The IP address of the device that was used when the activity was logged.
Parameter properties
Type:
System.String[]
Supports wildcards:
False
DontShow:
False
Parameter sets
UpdateViaIdentityExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
UpdateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-KeywordFilter
Free text field to search non-indexed properties of the audit log.
Parameter properties
Type:
System.String
Supports wildcards:
False
DontShow:
False
Parameter sets
UpdateViaIdentityExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
UpdateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-ObjectIdFilters
For SharePoint and OneDrive for Business activity, the full path name of the file or folder accessed by the user.
For Exchange admin audit logging, the name of the object that was modified by the cmdlet.
Parameter properties
Type:
System.String[]
Supports wildcards:
False
DontShow:
False
Parameter sets
UpdateViaIdentityExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
UpdateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-OperationFilters
The name of the user or admin activity.
For a description of the most common operations/activities, see Search the audit log in the Office 365 Protection Center.
Parameter properties
Type:
System.String[]
Supports wildcards:
False
DontShow:
False
Parameter sets
UpdateViaIdentityExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
UpdateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-Proxy
The URI for the proxy server to use
Parameter properties
Type:
System.Uri
Supports wildcards:
False
DontShow:
False
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-ProxyCredential
Credentials for a proxy server to use for the remote call
Parameter properties
Type:
System.Management.Automation.PSCredential
Supports wildcards:
False
DontShow:
False
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-ProxyUseDefaultCredentials
Use the default credentials for the proxy
Parameter properties
Type:
System.Management.Automation.SwitchParameter
Default value:
False
Supports wildcards:
False
DontShow:
False
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-Records
An individual audit log record.
To construct, see NOTES section for RECORDS properties and create a hash table.
The UPN (user principal name) of the user who performed the action (specified in the operation property) that resulted in the record being logged; for example, myname@mydomain_name.
Parameter properties
Type:
System.String[]
Supports wildcards:
False
DontShow:
False
Parameter sets
UpdateViaIdentityExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
UpdateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-WhatIf
Runs the command in a mode that only reports what would happen without performing the actions.
Parameter properties
Type:
System.Management.Automation.SwitchParameter
Supports wildcards:
False
DontShow:
False
Aliases:
wi
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
CommonParameters
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
-InformationAction, -InformationVariable, -OutBuffer, -OutVariable, -PipelineVariable,
-ProgressAction, -Verbose, -WarningAction, and -WarningVariable. For more information, see
about_CommonParameters.
To create the parameters described below, construct a hash table containing the appropriate properties.
For information on hash tables, run Get-Help about_Hash_Tables.
BODYPARAMETER <IMicrosoftGraphSecurityAuditLogQuery>: auditLogQuery
[(Any) <Object>]: This indicates any property can be added to this object.
[Id <String>]: The unique identifier for an entity.
Read-only.
[AdministrativeUnitIdFilters <String[]>]: The administrative units tagged to an audit log record.
[DisplayName <String>]: The display name of the saved audit log query.
[FilterEndDateTime <DateTime?>]: The end date of the date range in the query.
[FilterStartDateTime <DateTime?>]: The start date of the date range in the query.
[IPAddressFilters <String[]>]: The IP address of the device that was used when the activity was logged.
[KeywordFilter <String>]: Free text field to search non-indexed properties of the audit log.
[ObjectIdFilters <String[]>]: For SharePoint and OneDrive for Business activity, the full path name of the file or folder accessed by the user.
For Exchange admin audit logging, the name of the object that was modified by the cmdlet.
[OperationFilters <String[]>]: The name of the user or admin activity.
For a description of the most common operations/activities, see Search the audit log in the Office 365 Protection Center.
[RecordTypeFilters <String[]>]: The type of operation indicated by the record.
