Skip to main content

Active Directory JSON Log File

The following information lists all of the attributes generated by Active Directory Activity Monitor into a JSON log file:

AttributesDescription
AffectedObjectIf resolved, contains DN of the object affected by operation; otherwise, some textual representation of the object
AffectedObjectAccountNameIf resolved, contains account name of the object affected by operation
AffectedObjectSidIf resolved, contains Sid of the object affected by operation
AgentDomainDomain where SI agent is installed
AgentHostHost name where SI agent is installed
AgentIPIP address where SI agent is installed. If multiple IP addresses, one of them is reported.
AuthenticationTypeIndicates type of the authentication event. Possible values: Kerberos, NTLM.
AuthProtocolIndicates authentication protocol. Possible values: Unknown, Kerberos, KerberosTgs, KerberosAS, NTLM, NTLMv1, NTLMMixed, NTLMv2.
BlockedIndicates if operation was blocked by SI agent. Blocking policies are required.
ClassNameAffected object class
DesiredAccessSecurity and access rights requested during OpenProcess invoke. List of possible values can be found at:  https://docs.microsoft.com/en-us/windows/desktop/ProcThread/process-security-and-access-rights.
EncryptionTypeIndicates encryption type used in request part of the Kerberos ticket. Possible values: des_cbc_crc, des_cbc_md4, des_cbc_md5, reserved_0x4, des3_cbc_md5, reserved_0x6, des3_cbc_sha1, dsaWithSHA1, md5WithRSAEncryption, rc2CBC, rsaEncryption, rsaES, des_ede3_cbc, des3_cbc_sha1_kd, aes128, aes256, rc4_hmac, rc4_hmac_exp, subkey_keymaterial.
EventResultResult of the operation triggered current event
EventTypeIdentifies event
EventsCountNumber of similar events captured during consolidation period which is 1 minute by default
FromContains raw representation of the machine from which event was triggered
FromHostIf resolved, contains host name of the machine from which event was triggered
FromIpIf resolved, contains the IP address of the machine from which event was triggered
FromMacIf resolved, contains mac address of the machine from which event was triggered
IsN2PasswordIndicates if password that was used for authentication is a previous or one before previous
IsUserExistIndicates if user exists
KerbAuthTimeTime at which KDC issued the initial ticket that corresponds to this ticket
KerbEndTimeTicket expiration time
KerbRenewTillLatest time at which renewal of ticket can be valid
KerbSPNService principal name for which ticket was requested
KerbStartTimeTicket start time
LogonTypeContains SECURITY_LOGON_TYPE. More details at https://docs.microsoft.com/en-us/windows/win32/api/ntsecapi/ne-ntsecapi-security_logon_type.
NewAttributesMap of new attributes where key is name and value attribute value
NewNameNew name of the AD object
NlpLogonTypeNTLM logon type. Possible values: Unknown, Interactive, Network, Service, Generic, TransitiveInteractive, TransitiveNetwork, TransitiveService
OldAttributesMap of old attributes where key is attribute name and value attribute value
PACList of RIDs extracted from ticket authorization data
ProcessIDContains process ID that attempted to open LSASS process
ProcessNameContains process name that attempted to open LSASS process
ProtocolOperation specific details
QueryFilterLDAP filter used in the operation
QueryIsSSLIndicates if LDAP connection is secure or not
QueryObjectsReturnedNumber of returned objects produced by the LDAP request
SourceIndicates source of the operation. Currently can be: ‘Authentication’, ‘Active Directory’, ‘LSASS Guardian – Monitor’, ‘LDAP Monitor’, ‘AD Replication Monitoring’.
SuccessIndicates if original operation completed successfully or not
TargetHostContains host name to which authentication attempt took place. In case of failed Kerberos AS, this field contains name of the domain controller.
TargetHostIPIf resolved, contains IP address of the target host
TargetProcessContains process name that is monitored. Currently this is only lsass.exe.
TgsReplyEncryptionTypeIndicates encryption type used in reply part of the TGS Kerberos ticket. Possible values the same as for EncryptionType.
TimeLoggedUTC timestamp of the event
UserDNIf resolved, contains DN of the object triggered operation
UserNameIf resolved, contains account name of the object triggered operation
UserSidIf resolved, contains SID of the object triggered operation

File TSV Log File

The following information lists all of the columns generated by File Activity Monitor into a TSV log file, along with descriptions.

