Skip to main content

Linux TSV Log File

The following information lists all of the columns generated by Linux Activity Monitor into a TSV log file, along with descriptions.

Operation TimeDate timestamp of the event in UTC time Column format is dependent on "Report Operations with millisecond precision" option
HostHost name of the monitored device
User Sid/UidUnique identifier for the File System user: - For CIFS activity – user SID - For NFS activity – UID
Operation TypeType of operation for each event. Reports the following operations: - Add - Delete (Del) - Rename (Ren) - Network Share (SHARE) - Permission Change (Per) - Read (Rea) - Symlink or hardlink (LINK) - Update (Upd)
Object TypeThe type of object that was affected. Reports events for the following object types: - Folder (FOLD) - File (FILE) - Unknown (UNK)
PathThe Path where the event took place. - For Windows – If a path starts with “VSS:” then it is a shadow copy creation event. For example, “VSS:C” is a shadow copy creation of volume C.
Rename PathNew name of the path if a rename event occurs
Process or IPIndicates the source of the activity event: - For Local activity – Process name (e.g. notepad.exe) - For Remote network activity – IP Address of the user
1) Sub-Operation 2) Old Attributes 3) New AttributesWindows hosts only. These columns are filled with details about: - Permission changes (the “Per” operation type) - Attribute Changes (the “Upd” operation type) - Read events from VSS shadow copies See the Sub-Operation, Old Attributes, and New Attributes Table section for additional details.
User NameUsername in NTAccount format. This column is dependent upon the “Report account names” option.
ProtocolProtocol of the event, i.e. CIFS, NFS, or VSS
1) UNC 2) Rename UNC PathNetwork paths of remote activity. These columns are dependent upon the “Report UNC paths” option. - For CIFS activity – Reported with the following format \[SERVER][SHARE]\Folder\File.txt - For NFS activity – Reported with the following format[SERVER]:/[VOLUME]/Folder/File.txt
Volume IDID of the volume where the event occurred
Share NameShare name where the event occurred. This column is dependent upon the “Report UNC paths” option.
Protocol VersionNetApp Data ONTAP Cluster-Mode devices only. Protocol version of the event, i.e. CIFS or NFS. The following values are potentially reported: - For CIFS activity – 1.0, 2.0, 2.1, 3.0, 3.1 - For NFS activity – 2, 3, 4, 4.1, 4.2
File SizeSize of File
TagsWindows hosts only Contains 'Copy' for read events that are probably file copies
Group IDLinux hosts only Unique identifier for the File System Group (GID).
Group NameLinux hosts only Name of the File System Group (GID).
Process IDLinux hosts only Name of the File System Group (GID).

SharePoint JSON Log File

The JSON log file format is used to send SharePoint activity monitoring data to Access Analyzer v10.0 consoles. The following information lists all of the attributes generated by SharePoint Activity Monitor into a JSON log file:

