Monitoring Amazon WorkMail audit logs - Amazon WorkMail

Monitoring Amazon WorkMail audit logs

You can use audit logs to monitor access to your Amazon WorkMail Organization’s mailboxes. Amazon WorkMail logs four types of audit events and these events can be published to CloudWatch Logs, Amazon S3, or Amazon Firehouse. You can use audit logs to monitor user interaction with your Organization’s mailboxes, authentication attempts, access control rule evaluation, and perform availability provider calls to external systems. For information about configuring audit logging, see Enabling audit logging.

The following sections describe the audit events logged by Amazon WorkMail, when the events are transmitted, and information about the event fields.

Mailbox access logs

Mailbox access events provide information about what action was taken (or attempted) on which mailbox object. A mailbox access event is generated for every operation that you attempt to run on an item or folder in a mailbox. These events are useful for auditing access to mailbox data.

Field Description

event_timestamp

When the event happened, in milliseconds since Unix epoch.

request_id

The ID that uniquely identifies the request.

organization_arn

The ARN of the & Amazon WorkMail Organization to which the authenticated user belongs.

user_id

The ID of the authenticated user.

impersonator_id

The ID of the impersonator. Present only if the impersonation feature was used for the request.

protocol

The protocol used. The protocol can be: AutoDiscover, EWS, IMAP, WindowsOutlook, ActiveSync, SMTP, WebMail, IncomingEmail, or OutgoingEmail.

source_ip

The source IP address of the request.

user_agent

The user agent that made the request.

action

The action taken on the object, which can be: read, read_hierarchy, read_summary, read_attachment, read_permissions, create, update, update_permissions, update_read_state, delete, submit_email_for_sending, abort_sending_email, move, move_to, copy, or copy_to.

owner_id

The ID of the user that owns the object being acted upon.

object_type

The object type, which can be: Folder, Message, or Attachment.

item_id

The ID that uniquely identifies the message that's the subject of the event or that contains the attachment that's the subject of the event.

folder_path

The path of the folder being acted upon or the path of the folder containing the item being acted upon.

folder_id

The ID that uniquely identifies the folder that's the subject of the event or contains the object that's the subject of the event.

attachment_path

The path of display names to the affected attachment.

action_allowed

Whether the action was allowed. Can be true or false.

Access control logs

Access control events are generated whenever an access control rule is evaluated. These logs are useful for auditing forbidden access, or debugging access control configurations.

Field Description

event_timestamp

When the event happened, in milliseconds since Unix epoch.

request_id

The ID that uniquely identifies the request.

organization_arn

The ARN of the WorkMail Organization to which the authenticated user belongs.

user_id

The ID of the authenticated user.

impersonator_id

The ID of the impersonator. Present only if the impersonation feature was used for the request.

protocol

The protocol used, which can be: AutoDiscover, EWS, IMAP, WindowsOutlook, ActiveSync, SMTP, WebMail, IncomingEmail, or OutgoingEmail.

source_ip

The source IP address of the request.

scope

The scope of the rule, which can be: AccessControl, DeviceAccessControl, or ImpersonationAccessControl.

rule_id

The ID of the matched access control rule. When there are no rules matched, rule_id is not available.

access_granted

Whether access was allowed. Can be true or false.

Authentication logs

Authentication events contain information about authentication attempts.

Note

Authentication events are not generated for authentication events through the Amazon WorkMail WebMail application.

Field Description

event_timestamp

When the event happened, in milliseconds since Unix epoch.

request_id

The ID that uniquely identifies the request.

organization_arn

The ARN of the WorkMail Organization to which the authenticated user belongs.

user_id

The ID of the authenticated user.

user

The username that the authentication was attempted with.

protocol

The protocol used, which can be: AutoDiscover, EWS, IMAP, WindowsOutlook, ActiveSync, SMTP, WebMail, IncomingEmail, or OutgoingEmail.

source_ip

The source IP address of the request.

user_agent

The user agent that made the request.

method

The auth method. Currently, only basic is supported.

auth_successful

Whether the auth attempt was successful. Can be true or false.

auth_failed_reason

The reason for auth failure. Present only if auth failed.

Availability provider logs

Availability provider events are generated for every availability request Amazon WorkMail does on your behalf to your configured availability provider. These events are useful for debugging your availability provider configuration.

Field Description

event_timestamp

When the event happened, in milliseconds since Unix epoch.

request_id

The ID that uniquely identifies the request.

organization_arn

The ARN of the WorkMail Organization to which the authenticated user belongs.

user_id

The ID of the authenticated user.

type

The type of availability provider being invoked, which can be: EWS or LAMBDA.

domain

The domain for which availability is obtained.

function_arn

The ARN of the invoked Lambda, if type is LAMBDA. Otherwise, this field is not present.

ews_endpoint

The EWS endpoint is type is EWS. Otherwise, this field is not present.

error_message

The message describing the cause of the failure. If the request was successful, this field is not present.

availability_event_successful

Whether the availability request was served successfully.