Column Name(s)Description
Operation TimeDate timestamp of the event in UTC time Column format is dependent on "Report Operations with millisecond precision" option
HostHost name of the monitored device
User Sid/UidUnique identifier for the File System user: - For CIFS activity – user SID - For NFS activity – UID
Operation TypeType of operation for each event. Reports the following operations: - Add - Delete (Del) - Rename (Ren) - Network Share (SHARE) - Permission Change (Per) - Read (Rea) - Symlink or hardlink (LINK) - Update (Upd)
Object TypeThe type of object that was affected. Reports events for the following object types: - Folder (FOLD) - File (FILE) - Unknown (UNK)
PathThe Path where the event took place. - For Windows – If a path starts with “VSS:” then it is a shadow copy creation event. For example, “VSS:C” is a shadow copy creation of volume C.
Rename PathNew name of the path if a rename event occurs
Process or IPIndicates the source of the activity event: - For local Windows activity – Process name (e.g. notepad.exe) - For network Windows activity – IP Address of the user - For NAS device activity – IP Address for the NAS device of the user
1) Sub-Operation 2) Old Attributes 3) New AttributesWindows hosts only. These columns are filled with details about: - Permission changes (the “Per” operation type) - Attribute Changes (the “Upd” operation type) - Read events from VSS shadow copies See the Sub-Operation, Old Attributes, and New Attributes Table section for additional details.
User NameUsername in NTAccount format. This column is dependent upon the “Report account names” option.
ProtocolProtocol of the event, i.e. CIFS, NFS, or VSS
1) UNC 2) Rename UNC PathNetwork paths of remote activity. These columns are dependent upon the “Report UNC paths” option. - For CIFS activity – Reported with the following format \[SERVER][SHARE]\Folder\File.txt - For NFS activity – Reported with the following format[SERVER]:/[VOLUME]/Folder/File.txt
Volume IDID of the volume where the event occurred
Share NameShare name where the event occurred. This column is dependent upon the “Report UNC paths” option.
Protocol VersionNetApp Data ONTAP Cluster-Mode devices only. Protocol version of the event, i.e. CIFS or NFS. The following values are potentially reported: - For CIFS activity – 1.0, 2.0, 2.1, 3.0, 3.1 - For NFS activity – 2, 3, 4, 4.1, 4.2
File SizeSize of File
Tags(Windows hosts only) Contains 'Copy' for read events that are probably file copies
Group IDLinux hosts only Unique identifier for the File System Group (GID)
Group NameLinux hosts only Name of the File System Group (GID)
Process IDLinux hosts only Name of the File System Group (GID)

Sub-Operation, Old Attributes, and New Attributes Table

The following table lists details for Sub-Operation, Old Attributes, and New Attributes according to File Operation.

File OperationSub-OperationOld AttributesNew Attributes
Owner was changedOwnOld owner in SDDL formatNew owner in SDDL format
Permissions were changed (DACL)DacOld DACL in SDDL formatNew DACL in SDDL format
Audit was changed (SACL)SacOld SACL in SDDL formatNew SACL in SDDL format
File attributes were changedAttOld attributes as a hexadecimal number (0xNNN)New attributes as a hexadecimal number (0xNNN)
File is read from a shadow copyVSSShadow copy creation time in YYYYMMDDThhmmss format (20180905T123456)

Linux TSV Log File

The following information lists all of the columns generated by Linux Activity Monitor into a TSV log file, along with descriptions.