Attribute NameDescriptionExample
TimeLoggedDateTime/ string2019-03-14T18:13:39.00Z
ActivityTypeConstant “SharePoint”SharePoint
AgentHostHost name where agent is installedsphost
UserSidUser SID who caused the eventS-1-0-0
UserNameUser Name who caused the eventSystem Account
UserIDID of the user who caused the event1073741823
UserLoginUser Login who caused the eventSHAREPOINT\system
ProtocolProtocol: HTTP / HTTPS..HTTP
AbsoluteUrlFull Url: SiteUrl + DocLocationhttp://sphost/Lists/Comments/1\_.000
WebApplicationWeb application nameSharePoint – 80
SiteIdSite Id (guid)7b2c8d23-a74f-4c3c-985d-2c7facb5ebae
SiteUrlSite Urlhttp://sphost/sites/mysite
WebTitleWeb titlemy site
DocLocationLocation of an audited object at the time of the audited eventLists/Comments/1_.000
ItemIdA Guid that the object whose event is represented by the entry2c4174dc-322d-47bc-a420-52968fc3ba6c
ItemTitleTitle of the objectWelcome to my blog!
ItemTypeType of the object: Document / ListItem / List / Folder / Web / SiteListItem
EventTypeAn SPAuditEventType that represents the type of eventUpdate
EventSourceA value that indicates whether the event occurred as a result of user action in the SharePoint Foundation user interface (UI) or programmatically. Values: SharePoint / ObjectModelSharePoint
LocationTypeSpecifies the actual location of a document in a SharePoint document library: Invalid, Url, ClientLocationUrl
AppPrincipalIdThe ID of the app principal who caused the event. If the value of EventSource is ObjectModel, thenAppPrincipalId holds the ID of the app principal whose context the code that caused the event was running. If there is no app context, the AppPrincipalId is null.0
SourceNameThe name of the application that caused the event<empty>
RawEventDataA String that holds XML markup providing data that is specific to the type of event that the entry object represents.<RelatedItem><Id>06C49477-0498-4858-900C-45B595337462</Id><Relationship><NewName> MyDocs/myfile.zip</NewName></RelatedItem
AuditMaskThe new audit mask[“CheckIn”,“View”,“Delete”,“Update”]
ChildIdThe GUID of the child that is deleted/moved.06C49477-0498-4858-900C-45B595337462
ChildDocLocationThe pre-deletion URL of the child itemLists/Posts/2_.000
NewDocLocationThe URL to which the item is movedMyNewDocs/myfile.zip
VersionThe new version of the document / The version that was deleted1.0
DeleteTypeWhether it is moved to the recycle bin (1) or is deleted completely (0). 1 - MovedToRecycle; 0 - DeletedCompletelyMovedToRecycle
SearchQuerymyfile
SearchConstraintsite:“http://sphost/sites/mysite”
GroupIdThe ID of the new/deleted group The ID of the group that was bound to the role11
GroupNameThe name of the new/deleted group The name of the group that was bound to the roleMy Super Group
TrusteeIdThe ID of the user that was added/deleted from the group The ID of the user that was bound to the role8
TrusteeNameThe Name of the user/group that was added/deleted from the group The Name of the user/group that was bound to the rolespuser
TrusteeTypeThe name is the name of group or user: User / GroupUser
UpdateTypeAdded or RemovedAdded, Removed, or Updated
RoleIdThe ID of the new/changed/deleted permission level1073741924
RoleNameThe name of the new/changed/deleted permission levelMy Role
PermissionsThe combination of permissions[“ViewListItems”,“AddListItems”,“EditListItems”]

SharePoint Online JSON Log File

The JSON log file format is used to send SharePoint Online activity monitoring data to Access Analyzer v10.0 consoles. The following information lists all of the attributes generated by SharePoint Online Activity Monitor into a JSON log file:

Base Schema

The following table details lists of attributes for base schema generated by SharePoint Online Activity Monitor.

