Skip to content

Instantly share code, notes, and snippets.

@alwashali
Created March 11, 2025 15:59
Show Gist options
  • Save alwashali/ff5db240909473304a74221492c7a07e to your computer and use it in GitHub Desktop.
Save alwashali/ff5db240909473304a74221492c7a07e to your computer and use it in GitHub Desktop.
Microsoft Defender KQL Schema
{
"Tables": [
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the alert",
"Type": "String",
"Entity": "Alert",
"Name": "AlertId"
},
{
"Description": "Title of the alert",
"Type": "String",
"Entity": null,
"Name": "Title"
},
{
"Description": "Type of threat indicator or breach activity identified by the alert",
"Type": "String",
"Entity": null,
"Name": "Category"
},
{
"Description": "Indicates the potential impact (high, medium, or low) of the threat indicator or breach activity identified by the alert",
"Type": "String",
"Entity": null,
"Name": "Severity"
},
{
"Description": "Product or service that provided the alert information",
"Type": "String",
"Entity": null,
"Name": "ServiceSource"
},
{
"Description": "Detection technology or sensor that identified the notable component or activity",
"Type": "String",
"Entity": null,
"Name": "DetectionSource"
},
{
"Description": "MITRE ATT&CK techniques associated with the activity that triggered the alert",
"Type": "String",
"Entity": null,
"Name": "AttackTechniques"
}
],
"TableSection": "AlertsAndObservations",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "AlertInfo"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the alert",
"Type": "String",
"Entity": "Alert",
"Name": "AlertId"
},
{
"Description": "Title of the alert",
"Type": "String",
"Entity": null,
"Name": "Title"
},
{
"Description": "List of categories that the information belongs to, in JSON array format",
"Type": "String",
"Entity": null,
"Name": "Categories"
},
{
"Description": "MITRE ATT&CK techniques associated with the activity that triggered the alert",
"Type": "String",
"Entity": null,
"Name": "AttackTechniques"
},
{
"Description": "Product or service that provided the alert information",
"Type": "String",
"Entity": null,
"Name": "ServiceSource"
},
{
"Description": "Detection technology or sensor that identified the notable component or activity",
"Type": "String",
"Entity": null,
"Name": "DetectionSource"
},
{
"Description": "Type of object, such as a file, a process, a device, or a user",
"Type": "String",
"Entity": null,
"Name": "EntityType"
},
{
"Description": "How the entity is involved in an alert, indicating whether it is impacted or is merely related",
"Type": "String",
"Entity": null,
"Name": "EvidenceRole"
},
{
"Description": "Indicates whether the entity is the source or the destination of a network connection",
"Type": "String",
"Entity": null,
"Name": "EvidenceDirection"
},
{
"Description": "Name of the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FileName"
},
{
"Description": "Folder containing the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FolderPath"
},
{
"Description": "SHA-1 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA1"
},
{
"Description": "SHA-256 of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA256"
},
{
"Description": "Size of the file in bytes",
"Type": "Int64",
"Entity": null,
"Name": "FileSize"
},
{
"Description": "Malware family that the suspicious or malicious file or process has been classified under",
"Type": "String",
"Entity": null,
"Name": "ThreatFamily"
},
{
"Description": "IP address that was being connected to",
"Type": "String",
"Entity": "Ip",
"Name": "RemoteIP"
},
{
"Description": "URL or fully qualified domain name (FQDN) that was being connected to",
"Type": "String",
"Entity": "Url",
"Name": "RemoteUrl"
},
{
"Description": "User name of the account",
"Type": "String",
"Entity": null,
"Name": "AccountName"
},
{
"Description": "Domain of the account",
"Type": "String",
"Entity": null,
"Name": "AccountDomain"
},
{
"Description": "Security Identifier (SID) of the account",
"Type": "String",
"Entity": "UserSid",
"Name": "AccountSid"
},
{
"Description": "Unique identifier for the account in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "AccountObjectId"
},
{
"Description": "User principal name (UPN) of the account",
"Type": "String",
"Entity": null,
"Name": "AccountUpn"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "IP address assigned to the local machine used during communication",
"Type": "String",
"Entity": "Ip",
"Name": "LocalIP"
},
{
"Description": "Unique identifier for the email, generated by Office 365",
"Type": "String",
"Entity": null,
"Name": "NetworkMessageId"
},
{
"Description": "Subject of the email",
"Type": "String",
"Entity": null,
"Name": "EmailSubject"
},
{
"Description": "Application that performed the recorded action",
"Type": "String",
"Entity": null,
"Name": "Application"
},
{
"Description": "Unique identifier for the application ",
"Type": "Int32",
"Entity": null,
"Name": "ApplicationId"
},
{
"Description": "Unique identifier of the third-party OAuth application",
"Type": "String",
"Entity": null,
"Name": "OAuthApplicationId"
},
{
"Description": "Command line used to create the new process",
"Type": "String",
"Entity": null,
"Name": "ProcessCommandLine"
},
{
"Description": "Registry key that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryKey"
},
{
"Description": "Name of the registry value that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryValueName"
},
{
"Description": "Data of the registry value that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryValueData"
},
{
"Description": "Additional information about the entity or event",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Indicates the potential impact (high, medium, or low) of the threat indicator or breach activity identified by the alert",
"Type": "String",
"Entity": null,
"Name": "Severity"
},
{
"Description": "Cloud resource name",
"Type": "String",
"Entity": null,
"Name": "CloudResource"
},
{
"Description": "The cloud platform that the resource belongs to, can be Azure, Amazon Web Services, or Google Cloud Platform",
"Type": "String",
"Entity": null,
"Name": "CloudPlatform"
},
{
"Description": "Type of cloud resource",
"Type": "String",
"Entity": null,
"Name": "ResourceType"
},
{
"Description": "Unique identifier of the cloud resource accessed",
"Type": "String",
"Entity": null,
"Name": "ResourceID"
},
{
"Description": "Unique identifier of the cloud service subscription",
"Type": "String",
"Entity": null,
"Name": "SubscriptionId"
}
],
"TableSection": "AlertsAndObservations",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "AlertEvidence"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Unique identifier for the account in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "AccountObjectId"
},
{
"Description": "User principal name (UPN) of the account",
"Type": "String",
"Entity": null,
"Name": "AccountUpn"
},
{
"Description": "On-premises security identifier (SID) of the account",
"Type": "String",
"Entity": "UserSid",
"Name": "OnPremSid"
},
{
"Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
"Type": "String",
"Entity": null,
"Name": "AccountDisplayName"
},
{
"Description": "User name of the account",
"Type": "String",
"Entity": null,
"Name": "AccountName"
},
{
"Description": "Domain of the account",
"Type": "String",
"Entity": null,
"Name": "AccountDomain"
},
{
"Description": "The criticality score of each account",
"Type": "Int32",
"Entity": null,
"Name": "CriticalityLevel"
},
{