Operation TimeDate timestamp of the event in UTC time Column format is dependent on "Report Operations with millisecond precision" option
HostHost name of the monitored device
User Sid/UidUnique identifier for the File System user: - For CIFS activity – user SID - For NFS activity – UID
Operation TypeType of operation for each event. Reports the following operations: - Add - Delete (Del) - Rename (Ren) - Network Share (SHARE) - Permission Change (Per) - Read (Rea) - Symlink or hardlink (LINK) - Update (Upd)
Object TypeThe type of object that was affected. Reports events for the following object types: - Folder (FOLD) - File (FILE) - Unknown (UNK)
PathThe Path where the event took place. - For Windows – If a path starts with “VSS:” then it is a shadow copy creation event. For example, “VSS:C” is a shadow copy creation of volume C.
Rename PathNew name of the path if a rename event occurs
Process or IPIndicates the source of the activity event: - For Local activity – Process name (e.g. notepad.exe) - For Remote network activity – IP Address of the user
1) Sub-Operation 2) Old Attributes 3) New AttributesWindows hosts only. These columns are filled with details about: - Permission changes (the “Per” operation type) - Attribute Changes (the “Upd” operation type) - Read events from VSS shadow copies See the Sub-Operation, Old Attributes, and New Attributes Table section for additional details.
User NameUsername in NTAccount format. This column is dependent upon the “Report account names” option.
ProtocolProtocol of the event, i.e. CIFS, NFS, or VSS
1) UNC 2) Rename UNC PathNetwork paths of remote activity. These columns are dependent upon the “Report UNC paths” option. - For CIFS activity – Reported with the following format \[SERVER][SHARE]\Folder\File.txt - For NFS activity – Reported with the following format[SERVER]:/[VOLUME]/Folder/File.txt
Volume IDID of the volume where the event occurred
Share NameShare name where the event occurred. This column is dependent upon the “Report UNC paths” option.
Protocol VersionNetApp Data ONTAP Cluster-Mode devices only. Protocol version of the event, i.e. CIFS or NFS. The following values are potentially reported: - For CIFS activity – 1.0, 2.0, 2.1, 3.0, 3.1 - For NFS activity – 2, 3, 4, 4.1, 4.2
File SizeSize of File
TagsWindows hosts only Contains 'Copy' for read events that are probably file copies
Group IDLinux hosts only Unique identifier for the File System Group (GID).
Group NameLinux hosts only Name of the File System Group (GID).
Process IDLinux hosts only Name of the File System Group (GID).

SharePoint JSON Log File

The JSON log file format is used to send SharePoint activity monitoring data to Enterprise Auditor v10.0 consoles. The following information lists all of the attributes generated by SharePoint Activity Monitor into a JSON log file:

Attribute NameDescriptionExample
TimeLoggedDateTime/ string2019-03-14T18:13:39.00Z
ActivityTypeConstant “SharePoint”SharePoint
AgentHostHost name where agent is installedsphost
UserSidUser SID who caused the eventS-1-0-0
UserNameUser Name who caused the eventSystem Account
UserIDID of the user who caused the event1073741823
UserLoginUser Login who caused the eventSHAREPOINT\system
ProtocolProtocol: HTTP / HTTPS..HTTP
AbsoluteUrlFull Url: SiteUrl + DocLocationhttp://sphost/Lists/Comments/1\_.000
WebApplicationWeb application nameSharePoint – 80
SiteIdSite Id (guid)7b2c8d23-a74f-4c3c-985d-2c7facb5ebae
SiteUrlSite Urlhttp://sphost/sites/mysite
WebTitleWeb titlemy site
DocLocationLocation of an audited object at the time of the audited eventLists/Comments/1_.000
ItemIdA Guid that the object whose event is represented by the entry2c4174dc-322d-47bc-a420-52968fc3ba6c
ItemTitleTitle of the objectWelcome to my blog!
ItemTypeType of the object: Document / ListItem / List / Folder / Web / SiteListItem
EventTypeAn SPAuditEventType that represents the type of eventUpdate
EventSourceA value that indicates whether the event occurred as a result of user action in the SharePoint Foundation user interface (UI) or programmatically. Values: SharePoint / ObjectModelSharePoint
LocationTypeSpecifies the actual location of a document in a SharePoint document library: Invalid, Url, ClientLocationUrl
AppPrincipalIdThe ID of the app principal who caused the event. If the value of EventSource is ObjectModel, thenAppPrincipalId holds the ID of the app principal whose context the code that caused the event was running. If there is no app context, the AppPrincipalId is null.0
SourceNameThe name of the application that caused the event<empty>
RawEventDataA String that holds XML markup providing data that is specific to the type of event that the entry object represents.<RelatedItem><Id>06C49477-0498-4858-900C-45B595337462</Id><Relationship><NewName>MyDocs/myfile.zip</NewName></Relationship></RelatedItem>
AuditMaskThe new audit mask[“CheckIn”,“View”,“Delete”,“Update”]
ChildIdThe GUID of the child that is deleted/moved.06C49477-0498-4858-900C-45B595337462
ChildDocLocationThe pre-deletion URL of the child itemLists/Posts/2_.000
NewDocLocationThe URL to which the item is movedMyNewDocs/myfile.zip
VersionThe new version of the document / The version that was deleted1.0
DeleteTypeWhether it is moved to the recycle bin (1) or is deleted completely (0). 1 - MovedToRecycle; 0 - DeletedCompletelyMovedToRecycle
SearchQuerymyfile
SearchConstraintsite:“http://sphost/sites/mysite”
GroupIdThe ID of the new/deleted group The ID of the group that was bound to the role11
GroupNameThe name of the new/deleted group The name of the group that was bound to the roleMy Super Group
TrusteeIdThe ID of the user that was added/deleted from the group The ID of the user that was bound to the role8
TrusteeNameThe Name of the user/group that was added/deleted from the group The Name of the user/group that was bound to the rolespuser
TrusteeTypeThe name is the name of group or user: User / GroupUser
UpdateTypeAdded or RemovedAdded, Removed, or Updated
RoleIdThe ID of the new/changed/deleted permission level1073741924
RoleNameThe name of the new/changed/deleted permission levelMy Role
PermissionsThe combination of permissions[“ViewListItems”,“AddListItems”,“EditListItems”]

