Mailbox Audit Logs

m365-azureEmail SecurityCloud Admin Portal

Location

Exchange Admin Center or Search-MailboxAuditLog cmdlet

Description

Per-mailbox audit records capturing owner, delegate, and admin actions on mailbox items including MessageBind (read), SendAs, SendOnBehalf, MoveToDeletedItems, SoftDelete, HardDelete, and UpdateInboxRules.

Forensic Value

Mailbox audit logs are essential for BEC and email-based data theft investigations. MessageBind events with ClientInfoString containing "Client=OWA" from unusual IPs indicate webmail access from a compromised session. HardDelete operations suggest evidence destruction. UpdateInboxRules events reveal forwarding rules created to silently exfiltrate email. Delegate access logs expose when another account accessed the mailbox.

Tools Required

PowerShell (ExchangeOnlineManagement)Microsoft PurviewHawk

Related Blockers