"Description": "The certificate’s type. It is one of the following: Machine, Server, Intermediate, Root, TrustedPublisher or Other",
"Type": "String",
"Entity": null,
"Name": "Type"
},
{
"Description": "On premises distinguished name of the account user",
"Type": "String",
"Entity": null,
"Name": "DistinguishedName"
},
{
"Description": "Cloud security identifier of the account",
"Type": "String",
"Entity": "UserSid",
"Name": "CloudSid"
},
{
"Description": "Given name or first name of the account user",
"Type": "String",
"Entity": null,
"Name": "GivenName"
},
{
"Description": "Surname, family name, or last name of the account user",
"Type": "String",
"Entity": null,
"Name": "Surname"
},
{
"Description": "Name of the department that the account user belongs to",
"Type": "String",
"Entity": null,
"Name": "Department"
},
{
"Description": "Job title of the account user",
"Type": "String",
"Entity": null,
"Name": "JobTitle"
},
{
"Description": "SMTP address of the account",
"Type": "String",
"Entity": null,
"Name": "EmailAddress"
},
{
"Description": "Voice of over IP (VOIP) session initiation protocol (SIP) address of the account",
"Type": "String",
"Entity": null,
"Name": "SipProxyAddress"
},
{
"Description": "Address of the account user",
"Type": "String",
"Entity": null,
"Name": "Address"
},
{
"Description": "City where the client IP address is geolocated",
"Type": "String",
"Entity": null,
"Name": "City"
},
{
"Description": "Country/Region where the account user is located",
"Type": "String",
"Entity": null,
"Name": "Country"
},
{
"Description": "Indicates whether the account is enabled or not",
"Type": "Boolean",
"Entity": null,
"Name": "IsAccountEnabled"
},
{
"Description": "Manager of the account user",
"Type": "String",
"Entity": null,
"Name": "Manager"
},
{
"Description": "Phone number of the account user",
"Type": "String",
"Entity": null,
"Name": "Phone"
},
{
"Description": "Date and time when the account user was created",
"Type": "DateTime",
"Entity": null,
"Name": "CreatedDateTime"
},
{
"Description": "The primary Identity provider of the account user",
"Type": "String",
"Entity": null,
"Name": "SourceProvider"
},
{
"Description": "The last source system to modify the account user",
"Type": "String",
"Entity": null,
"Name": "ChangeSource"
},
{
"Description": "A calculation based on the position of the user in the org tree and the user's Microsoft Entra roles and permissions. Possible values: Low, Medium, High",
"Type": "String",
"Entity": null,
"Name": "BlastRadius"
},
{
"Description": "The name for the company in which the user works",
"Type": "String",
"Entity": null,
"Name": "CompanyName"
},
{
"Description": "The date and time the user was deleted",
"Type": "DateTime",
"Entity": null,
"Name": "DeletedDateTime"
},
{
"Description": "The employee identifier assigned to the user by the organization",
"Type": "String",
"Entity": null,
"Name": "EmployeeId"
},
{
"Description": "Additional email addresses of the user",
"Type": "Object",
"Entity": null,
"Name": "OtherMailAddresses"
},
{
"Description": "The AAD risk level (Low/Medium/High) of the user account",
"Type": "String",
"Entity": null,
"Name": "RiskLevel"
},
{
"Description": "Details regarding the AAD risk level",
"Type": "String",
"Entity": null,
"Name": "RiskLevelDetails"
},
{
"Description": "State where the sign-in occurred, if available",
"Type": "String",
"Entity": null,
"Name": "State"
},
{
"Description": "Labels representing various attributes used to identify or categorize a security configuration",
"Type": "Object",
"Entity": null,
"Name": "Tags"
},
{
"Description": "Active roles assigned to the account",
"Type": "Object",
"Entity": null,
"Name": "AssignedRoles"
},
{
"Description": "A snapshot of privileged role assignment schedules and eligibility schedules for the account as maintained by Microsoft Entra Privileged Identity Management (excluding activated assignments)",
"Type": "Object",
"Entity": null,
"Name": "PrivilegedEntraPimRoles"
}
],
"TableSection": "Itp",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "IdentityInfo"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Application that performed the recorded action",
"Type": "String",
"Entity": null,
"Name": "Application"
},
{
"Description": "Type of logon session, specifically interactive, remote interactive (RDP), network, batch, and service",
"Type": "String",
"Entity": null,
"Name": "LogonType"
},
{
"Description": "Protocol used during the communication",
"Type": "String",
"Entity": null,
"Name": "Protocol"
},
{
"Description": "Information explaining why the recorded action failed",
"Type": "String",
"Entity": null,
"Name": "FailureReason"
},
{
"Description": "User name of the account",
"Type": "String",
"Entity": null,
"Name": "AccountName"
},
{
"Description": "Domain of the account",
"Type": "String",
"Entity": null,
"Name": "AccountDomain"
},
{
"Description": "User principal name (UPN) of the account",
"Type": "String",
"Entity": null,
"Name": "AccountUpn"
},
{
"Description": "Security Identifier (SID) of the account",
"Type": "String",
"Entity": "UserSid",
"Name": "AccountSid"
},
{
"Description": "Unique identifier for the account in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "AccountObjectId"
},
{
"Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
"Type": "String",
"Entity": null,
"Name": "AccountDisplayName"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer",
"Type": "String",
"Entity": null,
"Name": "DeviceType"
},
{
"Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
"Type": "String",
"Entity": null,
"Name": "OSPlatform"
},
{
"Description": "IP address assigned to the device during communication",
"Type": "String",
"Entity": "Ip",
"Name": "IPAddress"
},
{
"Description": "TCP port used during communication",
"Type": "Int32",
"Entity": null,
"Name": "Port"
},
{
"Description": "Name of the device running the server application that processed the recorded action",
"Type": "String",
"Entity": "Machine",
"Name": "DestinationDeviceName"
},
{
"Description": "IP address of the device running the server application that processed the recorded action",
"Type": "String",
"Entity": null,
"Name": "DestinationIPAddress"
},
{
"Description": "Destination port of the activity",
"Type": "Int32",
"Entity": null,
"Name": "DestinationPort"
},
{
"Description": "Fully qualified domain name (FQDN) of the device that the recorded action was applied to",
"Type": "String",
"Entity": "Machine",
"Name": "TargetDeviceName"
},
{
"Description": "Display name of the account that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "TargetAccountDisplayName"
},
{
"Description": "City, country, or other geographic location associated with the event",
"Type": "String",
"Entity": null,
"Name": "Location"
},
{
"Description": "Internet service provider associated with the IP address",
"Type": "String",
"Entity": null,
"Name": "ISP"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Additional information about the entity or event",
"Type": "Object",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "List of features observed to be statistically uncommon for the user that performed the activity",
"Type": "Object",
"Entity": null,
"Name": "UncommonForUser"
},
{
"Description": "Number of days since each statistical feature for the user was last seen",
"Type": "Object",
"Entity": null,
"Name": "LastSeenForUser"
}
],
"TableSection": "Itp",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "IdentityLogonEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Application that performed the recorded action",
"Type": "String",