The possible values are: exchangeAdmin, exchangeItem, exchangeItemGroup, sharePoint, syntheticProbe, sharePointFileOperation, oneDrive, azureActiveDirectory, azureActiveDirectoryAccountLogon, dataCenterSecurityCmdlet, complianceDLPSharePoint, sway, complianceDLPExchange, sharePointSharingOperation, azureActiveDirectoryStsLogon, skypeForBusinessPSTNUsage, skypeForBusinessUsersBlocked, securityComplianceCenterEOPCmdlet, exchangeAggregatedOperation, powerBIAudit, crm, yammer, skypeForBusinessCmdlets, discovery, microsoftTeams, threatIntelligence, mailSubmission, microsoftFlow, aeD, microsoftStream, complianceDLPSharePointClassification, threatFinder, project, sharePointListOperation, sharePointCommentOperation, dataGovernance, kaizala, securityComplianceAlerts, threatIntelligenceUrl, securityComplianceInsights, mipLabel, workplaceAnalytics, powerAppsApp, powerAppsPlan, threatIntelligenceAtpContent, labelContentExplorer, teamsHealthcare, exchangeItemAggregated, hygieneEvent, dataInsightsRestApiAudit, informationBarrierPolicyApplication, sharePointListItemOperation, sharePointContentTypeOperation, sharePointFieldOperation, microsoftTeamsAdmin, hrSignal, microsoftTeamsDevice, microsoftTeamsAnalytics, informationWorkerProtection, campaign, dlpEndpoint, airInvestigation, quarantine, microsoftForms, applicationAudit, complianceSupervisionExchange, customerKeyServiceEncryption, officeNative, mipAutoLabelSharePointItem, mipAutoLabelSharePointPolicyLocation, microsoftTeamsShifts, secureScore, mipAutoLabelExchangeItem, cortanaBriefing, search, wdatpAlerts, powerPlatformAdminDlp, powerPlatformAdminEnvironment, mdatpAudit, sensitivityLabelPolicyMatch, sensitivityLabelAction, sensitivityLabeledFileAction, attackSim, airManualInvestigation, securityComplianceRBAC, userTraining, airAdminActionInvestigation, mstic, physicalBadgingSignal, teamsEasyApprovals, aipDiscover, aipSensitivityLabelAction, aipProtectionAction, aipFileDeleted, aipHeartBeat, mcasAlerts, onPremisesFileShareScannerDlp, onPremisesSharePointScannerDlp, exchangeSearch, sharePointSearch, privacyDataMinimization, labelAnalyticsAggregate, myAnalyticsSettings, securityComplianceUserChange, complianceDLPExchangeClassification, complianceDLPEndpoint, mipExactDataMatch, msdeResponseActions, msdeGeneralSettings, msdeIndicatorsSettings, ms365DCustomDetection, msdeRolesSettings, mapgAlerts, mapgPolicy, mapgRemediation, privacyRemediationAction, privacyDigestEmail, mipAutoLabelSimulationProgress, mipAutoLabelSimulationCompletion, mipAutoLabelProgressFeedback, dlpSensitiveInformationType, mipAutoLabelSimulationStatistics, largeContentMetadata, microsoft365Group, cdpMlInferencingResult, filteringMailMetadata, cdpClassificationMailItem, cdpClassificationDocument, officeScriptsRunAction, filteringPostMailDeliveryAction, cdpUnifiedFeedback, tenantAllowBlockList, consumptionResource, healthcareSignal, dlpImportResult, cdpCompliancePolicyExecution, multiStageDisposition, privacyDataMatch, filteringDocMetadata, filteringEmailFeatures, powerBIDlp, filteringUrlInfo, filteringAttachmentInfo, coreReportingSettings, complianceConnector, powerPlatformLockboxResourceAccessRequest, powerPlatformLockboxResourceCommand, cdpPredictiveCodingLabel, cdpCompliancePolicyUserFeedback, webpageActivityEndpoint, omePortal, cmImprovementActionChange, filteringUrlClick, mipLabelAnalyticsAuditRecord, filteringEntityEvent, filteringRuleHits, filteringMailSubmission, labelExplorer, microsoftManagedServicePlatform, powerPlatformServiceActivity, scorePlatformGenericAuditRecord, filteringTimeTravelDocMetadata, alert, alertStatus, alertIncident, incidentStatus, case, caseInvestigation, recordsManagement, privacyRemediation, dataShareOperation, cdpDlpSensitive, ehrConnector, filteringMailGradingResult, publicFolder, privacyTenantAuditHistoryRecord, aipScannerDiscoverEvent, eduDataLakeDownloadOperation, m365ComplianceConnector, microsoftGraphDataConnectOperation, microsoftPurview, filteringEmailContentFeatures, powerPagesSite, powerAppsResource, plannerPlan, plannerCopyPlan, plannerTask, plannerRoster, plannerPlanList, plannerTaskList, plannerTenantSettings, projectForTheWebProject, projectForTheWebTask, projectForTheWebRoadmap, projectForTheWebRoadmapItem, projectForTheWebProjectSettings, projectForTheWebRoadmapSettings, quarantineMetadata, microsoftTodoAudit, timeTravelFilteringDocMetadata, teamsQuarantineMetadata, sharePointAppPermissionOperation, microsoftTeamsSensitivityLabelAction, filteringTeamsMetadata, filteringTeamsUrlInfo, filteringTeamsPostDeliveryAction, mdcAssessments, mdcRegulatoryComplianceStandards, mdcRegulatoryComplianceControls, mdcRegulatoryComplianceAssessments, mdcSecurityConnectors, mdaDataSecuritySignal, vivaGoals, filteringRuntimeInfo, attackSimAdmin, microsoftGraphDataConnectConsent, filteringAtpDetonationInfo, privacyPortal, managedTenants, unifiedSimulationMatchedItem, unifiedSimulationSummary, updateQuarantineMetadata, ms365DSuppressionRule, purviewDataMapOperation, filteringUrlPostClickAction, irmUserDefinedDetectionSignal, teamsUpdates, plannerRosterSensitivityLabel, ms365DIncident, filteringDelistingMetadata, complianceDLPSharePointClassificationExtended, microsoftDefenderForIdentityAudit, supervisoryReviewDayXInsight, defenderExpertsforXDRAdmin, cdpEdgeBlockedMessage, hostedRpa, cdpContentExplorerAggregateRecord, cdpHygieneAttachmentInfo, cdpHygieneSummary, cdpPostMailDeliveryAction, cdpEmailFeatures, cdpHygieneUrlInfo, cdpUrlClick, cdpPackageManagerHygieneEvent, filteringDocScan, timeTravelFilteringDocScan, mapgOnboard, unknownFutureValue.
[Records <IMicrosoftGraphSecurityAuditLogRecord[]>]: An individual audit log record.
[Id <String>]: The unique identifier for an entity.
Read-only.
[AdministrativeUnits <String[]>]: The administrative units tagged to an audit log record.
[AuditData <IMicrosoftGraphSecurityAuditData>]: auditData
[(Any) <Object>]: This indicates any property can be added to this object.
[AuditLogRecordType <String>]: auditLogRecordType
[ClientIP <String>]: The IP address of the device used when the activity was logged.
The IP address is displayed in either an IPv4 or IPv6 address format.
[CreatedDateTime <DateTime?>]: The date and time in UTC when the user performed the activity.
[ObjectId <String>]: For Exchange admin audit logging, the name of the object modified by the cmdlet.
For SharePoint activity, the full URL path name of the file or folder accessed by a user.
For Microsoft Entra activity, the name of the user account that was modified.
[Operation <String>]: The name of the user or admin activity.
[OrganizationId <String>]: The GUID for your organization.
[Service <String>]: The Microsoft 365 service where the activity occurred.
[UserId <String>]: The user who performed the action (specified in the Operation property) that resulted in the record being logged.
Audit records for activity performed by system accounts (such as SHAREPOINT/system or NT AUTHORITY/SYSTEM) are also included in the audit log.
Another common value for the UserId property is app@sharepoint.
It indicates that the 'user' who performed the activity was an application with the necessary permissions in SharePoint to perform organization-wide actions (such as searching a SharePoint site or OneDrive account) on behalf of a user, admin, or service.
[UserPrincipalName <String>]: UPN of the user who performed the action.
[UserType <String>]: auditLogUserType
[ServiceFilters <String[]>]:
[Status <String>]: auditLogQueryStatus
[UserPrincipalNameFilters <String[]>]: The UPN (user principal name) of the user who performed the action (specified in the operation property) that resulted in the record being logged; for example, myname@mydomain_name.