Attribute NameDescriptionExample
TimeLoggedEvent time (UTC)2019-03-14T18:13:39.0 00Z
ActivityTypeConstant "SharePoint"SharePointOnline
AgentHostHost name where agent is installed.sphost
SourceSharePoint, SharePointFileOperation, SharePointListOperation, SharePointListItemOperation, SharePointContentTypeOperation, SharePointFieldOperation, SharePointSharingOperation, ComplianceDLPSharePoint, ComplianceDLPSharePointClassificationSharePointFileOperation
IdUnique id of an audit record5ed5f834-7609-4ea6-df9b-08d76f79a875
EventTypeAccessInvitationCreated AccessInvitationExpired AccessInvitationRevoked AccessInvitationUpdated AccessRequestApproved AccessRequestCreated AccessRequestRejected ActivationEnabled AdministratorAddedToTermStore AdministratorDeletedFromTermStore AllowGroupCreationSet AppCatalogCreated AuditPolicyRemoved AuditPolicyUpdate AzureStreamingEnabledSet CollaborationTypeModified ConnectedSiteSettingModified CreateSSOApplication CustomFieldOrLookupTableCreated CustomFieldOrLookupTableDeleted CustomFieldOrLookupTableModified CustomizeExemptUsers DefaultLanguageChangedInTermStore DelegateModified DelegateRemoved DeleteSSOApplication eDiscoveryHoldApplied eDiscoveryHoldRemoved eDiscoverySearchPerformed EngagementAccepted EngagementModified EngagementRejected EnterpriseCalendarModified EntityDeleted EntityForceCheckedIn ExemptUserAgentSet FileAccessed FileCheckOutDiscarded FileCheckedIn FileCheckedOut FileCopied FileDeleted FileDeletedFirstStageRecycleBin FileDeletedSecondStageRecycleBin FileDownloaded FileFetched FileModified FileMoved FilePreviewed FileRenamed FileRestored FileSyncDownloadedFull FileSyncDownloadedPartial FileSyncUploadedFull FileSyncUploadedPartial FileUploaded FileViewed FolderCopied FolderCreated FolderDeleted FolderDeletedFirstStageRecycleBin FolderDeletedSecondStageRecycleBin FolderModified FolderMoved FolderRenamed FolderRestored GroupAdded GroupRemoved GroupUpdated LanguageAddedToTermStore LanguageRemovedFromTermStore LegacyWorkflowEnabledSet LookAndFeelModified ManagedSyncClientAllowed MaxQuotaModified MaxResourceUsageModified MySitePublicEnabledSet NewsFeedEnabledSet ODBNextUXSettings OfficeOnDemandSet PageViewed PeopleResultsScopeSet PermissionSyncSettingModified PermissionTemplateModified PortfolioDataAccessed PortfolioDataModified PreviewModeEnabledSet ProjectAccessed ProjectCheckedIn ProjectCheckedOut ProjectCreated ProjectDeleted ProjectForceCheckedIn ProjectModified ProjectPublished ProjectWorkflowRestarted PWASettingsAccessed PWASettingsModified QueueJobStateModified QuotaWarningEnabledModified RenderingEnabled ReportingAccessed ReportingSettingModified ResourceAccessed ResourceCheckedIn ResourceCheckedOut ResourceCreated ResourceDeleted ResourceForceCheckedIn ResourceModified ResourcePlanCheckedInOrOut ResourcePlanModified ResourcePlanPublished ResourceRedacted ResourceWarningEnabledModified SSOGroupCredentialsSet SSOUserCredentialsSet SearchCenterUrlSet SecondaryMySiteOwnerSet SecurityCategoryModified SecurityGroupModified SendToConnectionAdded SendToConnectionRemoved SharedLinkCreated SharedLinkDisabled SharingInvitationAccepted SharingRevoked SharingSet SiteAdminChangeRequest SiteCollectionAdminAdded SiteCollectionCreated SiteRenamed StatusReportModified SyncGetChanges TaskStatusAccessed TaskStatusApproved TaskStatusRejected TaskStatusSaved TaskStatusSubmitted TimesheetAccessed TimesheetApproved TimesheetRejected TimesheetSaved TimesheetSubmitted UnmanagedSyncClientBlocked UpdateSSOApplication UserAddedToGroup UserRemovedFromGroup WorkflowModifiedFileDeleted
OrganizationIdOrganization tenant ID86e5dcbf-56e9-4452-8c43-1e99f0e9aabd
UserTypeType of the user performed the operation.Regular
UserIdThe UPN of the user who performed the operationuser1@stealthbitstechnologie.onmicrosoft.com
UserNameName of the user who performed the operationUser1
UserLoginAn alternative ID of the user. "DlpAgent" for DLP eventsi:0h.f/membership/10033fff8a7ae322@live.com
ClientIPIP address of the user or a trusted application75.155.180.82
ProtocolProtocol: HTTPSHTTPS
WorkloadOffice 365 service where the activty occurred.SharePoint
ResultStatusSucceeded, ParticallySucceeded, Failed, True, FalseParticallySucceeded
AbsoluteUrlFull path of the file/folder accessed by the userhttps://stealthbitstechnologie-my.sharepoint.com/personal/sgiles_stealthbitstechnologie_onmicrosoft_com/personal/myfiles/21ded
ScopeWas this event created by a hosted O365 service or an on-premises server? online or onprem
SiteIdGuid of the siteaef1ad6b-11c5-4b25-a669-b5f8379f8c55
ItemTypeObject type: File, Folder, Web, Site, Tenant, DocumentLibrary, Page, Differs from SP typesFile
ItemTitle
EventSourceSharePoint or ObjectModelSharePoint
UserAgentUser client or browser
MachineDomainInfoInformation about device sync operations
MachineIdInformation about device sync operations
UpdateTypeAdded, Removed, or UpdatedAdded
VersionThe new version of the document/version of deleted document1

File/Folder Operations

The following table details lists of attributes for file/folder operations generated by SharePoint Online Activity Monitor.

Attribute NameDescriptionExample
SiteUrlURL of the sitehttps://example-url.sharepoint.com/
DocLocationRelative URL of the file or document accessed by the userShared Documents/100 Sensitive Docs/Document.docx
SourceRelativeUrlThe URL of the folder that contains the file accessed by the user. The combination of the values for the SiteURL, SourceRelativeURL, and SourceFileName parameters is the same as the value for the AbsoluteUrl propertyShared Documents/100 Sensitive Docs
SourceFileNameFile or folder nameMy Document.docx
SourceFileExtensionFile extensiondocx
NewDocLocationA relative URL to which the object is copied or movedShared Documents/100 Sensitive Docs/Copy.docx
DestinationRelativeUrlOnly for EventType: FileCopied, FileMoved The URL of the destination folder where a file is copied or moved.Shared Documents/100 Sensitive Docs
DestinationFileNameOnly for EventType: FileCopied, FileMoved The name of the file that is copied or moved.Copy.docx
DestinationFileExtensionOnly for EventType: FileCopied, FileMoveddocx

Sharing

The following table details lists of attributes for sharing generated by SharePoint Online Activity Monitor by Sharing.

