Mayo's Outlook Forensics

Email Breach Investigation & Analysis Tool

Welcome to Outlook Forensics Tool

What This Tool Does For You

If you're investigating a potential email breach, this tool helps you:

  1. Find the smoking gun - Load Microsoft Purview audit logs and quickly spot suspicious email access patterns
  2. Get the actual compromised emails - Extract specific emails from PST files based on the audit trail
  3. Scan for sensitive data - Automatically search through emails and attachments for keywords like "password", "SSN", etc.
  4. Create interactable reports - Generate HTML reports you can actually share with management or law enforcement

Bottom line: You go from "we think someone accessed emails" to "here are the exact 47 emails they viewed, and 12 of them contained sensitive customer data."

What the Application Looks Like

Here's what you'll see when you run the tool - a clean, professional interface designed for forensic investigations:

Audit Log Analysis Tab

Audit Log Analysis Interface

Load and analyze Microsoft Purview audit logs with filtering and export capabilities.

Email Extraction Tab

Email Extraction Interface

Extract specific emails from PST files and scan for sensitive keywords.

What You'll Actually Get

When you're done with an investigation, you'll have:

Sortable HTML Reports

Interactive reports showing exactly when suspicious access happened

Individual Email Files

Each compromised message exported in .eml format for detailed analysis

Keyword Summaries

Complete breakdown of what sensitive keywords were found and where

Interactive Documentation

Professional reports suitable for incident reports and legal proceedings

Two Tools in One

This combines two separate investigation workflows:

Tab 1: Audit Log Analysis

  • Load those massive CSV files from Microsoft Purview
  • Filter out the noise to focus on actual suspicious activity
  • Export clean, readable reports instead of spreadsheet hell

Tab 2: Email Extraction

  • Pull specific emails from PST files using the IDs you found in the audit logs
  • Scan through email content and attachments for sensitive data
  • Generate keyword match reports

The tabs talk to each other - you can send email IDs directly from the audit analysis to the extraction tool.

Installation Guide

Windows Executable

Pre-built Windows executable with everything included. No installation required!

What's Included:

  • OutlookForensics.exe (~42MB)
  • Built-in PST extraction (readpst)
  • Sample keywords file
  • User documentation

Instructions: Download → Extract → Double-click OutlookForensics.exe

How to Use This Tool

Step 1: Start with the Audit Logs

  1. Get your Microsoft Purview audit log CSV file
    • Purview → Audit → Search → Activities - friendly names → select everything under "Exchange mailbox activities"
  2. Load it in the first tab
  3. (Optional) Set your timezone so timestamps make sense
  4. Filter by suspicious IP addresses or date ranges
    • Due to widespread use of VPNs by attackers, more often than not you will need to filter out friendly activity instead.
  5. Export to HTML to see what you're dealing with
  6. Go back and refine the filters to filter out as much "friendly" activity as possible

Step 2: Get the Compromised Email IDs

  • Click "Send MailItemsAccessed IDs to Extraction Tab"
    • This finds all the email Message-IDs that were accessed suspiciously
    • They automatically get loaded into the second tab
  • (Optional) "HardDelete", "Send", and other message ID's can also be extracted from the HTML from "Digested Information" tab

Step 3: Extract and Scan the Actual Emails

  1. Switch to the Email Extraction tab
  2. Browse for affected PST file (usually huge)
  3. Pick an output folder
  4. Load a keywords file (one keyword per line - "password", "ssn", etc.)
    • Feel free to add your own, or remove any keywords
  5. Click "Import from Audit Tab" to load those email IDs
  6. Hit "Extract & Scan Emails" and wait
  7. (Optional) Work with the person who got phished to identify which of those emails were accessed by them to refine the filters again.

Step 4: Check Your Results

The HTML reports are what you actually want to look at. They're sortable and you can send them to people who need to understand what happened.

What Files You'll Get

From Audit Log Analysis:

  • HTML report with sortable timeline of suspicious access
  • CSV files split by IP address (if you want them)
  • Filtered data exports

From Email Extraction:

  • Individual .eml files for each compromised email
  • Folders with extracted attachments
  • CSV summary showing which emails had sensitive keywords
  • HTML report with keyword match details

File Types It Can Scan

  • Emails: Regular email body text (plain and HTML)
  • Attachments: PDF, Word docs, Excel sheets, images, and text files

Important Security Notes

This tool processes potentially sensitive breach data:

  • Only run it on secure, trusted computers
  • Don't leave extracted emails sitting around afterward
  • Be careful who you share the HTML reports with
  • Follow your organization's data handling policies
  • Consider encrypting the output folder

Performance Tips

  • Large PST files: Extract to a local drive, not network storage
  • Lots of keywords: Start with a few specific ones first
  • Memory issues: Close other apps, especially browsers with lots of tabs
  • Network drives: Copy PST files locally before processing

Sample Reports

Here are examples of the HTML reports generated by the tool. These demonstrate the kind of interactive analysis you'll get from your investigations. All sensitive and personally identifiable information has been removed from these samples.

What You're Looking At

Audit Log Analysis: Shows timeline of suspicious email access activities, filterable by IP address, date, and activity type.

Email Keyword Scan: Displays emails and attachments that contained sensitive information, with detailed keyword match counts.

Both reports are fully interactive - you can sort, filter, and drill down into specific incidents for detailed analysis.