aspose.email.clients.activity
Contents
[
Hide
]the aspose.email.clients.activity namespace provides classes
that implement the office 365 management activity api.
Classes
Class | Description |
---|---|
ActivityClient | Provides access to MS Exchange Server (Office365) by using REST API. |
AttachmentData | |
Content | Object contains an aggregation of actions and events harvested from multiple servers across multiple datacenters. |
ContentInfo | Object contains brief information of an aggregation of actions and events harvested from multiple servers across multiple datacenters. |
ExchangeAdminActivity | Extends the Common schema with the properties specific to all Exchange admin audit data. |
ExchangeFolder | Exchange folder |
ExchangeItem | Exchange item |
ExchangeMailboxActivity | Extends the Common schema with the properties specific to all Exchange mailbox audit data. |
ExchangeMailboxAuditActivity | |
ExchangeMailboxAuditGroupActivity | |
ExchangeMetadata | Exchange metadata in DLP events |
ExtendedProperty | Extended properties for the setting being changed. Each property will have a Name and Value. |
IActivityClient | Represents the interface for Exchange REST client. |
ModifiedProperty | Modified property |
Notification | Object contains an aggregation of actions and events harvested from multiple servers across multiple datacenters. |
O365EmailMessageActivity | Extends the Common schema with the properties specific to Office 365 Advanced Threat Protection and Threat Intelligence data. Office 365 Advanced Threat Protection (ATP) and Threat Intelligence events are available for Office 365 customers who have an ATP, Threat Intelligence, or E5 subscription. Each event in the ATP and Threat Intelligence feed corresponds to An email message sent by or received by a user in the organization with detections are made on messages at delivery time and from Zero hour auto purge. |
O365URLTimeOfClickActivity | Extends the Common schema with the properties specific to Office 365 Advanced Threat Protection and Threat Intelligence data. Office 365 Advanced Threat Protection (ATP) and Threat Intelligence events are available for Office 365 customers who have an ATP, Threat Intelligence, or E5 subscription. Each event in the ATP and Threat Intelligence feed corresponds to the URLs clicked by a user in the organization that were detected as malicious at time-of-click based on Office 365 ATP Safe Links protection. |
ObjectName | Contains name for object in the data feed identified by guids. |
Record | Audit log record |
SharePointMetadata | Describes metadata about the document in SharePoint or OneDrive for Business that contained the sensitive information. |
Subscription | Object contains information about subscription together with the associated webhook. |
Webhook | Object contains information about webhook |
Enumerations
Enumeration | Description |
---|---|
ActivityAzureActiveDirectoryEventType | The type of Azure AD event. |
AddOnType | Types of add-on that generated event. |
AuthenticationMethod | Authentication methods |
CredentialType | Credential types |
DataCenterSecurityEventType | Types of dmdlet event in lock box. |
DetectionType | The type of detection. |
DeviceType | Device types used to access Sway for the triggered event. |
Endpoint | Types of Sway client endpoint for the triggered event. |
EventSource | Audit event sources |
FileVerdict | The file malware verdict. |
IdentityType | Identity types |
ItemType | Audit item types |
LoginType | Login types |
LogonType | Audit logon types |
MemberRoleType | Type of a user role within the team. |
NotificationStatus | |
OperationResult | Types of operation result |
ProjectAction | Project action |
ProjectEntity | Project entity |
RecordType | Audit record types |
ResultStatus | Indicates statuses of logged operation. |
Scope | Audit scope |
SharePointAuditOperation | SharePoint audit operations |
SubscriptionStatus | Subscription status |
SwayAuditOperation | Sway audit operation |
UserType | User types |
WebhookStatus | Webhook status |
Workload | The Office 365 service where the activity occurred. |