Aspose.Email.Clients.Activity

The Aspose.Email.Clients.Activity namespace provides classes that implement the Office 365 Management Activity API.

Classes

Class Description
ActivityClient Provides access to MS Exchange Server (Office365) by using REST API.
AttachmentData
Content Object contains an aggregation of actions and events harvested from multiple servers across multiple datacenters.
ContentInfo Object contains brief information of an aggregation of actions and events harvested from multiple servers across multiple datacenters.
ExchangeAdminActivity Extends the Common schema with the properties specific to all Exchange admin audit data.
ExchangeFolder Exchange folder
ExchangeItem Exchange item
ExchangeMailboxActivity Extends the Common schema with the properties specific to all Exchange mailbox audit data.
ExchangeMailboxAuditActivity
ExchangeMailboxAuditGroupActivity
ExchangeMetadata Exchange metadata in DLP events
ExtendedProperty Extended properties for the setting being changed. Each property will have a Name and Value.
ModifiedProperty Modified property
Notification Object contains an aggregation of actions and events harvested from multiple servers across multiple datacenters.
O365EmailMessageActivity Extends the Common schema with the properties specific to Office 365 Advanced Threat Protection and Threat Intelligence data. Office 365 Advanced Threat Protection (ATP) and Threat Intelligence events are available for Office 365 customers who have an ATP, Threat Intelligence, or E5 subscription. Each event in the ATP and Threat Intelligence feed corresponds to An email message sent by or received by a user in the organization with detections are made on messages at delivery time and from Zero hour auto purge.
O365URLTimeOfClickActivity Extends the Common schema with the properties specific to Office 365 Advanced Threat Protection and Threat Intelligence data. Office 365 Advanced Threat Protection (ATP) and Threat Intelligence events are available for Office 365 customers who have an ATP, Threat Intelligence, or E5 subscription. Each event in the ATP and Threat Intelligence feed corresponds to the URLs clicked by a user in the organization that were detected as malicious at time-of-click based on Office 365 ATP Safe Links protection.
ObjectName Contains name for object in the data feed identified by guids.
Record Audit log record
SharePointMetadata Describes metadata about the document in SharePoint or OneDrive for Business that contained the sensitive information.
Subscription Object contains information about subscription together with the associated webhook.
Webhook Object contains information about webhook

Interfaces

Interface Description
IActivityClient Represents the interface for Exchange REST client.

Enumeration

Enumeration Description
ActivityAzureActiveDirectoryEventType The type of Azure AD event.
AddOnType Types of add-on that generated event.
AuthenticationMethod Authentication methods
CredentialType Credential types
DataCenterSecurityEventType Types of dmdlet event in lock box.
DetectionType The type of detection.
DeviceType Device types used to access Sway for the triggered event.
Endpoint Types of Sway client endpoint for the triggered event.
EventSource Audit event sources
FileVerdict The file malware verdict.
IdentityType Identity types
ItemType Audit item types
LoginType Login types
LogonType Audit logon types
MemberRoleType Type of a user role within the team.
NotificationStatus
OperationResult Types of operation result
ProjectAction Project action
ProjectEntity Project entity
RecordType Audit record types
ResultStatus Indicates statuses of logged operation.
Scope Audit scope
SharePointAuditOperation SharePoint audit operations
SubscriptionStatus Subscription status
SwayAuditOperation Sway audit operation
UserType User types
WebhookStatus Webhook status
Workload The Office 365 service where the activity occurred.