Detailed activity properties in the audit log (2024)

ActorThe user or service account that performed the action.Azure Active DirectoryAddOnNameThe name of an add-on that was added, removed, or updated in a team. The type of add-ons in Microsoft Teams is a bot, a connector, or a tab.Microsoft TeamsAddOnTypeThe type of an add-on that was added, removed, or updated in a team. The following values indicate the type of add-on.
1 - Indicates a bot.
2 - Indicates a connector.
3 - Indicates a tab.Microsoft TeamsAppAccessContextThe application context for the user or service principal that performed the action.Microsoft TeamsArtifactSharedFiles or content shared by the user.Microsoft TeamsAzureActiveDirectoryEventTypeThe type of Azure Active Directory activity. The following values indicate the type of activity.
0 - Indicates an account login activity.
1 - Indicates an Azure application security activity.Azure Active DirectoryChannelGuidThe ID of a Microsoft Teams channel. The team that the channel is located in is identified by the TeamName and TeamGuid properties.Microsoft TeamsChannelNameThe name of a Microsoft Teams channel. The team that the channel is located in is identified by the TeamName and TeamGuid properties.Microsoft TeamsClientThe client device, the device OS, and the device browser used for the login activity (for example, Nokia Lumia 920; Windows Phone 8; IE Mobile 11).Azure Active DirectoryClientInfoStringInformation about the email client that was used to perform the operation, such as a browser version, Outlook version, and mobile device informationExchange (mailbox activity)ClientIPThe IP address of the device that was used when the activity was logged. The IP address is displayed in either an IPv4 or IPv6 address format.

For some services, the value displayed in this property might be the IP address for a trusted application (for example, Office on the web apps) calling into the service on behalf of a user and not the IP address of the device used by person who performed the activity.

Also, for admin activity (or activity performed by a system account) for Azure Active Directory-related activities, the IP address isn't logged and the value for the ClientIP property is null.

Azure Active Directory, Exchange, SharePointCreationTimeThe date and time in Coordinated Universal Time (UTC) when the user performed the activity.AllCurrentProtectionTypeA complex property type containing fields to describe the current protection status of a document. Includes the following:

ProtectionType: Enumerates the type of protection applied to the document. These values and their meanings apply: 0 (no protection), 1 (template-based protection), 2 (don't forward, for email), 3 (encrypt only), and 4 (custom, user configured protection)
Owner: The email address of the user that configured protection.
TemplateId: When the ProtectionType is set to 1 (template), this field contains the GUID of the template applied to the document. When the value of ProtectionType doesn't equal 1, this field is blank.
DocumentEncrypted: Boolean flag indicating if any type of encryption is applied to the document. Values are True or False.

AllDestinationFileExtensionThe file extension of a file that is copied or moved. This property is displayed only for the FileCopied and FileMoved user activities.SharePointDestinationFileNameThe name of the file is copied or moved. This property is displayed only for the FileCopied and FileMoved actions.SharePointDestinationRelativeUrlThe URL of the destination folder where a file is copied or moved. The combination of the values for the SiteURL, the DestinationRelativeURL, and the DestinationFileName property is the same as the value for the ObjectID property, which is the full path name for the file that was copied. This property is displayed only for the FileCopied and FileMoved user activities.SharePointEventSourceIdentifies that an activity occurred in SharePoint. Possible values are SharePoint and ObjectModel.SharePointExternalAccessFor Exchange admin activity, specifies whether the cmdlet was run by a user in your organization, by Microsoft datacenter personnel or a datacenter service account, or by a delegated administrator. The value False indicates that the cmdlet was run by someone in your organization. The value True indicates that the cmdlet was run by datacenter personnel, a datacenter service account, or a delegated administrator.
For Exchange mailbox activity, specifies whether a mailbox was accessed by a user outside your organization.ExchangeExtendedPropertiesThe extended properties for an Azure Active Directory activity.Azure Active DirectoryIDThe ID of the report entry. The ID uniquely identifies the report entry.AllInternalLogonTypeReserved for internal use.Exchange (mailbox activity)ItemTypeThe type of object that was accessed or modified. Possible values include File, Folder, Web, Site, Tenant, and DocumentLibrary.SharePointIsJoinedFromLobbyWhether or not the user joined a Teams session from the lobby.Microsoft TeamsLoginStatusIdentifies login failures that might have occurred.Azure Active DirectoryLogonTypeThe type of mailbox access. The following values indicate the type of user who accessed the mailbox.

0 - Indicates a mailbox owner.
1 - Indicates an administrator.
2 - Indicates a delegate.
3 - Indicates the transport service in the Microsoft datacenter.
4 - Indicates a service account in the Microsoft datacenter.
6 - Indicates a delegated administrator.

Exchange (mailbox activity)MailboxGuidThe Exchange GUID of the mailbox that was accessed.Exchange (mailbox activity)MailboxOwnerUPNThe email address of the person who owns the mailbox that was accessed.Exchange (mailbox activity)MembersLists the users that have been added or removed from a team. The following values indicate the Role type assigned to the user.

1 - Indicates the Owner role.
2 - Indicates the Member role.
3 - Indicates the Guest role.

The Members property also includes the name of your organization, and the member's email address.

