

Contact Trustwave about engaging professional threat hunting. We regularly monitor and improve our threat hunting plans for all global cyber events and all organizations can undertake similar operations within their environment. Trustwave is exercising extra vigilance in monitoring this kind of traffic. They responded, "We determined that this behavior is considered to be by design." We reported this issue to Microsoft through our responsible disclosure program. Monitor for file behaviors like copy and delete for the above foldersĪ quick workaround for this issue is to deny read/write permissions for the standard user accounts to folders “IndexedDB” and “Cache” to prevent the creation of the logs as you can see in the screenshot below:.


The log database in both clients stores all the chats and images as plain non-encrypted data. This blog post focuses on the privacy issues that Microsoft Teams & Skype desktop clients pose.
