aspose.email.clients.activity

the aspose.email.clients.activity namespace provides classes
that implement the office 365 management activity api.

Classes

ClassDescription
ActivityClientProvides access to MS Exchange Server (Office365) by using REST API.
AttachmentData
ContentObject contains an aggregation of actions and events harvested from multiple servers across multiple datacenters.
ContentInfoObject contains brief information of an aggregation of actions and events harvested from multiple servers across multiple datacenters.
ExchangeAdminActivityExtends the Common schema with the properties specific to all Exchange admin audit data.
ExchangeFolderExchange folder
ExchangeItemExchange item
ExchangeMailboxActivityExtends the Common schema with the properties specific to all Exchange mailbox audit data.
ExchangeMailboxAuditActivity
ExchangeMailboxAuditGroupActivity
ExchangeMetadataExchange metadata in DLP events
ExtendedPropertyExtended properties for the setting being changed.
Each property will have a Name and Value.
IActivityClientRepresents the interface for Exchange REST client.
ModifiedPropertyModified property
NotificationObject contains an aggregation of actions and events harvested from multiple servers across multiple datacenters.
O365EmailMessageActivityExtends the Common schema with the properties specific to Office 365 Advanced Threat Protection and Threat Intelligence data.
Office 365 Advanced Threat Protection (ATP) and Threat Intelligence events are available for Office 365 customers who have an ATP, Threat Intelligence, or E5 subscription.
Each event in the ATP and Threat Intelligence feed corresponds to
An email message sent by or received by a user in the organization with detections are made on messages at delivery time and from Zero hour auto purge.
O365URLTimeOfClickActivityExtends the Common schema with the properties specific to Office 365 Advanced Threat Protection and Threat Intelligence data.
Office 365 Advanced Threat Protection (ATP) and Threat Intelligence events are available for Office 365 customers who have an ATP, Threat Intelligence, or E5 subscription.
Each event in the ATP and Threat Intelligence feed corresponds to the
URLs clicked by a user in the organization that were detected as malicious at time-of-click based on Office 365 ATP Safe Links protection.
ObjectNameContains name for object in the data feed identified by guids.
RecordAudit log record
SharePointMetadataDescribes metadata about the document in SharePoint or OneDrive for Business that contained the sensitive information.
SubscriptionObject contains information about subscription together with the associated webhook.
WebhookObject contains information about webhook

Enumerations

EnumerationDescription
ActivityAzureActiveDirectoryEventTypeThe type of Azure AD event.
AddOnTypeTypes of add-on that generated event.
AuthenticationMethodAuthentication methods
CredentialTypeCredential types
DataCenterSecurityEventTypeTypes of dmdlet event in lock box.
DetectionTypeThe type of detection.
DeviceTypeDevice types used to access Sway for the triggered event.
EndpointTypes of Sway client endpoint for the triggered event.
EventSourceAudit event sources
FileVerdictThe file malware verdict.
IdentityTypeIdentity types
ItemTypeAudit item types
LoginTypeLogin types
LogonTypeAudit logon types
MemberRoleTypeType of a user role within the team.
NotificationStatus
OperationResultTypes of operation result
ProjectActionProject action
ProjectEntityProject entity
RecordTypeAudit record types
ResultStatusIndicates statuses of logged operation.
ScopeAudit scope
SharePointAuditOperationSharePoint audit operations
SubscriptionStatusSubscription status
SwayAuditOperationSway audit operation
UserTypeUser types
WebhookStatusWebhook status
WorkloadThe Office 365 service where the activity occurred.