/
Office365ExchangeItem log type

Office365ExchangeItem log type

Description

Events from an Exchange mailbox audit log for actions that are performed on a single item, such as creating or receiving an email message.

 

Log Structure

[
{
"CreationTime": "2022-02-16T07:22:14",
"Id": "80c76bd2-9d81-4c57-a97a-accfc3443dca",
"Operation": "ModifyFolderPermissions",
"OrganizationId": "41463f53-8812-40f4-890f-865bf6e35190",
"RecordType": 2,
"ResultStatus": "Succeeded",
"UserKey": "1234522233C77A20",
"UserType": 0,
"Version": 1,
"Workload": "Exchange",
"ClientIP": "134.170.188.221",
"UserId": "admin@contoso.onmicrosoft.com",
"AppId": "00012343-1111-0ff1-ef22-000000000000",
"ClientIPAddress": "134.170.188.221",
"ClientInfoString": "Client=OWA;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36+Preload+Preload;",
"ExternalAccess": false,
"InternalLogonType": 0,
"LogonType": 0,
"LogonUserSid": "S-1-5-44-1234564413-1234536233-543218302-42844876",
"MailboxGuid": "a78873bc-8394-40d1-8e2f-a0b6c3334455",
"MailboxOwnerSid": "S-1-5-44-1234564413-1234536233-543218302-42844876",
"MailboxOwnerUPN": "admin@contoso.onmicrosoft.com",
"OrganizationName": "contoso.onmicrosoft.com",
"OriginatingServer": "DEFPR01MB5223 (15.16.5500.000)\r\n",
"SessionId": "9a8cf76d-d754-3e2e-b10d-9bb87654f3b2",
"Item": {
"Id": "LgCCCCBfilsyPsriQIl0rq9TWIlUARXgU5LBEA9rTKAxHEa3YAjjAAAY2qUXBBBC",
"ParentFolder": {
"Id": "LgCCCCBfilsyPsriQIl0rq9TWIlUARXgU5LBEA9rTKAxHEa3YAjjAAAY2qUXBBBC",
"MemberRights": "ReadAny, Create, EditOwned, DeleteOwned, EditAny, DeleteAny, CreateSubfolder, Owner, Contact, Visible",
"MemberSid": "S-1-9-4",
"MemberUpn": "Everyone",
"Name": "test-dir",
"Path": "\test-dir"
}
}
}
]

 

Table Fields

Field

Description

Field

Description

TABLE

Office365ExchangeItem

RECORDTYPE

Based on RecordType, this field indicates the operation performed by the record.
For this log type its value is 2.
For available RecordType values, you can visit Microsoft’s documentation here.

APPID

Based on AppId, there’s no available documentation for this field.

CLIENTAPPDID

Based on ClientAppId, there’s no available documentation for this field.

LOGONTYPE

Based on LogonType, this field indicates the type of user who accessed the mailbox and performed the operation that was logged.

INTERNALLOGONTYPE

Based on InternalLogonType, this field indicates where it is for internal use.

MAILBOXGUID

Based on MailboxGuid, this field contains the Exchange GUID of the mailbox that was accessed.

MAILBOXOWNERUPN

Based on MailboxOwnerUPN, this field contains the email address of the person who owns the mailbox that was accessed.

MAILBOXOWNERSID

Based on MailboxOwnerSid, this field contains the SID of the mailbox owner.

MAILBOXOWNERMASTERSID

Based on MailboxOwnerMasterAccountSid, this field contains the Mailbox owner account's master account SID.

LOGONUSERSID

Based on LogonUserSid, this field contains the SID of the user who performed the operation.

LOGONUSERNAME

Based on LogonUserDisplayName, this field contains the user-friendly name of the user who performed the operation.

EXTERNALACCESS

Based on ExternalAccess, this field when set to true means that the logon user's domain is different from the mailbox owner's domain.

ORIGINATINGSERVER

Based on OriginatingServer, this field contains the details where the operation originated.

ORGNAME

Based on OrganizationName, this field contains the name of the tenant.

CLIENTINFO

Based on ClientInfoString, this field contains the information about the email client that was used to perform the operation, such as a browser version, Outlook version, and mobile device information.

CLIENTADDR

Based on ClientIPAddress, this field contains the IP address of the device that was used when the operation was logged.
The IP address is displayed in either an IPv4 or IPv6 address format.

CLIENTMACHINE

Based on ClientMachineName, this field contains the machine name that hosts the Outlook client.

CLIENTPROCESS

Based on ClientProcessName, this field contains the email client that was used to access the mailbox.

CLIENTVERSION

Based on ClientVersion, this field contains the version of the email client.

CLIENTREQID

Based on ClientRequestId, there’s no available documentation for this field.

ITEM

Based on Item, this field contains the information about the operation was performed. Including details about store id, subject, parent folder and attachment(s).

MODIFIEDPROPERTIES

Based on ModifiedProperties, this field contains the property is included for admin events, such as adding a user as a member of a site or a site collection admin group.

SENDADDR

Based on SendAsUserSmtp, this field contains the SMTP address of the user who is being impersonated.

SENDMBGUID

Based on SendAsUserMailboxGuid, this field contains the Exchange GUID of the mailbox that was accessed to send email as.

SENDONADDR

Based on SendOnBehalfOfUserSmtp , this field contains the SMTP address of the user on whose behalf the email is sent.

SENDONMBGUID

Based on SendOnBehalfOfUserMailboxGuid, this field contains the Exchange GUID of the mailbox that was accessed to send mail on behalf of.

SNAREDATAMAP

All unclassified field(s) parsed from this log type will be pushed into the SNAREDATAMAP.

 

Notes

Office 365 Management Activity API schema

Related content

Office365ExchangeItemAggregated log type
Office365ExchangeItemAggregated log type
More like this
Office365ExchangeAdmin log type
Office365ExchangeAdmin log type
More like this
Office365SharePointListOperation log type
Office365SharePointListOperation log type
More like this
Office365AzureActiveDirectory log type
Office365AzureActiveDirectory log type
More like this
Office365AzureActiveDirectoryAccountLogon log type
Office365AzureActiveDirectoryAccountLogon log type
More like this
AzureActiveDirectory log types
AzureActiveDirectory log types
Read with this