SharePoint Online JSON Log File

The JSON log file format is used to send SharePoint Online activity monitoring data to Enterprise Auditor v10.0 consoles. The following information lists all of the attributes generated by SharePoint Online Activity Monitor into a JSON log file:

Base Schema

The following table details lists of attributes for base schema generated by SharePoint Online Activity Monitor.

Attribute NameDescriptionExample
TimeLoggedEvent time (UTC)2019-03-14T18:13:39.0 00Z
ActivityTypeConstant "SharePoint"SharePointOnline
AgentHostHost name where agent is installed.sphost
SourceSharePoint, SharePointFileOperation, SharePointListOperation, SharePointListItemOperation, SharePointContentTypeOperation, SharePointFieldOperation, SharePointSharingOperation, ComplianceDLPSharePoint, ComplianceDLPSharePointClassificationSharePointFileOperation
IdUnique id of an audit record5ed5f834-7609-4ea6-df9b-08d76f79a875
EventTypeAccessInvitationCreated AccessInvitationExpired AccessInvitationRevoked AccessInvitationUpdated AccessRequestApproved AccessRequestCreated AccessRequestRejected ActivationEnabled AdministratorAddedToTermStore AdministratorDeletedFromTermStore AllowGroupCreationSet AppCatalogCreated AuditPolicyRemoved AuditPolicyUpdate AzureStreamingEnabledSet CollaborationTypeModified ConnectedSiteSettingModified CreateSSOApplication CustomFieldOrLookupTableCreated CustomFieldOrLookupTableDeleted CustomFieldOrLookupTableModified CustomizeExemptUsers DefaultLanguageChangedInTermStore DelegateModified DelegateRemoved DeleteSSOApplication eDiscoveryHoldApplied eDiscoveryHoldRemoved eDiscoverySearchPerformed EngagementAccepted EngagementModified EngagementRejected EnterpriseCalendarModified EntityDeleted EntityForceCheckedIn ExemptUserAgentSet FileAccessed FileCheckOutDiscarded FileCheckedIn FileCheckedOut FileCopied FileDeleted FileDeletedFirstStageRecycleBin FileDeletedSecondStageRecycleBin FileDownloaded FileFetched FileModified FileMoved FilePreviewed FileRenamed FileRestored FileSyncDownloadedFull FileSyncDownloadedPartial FileSyncUploadedFull FileSyncUploadedPartial FileUploaded FileViewed FolderCopied FolderCreated FolderDeleted FolderDeletedFirstStageRecycleBin FolderDeletedSecondStageRecycleBin FolderModified FolderMoved FolderRenamed FolderRestored GroupAdded GroupRemoved GroupUpdated LanguageAddedToTermStore LanguageRemovedFromTermStore LegacyWorkflowEnabledSet LookAndFeelModified ManagedSyncClientAllowed MaxQuotaModified MaxResourceUsageModified MySitePublicEnabledSet NewsFeedEnabledSet ODBNextUXSettings OfficeOnDemandSet PageViewed PeopleResultsScopeSet PermissionSyncSettingModified PermissionTemplateModified PortfolioDataAccessed PortfolioDataModified PreviewModeEnabledSet ProjectAccessed ProjectCheckedIn ProjectCheckedOut ProjectCreated ProjectDeleted ProjectForceCheckedIn ProjectModified ProjectPublished ProjectWorkflowRestarted PWASettingsAccessed PWASettingsModified QueueJobStateModified QuotaWarningEnabledModified RenderingEnabled ReportingAccessed ReportingSettingModified ResourceAccessed ResourceCheckedIn ResourceCheckedOut ResourceCreated ResourceDeleted ResourceForceCheckedIn ResourceModified ResourcePlanCheckedInOrOut ResourcePlanModified ResourcePlanPublished ResourceRedacted ResourceWarningEnabledModified SSOGroupCredentialsSet SSOUserCredentialsSet