This is a quick one today, but wanted to get the information out there.
When investigating compromised user accounts, it is important to understand what items were accessed by the attacker. This capability can also be useful when a phishing email comes in and you need to identify whether the