INPUTOBJECT <ISecurityIdentity>: Identity Parameter
[AlertId <String>]: The unique identifier of alert
[AnalyzedEmailId <String>]: The unique identifier of analyzedEmail
[ArticleId <String>]: The unique identifier of article
[ArticleIndicatorId <String>]: The unique identifier of articleIndicator
[AttackSimulationOperationId <String>]: The unique identifier of attackSimulationOperation
[AuditLogQueryId <String>]: The unique identifier of auditLogQuery
[AuditLogRecordId <String>]: The unique identifier of auditLogRecord
[AuthoredNoteId <String>]: The unique identifier of authoredNote
[AuthorityTemplateId <String>]: The unique identifier of authorityTemplate
[CaseOperationId <String>]: The unique identifier of caseOperation
[CategoryTemplateId <String>]: The unique identifier of categoryTemplate
[CitationTemplateId <String>]: The unique identifier of citationTemplate
[CloudAppDiscoveryReportId <String>]: The unique identifier of cloudAppDiscoveryReport
[CloudAppSecurityProfileId <String>]: The unique identifier of cloudAppSecurityProfile
[ContentFormats <String[]>]: Usage: contentFormats={contentFormats}
[CustomerInsightTenantId <String>]: The unique identifier of customerInsight
[DataSourceId <String>]: The unique identifier of dataSource
[DepartmentTemplateId <String>]: The unique identifier of departmentTemplate
[DetectionRuleId <String>]: The unique identifier of detectionRule
[DispositionReviewStageNumber <String>]: The unique identifier of dispositionReviewStage
[DomainSecurityProfileId <String>]: The unique identifier of domainSecurityProfile
[EdiscoveryCaseId <String>]: The unique identifier of ediscoveryCase
[EdiscoveryCaseMemberId <String>]: The unique identifier of ediscoveryCaseMember
[EdiscoveryCustodianId <String>]: The unique identifier of ediscoveryCustodian
[EdiscoveryFileId <String>]: The unique identifier of ediscoveryFile
[EdiscoveryHoldPolicyId <String>]: The unique identifier of ediscoveryHoldPolicy
[EdiscoveryNoncustodialDataSourceId <String>]: The unique identifier of ediscoveryNoncustodialDataSource
[EdiscoveryReviewSetId <String>]: The unique identifier of ediscoveryReviewSet
[EdiscoveryReviewSetQueryId <String>]: The unique identifier of ediscoveryReviewSetQuery
[EdiscoveryReviewTagId <String>]: The unique identifier of ediscoveryReviewTag
[EdiscoveryReviewTagId1 <String>]: The unique identifier of ediscoveryReviewTag
[EdiscoverySearchId <String>]: The unique identifier of ediscoverySearch
[EmailThreatSubmissionId <String>]: The unique identifier of emailThreatSubmission
[EmailThreatSubmissionPolicyId <String>]: The unique identifier of emailThreatSubmissionPolicy
[EndUserNotificationDetailId <String>]: The unique identifier of endUserNotificationDetail
[EndUserNotificationId <String>]: The unique identifier of endUserNotification
[FilePlanReferenceTemplateId <String>]: The unique identifier of filePlanReferenceTemplate
[FileSecurityProfileId <String>]: The unique identifier of fileSecurityProfile
[FileThreatSubmissionId <String>]: The unique identifier of fileThreatSubmission
[HealthIssueId <String>]: The unique identifier of healthIssue
[HostComponentId <String>]: The unique identifier of hostComponent
[HostCookieId <String>]: The unique identifier of hostCookie
[HostId <String>]: The unique identifier of host
[HostPairId <String>]: The unique identifier of hostPair
[HostPortId <String>]: The unique identifier of hostPort
[HostSecurityProfileId <String>]: The unique identifier of hostSecurityProfile
[HostSslCertificateId <String>]: The unique identifier of hostSslCertificate
[HostTrackerId <String>]: The unique identifier of hostTracker
[IPSecurityProfileId <String>]: The unique identifier of ipSecurityProfile
[IdentityAccountsId <String>]: The unique identifier of identityAccounts
[IncidentId <String>]: The unique identifier of incident
[IncidentTaskId <String>]: The unique identifier of incidentTask
[IntelligenceProfileId <String>]: The unique identifier of intelligenceProfile
[IntelligenceProfileIndicatorId <String>]: The unique identifier of intelligenceProfileIndicator
[LabelIds <String[]>]: Usage: labelIds={labelIds}
[LandingPageDetailId <String>]: The unique identifier of landingPageDetail
[LandingPageId <String>]: The unique identifier of landingPage
[Locale <String>]: Usage: locale='{locale}'
[LoginPageId <String>]: The unique identifier of loginPage
[PartnerSecurityAlertId <String>]: The unique identifier of partnerSecurityAlert