"Entity": null,
"Name": "Application"
},
{
"Description": "Unique identifier for the application ",
"Type": "Int32",
"Entity": null,
"Name": "ApplicationId"
},
{
"Description": "Unique identifier for the instance of an application",
"Type": "Int32",
"Entity": null,
"Name": "AppInstanceId"
},
{
"Description": "Unique identifier for the account in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "AccountObjectId"
},
{
"Description": "An identifier for the account as found by Microsoft Cloud App Security. Could be Microsoft Entra ID, user principal name, or other identifiers.",
"Type": "String",
"Entity": null,
"Name": "AccountId"
},
{
"Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
"Type": "String",
"Entity": null,
"Name": "AccountDisplayName"
},
{
"Description": "Indicates whether the activity was performed by an administrator",
"Type": "Boolean",
"Entity": null,
"Name": "IsAdminOperation"
},
{
"Description": "Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer",
"Type": "String",
"Entity": null,
"Name": "DeviceType"
},
{
"Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
"Type": "String",
"Entity": null,
"Name": "OSPlatform"
},
{
"Description": "IP address assigned to the device during communication",
"Type": "String",
"Entity": "Ip",
"Name": "IPAddress"
},
{
"Description": "Indicates whether the IP address belongs to a known anonymous proxy",
"Type": "Boolean",
"Entity": null,
"Name": "IsAnonymousProxy"
},
{
"Description": "Two-letter code indicating the country where the client IP address is geolocated",
"Type": "String",
"Entity": null,
"Name": "CountryCode"
},
{
"Description": "City where the client IP address is geolocated",
"Type": "String",
"Entity": null,
"Name": "City"
},
{
"Description": "Internet service provider associated with the IP address",
"Type": "String",
"Entity": null,
"Name": "ISP"
},
{
"Description": "User agent information from the web browser or other client application",
"Type": "String",
"Entity": null,
"Name": "UserAgent"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActivityType"
},
{
"Description": "List of objects, such as files or folders, that were involved in the recorded activity",
"Type": "Object",
"Entity": null,
"Name": "ActivityObjects"
},
{
"Description": "Name of the object that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "ObjectName"
},
{
"Description": "The type of object, such as a file or a folder, that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "ObjectType"
},
{
"Description": "Unique identifier of the object that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "ObjectId"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Type of user account, indicating its general role and access levels, such as Regular, System, Admin, Application",
"Type": "String",
"Entity": null,
"Name": "AccountType"
},
{
"Description": "Indicates whether a user inside the network does not belong to the organization’s domain",
"Type": "Boolean",
"Entity": null,
"Name": "IsExternalUser"
},
{
"Description": "Indicates whether the activity was performed by one user on behalf of another (impersonated) user",
"Type": "Boolean",
"Entity": null,
"Name": "IsImpersonated"
},
{
"Description": "Customer-defined information applied to specific IP addresses and IP address ranges",
"Type": "Object",
"Entity": null,
"Name": "IPTags"
},
{
"Description": "Additional information about the IP address",
"Type": "String",
"Entity": null,
"Name": "IPCategory"
},
{
"Description": "More information provided by Microsoft Cloud App Security in a tag in the user agent field. Can have any of the following values: Native client, Outdated browser, Outdated operating system, Robot",
"Type": "Object",
"Entity": null,
"Name": "UserAgentTags"
},
{
"Description": "Raw event information from the source application or service in JSON format",
"Type": "Object",
"Entity": null,
"Name": "RawEventData"
},
{
"Description": "Additional information about the entity or event",
"Type": "Object",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Session identifiers (if provided by the audit source)",
"Type": "Object",
"Entity": null,
"Name": "SessionData"
},
{
"Description": "Cloud enviorment source of the cloud audit event. Cloud be Azure, AWS, GCP, AliCloud or other",
"Type": "String",
"Entity": null,
"Name": "AuditSource"
},
{
"Description": "A unique identifier that's assigned to an application when it’s registered to Entra with OAuth 2.0.",
"Type": "String",
"Entity": null,
"Name": "OAuthAppId"
},
{
"Description": "List of features observed to be statistically uncommon for the user that performed the activity",
"Type": "Object",
"Entity": null,
"Name": "UncommonForUser"
},
{
"Description": "Number of days since each statistical feature for the user was last seen",
"Type": "Object",
"Entity": null,
"Name": "LastSeenForUser"
}
],
"TableSection": "Itp",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "CloudAppEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the email, generated by Office 365",
"Type": "String",
"Entity": null,
"Name": "NetworkMessageId"
},
{
"Description": "Public-facing identifier for the email that is set by the sending email system",
"Type": "String",
"Entity": null,
"Name": "InternetMessageId"
},
{
"Description": "Sender email address in the MAIL FROM header, also known as the envelope sender or the Return-Path address",
"Type": "String",
"Entity": null,
"Name": "SenderMailFromAddress"
},
{
"Description": "Sender email address in the FROM header, which is visible to email recipients on their email clients",
"Type": "String",
"Entity": null,
"Name": "SenderFromAddress"
},
{
"Description": "Name of the sender displayed in the address book, typically a combination of a given or first name, a middle initial, and a last name or surname",
"Type": "String",
"Entity": null,
"Name": "SenderDisplayName"
},
{
"Description": "Unique identifier for the sender’s account in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "SenderObjectId"
},
{
"Description": "Sender domain in the MAIL FROM header, also known as the envelope sender or the Return-Path address",
"Type": "String",
"Entity": null,
"Name": "SenderMailFromDomain"
},
{
"Description": "Sender domain in the FROM header, which is visible to email recipients on their email clients",
"Type": "String",
"Entity": null,
"Name": "SenderFromDomain"
},
{
"Description": "IPv4 address of the last detected mail server that relayed the message",
"Type": "String",
"Entity": null,
"Name": "SenderIPv4"
},
{
"Description": "IPv6 address of the last detected mail server that relayed the message",
"Type": "String",
"Entity": null,
"Name": "SenderIPv6"
},
{
"Description": "Email address of the recipient, or email address of the recipient after distribution list expansion",
"Type": "String",
"Entity": null,
"Name": "RecipientEmailAddress"
},
{
"Description": "Unique identifier for the email recipient in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "RecipientObjectId"
},
{
"Description": "Subject of the email",
"Type": "String",
"Entity": null,
"Name": "Subject"
},
{
"Description": "Identifier for the group of similar emails clustered based on heuristic analysis of their contents",
"Type": "Int64",
"Entity": null,
"Name": "EmailClusterId"
},
{
"Description": "Direction of the email relative to your network: Inbound, Outbound, Intra-org",
"Type": "String",
"Entity": null,
"Name": "EmailDirection"
},
{
"Description": "Delivery action of the email: Delivered, Junked, Blocked, or Replaced",
"Type": "String",
"Entity": null,
