Detailed properties in the audit log
When you export the results of an audit log search from the Security & Compliance Center, you have the option to download all the results that meet your search criteria. You do this by selecting Export results > Download all results on the Audit log search page. For more information, see Search the audit log.
When your export all results for an audit log search, the raw data from the unified audit log is copied to a comma-separated value (CSV) file that is downloaded to your local computer. This file contains additional information from each audit record in a column named AuditData. This column contains a multi-value property for multiple properties from the audit log record. Each of the property: value pairs in this multi-value property are separated by a comma.
The following table describes the properties that are included (depending on the service in which an event occurs) in the multi-property AuditData column. The Office 365 service that has this property column indicates the service and type of activity (user or admin) that includes the property. For more detailed information about these properties or about properties that may not be listed in this topic, see Management Activity API Schema.
You can use the JSON transform feature in Power Query in Excel to split the AuditData column into multiple columns so that each property has its own column. This lets you sort and filter on one or more of these properties. To learn how to do this, see Export, configure, and view audit log records.
|Property||Description||Microsoft 365 service that has this property|
|Actor||The user or service account that performed the action.||Azure Active Directory|
|AddOnName||The name of an add-on that was added, removed, or updated in a team. The type of add-ons in Microsoft Teams is a bot, a connector, or a tab.||Microsoft Teams|
|AddOnType||The type of an add-on that was added, removed, or updated in a team. The following values indicate the type of add-on.
1 - Indicates a bot.
2 - Indicates a connector.
3 - Indicates a tab.
|AzureActiveDirectoryEventType||The type of Azure Active Directory event. The following values indicate the type of event.
0 - Indicates an account login event.
1 - Indicates an Azure application security event.
|Azure Active Directory|
|ChannelGuid||The ID of a Microsoft Teams channel. The team that the channel is located in is identified by the TeamName and TeamGuid properties.||Microsoft Teams|
|ChannelName||The name of a Microsoft Teams channel. The team that the channel is located in is identified by the TeamName and TeamGuid properties.||Microsoft Teams|
|Client||The client device, the device OS, and the device browser used for the login event (for example, Nokia Lumia 920; Windows Phone 8; IE Mobile 11).||Azure Active Directory|
|ClientInfoString||Information about the email client that was used to perform the operation, such as a browser version, Outlook version, and mobile device information||Exchange (mailbox activity)|
|ClientIP||The IP address of the device that was used when the activity was logged. The IP address is displayed in either an IPv4 or IPv6 address format.
For some services, the value displayed in this property might be the IP address for a trusted application (for example, Office on the web apps) calling into the service on behalf of a user and not the IP address of the device used by person who performed the activity.
Also, for admin activity (or activity performed by a system account) for Azure Active Directory-related events, the IP address isn't logged and the value for the ClientIP property is
|Azure Active Directory, Exchange, SharePoint|
|CreationTime||The date and time in Coordinated Universal Time (UTC) when the user performed the activity.||All|
|DestinationFileExtension||The file extension of a file that is copied or moved. This property is displayed only for the FileCopied and FileMoved user activities.||SharePoint|
|DestinationFileName||The name of the file is copied or moved. This property is displayed only for the FileCopied and FileMoved actions.||SharePoint|
|DestinationRelativeUrl||The URL of the destination folder where a file is copied or moved. The combination of the values for the SiteURL, the DestinationRelativeURL, and the DestinationFileName property is the same as the value for the ObjectID property, which is the full path name for the file that was copied. This property is displayed only for the FileCopied and FileMoved user activities.||SharePoint|
|EventSource||Identifies that an event occurred in SharePoint. Possible values are SharePoint and ObjectModel.||SharePoint|
|ExternalAccess||For Exchange admin activity, specifies whether the cmdlet was run by a user in your organization, by Microsoft datacenter personnel or a datacenter service account, or by a delegated administrator. The value False indicates that the cmdlet was run by someone in your organization. The value True indicates that the cmdlet was run by datacenter personnel, a datacenter service account, or a delegated administrator.
For Exchange mailbox activity, specifies whether a mailbox was accessed by a user outside your organization.
|ExtendedProperties||The extended properties for an Azure Active Directory event.||Azure Active Directory|
|ID||The ID of the report entry. The ID uniquely identifies the report entry.||All|
|InternalLogonType||Reserved for internal use.||Exchange (mailbox activity)|
|ItemType||The type of object that was accessed or modified. Possible values include File, Folder, Web, Site, Tenant, and DocumentLibrary.||SharePoint|
|LoginStatus||Identifies login failures that might have occurred.||Azure Active Directory|
|LogonType||The type of mailbox access. The following values indicate the type of user who accessed the mailbox.
0 - Indicates a mailbox owner.
1 - Indicates an administrator.
2 - Indicates a delegate.
3 - Indicates the transport service in the Microsoft datacenter.
