Investigating using Hawk
Introduction
Hawk is a free, open-source PowerShell module that streamlines the collection of forensic data from Microsoft cloud environments. Designed primarily for security professionals, incident responders, and administrators, Hawk automates the gathering of critical log data across Microsoft services, with a focus on Microsoft 365 (M365) and Microsoft Entra ID.
Core Capabilities
Data Collection: Efficiently gather forensic data with automated collection processes
Security Analysis: Examine security configurations, audit logs, and user activities
Export & Report: Generate both CSV reports and JSON data for SIEM integration
What Hawk is and isn't
While Hawk includes basic analysis capabilities to flag potential items of interest (such as suspicious mail forwarding rules, over-privileged applications, or risky user activities), it is fundamentally a data collection tool rather than an automated threat detection system.
Hawk streamlines data collection compared to manually running individual queries through web interfaces, freeing up those resources for other administrative tasks. The tool's goal is to quickly get you the data needed to come to a conclusion; not to make the conclusion for you.
Investigation Types
Hawk offers two main investigation approaches:
Tenant Investigations
Examines broader Microsoft Cloud tenant settings, audit logs, and security configurations
Provides an excellent starting point for identifying suspicious patterns
Use
Start-HawkTenantInvestigation
to begin a tenant-wide investigation
User Investigations
Performs deep-dive analysis into individual user accounts
Examines mailbox configurations, inbox rules, and login histories
Use
Start-HawkUserInvestigation -UserPrincipleName <user@domain.com>
to investigate specific users
Understanding Output
Hawk organizes investigation results into a structured directory hierarchy:
Files prefixed with _Investigate_
contain potentially suspicious findings that warrant further review.
System Requirements
Windows operating system with administrator access
PowerShell 5.0 or above (PowerShell Core will be supported in future)
Network connectivity to:
PowerShell Gallery
Graph API
Microsoft 365 services
1. Preparation and Initial Setup
A. Gather Necessary Permissions
Ensure you have appropriate administrative permissions in the Microsoft 365 environment. This typically includes Global Administrator rights or, at a minimum, roles that allow you to access audit logs, mailbox settings, and security configurations.â
B. Install the Hawk PowerShell Module
Install Hawk by launching PowerShell with administrative privileges and executing:â
If prompted about installing from an untrusted repository, confirm by typing 'Y' and pressing Enter. âPractical 365
c. Set Up an Output Directory
Create a dedicated directory to store the data extracts from Hawk:âPractical 365
2. Conduct a Tenant-Wide Investigation
A. Connect to Necessary Services
Establish connections to Exchange Online and the Microsoft Online Service (MSOL):âPractical 365
B. Initiate the Tenant Investigation
Execute the tenant investigation to collect broad data across the organization:âPractical 365+1Hawk Forensics+1
This command collects logs and configurations from the past 30 days. âPractical 365
3. Perform a User-Specific Investigation
A. Identify Compromised Accounts
Review the tenant investigation results to pinpoint accounts exhibiting suspicious activity.â
B. Investigate Specific User Accounts
For each suspected account, run:â
Replace "user@example.com" with the actual User Principal Name (UPN) of the account under investigation. â
4. Analyze Collected Data
A. Review Sign-In Logs
Examine the sign-in logs for anomalies such as logins from unfamiliar locations or devices.â
B. Inspect Inbox Rules and Forwarding Settings
Check for unauthorized inbox rules or forwarding settings that could indicate malicious activity.â
C. Assess Mailbox Permissions
Verify that mailbox permissions have not been altered to grant unauthorized access.â
5. Implement Remediation Measures
A. Reset Compromised Credentials
Force password resets and revoke existing sessions for affected accounts.â
B. Remove Malicious Configurations
Delete any unauthorized inbox rules, forwarding settings, or application consents identified during the investigation.â
C. Enhance Security Posture
Implement measures such as enabling multi-factor authentication (MFA), disabling legacy protocols, and conducting security awareness training to prevent future incidents.
REFERENCES
Last updated
Was this helpful?