SearchCenterUrlSet SecondaryMySiteOwnerSet SecurityCategoryModified SecurityGroupModified SendToConnectionAdded SendToConnectionRemoved SharedLinkCreated SharedLinkDisabled SharingInvitationAccepted SharingRevoked SharingSet SiteAdminChangeRequest SiteCollectionAdminAdded SiteCollectionCreated SiteRenamed StatusReportModified SyncGetChanges TaskStatusAccessed TaskStatusApproved TaskStatusRejected TaskStatusSaved TaskStatusSubmitted TimesheetAccessed TimesheetApproved TimesheetRejected TimesheetSaved TimesheetSubmitted UnmanagedSyncClientBlocked UpdateSSOApplication UserAddedToGroup UserRemovedFromGroup WorkflowModifiedFileDeleted
OrganizationIdOrganization tenant ID86e5dcbf-56e9-4452-8c43-1e99f0e9aabd
UserTypeType of the user performed the operation.Regular
UserIdThe UPN of the user who performed the operationuser1@stealthbitstechnologie.onmicrosoft.com
UserNameName of the user who performed the operationUser1
UserLoginAn alternative ID of the user. "DlpAgent" for DLP eventsi:0h.f/membership/10033fff8a7ae322@live.com
ClientIPIP address of the user or a trusted application75.155.180.82
ProtocolProtocol: HTTPSHTTPS
WorkloadOffice 365 service where the activty occurred.SharePoint
ResultStatusSucceeded, ParticallySucceeded, Failed, True, FalseParticallySucceeded
AbsoluteUrlFull path of the file/folder accessed by the userhttps://stealthbitstechnologie-my.sharepoint.com/personal/sgiles_stealthbitstechnologie_onmicrosoft_com/personal/myfiles/21ded
ScopeWas this event created by a hosted O365 service or an on-premises server? online or onprem
SiteIdGuid of the siteaef1ad6b-11c5-4b25-a669-b5f8379f8c55
ItemTypeObject type: File, Folder, Web, Site, Tenant, DocumentLibrary, Page, Differs from SP typesFile
ItemTitle
EventSourceSharePoint or ObjectModelSharePoint
UserAgentUser client or browser
MachineDomainInfoInformation about device sync operations
MachineIdInformation about device sync operations
UpdateTypeAdded, Removed, or UpdatedAdded
VersionThe new version of the document/version of deleted document1

File/Folder Operations

The following table details lists of attributes for file/folder operations generated by SharePoint Online Activity Monitor.

Attribute NameDescriptionExample
SiteUrlURL of the sitehttps://example-url.sharepoint.com/
DocLocationRelative URL of the file or document accessed by the userShared Documents/100 Sensitive Docs/Document.docx
SourceRelativeUrlThe URL of the folder that contains the file accessed by the user. The combination of the values for the SiteURL, SourceRelativeURL, and SourceFileName parameters is the same as the value for the AbsoluteUrl propertyShared Documents/100 Sensitive Docs
SourceFileNameFile or folder nameMy Document.docx
SourceFileExtensionFile extensiondocx
NewDocLocationA relative URL to which the object is copied or movedShared Documents/100 Sensitive Docs/Copy.docx
DestinationRelativeUrlOnly for EventType: FileCopied, FileMoved The URL of the destination folder where a file is copied or moved.Shared Documents/100 Sensitive Docs
DestinationFileNameOnly for EventType: FileCopied, FileMoved The name of the file that is copied or moved.Copy.docx
DestinationFileExtensionOnly for EventType: FileCopied, FileMoveddocx

Sharing

The following table details lists of attributes for sharing generated by SharePoint Online Activity Monitor by Sharing.

