Skip to content

Access Modes in O365

When conducting cloud forensics with Binalyze Tornado for Office 365, you have two authentication methods available. Each method provides different levels of access and capabilities for data collection.

What is it?

  • Basic user authentication method
  • Uses individual Office 365 account credentials
  • Perfect for single-user investigations
  • Limited to personal data access

When to use?

  • Investigating a specific user’s activities
  • Collecting personal mailbox data
  • Analyzing individual Teams’ communications
  • Personal OneDrive file investigations

What is it?

  • Advanced authentication method
  • Requires administrative privileges
  • Organization-wide access
  • Includes all normal user capabilities plus administrative features

When to use?

  • Organization-wide investigations
  • Security incident response
  • Compliance audits
  • Multi-user data collection

Email Related Collectors:

  • Mail Collector
    • What it collects: Emails, attachments, and message metadata
    • Use case: Investigating email communications
    • Example: Collecting sent/received emails for analysis
  • Mail Folder Collector
    • What it collects: Email folder structure and organization
    • Use case: Understanding email organization patterns
    • Example: Analyzing custom folder setups
  • Mail Rule Collector
    • What it collects: Email rules and filters
    • Use case: Identifying automated email handling
    • Example: Discovering forwarding rules

Teams Related Collectors:

  • Teams Collector
    • What it collects: Teams channel data and files
    • Use case: Team collaboration analysis
    • Example: Investigating shared content
  • Teams Chat Collector
    • What it collects: Direct messages and chat history
    • Use case: Communication pattern analysis
    • Example: Reviewing private conversations

Additional Service Collectors:

  • OneDrive Collector
    • What it collects: Cloud storage files and metadata
    • Use case: File activity investigation
    • Example: Tracking file sharing history
  • Calendar Collector
    • What it collects: Calendar events and meetings
    • Use case: Activity timeline analysis
    • Example: Mapping user schedules
  • All Normal User Collectors
    • Access to all collectors listed above
    • Can be applied to any user in the organization
    • Broader scope of data collection

Administrative Collectors:

  • Entra Sign-In Collector
    • What it collects: User authentication logs
    • Use case: Security monitoring
    • Example: Detecting suspicious login attempts
  • Entra Directory Audit Collector
    • What it collects: Azure AD audit logs
    • Use case: Administrative action tracking
    • Example: Monitoring permission changes

FeatureNormal User LoginAdmin Consent Login
Access ScopePersonal data onlyOrganization-wide data
Data CollectionLimited to authenticated userAll users and administrative data
Best ForIndividual investigationsEnterprise-level investigations
AdvantagesSimple, user-specific analysisComplete visibility of organization data
LimitationsCannot access other users’ dataRequires admin credentials
Use Case Example”I need to investigate my own email communications from last month.""I need to investigate all email communications within the finance department.”