Accessing Office 365

When conducting cloud forensics with Binalyze Tornado for Office 365, you can choose between two authentication methods, each offering different levels of access and data collection capabilities.


1. Normal User Login

What is it?

  • Basic user authentication method

  • Uses individual Office 365 account credentials

  • Ideal for single-user investigations

  • Limited to personal data access

When to use it?

  • Investigating a specific user's activities

  • Collecting personal mailbox data

  • Analyzing individual Teams communications

  • Reviewing personal OneDrive files


2. Admin Consent Login

What is it?

  • Advanced authentication method requiring administrative privileges

  • Provides organization-wide access

  • Includes all Normal User Login capabilities plus administrative features

When to use it?

  • Organization-wide investigations

  • Security incident response

  • Compliance audits

  • Multi-user data collection


Available Collectors by Access Mode

Normal User Login Collectors

Email Collectors

  • Mail Collector

    • What it collects: Emails, attachments, and message metadata

    • Use case: Investigating email communications

    • Example: Analyzing sent and received emails

  • Mail Folder Collector

    • What it collects: Email folder structure and organization

    • Use case: Understanding email organization patterns

    • Example: Reviewing custom folder setups

  • Mail Rule Collector

    • What it collects: Email rules and filters

    • Use case: Identifying automated email handling

    • Example: Discovering forwarding rules

Teams Collectors

  • Teams Collector

    • What it collects: Teams channel data and files

    • Use case: Analyzing team collaboration

    • Example: Investigating shared content

  • Teams Chat Collector

    • What it collects: Direct messages and chat history

    • Use case: Communication pattern analysis

    • Example: Reviewing private conversations

Additional Collectors

  • OneDrive Collector

    • What it collects: Cloud storage files and metadata

    • Use case: File activity investigation

    • Example: Tracking file-sharing history

  • Calendar Collector

    • What it collects: Calendar events and meetings

    • Use case: Activity timeline analysis

    • Example: Mapping user schedules


Admin Consent Login Collectors

1. All Normal User Login Collectors

  • Includes access to all Normal User Login collectors with organization-wide scope

  • Applicable to any user in the organization

2. Administrative Collectors

  • Entra Sign-In Collector

    • What it collects: User authentication logs

    • Use case: Security monitoring

    • Example: Detecting suspicious login attempts

  • Entra Directory Audit Collector

    • What it collects: Azure AD audit logs

    • Use case: Tracking administrative actions

    • Example: Monitoring permission changes


Key Differences Between Access Modes

Feature

Normal User Login

Admin Consent Login

Access Scope

Personal data only

Organization-wide data

Data Collection

Limited to authenticated user

All users and administrative data

Best For

Individual investigations

Enterprise-level investigations

Advantages

Simple, user-specific analysis

Complete visibility of organization data

Limitations

Cannot access other users' data

Requires admin credentials

Use Case Example

"I need to investigate my own email communications from last month."

"I need to investigate all email communications within the finance department."


Last updated