Overview
When an account is compromised, one of the first questions to answer is: what did the attacker read, send, or delete from the mailbox? Petra pulls Microsoft audit logs and surfaces this directly on the incident page, so you can quickly scope the blast radius without digging through raw logs.Step 1: Open the Incident Page
- Navigate to the Incidents tab in the top navigation.
- Click the incident for the compromised account.
Step 2: Check the Attack Impact Panel
The Attack Impact panel is on the incident page below the threat overview. It answers the email access question in two layers: a summary and a full per-email breakdown.Summary view
The summary shows four counters for the duration of the attacker’s access:| Counter | What it means |
|---|---|
| Accessed | Emails the attacker opened (MailItemsAccessed) |
| Sent | Emails sent by the attacker (Send, SendAs, SendOnBehalf) |
| Modified | Emails moved or drafted by the attacker (Create, Move) |
| Deleted | Emails deleted by the attacker (MoveToDeletedItems, SoftDelete, HardDelete) |
Petra preserves hard-deleted items. Even if the attacker tried to erase their tracks by hard-deleting emails, those events are captured and visible here.
Full view — per-email breakdown
Click Full in the top-right of the Attack Impact panel to expand the email-by-email table. Switch to the Emails tab if it isn’t already selected. Each row represents one unique email and shows:- Email Subject
- Operations — all attacker actions on that email (e.g. Read, Sent, Deleted)
- Folder — which folder the email was in
- From / To
- Attachments
- Last Activity
Pay special attention to Sent rows. Emails sent by the attacker are the most likely to require additional remediation — they may indicate trusted-third-party phishing sent from the compromised account to the victim’s contacts.
Step 3: Check the Exchange Logs for Deeper Filtering
For granular analysis, use the Exchange tab in the Logs Viewer (scroll below the Attack Impact panel):- Click the Exchange tab in the Logs Viewer.
- Use the Operation filter to focus on the actions you care about most.
- Filter not in:
MailItemsAccessed(Read) andUpdateto hide bulk read events and surface only high-value actions. - Filter in:
Send,SendAs,SendOnBehalfto isolate outbound emails the attacker sent. - Filter in:
SoftDelete,HardDelete,MoveToDeletedItemsto see what the attacker deleted.
- Filter not in:
- Click any row to open the detail sidebar with full message metadata.
Step 4: Check for Email Forwarding Rules
A common post-compromise tactic is setting up a silent inbox rule to forward all incoming mail to an attacker-controlled address. Petra detects this automatically and surfaces it in the Remediation Actions Panel at the top of the incident page. Look for tagged items under Persistence:- New-InboxRule or Set-InboxRule — indicates a rule was created or modified
- Rules with
Forward to,Forward as attachment to, orRedirect toconditions are direct evidence of ongoing email exfiltration
Step 5: Check for Delegated Mailbox Access
An attacker may have granted themselves or an accomplice access to the mailbox as a delegate, allowing ongoing access even after a password reset. Look for these in the Remediation Actions Panel under Persistence:- Add-MailboxPermission — full mailbox access granted to another account
- Add-RecipientPermission (
SendAs/SendOnBehalf) — the attacker granted another account the ability to send as the compromised user
Step 6: Export for Deeper Analysis or Reporting
To export all Exchange activity for offline review:- In the Logs Viewer, go to the Exchange tab.
- Click Export at the top of the viewer.
- Open the downloaded Excel file.
- The Exchange tab contains all metadata for each event, including fields not visible in the web UI.
What to Look For — Summary
| Signal | What it indicates |
|---|---|
High Sent / SendAs count | Attacker sent phishing or exfiltration emails from the account |
HardDelete events | Attacker attempted to cover their tracks |
New-InboxRule with forwarding | Ongoing silent email exfiltration — remediate immediately |
Add-MailboxPermission | Attacker granted delegate access as a persistence mechanism |
MailItemsAccessed on sensitive folders | Attacker read sensitive emails (finance, HR, executive) |
Your clients will want to know whether sensitive emails were read and whether any external communications were sent from the account. The Attack Impact panel and Exchange logs give you the evidence needed to answer both questions precisely.