Canadian Sovereignty threat Exercise: Intune managed IOS/Android

Objective & Context

This playbook outlines a one-time, covert data extraction from a Microsoft Intune-managed Android device under lawful U.S. FISA/CLOUD Act authority with Microsoft’s secret cooperation. The target device is corporate-managed (Intune MDM with conditional access), runs Microsoft Defender for Endpoint (mobile EDR) with telemetry on, and has Microsoft 365 apps (Outlook, OneDrive, SharePoint, Teams). The goal is to exfiltrate the user’s Outlook emails (and attachments), OneDrive/SharePoint documents, and Teams chats without persistent malware or tipping off the user or the Canadian enterprise’s SOC. This operation leverages Microsoft-native tools, Graph APIs, and Intune capabilities to impersonally access data, leaving minimal traces.

Reconnaissance & Preparation

  1. Intune Device Inventory & Compliance: Use Microsoft Graph (Intune API) or the Intune portal to gather device details: OS version, Intune compliance status, device ID, and a list of managed apps installed (confirm Outlook, OneDrive, Teams are present)learn.microsoft.com. Ensure the Android device is corporate-owned (fully managed or work profile), which allows silent app deployments and extensive policy control.

  2. Azure AD (Entra ID) & Sign-in Logs: Query Microsoft Entra ID (formerly Azure AD) logs for the target user. Identify recent sign-ins to Exchange Online, SharePoint, Teams, etc., from this device. These logs reveal which services the user accessed and when, helping pinpoint where data resides (e.g. if the user accessed specific SharePoint sites or downloaded certain files). They also provide the device’s Azure AD ID and compliance state used in Conditional Access.

  3. Defender Telemetry Review: Leverage Microsoft Defender for Endpoint telemetry for this Android device. Since MDE on Android can scan for malicious apps/fileslearn.microsoft.com, review alerts or signals that might incidentally reveal file names or email attachment scans. For example, if the user opened a malicious attachment, Defender logs could show the file path or name. Additionally, confirm the device is not flagged (no active malware or jailbreak-equivalent) to avoid Intune auto-remediation during the operation.

  4. M365 App Diagnostics (Stealth Recon): If available, use Intune’s “Collect Diagnostics” remote action on Outlook, OneDrive, or Teams appslearn.microsoft.com. This Intune feature can retrieve application logs without user involvement, especially if the device is under an App Protection Policy. The collected logs (available to admins or Microsoft support) may contain metadata like email headers, filenames, or usage patterns (e.g. recent document names or chat sync info) while excluding actual content by design. These logs help infer where important data might be (e.g. a log might show the user opened ProjectX.docx from OneDrive or accessed a Teams chat at a certain time). Note: This diagnostic collection is done quietly in the background and uploads logs to Intune; it does not interrupt the user or access personal fileslearn.microsoft.com. Ensure the diagnostic data is retrieved from Intune and examine it for clues (e.g. identifying a specific SharePoint site or team name to target).

Initial Access via Microsoft Cooperation

Because Microsoft is cooperating under lawful order, direct credential compromise is not needed. Instead, leverage privileged access channels:

Data Collection – Email, Files, Teams

Using Graph API and Microsoft 365 services, systematically collect the target data:

Exfiltration & Secure Transfer

After collection, aggregate the data and transfer it to the requesting authority’s secure storage. Because this is a one-time pull, use a secure channel (for example, an Azure Government storage blob or on-premises server controlled by investigators) to store the archive. This data exfiltration is done entirely via cloud – effectively, the data moved from Microsoft 365 to the authorized repository. From the device’s perspective, no unusual large upload occurs; any network activity is on Microsoft’s side. This prevents Defender for Endpoint or any on-device DLP from flagging exfiltration. Label the data with minimal identifiers (e.g. a case ID) and avoid any metadata that could alert enterprise admins if discovered.

If a temporary Intune-deployed tool or script was used on the device (for local cache data), ensure it sends its collected data over an encrypted channel (e.g. HTTPS to a gov server or Graph upload) and then self-deletes. The transfer should happen during off-hours or when the device is idle to reduce chances the user notices any slight performance or battery impact.

Covering Tracks & Cleanup

Detection Risks & Mitigations (Android)


Red Team Playbook – iOS (Enterprise-Managed Device)

Objective & Context

This playbook covers the covert data exfiltration from an Intune-managed iOS device under lawful order, parallel to the Android scenario. The target iPhone/iPad is corporate-owned (supervised via Apple Business Manager, enrolled in Intune), runs Defender for Endpoint for iOS (with telemetry), and uses the same Microsoft 365 apps: Outlook, OneDrive/SharePoint, Teams. The goal is identical: extract Outlook emails, attachments, OneDrive/SharePoint files, and Teams chats without persistence or user knowledge. Compared to Android, iOS’s security model is more restrictive, so this plan leans even more on cloud APIs and careful use of MDM capabilities. All actions use October 2025 capabilities of M365, Intune, and iOS MDM.