"Name": "DeliveryAction"
},
{
"Description": "Location where the email was delivered: Inbox/Folder, On-premises/External, Junk, Quarantine, Failed, Dropped, Deleted items",
"Type": "String",
"Entity": null,
"Name": "DeliveryLocation"
},
{
"Description": "Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats",
"Type": "String",
"Entity": null,
"Name": "ThreatTypes"
},
{
"Description": "Detection name for malware or other threats found",
"Type": "String",
"Entity": null,
"Name": "ThreatNames"
},
{
"Description": "Methods used to detect malware, phishing, or other threats found in the email",
"Type": "String",
"Entity": null,
"Name": "DetectionMethods"
},
{
"Description": "List of confidence levels of any spam or phishing verdicts. For spam, this column shows the spam confidence level (SCL), indicating if the email was skipped (-1), found to be not spam (0,1), found to be spam with moderate confidence (5,6), or found to be spam with high confidence (9). For phishing, this column displays whether the confidence level is \"High\" or \"Low\".",
"Type": "String",
"Entity": null,
"Name": "ConfidenceLevel"
},
{
"Description": "Threshold assigned to email from bulk mailers, a high bulk complain level (BCL) means the email is more likely to generate complaints, and thus more likely to be spam",
"Type": "Int32",
"Entity": null,
"Name": "BulkComplaintLevel"
},
{
"Description": "Final action taken on the email based on filter verdict, policies, and user actions: Move message to junk mail folder, Add X-header, Modify subject, Redirect message, Delete message, send to quarantine, No action taken, Bcc message",
"Type": "String",
"Entity": null,
"Name": "EmailAction"
},
{
"Description": "Action policy that took effect: Antispam high-confidence, Antispam, Antispam bulk mail, Antispam phishing, Anti-phishing domain impersonation, Anti-phishing user impersonation, Anti-phishing spoof, Anti-phishing graph impersonation, Antimalware Safe Attachments, Enterprise Transport Rules (ETR)",
"Type": "String",
"Entity": null,
"Name": "EmailActionPolicy"
},
{
"Description": "Unique identifier for the policy that determined the final mail action",
"Type": "String",
"Entity": null,
"Name": "EmailActionPolicyGuid"
},
{
"Description": "List of pass or fail verdicts by email authentication protocols like DMARC, DKIM, SPF or a combination of multiple authentication types (CompAuth)",
"Type": "String",
"Entity": null,
"Name": "AuthenticationDetails"
},
{
"Description": "Number of attachments in the email",
"Type": "Int32",
"Entity": null,
"Name": "AttachmentCount"
},
{
"Description": "Number of embedded URLs in the email",
"Type": "Int32",
"Entity": null,
"Name": "UrlCount"
},
{
"Description": "Detected language of the email content",
"Type": "String",
"Entity": null,
"Name": "EmailLanguage"
},
{
"Description": "Custom instructions that define organizational mail flow and how the email was routed",
"Type": "String",
"Entity": null,
"Name": "Connectors"
},
{
"Description": "Action taken on the email in response to matches to a policy defined at the organizational level",
"Type": "String",
"Entity": null,
"Name": "OrgLevelAction"
},
{
"Description": "Organizational policy that triggered the action taken on the email",
"Type": "String",
"Entity": null,
"Name": "OrgLevelPolicy"
},
{
"Description": "Action taken on the email in response to matches to a mailbox policy defined by the recipient",
"Type": "String",
"Entity": null,
"Name": "UserLevelAction"
},
{
"Description": "End user mailbox policy that triggered the action taken on the email",
"Type": "String",
"Entity": null,
"Name": "UserLevelPolicy"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Additional information about the entity or event",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Last known location of the email.",
"Type": "String",
"Entity": null,
"Name": "LatestDeliveryLocation"
},
{
"Description": "Last known action attempted on an email by the service or by an admin through manual remediation. ",
"Type": "String",
"Entity": null,
"Name": "LatestDeliveryAction"
},
{
"Description": "Mail flow rules (also known as transport rules) are similar to Inbox rules that are available in Outlook and Outlook on the web. The main difference is mail flow rules take action on messages while they're in transit.",
"Type": "String",
"Entity": null,
"Name": "ExchangeTransportRule"
},
{
"Description": "Name of distribution list that the recipient was a member of and to which the email was sent, if applicable; shows top-level distribution list if nested lists are involved",
"Type": "String",
"Entity": null,
"Name": "DistributionList"
},
{
"Description": "A JSON array of forwarding details including the forwarding user and the forwarding type",
"Type": "String",
"Entity": null,
"Name": "ForwardingInformation"
},
{
"Description": null,
"Type": "String",
"Entity": null,
"Name": "ThreatClassification"
}
],
"TableSection": "Emails",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "EmailEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the email, generated by Office 365",
"Type": "String",
"Entity": null,
"Name": "NetworkMessageId"
},
{
"Description": "Sender email address in the FROM header, which is visible to email recipients on their email clients",
"Type": "String",
"Entity": null,
"Name": "SenderFromAddress"
},
{
"Description": "Name of the sender displayed in the address book, typically a combination of a given or first name, a middle initial, and a last name or surname",
"Type": "String",
"Entity": null,
"Name": "SenderDisplayName"
},
{
"Description": "Unique identifier for the sender’s account in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "SenderObjectId"
},
{
"Description": "Email address of the recipient, or email address of the recipient after distribution list expansion",
"Type": "String",
"Entity": null,
"Name": "RecipientEmailAddress"
},
{
"Description": "Unique identifier for the email recipient in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "RecipientObjectId"
},
{
"Description": "Name of the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FileName"
},
{
"Description": "File extension type",
"Type": "String",
"Entity": null,
"Name": "FileType"
},
{
"Description": "SHA-256 of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA256"
},
{
"Description": "Size of the file in bytes",
"Type": "Int64",
"Entity": null,
"Name": "FileSize"
},
{
"Description": "Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats",
"Type": "String",
"Entity": null,
"Name": "ThreatTypes"
},
{
"Description": "Detection name for malware or other threats found",
"Type": "String",
"Entity": null,
"Name": "ThreatNames"
},
{
"Description": "Methods used to detect malware, phishing, or other threats found in the email",
"Type": "String",
"Entity": null,
"Name": "DetectionMethods"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
}
],
"TableSection": "Emails",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "EmailAttachmentInfo"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the email, generated by Office 365",
"Type": "String",
"Entity": null,
"Name": "NetworkMessageId"
},
{
"Description": "Full Url from email",
"Type": "String",
"Entity": "Url",
"Name": "Url"
},
{
"Description": "Domain name or host name of the URL",
"Type": "String",
"Entity": null,
"Name": "UrlDomain"
},
{
"Description": "Indicates which part of the email the URL is located",
"Type": "String",
"Entity": null,
"Name": "UrlLocation"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
}
],