Attribute NameDescription
SharingTypeThe type of sharing permissions that were assigned to the user that the resource was shared with
TargetUserOrGroupNameUPN or name of the target user or group that a resource was shared with
TargetUserOrGroupTypeMember, Guest, Group, or Partner
EventData

Other SharePoint Events

The following table details lists of attributes for other SharePoint events generated by SharePoint Online Activity Monitor by Sharing.

Attribute NameDescription
CustomEvent
EventDataOptional payload
ModifiedPropertiesThe property is included for admin events, such as adding a user as a member of a site or a site collection admin group. The property includes the name of the property that was modified, old, and new value

DLP Events

The following table details lists of attributes for DLP events generated by SharePoint Online Activity Monitor by Sharing.

Attribute NameDescriptionExample
SharePointMetaDataMetadata about the document that contained the sensitive informationhttps://docs.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema#sharepointmetadata-complex-type
ExceptionInfoReasons why a policy no longer applies and any information about false positive or override
PolicyDetailsPolicy(s) that triggered the eventhttps://docs.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema#policydetails-complex-type
SensitiveInfoDetectionIsIncludedIndicates whether the event contains the value of the sensitive data type

SharePoint TSV Log File

The TSV log file format is used to send SharePoint activity monitoring data to Access Analyzer v10.0 and earlier consoles. The following information lists all of the columns generated by SharePoint Activity Monitor into a TSV log file:

Column NameDescription
Operation TimeDate timestamp of the event in UTC time
HostHost name of the monitored device as entered by the user
UserSid/UidUnique identifier for the SharePoint user: - For CIFS activity – user SID - For NFS activity – UID
User NameSharePoint user name
UserIDID of the SharePoint user
UserLoginIdentity claims using encoding format for user login
PathTruncated path where the event took place, e.g. sites/TestSite/Shared Documents/Testing.txt
ProtocolProtocol of the event
FullPathFull path where the event took place, e.g. http://sharepoint.local/sites/TestSite/Shared Documents/Testing.txt
WebApplicationTitle of the SharePoint web application
SiteIdID of the site collection
SiteUrlURL of the site collection
WebTitleTitle of the site collection
DocLocationLocation of the document
ItemIDID of the item
ItemTitleTitle of the item
Item TypeType of item
EventTypeType of SharePoint event
EventSourceSource where the event came from
LocationTypeLocation type of the SharePoint document location
AppPrincipalIdApplication principal ID
SourceNameName of the source
EventDataRaw event data
ParamParameters for the event

SQL Server JSON Log File

The following information lists all of the columns generated by SQL Server Activity Monitor into a JSON log file, along with descriptions.

FieldTypeDescriptionExample
TimeLoggedDateTimeUNC Datetime of the event, format: yyyy-MM-ddTHH:mm:ss.fffZ2021-02-18T15:39:29.424Z
ActivityTypeFixed stringSqlServer
AgentHostStringHost of Stealthbits Activity Monitor Agent ServiceW7-VS17
UserNameStringName of user performed the operationadmin
SuccessboolThe result of the operation. For Login operations, False means the login has failed. For other operations, the result is always True.True
TypeMaskuintInteger representation of performed operation: combination (mask) of codes of SqlServerEvent enumeration. - Select = 0x01, - Insert = 0x02, - Update = 0x04, - Delete = 0x08, - Merge = 0x10, - Execute = 0x20, - LoginSuccessful = 0x40, - LoginFailed = 0x80, - Logout = 0x0100, - Grant = 0x0200, - Revoke = 0x0400, - Deny = 0x0800, - Error = 0x1000, - Create = 0x2000, - Alter = 0x4000, - Drop = 0x800033 (Combination of Select and Execute)
TypeMaskDescStringText representation of TypeMask fieldSelect | Execute
ClientAppNameStringName of application that cause the operationMicrosoft SQL Server Management Studio - Transact-SQL IntelliSense
ClientHostNameStringName of client hostW10
ClientIpStringIP address of the client (can be empty)127.0.0.1
DatabaseNameStringName of affected DatabaseAdventureWorks
SqlTextStringQuery textselect * from [SalesLT].[Customer]
ErrorNumberIntegerMSSQL Error Code208
MessageStringMessage text of the errorInvalid object name 'SalesLT.Customer1'.
CategoryStringCategory of the error2
SqlObjectsStringArray of affected objects