Attribute NameDescription
SharingTypeThe type of sharing permissions that were assigned to the user that the resource was shared with
TargetUserOrGroupNameUPN or name of the target user or group that a resource was shared with
TargetUserOrGroupTypeMember, Guest, Group, or Partner
EventData

Other SharePoint Events

The following table details lists of attributes for other SharePoint events generated by SharePoint Online Activity Monitor by Sharing.

Attribute NameDescription
CustomEvent
EventDataOptional payload
ModifiedPropertiesThe property is included for admin events, such as adding a user as a member of a site or a site collection admin group. The property includes the name of the property that was modified, old, and new value

DLP Events

The following table details lists of attributes for DLP events generated by SharePoint Online Activity Monitor by Sharing.

Attribute NameDescriptionExample
SharePointMetaDataMetadata about the document that contained the sensitive informationhttps://docs.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema#sharepointmetadata-complex-type
ExceptionInfoReasons why a policy no longer applies and any information about false positive or override
PolicyDetailsPolicy(s) that triggered the eventhttps://docs.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema#policydetails-complex-type
SensitiveInfoDetectionIsIncludedIndicates whether the event contains the value of the sensitive data type

SharePoint TSV Log File

The TSV log file format is used to send SharePoint activity monitoring data to Enterprise Auditor v10.0 and earlier consoles. The following information lists all of the columns generated by SharePoint Activity Monitor into a TSV log file:

Column NameDescription
Operation TimeDate timestamp of the event in UTC time
HostHost name of the monitored device as entered by the user
UserSid/UidUnique identifier for the SharePoint user: - For CIFS activity – user SID - For NFS activity – UID
User NameSharePoint user name
UserIDID of the SharePoint user
UserLoginIdentity claims using encoding format for user login
PathTruncated path where the event took place, e.g. sites/TestSite/Shared Documents/Testing.txt
ProtocolProtocol of the event
FullPathFull path where the event took place, e.g. http://sharepoint.local/sites/TestSite/Shared Documents/Testing.txt
WebApplicationTitle of the SharePoint web application
SiteIdID of the site collection
SiteUrlURL of the site collection
WebTitleTitle of the site collection
DocLocationLocation of the document
ItemIDID of the item
ItemTitleTitle of the item
Item TypeType of item
EventTypeType of SharePoint event
EventSourceSource where the event came from
LocationTypeLocation type of the SharePoint document location
AppPrincipalIdApplication principal ID
SourceNameName of the source
EventDataRaw event data
ParamParameters for the event

SQL Server JSON Log File

The following information lists all of the columns generated by SQL Server Activity Monitor into a JSON log file, along with descriptions.

| Field | Type | Description | Example | | -------------- | ------------ | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------ | ------- | | TimeLogged | DateTime | UNC Datetime of the event, format: yyyy-MM-ddTHH:mm:ss.fffZ | 2021-02-18T15:39:29.424Z | | ActivityType | Fixed string | | SqlServer | | AgentHost | String | Host of Stealthbits Activity Monitor Agent Service | W7-VS17 | | UserName | String | Name of user performed the operation | admin | | Success | bool | The result of the operation. For Login operations, False means the login has failed. For other operations, the result is always True. | True | | TypeMask | uint | Integer representation of performed operation: combination (mask) of codes of SqlServerEvent enumeration. - Select = 0x01, - Insert = 0x02, - Update = 0x04, - Delete = 0x08, - Merge = 0x10, - Execute = 0x20, - LoginSuccessful = 0x40, - LoginFailed = 0x80, - Logout = 0x0100, - Grant = 0x0200, - Revoke = 0x0400, - Deny = 0x0800, - Error = 0x1000, - Create = 0x2000, - Alter = 0x4000, - Drop = 0x8000 | 33 (Combination of Select and Execute) | | TypeMaskDesc | String | Text representation of TypeMask field | Select | Execute | | ClientAppName | String | Name of application that cause the operation | Microsoft SQL Server Management Studio - Transact-SQL IntelliSense | | ClientHostName | String | Name of client host | W10 | | ClientIp | String | IP address of the client (can be empty) | 127.0.0.1 | | DatabaseName | String | Name of affected Database | AdventureWorks | | SqlText | String | Query text | select * from [SalesLT].[Customer] | | ErrorNumber | Integer | MSSQL Error Code | 208 | | Message | String | Message text of the error | Invalid object name 'SalesLT.Customer1'. | | Category | String | Category of the error | 2 | | SqlObjects | String | Array of affected objects | |

