Message Trace Logs

m365-azureEmail SecurityCloud Admin Portal

Location

Exchange Admin Center > Mail flow > Message trace (or Get-MessageTrace cmdlet)

Description

Email transport logs recording sender, recipient, subject, message ID, delivery status, and connector details for all messages processed by Exchange Online in the last 90 days.

Forensic Value

Message trace reconstructs the full email delivery chain for phishing investigations -- confirming which users received a malicious message, whether it was delivered to the inbox or quarantined, and if any users forwarded it. Outbound message traces detect data exfiltration via email, especially when filtered by large attachment sizes or external recipients not in the organization directory.

Tools Required

Exchange Admin CenterPowerShell (Get-MessageTrace)PowerShell (Get-MessageTraceDetail)

Related Blockers

No EDR Agent on Compromised Hosts

The affected endpoints do not have an EDR agent installed or the agent was disabled prior to the incident. Without endpoint telemetry you lose process trees, command-line logging, and real-time containment capability.

BitLocker/Encrypted Drives Preventing Forensic Imaging

Full-disk encryption (BitLocker, FileVault, LUKS) prevents mounting or imaging the drive without the recovery key. Without decryption you cannot access the filesystem for artifact collection.

Compromised Systems Powered Off or Disconnected

Key systems have been powered off by users, IT, or as part of a premature containment action. Volatile data (running processes, network connections, memory-resident malware) is lost. Remote collection tools cannot reach the host.

Shared Cloud Environment Complicates Isolation

The compromised workload runs in a multi-tenant cloud environment (shared subscription, Kubernetes cluster, or PaaS) where isolation actions may impact other tenants or business-critical services sharing the same infrastructure.

Systems Already Rebooted -- Volatile Data Lost

The affected systems have already been rebooted (by users, IT, or automated patch processes) before memory could be captured. Running processes, network connections, injected code, and encryption keys that existed only in RAM are no longer recoverable.

Backups May Be Compromised -- Cannot Trust for Recovery

Backup integrity is uncertain. The attacker may have been present in the environment long enough to have compromised backup copies, planted persistence mechanisms in backup images, or encrypted/deleted backup repositories.