JSON Examples

Error

{
"TimeLogged": "2021-06-11T12:57:18.600Z",
"ActivityType": "SqlServer",
"AgentHost": "W7-VS17",
"UserName": "testuser1",
"Success": true,
"TypeMask": 4096,
"TypeMaskDesc": "Error",
"ClientAppName": "Microsoft SQL Server Management Studio - Query",
"ClientHostName": "W10",
"ClientIp": "127.0.0.1",
"DatabaseName": "StealthRECOVER_22-04",
"SqlText": "select * from [SalesLT].[Customer1]",
"ErrorNumber": 208,
"Message": "Invalid object name 'SalesLT.Customer1'.",
"Category": "2"
}

Login (Success)

{
"TimeLogged": "2021-06-11T12:50:40.038Z",
"ActivityType": "SqlServer",
"AgentHost": "W7-VS17",
"UserName": "testuser1",
"Success": true,
"TypeMask": 64,
"TypeMaskDesc": "Login",
"ClientAppName": "Microsoft SQL Server Management Studio - Query",
"ClientHostName": "W10",
"ClientIp": "127.0.0.1",
"DatabaseName": "master"
}

Login (Failed)

{
"TimeLogged": "2021-06-11T12:28:24.165Z",
"ActivityType": "SqlServer",
"AgentHost": "W7-VS17",
"UserName": "",
"Success": false,
"TypeMask": 64,
"TypeMaskDesc": "Login",
"ClientAppName": "Microsoft SQL Server Management Studio",
"ClientHostName": "W10",
"ClientIp": "",
"DatabaseName": "master",
"ErrorNumber": 18456,
"Message": "Login failed for user 'testuser'. Reason: Could not find a login matching the name provided. [CLIENT: local machine]"
}

Logout

{
"TimeLogged": "2021-06-11T13:14:28.386Z",
"ActivityType": "SqlServer",
"AgentHost": "W7-VS17",
"UserName": "testuser1",
"Success": true,
"TypeMask": 256,
"TypeMaskDesc": "Logout",
"ClientAppName": "Microsoft SQL Server Management Studio - Query",
"ClientHostName": "W10",
"ClientIp": "127.0.0.1",
"DatabaseName": "StealthRECOVER_22-04"
}

SqlEvent

{
"TimeLogged": "2021-06-11T13:22:48.682Z",
"ActivityType": "SqlServer",
"AgentHost": "W7-VS17",
"UserName": "sa",
"Success": true,
"TypeMask": 5,
"TypeMaskDesc": "Select | Update",
"ClientAppName": "Microsoft SQL Server Management Studio - Query",
"ClientHostName": "W10",
"ClientIp": "127.0.0.1",
"DatabaseName": "AdventureWorksLT2019",
"SqlText": "select top 100 * \r\nfrom [SalesLT].[SalesOrderDetail] d\r\nleft join [SalesLT].[Product] p on p.ProductID=d.ProductID;\r\nUpdate [SalesLT].[Product] set ProductNumber='zzz' where ProductNumber='xxx';\r\n",
"SqlObjects": [
{
"t": "U",
"db": "AdventureWorksLT2019",
"s": "saleslt",
"o": "SalesOrderDetail",
"op": "Select"
},
{
"t": "U",
"db": "AdventureWorksLT2019",
"s": "saleslt",
"o": "Product",
"op": "Select | Update"
}
]
}

Permission

{
"TimeLogged": "2021-06-11T13:27:48.009Z",
"ActivityType": "SqlServer",
"AgentHost": "W7-VS17",
"UserName": "sa",
"Success": true,
"TypeMask": 512,
"TypeMaskDesc": "Grant",
"ClientAppName": "Microsoft SQL Server Management Studio - Query",
"ClientHostName": "W10",
"ClientIp": "127.0.0.1",
"DatabaseName": "AdventureWorksLT2019",
"SqlText": "\r\n\r\nGRANT ALL ON [SalesLT].[Product] TO [sqluser3]; ",
"SqlObjects": [{ "t": "U", "db": "AdventureWorksLT2019", "s": "saleslt", "o": "Product", "op": "Grant" }]
}