JSON Examples

EventJSON Example
Error{"TimeLogged":"2021-06-11T12:57:18.600Z","ActivityType":"SqlServer","AgentHost":"W7-VS17","UserName":"testuser1","Success":true,"TypeMask":4096,"TypeMaskDesc":"Error","ClientAppName":"Microsoft SQL Server Management Studio - Query","ClientHostName":"W10","ClientIp":"127.0.0.1","DatabaseName":"StealthRECOVER_22-04","SqlText":"select * from [SalesLT].[Customer1]","ErrorNumber":208,"Message":"Invalid object name 'SalesLT.Customer1'.","Category":"2"}
Login{"TimeLogged":"2021-06-11T12:50:40.038Z","ActivityType":"SqlServer","AgentHost":"W7-VS17","UserName":"testuser1","Success":true,"TypeMask":64,"TypeMaskDesc":"Login","ClientAppName":"Microsoft SQL Server Management Studio - Query","ClientHostName":"W10","ClientIp":"127.0.0.1","DatabaseName":"master"} {"TimeLogged":"2021-06-11T12:28:24.165Z","ActivityType":"SqlServer","AgentHost":"W7-VS17","UserName":"","Success":false,"TypeMask":64,"TypeMaskDesc":"Login","ClientAppName":"Microsoft SQL Server Management Studio","ClientHostName":"W10","ClientIp":"","DatabaseName":"master","ErrorNumber":18456,"Message":"Login failed for user 'testuser'. Reason: Could not find a login matching the name provided. [CLIENT: &lt;local machine&gt;]"}
Logout{"TimeLogged":"2021-06-11T13:14:28.386Z","ActivityType":"SqlServer","AgentHost":"W7-VS17","UserName":"testuser1","Success":true,"TypeMask":256,"TypeMaskDesc":"Logout","ClientAppName":"Microsoft SQL Server Management Studio - Query","ClientHostName":"W10","ClientIp":"127.0.0.1","DatabaseName":"StealthRECOVER_22-04"}
SqlEvent{"TimeLogged":"2021-06-11T13:22:48.682Z","ActivityType":"SqlServer","AgentHost":"W7-VS17","UserName":"sa","Success":true,"TypeMask":5,"TypeMaskDesc":"Select | Update","ClientAppName":"Microsoft SQL Server Management Studio - Query","ClientHostName":"W10","ClientIp":"127.0.0.1","DatabaseName":"AdventureWorksLT2019","SqlText":"select top 100 * from [SalesLT].[SalesOrderDetail] d left join [SalesLT].[Product] p on p.ProductID=d.ProductID; Update [SalesLT].[Product] set ProductNumber='zzz' where ProductNumber='xxx'; ","SqlObjects":[{"t":"U","db":"AdventureWorksLT2019","s":"saleslt","o":"SalesOrderDetail","op":"Select"},{"t":"U","db":"AdventureWorksLT2019","s":"saleslt","o":"Product","op":"Select | Update"}]}
Permission{"TimeLogged":"2021-06-11T13:27:48.009Z","ActivityType":"SqlServer","AgentHost":"W7-VS17","UserName":"sa","Success":true,"TypeMask":512,"TypeMaskDesc":"Grant","ClientAppName":"Microsoft SQL Server Management Studio - Query","ClientHostName":"W10","ClientIp":"127.0.0.1","DatabaseName":"AdventureWorksLT2019","SqlText":" GRANT ALL ON [SalesLT].[Product] TO [sqluser3]; ","SqlObjects":[{"t":"U","db":"AdventureWorksLT2019","s":"saleslt","o":"Product","op":"Grant"}]}