top of page

Investigating OneDrive for Business: Advanced Forensics & Audit Logs


Microsoft OneDrive for Business is a powerful enterprise cloud storage solution, distinct from the personal OneDrive available by default on Windows. With Microsoft 365 integration, extensive logging, and advanced security controls, it provides rich forensic opportunities for investigators.


🔹 Why Investigate OneDrive for Business?

✅ Tracks file uploads, downloads, deletions, and modifications

✅ Stores detailed metadata for all synchronized files

✅ Keeps 90 days of Unified Audit Logs (UAL) with granular user activity

✅ Logs file sharing events, including external access


🚀 Let’s dive into forensic artifacts, registry keys, logs, and the powerful Microsoft 365 Unified Audit Log (UAL).


-----------------------------------------------------------------------------------------------------


1️⃣ Identifying OneDrive for Business on a System

Unlike personal OneDrive, OneDrive for Business requires authentication with a Microsoft 365 account. A single system can sync:


One personal OneDrive account

Up to nine OneDrive for Business accounts


📌 Key File Locations for OneDrive for Business

Up to nine OneDrive for Business accounts

Artifact

Location

Synchronized Files

%UserProfile%\OneDrive - <CompanyName>\

Sync Metadata

%UserProfile%\AppData\Local\Microsoft\OneDrive\settings\Business1\SyncEngineDatabase.db

Sync Logs

%UserProfile%\AppData\Local\Microsoft\OneDrive\logs\Business1\

Audit Logs (Cloud-based)

Microsoft 365 Unified Audit Log

📌 Note: If multiple OneDrive for Business accounts exist, folders and settings will be named Business2, Business3, etc.

----------------------------------------------------------------------------------------------------------


2️⃣ Investigating OneDrive for Business Registry Keys

Forensic investigators must audit registry keys to determine:


The existence of OneDrive for Business accounts

User authentication details (email, last sign-in time, account names)

The actual sync folder location (which may differ from default)


📍 Registry Keys for OneDrive for Business:

NTUSER\Software\Microsoft\OneDrive\Accounts\Business1

Value

Description

UserFolder

Path to OneDrive for Business local storage

UserEmail

Microsoft 365 account email

UserName

Name of the user tied to the account

LastSignInTime

Last authentication timestamp (Unix Epoch)

ClientFirstSignInTimestamp

Timestamp of first authentication

SPOResourceID

SharePoint URL linked to OneDrive Business

📌 Key Insight: SPOResourceID confirms SharePoint integration, as OneDrive for Business leverages SharePoint for storage and sharing.

🔍 Tracking Shared Folders & External Sources:

NTUSER\Software\Microsoft\OneDrive\Accounts\Business1\Tenants

----------------------------------------------------------------------------------------------------------


3️⃣ OneDrive for Business Sync Logs & Metadata Analysis

Investigating OneDrive-Business for Sync Logs & Metadata Analysis is similar to analyzing data in a personal-OneDrive account.


Headline of the article

Advanced OneDrive Forensics: Investigating Cloud-Only Files & Synchronization



Part 3: Of the mentioned above Link/Article

3️⃣ Investigating Cloud-Only Files Using OneDrive Sync Database

----------------------------------------------------------------------------------------------------------


4️⃣ Microsoft 365 Unified Audit Logs (UAL) for OneDrive Business


OneDrive for Business integrates with Microsoft 365 Unified Audit Logs (UAL), providing detailed forensic tracking of user activity for 90 days.


📍 Accessing UAL Logs:

  • Microsoft 365 Security & Compliance Center

  • PowerShell (Search-UnifiedAuditLog)

  • Microsoft Graph API


📌 Key UAL Events for OneDrive Investigations:

Event Name

Description

FileAccessed

Tracks file views (noisy, consider FileAccessedExtended)

FileModified

Tracks file edits (use FileModifiedExtended for fewer entries)

FileDeleted

Tracks file deletions

FileDeletedFirstStageRecycleBin

Identifies files moved to the OneDrive Recycle Bin

FileDeletedSecondStageRecycleBin

Identifies permanently deleted files

FileDownloaded

Tracks files downloaded from OneDrive/SharePoint

AnonymousLinkCreated

Tracks externally shared files (links sent outside the organization)

FileSyncUploadedFull

Logs full file uploads

FileSyncDownloadedFull

Logs full file downloads


💡 Forensic Use:
  • Identify suspicious file downloads and deletions.

  • Track data exfiltration via external sharing (AnonymousLinkCreated).

  • Correlate file access patterns to suspicious login activity.



----------------------------------------------------------------------------------------------------------


5️⃣ Investigating External File Sharing & Data Exfiltration


Investigating OneDrive-Business for File Sharing & Data Exfiltration is similar to analyzing data in a personal-OneDrive account.


Headline of the article

Advanced OneDrive Forensics: Investigating Cloud-Only Files & Synchronization



Part 5: Of the mentioned above Link/Article

5️⃣ Tracking Shared Files & External Data Sources


----------------------------------------------------------------------------------------------------------


Final Thoughts: OneDrive for Business Forensics is a Goldmine for Investigators

🚀 Next Up: Google Drive for desktop– Investigating Enterprise Cloud Storage Activity 🔍


-------------------------------------------Dean-------------------------------------------------------

7 views0 comments

Recent Posts

See All

Comments


bottom of page