[PassiveDnsRecordId <String>]: The unique identifier of passiveDnsRecord
[PayloadId <String>]: The unique identifier of payload
[PolicyFileId <String>]: The unique identifier of policyFile
[ProviderTenantSettingId <String>]: The unique identifier of providerTenantSetting
[RetentionEventId <String>]: The unique identifier of retentionEvent
[RetentionEventTypeId <String>]: The unique identifier of retentionEventType
[RetentionLabelId <String>]: The unique identifier of retentionLabel
[SecureScoreControlProfileId <String>]: The unique identifier of secureScoreControlProfile
[SecureScoreId <String>]: The unique identifier of secureScore
[SecurityActionId <String>]: The unique identifier of securityAction
[SecurityRequirementId <String>]: The unique identifier of securityRequirement
[SecurityScoreHistoryId <String>]: The unique identifier of securityScoreHistory
[SensitivityLabelId <String>]: The unique identifier of sensitivityLabel
[SensitivityLabelId1 <String>]: The unique identifier of sensitivityLabel
[SensorId <String>]: The unique identifier of sensor
[SimulationAutomationId <String>]: The unique identifier of simulationAutomation
[SimulationAutomationRunId <String>]: The unique identifier of simulationAutomationRun
[SimulationId <String>]: The unique identifier of simulation
[SiteSourceId <String>]: The unique identifier of siteSource
[SslCertificateId <String>]: The unique identifier of sslCertificate
[SubcategoryTemplateId <String>]: The unique identifier of subcategoryTemplate
[SubdomainId <String>]: The unique identifier of subdomain
[SubjectRightsRequestId <String>]: The unique identifier of subjectRightsRequest
[TiIndicatorId <String>]: The unique identifier of tiIndicator
[TrainingCampaignId <String>]: The unique identifier of trainingCampaign
[TrainingId <String>]: The unique identifier of training
[TrainingLanguageDetailId <String>]: The unique identifier of trainingLanguageDetail
[UnifiedGroupSourceId <String>]: The unique identifier of unifiedGroupSource
[UrlThreatSubmissionId <String>]: The unique identifier of urlThreatSubmission
[UserId <String>]: The unique identifier of user
[UserPrincipalName <String>]: Alternate key of user
[UserSecurityProfileId <String>]: The unique identifier of userSecurityProfile
[UserSourceId <String>]: The unique identifier of userSource
[VulnerabilityComponentId <String>]: The unique identifier of vulnerabilityComponent
[VulnerabilityId <String>]: The unique identifier of vulnerability
[WhoisHistoryRecordId <String>]: The unique identifier of whoisHistoryRecord
[WhoisRecordId <String>]: The unique identifier of whoisRecord
RECORDS <IMicrosoftGraphSecurityAuditLogRecord[]>: An individual audit log record.
[Id <String>]: The unique identifier for an entity.
Read-only.
[AdministrativeUnits <String[]>]: The administrative units tagged to an audit log record.
[AuditData <IMicrosoftGraphSecurityAuditData>]: auditData
[(Any) <Object>]: This indicates any property can be added to this object.
[AuditLogRecordType <String>]: auditLogRecordType
[ClientIP <String>]: The IP address of the device used when the activity was logged.
The IP address is displayed in either an IPv4 or IPv6 address format.
[CreatedDateTime <DateTime?>]: The date and time in UTC when the user performed the activity.
[ObjectId <String>]: For Exchange admin audit logging, the name of the object modified by the cmdlet.
For SharePoint activity, the full URL path name of the file or folder accessed by a user.
For Microsoft Entra activity, the name of the user account that was modified.
[Operation <String>]: The name of the user or admin activity.
[OrganizationId <String>]: The GUID for your organization.
[Service <String>]: The Microsoft 365 service where the activity occurred.
[UserId <String>]: The user who performed the action (specified in the Operation property) that resulted in the record being logged.
Audit records for activity performed by system accounts (such as SHAREPOINT/system or NT AUTHORITY/SYSTEM) are also included in the audit log.
Another common value for the UserId property is app@sharepoint.
It indicates that the 'user' who performed the activity was an application with the necessary permissions in SharePoint to perform organization-wide actions (such as searching a SharePoint site or OneDrive account) on behalf of a user, admin, or service.
[UserPrincipalName <String>]: UPN of the user who performed the action.
[UserType <String>]: auditLogUserType