"TableSection": "Emails",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "EmailUrlInfo"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the email, generated by Office 365",
"Type": "String",
"Entity": null,
"Name": "NetworkMessageId"
},
{
"Description": "Public-facing identifier for the email that is set by the sending email system",
"Type": "String",
"Entity": null,
"Name": "InternetMessageId"
},
{
"Description": "Action taken on the entity",
"Type": "String",
"Entity": null,
"Name": "Action"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Indicates whether an action was triggered by an administrator (manually or through approval of a pending automated action), or by some special mechanism, such as a ZAP or Dynamic Delivery",
"Type": "String",
"Entity": null,
"Name": "ActionTrigger"
},
{
"Description": "Result of the action",
"Type": "String",
"Entity": null,
"Name": "ActionResult"
},
{
"Description": "Email address of the recipient, or email address of the recipient after distribution list expansion",
"Type": "String",
"Entity": null,
"Name": "RecipientEmailAddress"
},
{
"Description": "Location where the email was delivered: Inbox/Folder, On-premises/External, Junk, Quarantine, Failed, Dropped, Deleted items",
"Type": "String",
"Entity": null,
"Name": "DeliveryLocation"
},
{
"Description": "Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats",
"Type": "String",
"Entity": null,
"Name": "ThreatTypes"
},
{
"Description": "Methods used to detect malware, phishing, or other threats found in the email",
"Type": "String",
"Entity": null,
"Name": "DetectionMethods"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Sender email address in the FROM header, which is visible to email recipients on their email clients",
"Type": "String",
"Entity": null,
"Name": "SenderFromAddress"
},
{
"Description": "Direction of the email relative to your network: Inbound, Outbound, Intra-org",
"Type": "String",
"Entity": null,
"Name": "EmailDirection"
}
],
"TableSection": "Emails",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "EmailPostDeliveryEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "URL that was clicked",
"Type": "String",
"Entity": "Url",
"Name": "Url"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "User principal name (UPN) of the account",
"Type": "String",
"Entity": null,
"Name": "AccountUpn"
},
{
"Description": "Information about the workload from which the URL originated from",
"Type": "String",
"Entity": null,
"Name": "Workload"
},
{
"Description": "Unique identifier for the email from which the URL was clicked",
"Type": "String",
"Entity": null,
"Name": "NetworkMessageId"
},
{
"Description": "Verdict on whether the URL leads to malware, phishing, or other threats",
"Type": "String",
"Entity": null,
"Name": "ThreatTypes"
},
{
"Description": "Methods used to detect whether the URL contains or leads to malware, phishing, or other threats",
"Type": "String",
"Entity": null,
"Name": "DetectionMethods"
},
{
"Description": "IP address assigned to the device during communication",
"Type": "String",
"Entity": "Ip",
"Name": "IPAddress"
},
{
"Description": "Indicates whether the user was able to click through to the original URL or not",
"Type": "Boolean",
"Entity": null,
"Name": "IsClickedThrough"
},
{
"Description": "List of URLs in the redirection chain",
"Type": "String",
"Entity": null,
"Name": "UrlChain"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
}
],
"TableSection": "Emails",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "UrlClickEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Version of the endpoint agent or sensor running on the machine",
"Type": "String",
"Entity": null,
"Name": "ClientVersion"
},
{
"Description": "Public IP address used by the onboarded machine to connect to the Windows Defender ATP service. This could be the IP address of the machine itself, a NAT device, or a proxy",
"Type": "String",
"Entity": "Ip",
"Name": "PublicIP"
},
{
"Description": "Architecture of the operating system running on the machine",
"Type": "String",
"Entity": null,
"Name": "OSArchitecture"
},
{
"Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
"Type": "String",
"Entity": null,
"Name": "OSPlatform"
},
{
"Description": "Build version of the operating system running on the machine",
"Type": "Int64",
"Entity": null,
"Name": "OSBuild"
},
{
"Description": "Boolean indicator of whether machine is joined to the Microsoft Entra ID",
"Type": "Boolean",
"Entity": null,
"Name": "IsAzureADJoined"
},
{
"Description": "The device's Microsoft Entra ID join type",
"Type": "String",
"Entity": null,
"Name": "JoinType"
},
{
"Description": "Unique identifier for the device in Microsoft Entra ID",
"Type": "String",
"Entity": null,
"Name": "AadDeviceId"
},
{
"Description": "List of all users that are logged on the machine at the time of the event in JSON array format",
"Type": "String",
"Entity": null,
"Name": "LoggedOnUsers"
},
{
"Description": "Device tag added through the registry",
"Type": "String",
"Entity": null,
"Name": "RegistryDeviceTag"
},
{
"Description": "Version of the operating system running on the machine",
"Type": "String",
"Entity": null,
"Name": "OSVersion"
},
{
"Description": "Machine group of the machine. This group is used by role-based access control to determine access to the machine",
"Type": "String",
"Entity": null,
"Name": "MachineGroup"
},
{
"Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
"Type": "Int64",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Indicates whether the device is currently onboarded or not to Microsoft Defender For Endpoint or if the device is not supported",
"Type": "String",
"Entity": null,
"Name": "OnboardingStatus"
},
{
"Description": "Additional information about the entity or event",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Broader classification that groups certain device types under the following categories: Endpoint, Network device, IoT, Unknown",
"Type": "String",
"Entity": null,
"Name": "DeviceCategory"
},
{
"Description": "Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer",
"Type": "String",
"Entity": null,
"Name": "DeviceType"
},
{
"Description": "Additional modifier for certain types of devices; for example, a mobile device can be a tablet or a smartphone; only available if device discovery finds enough information about this attribute",
"Type": "String",
"Entity": null,
"Name": "DeviceSubtype"
},
{
"Description": "Model name or number of the product from the vendor or manufacturer; only available if device discovery finds enough information about this attribute",
"Type": "String",
"Entity": null,
"Name": "Model"
},
{
"Description": "Name of the product vendor or manufacturer; only available if device discovery finds enough information about this attribute",
"Type": "String",
"Entity": null,
"Name": "Vendor"
},
{
"Description": "Distribution of the OS platform, such as Ubuntu or RedHat for Linux platforms",
"Type": "String",
"Entity": null,
"Name": "OSDistribution"
},
{
"Description": "Additional information about the OS version, such as the popular name, code name, or version number",
"Type": "String",
"Entity": null,
"Name": "OSVersionInfo"
},
{
"Description": "Previous device IDs that have been assigned to the same device.",
"Type": "String",
"Entity": null,
"Name": "MergedDeviceIds"
},
{
"Description": "The most recent device ID assigned to a device ",
"Type": "String",
"Entity": null,
"Name": "MergedToDeviceId"
},
{
"Description": "Indicates whether the device is internet-facing",