Microsoft TeamsModifiedProperties (Name, NewValue, OldValue)The property is included for admin activities, such as adding a user as a member of a site or a site collection admin group. The property includes the name of the property that was modified (for example, the Site Admin group) the new value of the modified property (such the user who was added as a site admin, and the previous value of the modified object).All (admin activity)ObjectFullyQualifiedNameThe fully qualified name for an entity.Microsoft Purview (governance)ObjectIdFor Exchange admin audit logging, the name of the object that was modified by the cmdlet.
For SharePoint activity, the full URL path name of the file or folder accessed by a user.
For Azure AD activity, the name of the user account that was modified.AllObjectNameThe main entity name.Microsoft Purview (governance)ObjectTypeThe entity type.Microsoft Purview (governance)OldValueThe value before a change, includes all properties updated or deleted.Microsoft Purview (governance)OperationThe name of the user or admin activity. The value of this property corresponds to the value that was selected in the Activities drop down list. If Show results for all activities was selected, the report will included entries for all user and admin activities for all services. For a description of the operations/activities that are logged in the audit log, see the Audited activities tab in Search the audit log in the Office 365.
For Exchange admin activity, this property identifies the name of the cmdlet that was run.AllOrganizationIdThe GUID for your organization.AllNewValueThe value after a change, includes all properties updated or deleted.Microsoft Purview (governance)PathThe name of the mailbox folder where the message that was accessed is located. This property also identifies the folder a where a message is created in or copied/moved to.Exchange (mailbox activity)ParametersFor Exchange admin activity, the name and value for all parameters that were used with the cmdlet that is identified in the Operation property.Exchange (admin activity)ParticipantInfoAdditional properties about the participant identity.Microsoft TeamsParticipatingDomainInformationDomain information about the participant.Microsoft TeamsPreviousProtectionTypeA complex property type containing fields to describe the previous protection status of a document. Includes the following:

ProtectionType: Enumerates the type of protection applied to the document. These values and their meanings apply: 0 (no protection), 1 (template-based protection), 2 (don't forward, for email), 3 (encrypt only), and 4 (custom, user configured protection)
Owner: The email address of the user that configured protection.
TemplateId: When the ProtectionType is set to 1 (template), this field contains the GUID of the template applied to the document. When the value of ProtectionType doesn't equal 1, this field is blank.
DocumentEncrypted: Boolean flag indicating if any type of encryption is applied to the document. Values are True or False.

AllProtectionEventTypeEnumerates how the protection was changed by the operation being audited. The following values and meanings apply:

0 - Indicates unchanged.
1 - Indicates added.
2 - Indicates changed.
3 - Indicates removed.

AllRecordTypeThe type of operation indicated by the record. This property indicates the service or feature that the operation was triggered in. For a list of record types and their corresponding ENUM value (which is the value displayed in the RecordType property in an audit record), see Audit log record type.ResultStatusIndicates whether the action (specified in the Operation property) was successful or not.
For Exchange admin activity, the value is either True (successful) or False (failed).All
SecurityComplianceCenterEventTypeIndicates that the activity was a Microsoft Purview portal and compliance portal activity. All Microsoft Purview portal and compliance portal activities will have a value of 0 for this property.Microsoft Purview portal
Microsoft Purview compliance portalSensitivityLabelThe sensitivity label assigned to a specific mail item.ExchangeSharingTypeThe type of sharing permissions that was assigned to the user that the resource was shared with. This user is identified in the UserSharedWith property.SharePointSiteThe GUID of the site where the file or folder accessed by the user is located.SharePointSiteUrlThe URL of the site where the file or folder accessed by the user is located.SharePointSourceFileExtensionThe file extension of the file that was accessed by the user. This property is blank if the object that was accessed is a folder.SharePointSourceFileNameThe name of the file or folder accessed by the user.SharePointSourceRelativeUrlThe URL of the folder that contains the file accessed by the user. The combination of the values for the SiteURL, the SourceRelativeURL, and the SourceFileName property is the same as the value for the ObjectID property, which is the full path name for the file accessed by the user.SharePointSubjectThe subject line of the message that was accessed.Exchange (mailbox activity)TabTypeThe type of tab added, removed, or updated in a team. The possible values for this property are:

Excel pin - An Excel tab.
Extension - All first-party and third-party apps; such as Class Schedule, VSTS, and Forms.
Notes - OneNote tab.
Pdfpin - A PDF tab.
Powerbi - A Power BI tab.
Powerpointpin - A PowerPoint tab.
Sharepointfiles - A SharePoint tab.
Webpage - A pinned website tab.
Wiki-tab - A wiki tab.
Wordpin - A Word tab.

Microsoft TeamsTargetThe user that the action (identified in the Operation property) was performed on. For example, if a guest is added to SharePoint or a Microsoft Team, that user would be listed in this property.Azure Active DirectoryTeamGuidThe ID of a team in Microsoft Teams.Microsoft TeamsTeamNameThe name of a team in Microsoft Teams.Microsoft TeamsUserAgentInformation about the user's browser. This information is provided by the browser.SharePointUserDomainIdentity information about the tenant organization of the user (actor) who performed the action.Azure Active DirectoryUserIdThe user who performed the action (specified in the Operation property) that resulted in the record being logged. Audit records for activity performed by system accounts (such as SHAREPOINT\system or NT AUTHORITY\SYSTEM) are also included in the audit log. Another common value for the UserId property is app@sharepoint. This indicates that the "user" who performed the activity was an application that has the necessary permissions in SharePoint to perform organization-wide actions (such as search a SharePoint site or OneDrive account) on behalf of a user, admin, or service.

For more information, see:
The app@sharepoint user in audit records
or
System accounts in Exchange mailbox audit records.

AllUserKeyContains a valid Azure Active Directory Object ID in GUID format or hex format. For scenarios where the primary actor isn't a user, the UserKey is an empty string. See UserType and UserKey scenarios for details on various UserKey scenarios.AllUserTypeThe type of user that performed the operation. See the UserType and UserKey scenarios for details on various UserType scenarios.AllVersionIndicates the version number of the activity (identified by the Operation property) that's logged.AllWorkloadThe Microsoft 365 service where the activity occurred.All
Detailed activity properties in the audit log (2024)
Top Articles
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6345

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.