Class ExchangeMailboxAuditActivity

ExchangeMailboxAuditActivity class

public class ExchangeMailboxAuditActivity : Content

Constructors

NameDescription
ExchangeMailboxAuditActivity()The default constructor.

Properties

NameDescription
ClientIP { get; set; }The IP address of the device that was used when the activity was logged. The IP address is displayed in either an IPv4 or IPv6 address format. Mandatory: Yes
CreationTime { get; set; }The date and time in Coordinated Universal Time (UTC) when the user performed the activity. Mandatory: Yes
Id { get; set; }Unique identifier of an audit record. Mandatory: Yes
Item { get; set; }Represents the item upon which the operation was performed
ModifiedProperties { get; set; }TBD
ObjectId { get; set; }For SharePoint and OneDrive for Business activity, the full path name of the file or folder accessed by the user. For Exchange admin audit logging, the name of the object that was modified by the cmdlet. Mandatory: No
Operation { get; set; }The name of the user or admin activity. For a description of the most common operations/activities, see Search the audit log in the Office 365 Protection Center. For Exchange admin activity, this property identifies the name of the cmdlet that was run. For Dlp events, this can be “DlpRuleMatch”, “DlpRuleUndo” or “DlpInfo”, which are described under “DLP schema” below. Mandatory: Yes
OrganizationId { get; set; }The GUID for your organization’s Office 365 tenant. This value will always be the same for your organization, regardless of the Office 365 service in which it occurs. Mandatory: Yes
RecordType { get; set; }The type of operation indicated by the record. Mandatory: Yes
ResultStatus { get; set; }Indicates whether the action (specified in the Operation property) was successful or not. Possible values are Succeeded, PartiallySucceded, or Failed. For Exchange admin activity, the value is either True or False. Mandatory: No
Scope { get; set; }Was this event created by a hosted O365 service or an on-premises server? Possible values are online and onprem. Note that SharePoint is the only workload currently sending events from on-premises to O365. Mandatory: No
SendAsUserMailboxGuid { get; set; }The Exchange GUID of the mailbox that was accessed to send email as.
SendAsUserSmtp { get; set; }SMTP address of the user who is being impersonated.
SendonBehalfOfUserMailboxGuid { get; set; }The Exchange GUID of the mailbox that was accessed to send mail on behalf of.
SendOnBehalfOfUserSmtp { get; set; }SMTP address of the user on whose behalf the email is sent.
UserId { get; set; }The UPN (User Principal Name) of the user who performed the action (specified in the Operation property) that resulted in the record being logged; for example, my_name@my_domain_name. Note that records for activity performed by system accounts (such as SHAREPOINT\system or NT AUTHORITY\SYSTEM) are also included. Mandatory: Yes
UserKey { get; set; }An alternative ID for the user identified in the UserId property. For example, this property is populated with the passport unique ID (PUID) for events performed by users in SharePoint, OneDrive for Business, and Exchange. This property may also specify the same value as the UserID property for events occurring in other services and events performed by system accounts. Mandatory: Yes
UserType { get; set; }The type of user that performed the operation. Mandatory: Yes
Workload { get; set; }The Office 365 service where the activity occurred in the Workload string. The possible values for this property are: Exchange SharePoint OneDrive AzureActiveDirectory SecurityComplianceCenter Sway ThreatIntelligence Mandatory: No

See Also