Documentation Index
Fetch the complete documentation index at: https://docs.petrasecurity.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
Overview
When an account is compromised, one of the first questions to answer is: what did the attacker read, send, or delete from the mailbox? Petra pulls Microsoft audit logs and surfaces this directly on the incident page, so you can quickly scope the blast radius without digging through raw logs.Step 1: Open the Incident Page
- Navigate to the Incidents tab in the top navigation.
- Click the incident for the compromised account.
Step 2: Check the Attack Impact Panel
The Attack Impact panel is on the incident page below the threat overview. It answers the email access question in two layers: a summary and a full per-email breakdown.Summary view
The summary shows four counters for the duration of the attacker’s access:| Counter | What it means |
|---|---|
| Accessed | Emails the attacker opened (MailItemsAccessed) |
| Sent | Emails sent by the attacker (Send, SendAs, SendOnBehalf) |
| Modified | Emails moved or drafted by the attacker (Create, Move) |
| Deleted | Emails deleted by the attacker (MoveToDeletedItems, SoftDelete, HardDelete) |
Petra preserves hard-deleted items. Even if the attacker tried to erase their tracks by hard-deleting emails, those events are captured and visible here.
Full view — per-email breakdown
Click Full in the top-right of the Attack Impact panel to expand the email-by-email table. Switch to the Emails tab if it isn’t already selected. Each row represents one unique email and shows:- Email Subject
- Operations — all attacker actions on that email (e.g. Read, Sent, Deleted)
- Folder — which folder the email was in
- From / To
- Attachments
- Last Activity
Pay special attention to Sent rows. Emails sent by the attacker are the most likely to require additional remediation — they may indicate trusted-third-party phishing sent from the compromised account to the victim’s contacts.
Step 3: Check the Exchange Logs for Deeper Filtering
For granular analysis, use the Exchange tab in the Logs Viewer (scroll below the Attack Impact panel):- Click the Exchange tab in the Logs Viewer.
- Use the Operation filter to focus on the actions you care about most.
- Filter not in:
MailItemsAccessed(Read) andUpdateto hide bulk read events and surface only high-value actions. - Filter in:
Send,SendAs,SendOnBehalfto isolate outbound emails the attacker sent. - Filter in:
SoftDelete,HardDelete,MoveToDeletedItemsto see what the attacker deleted.
- Filter not in:
- Use the Attachments filter to search for emails by attachment file name. This is useful for tracking data exfiltration or identifying phishing emails with specific attachments.
- Click any row to open the detail sidebar with full message metadata.
Step 4: Check for Email Forwarding Rules
A common post-compromise tactic is setting up a silent inbox rule to forward all incoming mail to an attacker-controlled address. Petra detects this automatically and surfaces it in the Remediation Actions Panel at the top of the incident page. Look for tagged items under Persistence:- New-InboxRule or Set-InboxRule — a rule was created or modified via PowerShell or the Exchange admin center
- UpdateInboxRules — a rule was created, modified, or deleted via Outlook or another MAPI client
- Rules with
Forward to,Forward as attachment to, orRedirect toconditions are direct evidence of ongoing email exfiltration
Step 5: Check for Delegated Mailbox Access
An attacker may have granted themselves or an accomplice access to the mailbox as a delegate, allowing ongoing access even after a password reset. Look for these in the Remediation Actions Panel under Persistence:- Add-MailboxPermission — full mailbox access granted to another account
- Add-RecipientPermission (
SendAs/SendOnBehalf) — the attacker granted another account the ability to send as the compromised user
Step 6: Check for Cross-Tenant Phishing
If you manage multiple tenants, check the Cross-Tenant Phish panel on the incident page. Petra automatically searches for the same phishing email across all of your managed tenants and shows where it was delivered. You can retract matching emails in bulk from this panel without switching between tenants. See Cross-Tenant Phishing for details.Step 7: Export for Deeper Analysis or Reporting
To export all Exchange activity for offline review:- In the Logs Viewer, go to the Exchange tab.
- Click Export at the top of the viewer.
- Open the downloaded Excel file.
- The Exchange tab contains all metadata for each event, including fields not visible in the web UI.
What to Look For — Summary
| Signal | What it indicates |
|---|---|
High Sent / SendAs count | Attacker sent phishing or exfiltration emails from the account |
HardDelete events | Attacker attempted to cover their tracks |
New-InboxRule / UpdateInboxRules with forwarding | Ongoing silent email exfiltration — remediate immediately |
Add-MailboxPermission | Attacker granted delegate access as a persistence mechanism |
MailItemsAccessed on sensitive folders | Attacker read sensitive emails (finance, HR, executive) |
Your clients will want to know whether sensitive emails were read and whether any external communications were sent from the account. The Attack Impact panel and Exchange logs give you the evidence needed to answer both questions precisely.