4 - Indicates a service account in the Microsoft datacenter.
6 - Indicates a delegated administrator.
|Exchange (mailbox activity)|
|MailboxGuid||The Exchange GUID of the mailbox that was accessed.||Exchange (mailbox activity)|
|MailboxOwnerUPN||The email address of the person who owns the mailbox that was accessed.||Exchange (mailbox activity)|
|Members||Lists the users that have been added or removed from a team. The following values indicate the Role type assigned to the user.
1 - Indicates the Owner role.
2 - Indicates the Member role.
3 - Indicates the Guest role.
The Members property also includes the name of your organization, and the member's email address.
|ModifiedProperties (Name, NewValue, OldValue)||The property is included for admin events, such as adding a user as a member of a site or a site collection admin group. The property includes the name of the property that was modified (for example, the Site Admin group) the new value of the modified property (such the user who was added as a site admin, and the previous value of the modified object.||All (admin activity)|
|ObjectId||For Exchange admin audit logging, the name of the object that was modified by the cmdlet.
For SharePoint activity, the full URL path name of the file or folder accessed by a user.
For Azure AD activity, the name of the user account that was modified.
|Operation||The name of the user or admin activity. The value of this property corresponds to the value that was selected in the Activities drop down list. If Show results for all activities was selected, the report will included entries for all user and admin activities for all services. For a description of the operations/activities that are logged in the audit log, see the Audited activities tab in Search the audit log in the Office 365.
For Exchange admin activity, this property identifies the name of the cmdlet that was run.
|OrganizationId||The GUID for your organization.||All|
|Path||The name of the mailbox folder where the message that was accessed is located. This property also identifies the folder a where a message is created in or copied/moved to.||Exchange (mailbox activity)|
|Parameters||For Exchange admin activity, the name and value for all parameters that were used with the cmdlet that is identified in the Operation property.||Exchange (admin activity)|
|RecordType||The type of operation indicated by the record. The following values indicate the record type.
1 - Indicates a record from the Exchange admin audit log.
2 - Indicates a record from the Exchange mailbox audit log for an operation performed on a singled mailbox item.
3 - Also indicates a record from the Exchange mailbox audit log. This record type indicates that the operation was performed on multiple items in the source mailbox (such as moving multiple items to the Deleted Items folder or permanently deleting multiple items).
4 - Indicates a site admin operation in SharePoint, such as an administrator or user assigning permissions to a site.
6 - Indicates a file or folder-related operation in SharePoint, such as a user viewing or modifying a file.
8 - Indicates an admin operation performed in Azure Active Directory.
9 - Indicates OrgId logon events in Azure Active Directory. This record type is being deprecated.
10 - Indicates security cmdlet events that were performed by Microsoft personnel in the data center.
11 - Indicates Data loss protection (DLP) events in SharePoint.
12 - Indicates Sway events.
13 - Indicates DLP events in Exchange, when configured with a unified a DLP policy. DLP events based on Exchange mail flow rules (also known as transport rules) aren't supported.
14 - Indicates sharing events in SharePoint.
15 - Indicates Secure Token Service (STS) logon events in Azure Active Directory.
18 - Indicates Security & Compliance Center events.
19 - Indicates aggregated Exchange mailbox operations for repetitive activity that occurs within a very short duration.
20 - Indicates Power BI events.
21- Indicates Dynamics 365 events.
22 - Indicates Yammer events.
23 - Indicates Skype for Business events.
24 - Indicates eDiscovery events. This record type indicates activities that were performed by running content searches and managing eDiscovery cases in the security and compliance center. For more information, see Search for eDiscovery activities in the audit log.
25, 26, or 27 - Indicates Microsoft Teams events.
28 - Indicates phishing and malware events from Exchange Online Protection and Office 365 Advanced Threat Protection.
29 - Indicates submission events from Exchange Online Protection and Office 365 Advanced Threat Protection.
30 - Indicates Microsoft Power Automate (formerly called Microsoft Flow) events.
31 - Indicates Advanced eDiscovery events.
32 - Indicates Microsoft Stream events.
33 - Indicates events related to DLP classification in SharePoint.
35 - Indicates Microsoft Project events.
36 - Indicates SharePoint list events.
37 - Indicates events related to SharePoint comments.
38 - Indicates events related to retention policies and retention labels in the security and compliance center.
40 - Indicates events that results from security and compliance alert signals.
41 - Indicates safe links time-of-block and block override events in Office 365 Advanced Threat Protection.
42 - Indicates events related to insights and reports in the Security & Compliance Center.
44 - Indicates Workplace Analytics events.
45 - Indicates Power Apps events.
47 - Indicates phishing and malware events from Office 365 Advanced Threat Protection for files in SharePoint, OneDrive, and Microsoft Teams.
49 - Indicates Patients application events in Microsoft Teams for Healthcare.
