Common questions
- Was the mailbox accessed without authorization
- Were rules or forwarding settings changed
- What accounts or devices were involved
- When did suspicious activity begin
- Were messages deleted, moved, or altered
- Do the records support the reported sequence of events