"Type": "Boolean",
"Entity": null,
"Name": "IsInternetFacing"
},
{
"Description": "Indicates health of the device’s EDR sensor, if onboarded to Microsoft Defender For Endpoint",
"Type": "String",
"Entity": null,
"Name": "SensorHealthState"
},
{
"Description": "Determines if the device is excluded from different views and reports in the portal",
"Type": "Boolean",
"Entity": null,
"Name": "IsExcluded"
},
{
"Description": "The reason for the device being excluded",
"Type": "String",
"Entity": null,
"Name": "ExclusionReason"
},
{
"Description": "The device's level of vulnerability to exploitation based on its exposure score; can be: Low, Medium, High",
"Type": "String",
"Entity": null,
"Name": "ExposureLevel"
},
{
"Description": "Priority or value assigned to the device in relation to its importance in computing the organization's exposure score; can be: Low, Normal (Default), High",
"Type": "String",
"Entity": null,
"Name": "AssetValue"
},
{
"Description": "Device tags created manually using the portal UI or public API",
"Type": "String",
"Entity": null,
"Name": "DeviceManualTags"
},
{
"Description": "Device tags added and removed dynamically based on dynamic rules",
"Type": "String",
"Entity": null,
"Name": "DeviceDynamicTags"
},
{
"Description": "Universally Unique Identifier (UUID) of the device’s hardware",
"Type": "String",
"Entity": null,
"Name": "HardwareUuid"
},
{
"Description": "The cloud platforms that the device belongs to—can be Azure, Amazon Web Services, Google Cloud Platform and Azure Arc",
"Type": "String",
"Entity": null,
"Name": "CloudPlatforms"
},
{
"Description": "Unique identifier assigned to the device in Azure",
"Type": "String",
"Entity": null,
"Name": "AzureVmId"
},
{
"Description": "Unique identifier of the Azure resource associated with the device.",
"Type": "String",
"Entity": null,
"Name": "AzureResourceId"
},
{
"Description": "Unique identifier of the Azure subscription associated with the device",
"Type": "String",
"Entity": null,
"Name": "AzureVmSubscriptionId"
},
{
"Description": "Unique identifier specific to Google Cloud Platform devices, containing a combination of zone and ID",
"Type": "String",
"Entity": null,
"Name": "GcpFullResourceName"
},
{
"Description": "Unique identifier specific to Amazon Web Services devices, containing the Amazon Resource Name",
"Type": "String",
"Entity": null,
"Name": "AwsResourceName"
},
{
"Description": "Indicates whether this device is classified as short-lived or transient based on the frequency of appearance of the device on the network",
"Type": "Boolean",
"Entity": null,
"Name": "IsTransient"
},
{
"Description": "Build revision number of the operating system running on the machine",
"Type": "String",
"Entity": null,
"Name": "OsBuildRevision"
},
{
"Description": "Device ID of the device running Windows Subsystem for Linux",
"Type": "String",
"Entity": null,
"Name": "HostDeviceId"
},
{
"Description": "Indicates the mitigation action applied to a device",
"Type": "String",
"Entity": null,
"Name": "MitigationStatus"
},
{
"Description": "Type of connectivity from the device to the cloud",
"Type": "String",
"Entity": null,
"Name": "ConnectivityType"
},
{
"Description": "Products or services that have seen or reported the device, including when they last reported it",
"Type": "String",
"Entity": null,
"Name": "DiscoverySources"
}
],
"TableSection": "Devices",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceInfo"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Name of the network adapter",
"Type": "String",
"Entity": null,
"Name": "NetworkAdapterName"
},
{
"Description": "MAC address of the network adapter",
"Type": "String",
"Entity": null,
"Name": "MacAddress"
},
{
"Description": "Network adapter type",
"Type": "String",
"Entity": null,
"Name": "NetworkAdapterType"
},
{
"Description": "Operational status of the network adapter",
"Type": "String",
"Entity": null,
"Name": "NetworkAdapterStatus"
},
{
"Description": "Tunneling protocol, if the interface is used for this purpose, for example 6to4, Teredo, ISATAP, PPTP, SSTP, and SSH",
"Type": "String",
"Entity": null,
"Name": "TunnelType"
},
{
"Description": "Networks that the adapter is connected to. Each JSON element in the array contains the network name, category (public, private or domain), a description, and a flag indicating if it’s connected publicly to the internet",
"Type": "String",
"Entity": null,
"Name": "ConnectedNetworks"
},
{
"Description": "DNS server addresses in JSON array format",
"Type": "String",
"Entity": null,
"Name": "DnsAddresses"
},
{
"Description": "IPv4 address of DHCP server",
"Type": "String",
"Entity": "Ip",
"Name": "IPv4Dhcp"
},
{
"Description": "IPv6 address of DHCP server",
"Type": "String",
"Entity": "Ip",
"Name": "IPv6Dhcp"
},
{
"Description": "Default gateway addresses in JSON array format",
"Type": "String",
"Entity": null,
"Name": "DefaultGateways"
},
{
"Description": "JSON array containing all the IP addresses assigned to the adapter, along with their respective subnet prefix and the IP class (RFC 1918 & RFC 4291)",
"Type": "String",
"Entity": null,
"Name": "IPAddresses"
},
{
"Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
"Type": "Int64",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Name of the manufacturer or vendor of the network adapter",
"Type": "String",
"Entity": null,
"Name": "NetworkAdapterVendor"
}
],
"TableSection": "Devices",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceNetworkInfo"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Name of the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FileName"
},
{
"Description": "Folder containing the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FolderPath"
},
{
"Description": "SHA-1 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA1"
},
{
"Description": "SHA-256 of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA256"
},
{
"Description": "MD5 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "MD5"
},
{
"Description": "Size of the file in bytes",
"Type": "Int64",
"Entity": null,
"Name": "FileSize"
},
{
"Description": "Company name from the version information of the newly created process",
"Type": "String",
"Entity": null,
"Name": "ProcessVersionInfoCompanyName"
},
{
"Description": "Product name from the version information of the newly created process",
"Type": "String",
"Entity": null,
"Name": "ProcessVersionInfoProductName"
},
{
"Description": "Product version from the version information of the newly created process",
"Type": "String",
"Entity": null,
"Name": "ProcessVersionInfoProductVersion"
},
{
"Description": "Internal file name from the version information of the newly created process",
"Type": "String",
"Entity": null,
"Name": "ProcessVersionInfoInternalFileName"
},
{
"Description": "Original file name from the version information of the newly created process",
"Type": "String",
"Entity": null,
"Name": "ProcessVersionInfoOriginalFileName"
},
{
"Description": "Description from the version information of the newly created process",
"Type": "String",
"Entity": null,
"Name": "ProcessVersionInfoFileDescription"
},
{
"Description": "Process ID (PID) of the newly created process",
"Type": "Int64",
"Entity": null,
"Name": "ProcessId"
},
{
"Description": "Command line used to create the new process",
"Type": "String",
"Entity": null,
"Name": "ProcessCommandLine"
},
{
"Description": "Integrity level of the newly created process. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet downloaded. These integrity levels influence permissions to resources.",
