top of page
Search

Petra Security: The UI, the Logs, and Why I Genuinely Prefer It Over Microsoft Sentinel

  • 23 hours ago
  • 5 min read

Updated: 31 minutes ago


Let me start with a personal opinion:

I really like Petra Security’s user interface. No offense to Microsoft Sentinel, but Petra’s UI feels modern, intuitive, and built for real-world investigation. With Microsoft, things are powerful — no doubt — but often buried in layers of menus and dashboards.

Petra, on the other hand? Everything is just… right there.

And that makes a big difference when you're knee-deep in incident response or hunting through user activity.


------------------------------------------------------------------------------------------------------------


🔍 Not a Full Microsoft 365 Monitor — But the Best for What Matters Most

Petra doesn’t aim to replace Microsoft Defender, Sentinel, or all your SIEM tools. It's not trying to be everything.

But what it does focus on — identity and account activity — it does exceptionally well.

Once the Petra app is approved by a Microsoft 365 admin (using OAuth), it starts collecting and analyzing the most critical logs in your environment:

  • Entra ID (formerly Azure AD)

  • Exchange Online

  • SharePoint

  • Microsoft Teams


Yes, logins are tracked — but they’re only about 2% of the story. The real value lies in everything else.


------------------------------------------------------------------------------------------------------------


🧑‍💼 User Intelligence: Before Logs Come In, Petra Knows the User

Before we even touch logs, Petra collects rich identity information for every user:

  • Full name and email

  • Job title

  • Whether the account is active or disabled

  • Last password change

  • Assigned Employee ID (if any)

  • Phone number (if present)

  • Authentication method: whether the user uses just a password, or also has MFA like Microsoft Authenticator


And this part is so underrated. In Microsoft, you have to dig into separate portals or click multiple layers deep to get all this info. In Petra, it's presented in one clean view — which is super helpful during investigations.

You can even quickly check which users don’t have MFA enabled — something every security team should monitor.

Because let’s be real: if users don’t have MFA set up, and your security team doesn’t catch it — it’s a problem.

------------------------------------------------------------------------------------------------------------


🧭 The “Activity” Tab — Petra’s Unified Log View

Petra doesn’t just give you logs. It gives you investigative context in a timeline. And it calls this the Activity panel.

You can see everything here:

  • Successful and failed login attempts

  • File accesses

  • Inbox actions

  • SharePoint interactions

  • Teams activity

Everything is filterable.

Let’s say you want to find all failed logins — easy. Just filter for Incorrect password and boom, it’s there.


Want to drill down on one user’s failed password attempts? Add that user email as a filter in username column and you're done.


This isn’t just helpful — it’s fast. Investigators can zero in on anomalies within seconds.

------------------------------------------------------------------------------------------------------------


📧 Exchange Logs — The Gold Standard for Email Investigation

Here’s where Petra really won me over: the way it handles Exchange activity.


You can see:

  • Emails received, read, sent, and deleted

  • Actions performed by the user

  • Subject lines of the emails 😍 (yes, subject lines — very helpful in investigation)

  • Email rules created by the user

  • Got a suspicion about a phishing email that led to compromise?

    Go check the subject line and delivery time. Done.


  • Want to see if the attacker set up a malicious inbox rule?

Filter for inbox rule creation — it’s that easy.


Petra even captures:

  • Transport rules

  • Mail sync events

  • External sharing

  • Delegate access

Everything — in one pane.

Filters: (Few And Many more)
















No more switching between Microsoft 365 Security Center, Exchange Admin Center, and Sentinel. It’s all here. That’s what I love about Petra.

------------------------------------------------------------------------------------------------------------


When it comes to Microsoft 365 investigations, we often talk about logins and email activity — but there’s so much more beneath the surface. And honestly, SharePoint and OneDrive logs are where a lot of the real impact lives.


Think about it: attackers don’t just want to log in — they want to steal data. And where is that data?

👉 SharePoint and OneDrive.

That’s why I was genuinely impressed by how Petra Security handles these logs.


🧾 Every File Interaction Captured: SharePoint & OneDrive

Petra tracks everything a user does inside SharePoint and OneDrive:


  • ✅ File Accessed

  • ✏️ File Modified

  • 📥 File Downloaded

  • 🔁 File Synced


You might ask, “Why is this so important?”

Well, let me walk you through a real-world scenario — especially for those newer to incident response.


🧠 Scenario: The Silent Breach

An attacker gains access to an M365 account. There’s no suspicious email activity and no new inbox rules.


But in SharePoint:

  • They browse a folder named “Payment Docs”

  • Download Invoices_Q4_2025.xlsx

  • Sync an entire user directory to their machine

  • Access a document called passwords.txt


Now without Petra, this might go completely unnoticed — especially if you're only reviewing login logs.

But Petra stitches everything together. You can filter for downloads, file syncs, and modifications. You’ll see timestamps, file names, actions taken, and the user’s IP or device.

This is why SharePoint and OneDrive logs matter. Petra gives them the attention they deserve.


------------------------------------------------------------------------------------------------------------


💬 Teams Logs: Chat, Meetings, File Sharing

We won’t go too deep here, but yes — Petra also tracks Teams activity. That includes:

  • 🧵 New chats created

  • 📎 Links or files shared

  • 📅 Meetings scheduled

  • 👤 Participant joins/leaves and Many More

These logs are crucial for spotting lateral movement, phishing via Teams, or even attackers trying to extract data from group chats.


------------------------------------------------------------------------------------------------------------


🔐 Authentication Logs: Who Changed What?

Petra tracks authentication method changes across all users. So, you’ll know:

  • When a user removed MFA

  • When they added a new method (like Microsoft Authenticator or SMS)

  • If they’re only using a password (⚠️ red flag!)


Why is this important?

Because often, attackers try to downgrade authentication after getting in. Seeing those changes in plain view — without digging — is a massive win for any SOC analyst.

------------------------------------------------------------------------------------------------------------


💻 Devices, Permissions, and App Registrations

Let’s talk about the remaining three log sources in Petra captured:

1. Devices Log

Tracks every device tied to a user — by:

  • Device name

  • User ID

  • Type (mobile/laptop/desktop)

Perfect for identifying rogue endpoints or signs of lateral movement.


2. Permissions Log

Want to know which users have admin rights or custom roles?

This log shows:

  • Role name

  • Role description

  • Assigned users

Very helpful during privilege reviews and investigations involving privilege escalation.


3. App Registration Log

Petra tracks all enterprise and personal apps added into your M365 environment.

You can see:

  • Which apps were installed

  • Who registered them

  • When they were added

This is where attackers sometimes try to sneak in persistence — by registering apps with elevated API access.


------------------------------------------------------------------------------------------------------------

🚨 All of This in One View — With Context

Seeing all of this in one interface, filterable by:

  • IP

  • User

  • Country

  • Device

  • App

  • Log type

…is honestly what sets Petra apart. It’s centralized, simple, and fast.

------------------------------------------------------------------------------------------------------------

No flipping through five admin portals. No writing KQL queries. Just answers.

------------------------------------------------------------------------------------------------------------


⚡ Coming Up: Petra's Claim of “Zero False Positives” — Real or Just Hype?


Petra claims to deliver 100% zero false positives.

That’s a bold statement.

Next, we’ll dive into what that really means, how their machine learning model works behind the scenes, and whether it actually delivers on this promise in real-world investigations.

Stay tuned. 👀

------------------------------------------------------------------------------------------------------------

Upcoming Article : (Petra Security’s “Incidents” Tab — A Game-Changerfor M365 Breach Investigations)

------------------------------------------------------------------------------------------------------------

 
 
 
bottom of page