16.4 Identifying Exfiltration Channels
Identifying Exfiltration Channels
Downloading files from SharePoint is not exfiltration — it is normal work. Exfiltration is the transfer of those files out of the organisation’s control. Each exfiltration channel has different telemetry.
Channel 1: Personal cloud storage
| |
What to look for: Browser-based uploads (InitiatingProcessFileName = “chrome.exe” or “msedge.exe”) to personal cloud storage domains. Also check for desktop sync clients: “Dropbox.exe,” “googledrivesync.exe,” or “OneDrive.exe” connecting to personal (not corporate) OneDrive.
DLP correlation: If Purview DLP policies are configured (Module 3), check for DLP policy matches on the same files:
| |
Channel 2: USB devices
| |
Cross-reference USB mount times with DeviceFileEvents showing file writes to non-system drives (subsection 16.3 Step 4). A USB mount at 22:00 followed by file writes to the USB drive is a strong exfiltration indicator — especially if the files match the bulk downloads from SharePoint.
Channel 3: Personal email
| |
What to look for: Emails to personal addresses (gmail.com, outlook.com, yahoo.com) with attachments — especially if the attachment file names match the files downloaded from SharePoint. Also check for emails to the competitor’s domain (if known).
Channel 4: Print
| |
Printing is a low-tech exfiltration method that bypasses all digital controls. If Marcus printed proprietary design documents: the physical copies leave the building. Detection depends on Defender for Endpoint’s print monitoring capability.
Channel 5: Screen capture and photography
No reliable telemetry for photographing a screen with a phone. Screen capture (screenshot tools, screen recording software) may appear in DeviceProcessEvents:
| |
Limitation: This is the least detectable exfiltration channel. A user who photographs their screen with a personal phone leaves no M365 telemetry. This is why preventive controls (DLP, USB blocking) and deterrent controls (acceptable use policy, security awareness) exist — to prevent the exfiltration before it happens, because detection after the fact may be impossible.
Compile the exfiltration channel assessment
| Channel | Evidence Found | Volume | Files |
|---|---|---|---|
| Personal cloud (Dropbox) | Yes — 3 upload sessions | ~200MB | Design specs, pricing |
| USB device | Yes — mounted 30 Mar 22:00 | ~450MB | CAD drawings |
| Personal email | Yes — 2 emails to gmail | 5 attachments | Client contact lists |
| No evidence | — | — | |
| Screen capture | No evidence (low detectability) | — | — |
Subsection artifact: The 5 exfiltration channel queries and the channel assessment table. These form the exfiltration analysis section of your insider threat investigation playbook.
Knowledge check
Correlating across channels — building the exfiltration narrative
Individual channel findings are indicators. The narrative emerges when you correlate across channels:
Stage 1: Reconnaissance (SharePoint). Marcus accesses the Design Archive site (not in his baseline) and downloads 67 product specification files over 3 days.
Stage 2: Staging (Local device). DeviceFileEvents shows the 67 files moved from the Downloads folder to a folder named “Personal” on the Desktop. This is staging — organising files for transfer.
Stage 3: Transfer (USB + Cloud). On 30 March at 22:00, a USB drive is mounted. 45 of the 67 files are copied to the USB. The remaining 22 files (too large for USB) are uploaded to a personal Dropbox account the following morning.
Stage 4: Cleanup (Email). Marcus sends 5 emails with attachments to his personal Gmail — the client contact lists that were not included in the USB or Dropbox transfers.
The exfiltration narrative for the IR report: “Between 25-31 March, Marcus Chen downloaded 67 proprietary product specification files from the Design Archive (outside his normal access scope). He staged the files locally, transferred 45 to a USB device during after-hours, uploaded 22 to personal Dropbox cloud storage, and emailed 5 client contact lists to his personal Gmail. The exfiltration used three separate channels, suggesting deliberate planning to maximise the data transferred before his departure on 15 April.”
This narrative — supported by timestamped evidence from 4 data sources — is what HR and legal need to make their decision. It is factual, chronological, and does not speculate about intent. The pattern speaks for itself.
| |
This combined timeline query is the single most valuable query in an insider threat investigation. It shows every data movement across every channel in chronological order — the complete exfiltration story in one view.
Check your understanding
1. Marcus mounted a USB drive at 22:00 (outside business hours) and copied 450MB of CAD drawings. What does the timing tell you?