50 - Indicates events related to the MailItemsAccessed mailbox audit action.
51 Indicates events related to Anti-spam and mail hygiene.
52 - Indicates events related to the Data Insights REST API.
53 - Indicates events related to the application of information barrier policies. For more information, see Define policies for information barriers.
54 - Indicates SharePoint list item events.
55 - Indicates SharePoint content type events.
56 - Indicates SharePoint list field events.
62 - Indicates events related to email attack campaigns. For more information, see Campaign Views in Office 365 ATP.
64 - Indicates automated investigation and response events. For information, see automated investigation and response (AIR) in Office 365
65 - Indicates Quarantine Audit Record events.
66 - Indicates Microsoft Forms events.
68 - Indicates Communication compliance events in Exchange. For more information, see Communication compliance in Microsoft 365.
69 - Indicates events related to Customer Key Encryption. For more information, see Service encryption with Customer Key in Office 365.
|ResultStatus||Indicates whether the action (specified in the Operation property) was successful or not.
For Exchange admin activity, the value is either True (successful) or False (failed).
|SecurityComplianceCenterEventType||Indicates that the activity was a Security & Compliance Center event. All Security & Compliance Center activities will have a value of 0 for this property.||Security & Compliance Center|
|SharingType||The type of sharing permissions that was assigned to the user that the resource was shared with. This user is identified in the UserSharedWith property.||SharePoint|
|Site||The GUID of the site where the file or folder accessed by the user is located.||SharePoint|
|SiteUrl||The URL of the site where the file or folder accessed by the user is located.||SharePoint|
|SourceFileExtension||The file extension of the file that was accessed by the user. This property is blank if the object that was accessed is a folder.||SharePoint|
|SourceFileName||The name of the file or folder accessed by the user.||SharePoint|
|SourceRelativeUrl||The URL of the folder that contains the file accessed by the user. The combination of the values for the SiteURL, the SourceRelativeURL, and the SourceFileName property is the same as the value for the ObjectID property, which is the full path name for the file accessed by the user.||SharePoint|
|Subject||The subject line of the message that was accessed.||Exchange (mailbox activity)|
|TabType||The type of tab added, removed, or updated in a team. The possible values for this property are:
Excel pin - An Excel tab.
Extension - All first-party and third-party apps; such as Class Schedule, VSTS, and Forms.
Notes - OneNote tab.
Pdfpin - A PDF tab.
Powerbi - A PowerBI tab.
Powerpointpin - A PowerPoint tab.
Sharepointfiles - A SharePoint tab.
Webpage - A pinned website tab.
Wiki-tab - A wiki tab.
Wordpin - A Word tab.
|Target||The user that the action (identified in the Operation property) was performed on. For example, if a guest user is added to SharePoint or a Microsoft Team, that user would be listed in this property.||Azure Active Directory|
|TeamGuid||The ID of a team in Microsoft Teams.||Microsoft Teams|
|TeamName||The name of a team in Microsoft Teams.||Microsoft Teams|
|UserAgent||Information about the user's browser. This information is provided by the browser.||SharePoint|
|UserDomain||Identity information about the tenant organization of the user (actor) who performed the action.||Azure Active Directory|
|UserId||The user who performed the action (specified in the Operation property) that resulted in the record being logged. Audit records for activity performed by system accounts (such as SHAREPOINT\system or NT AUTHORITY\SYSTEM) are also included in the audit log. Another common value for the UserId property is app@sharepoint. This indicates that the "user" who performed the activity was an application that has the necessary permissions in SharePoint to perform organization-wide actions (such as search a SharePoint site or OneDrive account) on behalf of a user, admin, or service. For more information, see The app@sharepoint user in audit records.||All|
|UserKey||An alternative ID for the user identified in the UserID property. For example, this property is populated with the passport unique ID (PUID) for events performed by users in SharePoint. This property also might specify the same value as the UserID property for events occurring in other services and events performed by system accounts.||All|
|UserSharedWith||The user that a resource was shared with. This property is included if the value for the Operation property is SharingSet. This user is also listed in the Shared with column in the report.||SharePoint|
|UserType||The type of user that performed the operation. The following values indicate the user type.
0 - A regular user.
2 - An administrator in your Microsoft 365 organization.1
3 - A Microsoft datacenter administrator or datacenter system account.
4 - A system account.
5 - An application.
6 - A service principal.
7 - A custom policy.
8 - A system policy.
|Version||Indicates the version number of the activity (identified by the Operation property) that's logged.||All|
|Workload||The Microsoft 365 service where the activity occurred.||All|
1 For Azure Active Directory-related events, the value for an administrator isn't used in an audit record. Audit records for activities performed by administrators will indicate that a regular user (for example, UserType: 0) performed the activity. The UserID property will identify the person (regular user or administrator) who performed the activity.
The properties described above are also displayed when you click More information when viewing the details of a specific event.