ExchangeMailboxAuditActivity
Contents
[
Hide
]ExchangeMailboxAuditActivity class
The ExchangeMailboxAuditActivity type exposes the following members:
Constructors
Name | Description |
---|---|
ExchangeMailboxAuditActivity() | Initializes a new instance of the ExchangeMailboxAuditActivity class |
Properties
Name | Description |
---|---|
id | Unique identifier of an audit record. Mandatory: Yes |
record_type | The type of operation indicated by the record. Mandatory: Yes |
creation_time | The date and time in Coordinated Universal Time (UTC) when the user performed the activity. Mandatory: Yes |
operation | The name of the user or admin activity. For a description of the most common operations/activities, see Search the audit log in the Office 365 Protection Center. For Exchange admin activity, this property identifies the name of the cmdlet that was run. For Dlp events, this can be “DlpRuleMatch”, “DlpRuleUndo” or “DlpInfo”, which are described under “DLP schema” below. Mandatory: Yes |
organization_id | The GUID for your organization’s Office 365 tenant. This value will always be the same for your organization, regardless of the Office 365 service in which it occurs. Mandatory: Yes |
user_type | The type of user that performed the operation. Mandatory: Yes |
user_key | An alternative ID for the user identified in the UserId property. For example, this property is populated with the passport unique ID (PUID) for events performed by users in SharePoint, OneDrive for Business, and Exchange. This property may also specify the same value as the UserID property for events occurring in other services and events performed by system accounts. Mandatory: Yes |
workload | The Office 365 service where the activity occurred in the Workload string. The possible values for this property are: Exchange SharePoint OneDrive AzureActiveDirectory SecurityComplianceCenter Sway ThreatIntelligence Mandatory: No |
result_status | Indicates whether the action (specified in the Operation property) was successful or not. Possible values are Succeeded, PartiallySucceded, or Failed. For Exchange admin activity, the value is either True or False. Mandatory: No |
object_id | For SharePoint and OneDrive for Business activity, the full path name of the file or folder accessed by the user. For Exchange admin audit logging, the name of the object that was modified by the cmdlet. Mandatory: No |
user_id | The UPN (User Principal Name) of the user who performed the action (specified in the Operation property) that resulted in the record being logged; for example, my_name@my_domain_name. Note that records for activity performed by system accounts (such as SHAREPOINT\system or NT AUTHORITY\SYSTEM) are also included. Mandatory: Yes |
client_ip | The IP address of the device that was used when the activity was logged. The IP address is displayed in either an IPv4 or IPv6 address format. Mandatory: Yes |
scope | Was this event created by a hosted O365 service or an on-premises server? Possible values are online and onprem. Note that SharePoint is the only workload currently sending events from on-premises to O365. Mandatory: No |
item | Represents the item upon which the operation was performed |
modified_properties | TBD |
send_as_user_smtp | SMTP address of the user who is being impersonated. |
send_as_user_mailbox_guid | The Exchange GUID of the mailbox that was accessed to send email as. |
send_on_behalf_of_user_smtp | SMTP address of the user on whose behalf the email is sent. |
sendon_behalf_of_user_mailbox_guid | The Exchange GUID of the mailbox that was accessed to send mail on behalf of. |
See Also
- namespace aspose.email.clients.activity
- assembly Aspose.Email