Internal investigations
Review communications, user activity, device artifacts, cloud data, and access records to support privileged or management led fact finding.
Business forensics
Review of account activity, employee devices, email records, cloud data, and access questions.
Investigative focus
Business forensic work often happens under time pressure. The process still has to preserve records, respect scope, and produce findings that can be reviewed later.
Review communications, user activity, device artifacts, cloud data, and access records to support privileged or management led fact finding.
Assess file handling, external device use, cloud sync, downloads, transfers, account access, and document movement around departure windows.
Interpret sign ins, security alerts, recovery events, mailbox rules, access geography, and attacker persistence indicators.
Evaluate whether sensitive systems, files, accounts, or communication platforms were accessed, copied, modified, or shared.
Reconstruct the timeline of mailbox access, spoofing, forwarding rules, payment diversion, and message handling.
Common questions
Review file activity, removable media records, cloud sync folders, downloads, and account logs.
Evaluate login records, security alerts, recovery events, mailbox settings, and suspicious access patterns.
Examine mailbox configuration, message trace, forwarding rules, and related timing.
Review endpoint artifacts, USB records, cloud folders, document movement, and departure window activity.
Compare the claim against source records, timing, account activity, and alternate explanations.
Evidence handled with restraint
Rune Forensics can work with outside counsel, internal legal teams, executives, insurers, or investigators to keep the evidence review proportional and controlled.
Identify relevant custodians, devices, accounts, logs, and cloud sources before volatile evidence disappears.
Focus analysis on defined questions and relevant records rather than broad, intrusive review.
Compare endpoint artifacts, cloud activity, email events, and access records to avoid single source assumptions.
Deliver practical findings for counsel, leadership, insurance review, negotiation, or litigation strategy.
Common evidence sources
User activity, files, external devices, cloud sync folders, browser records, execution artifacts, and system logs.
Microsoft 365, Google Workspace, cloud storage, account settings, audit logs, sign in history, and sharing records.
Message headers, mailbox rules, message trace, forwarding activity, authentication events, and security alerts.
Work phones, chats, media, attachments, notifications, app records, and communication timelines.
Business inquiry