Reconnaissance & Preparation

  1. Intune Device Info & App Inventory: Gather the iOS device’s details from Intune (Graph API or portal) – confirm it’s in Supervised mode (critical for silent operations), check compliance status, and see the list of managed apps. Ensure Outlook, OneDrive, Teams are listed as managed apps; note their version and any managed app protection policies (e.g. is an App PIN required?). This context confirms what Intune can do silently on this device (supervision allows things like app push without promptseverythingaboutintune.com).

  2. Azure AD Sign-in & Audit Logs: Similar to Android, use Entra ID logs to identify the user’s activity. Specifically, note if the user’s iOS device had recent login refresh tokens or conditional access events for Exchange/SharePoint/Teams. These logs give device identifiers and help ensure the account is active on iOS. We might also discover if the user has multiple devices – if so, filter actions to the iOS device if needed (though our data extraction is cloud-based and device-agnostic).

  3. Defender for Endpoint Telemetry: On iOS, Defender’s telemetry is limited (it does anti-phishing and jailbreak detection, not deep file scanning)learn.microsoft.com. Review if any jailbreak alerts or risky app warnings exist – a jailbreak (if detected) would normally make Intune mark the device non-compliant, but if one occurred and somehow the device remained enrolled, it could both raise detection risk and paradoxically allow deeper access. (In our lawful scenario, we prefer the device not jailbroken to avoid Intune alerts.) Also check for any phishing alerts that indicate the user clicked certain links – this might hint at what services or sites they use, but it’s marginal intel. Overall, iOS Defender won’t provide file names or email content in telemetry, so it’s mostly to ensure no active security incident on the device that could interfere or notify the user.

  4. No Device-Level Diagnostics: Unlike Android, Intune cannot run arbitrary scripts on iOS, and while Intune’s Collect Diagnostics can gather some logs, on iOS this typically requires user consent (e.g. sending a sysdiagnose). There is a feature for collecting managed app logs, but it may prompt the user via the Company Portal on iOS. Because stealth is paramount, avoid any Intune action that would surface a notification on iOS. We skip direct device log collection unless absolutely necessary. (If we had to, one approach is asking Microsoft to leverage the M365 app diagnostics internally without user prompt – but this is not publicly documented for silent use. We assume no device log pulling to keep covert.) Thus, our reconnaissance relies almost entirely on cloud service logs and Intune inventory, rather than on-device probes.

Initial Access via Microsoft Cooperation

For iOS, direct device compromise or heavy MDM actions are off the table due to user transparency. Instead, we use Microsoft’s backend access similar to Android:

Note: We do not deploy any monitoring profile like an iOS “shared device” or VPN-based sniffer (though Defender uses a VPN for web protection, we won’t hijack that as it could be noticed). The cooperation path gives us easier cloud access to data.

Data Collection – Email, Files, Teams

The extraction of emails, files, and chats is conducted almost entirely via cloud APIs (identical to the Android approach):

All data is collected in a controlled environment on Microsoft’s side or an investigator’s system – nothing is pushed to or pulled from the iPhone directly during content collection.

Exfiltration & Secure Transfer

After using Graph and related APIs to gather the data, package it for exfiltration. Given Microsoft’s involvement, this may be as simple as Microsoft directly delivering the data to law enforcement via a secure channel, or the red team’s script uploading the data to a secure storage account. The transfer method is out-of-band from the device, so from the perspective of the iOS device and the enterprise network, it’s invisible.

If any data needed to be staged, it was done in Microsoft cloud (for instance, if using an eDiscovery case, data could be stored in Microsoft’s Compliance center for download). We ensure the final handoff is encrypted and authenticated (e.g., download over HTTPS from a Microsoft-controlled link, or shipping an encrypted drive). One-time access is fulfilled; no need for persistent access tokens beyond this operation.

Crucially, no exfiltration traffic originates from the iPhone itself. The device isn’t uploading gigabytes of data to an unusual host, so tools like Mobile Defender or network DLP can’t flag abnormal behavior.

Covering Tracks & Cleanup

Detection Risks & Mitigations (iOS)

In summary, the iOS playbook achieved the same data exfiltration through cloud APIs with Microsoft’s behind-the-scenes facilitation, navigating around iOS’s tighter on-device security by not touching the device at all. Both Android and iOS operations underscore that with Intune management and M365 integration, a red team (or law enforcement) can extract corporate data covertly when the cloud provider cooperates – all while leaving the device and its user oblivious to the intrusion.

Sources: Microsoft documentation and statements on mobile device management and data export capabilities were referenced in developing these playbookslearn.microsoft.comeverythingaboutintune.comlearn.microsoft.comlearn.microsoft.comlearn.microsoft.comtheregister.com, ensuring the methods align with current (Oct 2025) Microsoft 365 technologies and legal frameworks.