16.3 Activity Reconstruction
Activity Reconstruction
Build a complete picture of Marcus’ data access and transfer activity over the past 30 days. The goal is not to find a single smoking gun — it is to reconstruct the entire pattern and let the pattern tell the story.
Required role: Microsoft Sentinel Reader. Defender for Endpoint Security Reader (for device telemetry).
Step 1: Establish the baseline — what is normal for Marcus?
Before assessing whether recent activity is anomalous, establish what Marcus’ normal activity looks like:
| |
What this establishes: Marcus’ normal daily file access volume. If he typically downloads 5-10 files per day and the past 2 weeks show 50-100 per day, that is a 10x deviation — significant. If the past 2 weeks show 8-12 per day, that is within normal variation — not indicative of exfiltration.
Step 2: Recent activity — the investigation window
| |
Visualise the trend. Export to Excel or use a Sentinel workbook. You are looking for a step change — a sudden increase in download volume that correlates with the resignation date (31 March) or the weeks leading up to it. Departing employees typically start exfiltration 2-4 weeks before their last day — often starting slowly and accelerating as the last day approaches.
Step 3: What files were accessed?
| |
What to examine: File names and paths reveal what Marcus was accessing. Look for: proprietary design documents (CAD files, specifications, manufacturing drawings), client project files (proposal documents, contracts, deliverables), financial data (pricing models, cost structures), and source code or IP. Cross-reference with Marcus’ job responsibilities: accessing files related to his current projects is normal. Accessing files from projects he is not assigned to, or from historical archives, is anomalous.
Step 4: Device-level file operations
CloudAppEvents covers SharePoint and OneDrive. For local file operations (USB copy, local folder moves), use Defender for Endpoint telemetry:
| |
What to look for: Files created on removable drives (USB) — the FolderPath will show a non-system drive letter (D:, E:, F:). Files moved to the Downloads folder or Desktop (staging for transfer). Files renamed to obscure their content (“project-docs.zip” renamed to “photos-march.zip”).
Step 5: Build the activity timeline
Compile the findings into a chronological timeline:
| Date | Activity | Volume | Files | Channel |
|---|---|---|---|---|
| 18 Mar | Normal file access | 8 files | Current project docs | SharePoint |
| 25 Mar | Increased downloads | 34 files | Product specs + client docs | SharePoint |
| 28 Mar | Bulk download | 67 files | Design archive + pricing models | SharePoint |
| 30 Mar | USB file transfer | 12 files | CAD drawings + specs | USB (D: drive) |
| 31 Mar | Resignation submitted | — | — | — |
| 1 Apr | HR referral | — | — | — |
This timeline is the primary evidence in the investigation report. Each row must be supported by the query output — time, file name, path, size, and the source query.
Subsection artifact: The 4-step activity reconstruction queries and the timeline template. These form the core of your insider threat investigation playbook.
Knowledge check
Contextualising the findings — legitimate vs suspicious
Raw data shows what happened. Context determines whether it is suspicious. For every anomaly, consider these questions before reporting to HR:
Is there a legitimate business reason? A 5x increase in file downloads the week before a project deadline is normal. A 5x increase the week after resignation with no active project assignments is suspicious. Check the subject’s current project workload with their manager (via HR — not directly).
Is the access within the subject’s normal scope? A senior engineer downloading design documents from their own project sites is normal. The same engineer downloading documents from 5 project sites they are not assigned to — including archived projects from 3 years ago — is anomalous. Cross-reference accessed files against the subject’s SharePoint site memberships and project assignments.
Is the timing unusual? File downloads during business hours from the office IP may be normal work. The same downloads at 23:00 from a home IP the night after resignation may indicate staging for exfiltration. Correlate timing with the subject’s normal work patterns.
| |
Sites that appear in the investigation window but NOT in the 6-month baseline are new access — the subject is downloading from sites they have not previously used. This is the strongest file access anomaly indicator.
Try it yourself
Run the SharePoint site baseline comparison for your own account (substituting your display name). How many sites do you typically access? How consistent is the set over 6 months? Now imagine you are investigating a departing employee: what would a new-site-access alert look like in your environment? This builds the baseline understanding that makes insider threat investigation effective.
What you should observe
Most users access 3-8 SharePoint sites consistently. A departing employee accessing 15+ sites — including archived project sites — is a clear anomaly. The new-site query surfaces exactly this pattern.
Check your understanding
1. Marcus' baseline shows 8 file downloads per day. The past week shows 45 per day. Is this conclusive evidence of exfiltration?