
Looking for the Portal? Visit app.petrasecurity.com.
Getting started
The first step is to get access to Petra. You can request access here.Next Steps
About Us
Learn more about Petra Security and how we detect and protect against M365 attacks.
Read our Research
We share detection research and insights weekly.
Remediate an Incident
Remediate an incident and one-click remove persistence mechanisms, whether real-time or
for a BEC IR case.
Investigate Behavior
Investigate what an attacker did/accessed. Then, dig into benign behavior like benign proxy/VPN use and failed attacks.