"Type": "String",
"Entity": null,
"Name": "ProcessIntegrityLevel"
},
{
"Description": "Indicates the type of token elevation applied to the newly created process. Possible values: TokenElevationTypeLimited (restricted), TokenElevationTypeDefault (standard), and TokenElevationTypeFull (elevated)",
"Type": "String",
"Entity": null,
"Name": "ProcessTokenElevation"
},
{
"Description": "Date and time the process was created",
"Type": "DateTime",
"Entity": null,
"Name": "ProcessCreationTime"
},
{
"Description": "Domain of the account",
"Type": "String",
"Entity": null,
"Name": "AccountDomain"
},
{
"Description": "User name of the account",
"Type": "String",
"Entity": null,
"Name": "AccountName"
},
{
"Description": "Security Identifier (SID) of the account",
"Type": "String",
"Entity": "UserSid",
"Name": "AccountSid"
},
{
"Description": "User principal name (UPN) of the account",
"Type": "String",
"Entity": null,
"Name": "AccountUpn"
},
{
"Description": "Unique identifier for the account in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "AccountObjectId"
},
{
"Description": "Identifier for a logon session. This identifier is unique on the same machine only between restarts",
"Type": "Int64",
"Entity": null,
"Name": "LogonId"
},
{
"Description": "Domain of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountDomain"
},
{
"Description": "User name of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountName"
},
{
"Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserSid",
"Name": "InitiatingProcessAccountSid"
},
{
"Description": "User principal name (UPN) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountUpn"
},
{
"Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserObjectId",
"Name": "InitiatingProcessAccountObjectId"
},
{
"Description": "Identifier for a logon session of the process that initiated the event. This identifier is unique on the same machine only between restarts.",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessLogonId"
},
{
"Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessIntegrityLevel"
},
{
"Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessTokenElevation"
},
{
"Description": "SHA-1 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA1"
},
{
"Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA256"
},
{
"Description": "MD5 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessMD5"
},
{
"Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFileName"
},
{
"Description": "Size of the process (image file) that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessFileSize"
},
{
"Description": "Company name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoCompanyName"
},
{
"Description": "Product name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductName"
},
{
"Description": "Product version from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductVersion"
},
{
"Description": "Internal file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoInternalFileName"
},
{
"Description": "Original file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoOriginalFileName"
},
{
"Description": "Description from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoFileDescription"
},
{
"Description": "Process ID (PID) of the process that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessId"
},
{
"Description": "Command line used to run the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessCommandLine"
},
{
"Description": "Date and time when the process that initiated the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessCreationTime"
},
{
"Description": "Folder containing the process (image file) that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFolderPath"
},
{
"Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessParentId"
},
{
"Description": "Name of the parent process that spawned the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessParentFileName"
},
{
"Description": "Date and time when the parent of the process responsible for the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessParentCreationTime"
},
{
"Description": "Type of file signer of the process (image file) that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessSignerType"
},
{
"Description": "Information about the signature status of the process (image file) that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessSignatureStatus"
},
{
"Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
"Type": "Int64",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
"Type": "String",
"Entity": null,
"Name": "AppGuardContainerId"
},
{
"Description": "Additional information about the entity or event",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Windows session ID of the initiating process",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessSessionId"
},
{
"Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
"Type": "Boolean",
"Entity": null,
"Name": "IsInitiatingProcessRemoteSession"
},
{
"Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Machine",
"Name": "InitiatingProcessRemoteSessionDeviceName"
},
{
"Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Ip",
"Name": "InitiatingProcessRemoteSessionIP"
},
{
"Description": "Windows session ID of the created process",
"Type": "Int64",
"Entity": null,
"Name": "CreatedProcessSessionId"
},
{
"Description": "Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
"Type": "Boolean",
"Entity": null,
"Name": "IsProcessRemoteSession"
},
{
"Description": "Device name of the remote device from which the created process’s RDP session was initiated",
"Type": "String",
"Entity": "Machine",
"Name": "ProcessRemoteSessionDeviceName"
},
{
"Description": "IP address of the remote device from which the created process’s RDP session was initiated",
"Type": "String",
"Entity": "Ip",
"Name": "ProcessRemoteSessionIP"
},
{
"Description": "Unique identifier of the process; this is equal to the Process Start Key in Windows devices",
"Type": "String",
"Entity": null,
"Name": "ProcessUniqueId"
},
{
"Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessUniqueId"
}
],
"TableSection": "Devices",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceProcessEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "IP address that was being connected to",
"Type": "String",
"Entity": "Ip",
"Name": "RemoteIP"
},
{
"Description": "TCP port on the remote device that was being connected to",
"Type": "Int32",
"Entity": null,
"Name": "RemotePort"
},
{
"Description": "URL or fully qualified domain name (FQDN) that was being connected to",
"Type": "String",
"Entity": "Url",
"Name": "RemoteUrl"
},
{
"Description": "IP address assigned to the local machine used during communication",
"Type": "String",
"Entity": "Ip",
"Name": "LocalIP"
},
{
"Description": "TCP port on the local machine used during communication",
"Type": "Int32",
"Entity": null,
"Name": "LocalPort"
},
{
"Description": "Protocol used during the communication",
"Type": "String",
"Entity": null,
"Name": "Protocol"
},
{
"Description": "Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast",
"Type": "String",
"Entity": null,
"Name": "LocalIPType"
},
{
"Description": "Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast",
"Type": "String",
"Entity": null,
"Name": "RemoteIPType"
},
{
"Description": "SHA-1 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA1"
},
{
"Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA256"
},
{
"Description": "MD5 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessMD5"
},
{
"Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFileName"
},
{
"Description": "Size of the process (image file) that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessFileSize"
},
{
"Description": "Company name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoCompanyName"
},
{
"Description": "Product name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductName"
},
{
"Description": "Product version from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductVersion"
},
{
"Description": "Internal file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoInternalFileName"
},
{
"Description": "Original file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoOriginalFileName"
},
{
"Description": "Description from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoFileDescription"
},
{
"Description": "Process ID (PID) of the process that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessId"
},
{
"Description": "Command line used to run the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessCommandLine"
},
{
"Description": "Date and time when the process that initiated the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessCreationTime"
},
{
"Description": "Folder containing the process (image file) that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFolderPath"
},
{
"Description": "Name of the parent process that spawned the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessParentFileName"
},
{
"Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessParentId"
},
{
"Description": "Date and time when the parent of the process responsible for the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessParentCreationTime"
},
{
"Description": "Domain of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountDomain"
},
{
"Description": "User name of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountName"
},
{
"Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserSid",
"Name": "InitiatingProcessAccountSid"
},
{
"Description": "User principal name (UPN) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountUpn"
},
{
"Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserObjectId",
"Name": "InitiatingProcessAccountObjectId"
},
{
"Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessIntegrityLevel"
},
{
"Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessTokenElevation"
},
{
"Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
"Type": "Int64",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
"Type": "String",
"Entity": null,
"Name": "AppGuardContainerId"
},
{
"Description": "Additional information about the entity or event",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Windows session ID of the initiating process",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessSessionId"
},
{
"Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
"Type": "Boolean",
"Entity": null,
"Name": "IsInitiatingProcessRemoteSession"
},
{
"Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Machine",
"Name": "InitiatingProcessRemoteSessionDeviceName"
},
{
"Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Ip",
"Name": "InitiatingProcessRemoteSessionIP"
},
{
"Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessUniqueId"
}
],
"TableSection": "Devices",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceNetworkEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Name of the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FileName"
},
{
"Description": "Folder containing the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FolderPath"
},
{
"Description": "SHA-1 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA1"
},
{
"Description": "SHA-256 of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA256"
},
{
"Description": "MD5 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "MD5"
},
{
"Description": "URL where the file was downloaded from",
"Type": "String",
"Entity": "Url",
"Name": "FileOriginUrl"
},
{
"Description": "URL of the web page that links to the downloaded file",
"Type": "String",
"Entity": "Url",
"Name": "FileOriginReferrerUrl"
},
{
"Description": "IP address where the file was downloaded from",
"Type": "String",
"Entity": "Ip",
"Name": "FileOriginIP"
},
{
"Description": "Original folder containing the file before the recorded action was applied",
"Type": "String",
"Entity": null,
"Name": "PreviousFolderPath"
},
{
"Description": "Original name of the file that was renamed as a result of the action",
"Type": "String",
"Entity": null,
"Name": "PreviousFileName"
},
{
"Description": "Size of the file in bytes",
"Type": "Int64",
"Entity": null,
"Name": "FileSize"
},
{
"Description": "Domain of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountDomain"
},
{
"Description": "User name of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountName"
},
{
"Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserSid",
"Name": "InitiatingProcessAccountSid"
},
{
"Description": "User principal name (UPN) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountUpn"
},
{
"Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserObjectId",
"Name": "InitiatingProcessAccountObjectId"
},
{
"Description": "MD5 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessMD5"
},
{
"Description": "SHA-1 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA1"
},
{
"Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA256"
},
{
"Description": "Folder containing the process (image file) that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFolderPath"
},
{
"Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFileName"
},
{
"Description": "Size of the process (image file) that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessFileSize"
},
{
"Description": "Company name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoCompanyName"
},
{
"Description": "Product name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductName"
},
{
"Description": "Product version from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductVersion"
},
{
"Description": "Internal file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoInternalFileName"
},
{
"Description": "Original file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoOriginalFileName"
},
{
"Description": "Description from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoFileDescription"
},
{
"Description": "Process ID (PID) of the process that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessId"
},
{
"Description": "Command line used to run the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessCommandLine"
},
{
"Description": "Date and time when the process that initiated the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessCreationTime"
},
{
"Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessIntegrityLevel"
},
{
"Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessTokenElevation"
},
{
"Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessParentId"
},
{
"Description": "Name of the parent process that spawned the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessParentFileName"
},
{
"Description": "Date and time when the parent of the process responsible for the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessParentCreationTime"
},
{
"Description": "Network protocol, if applicable, used to initiate the activity: Unknown, Local, SMB, or NFS",
"Type": "String",
"Entity": null,
"Name": "RequestProtocol"
},
{
"Description": "IPv4 or IPv6 address of the remote device that initiated the activity",
"Type": "String",
"Entity": null,
"Name": "RequestSourceIP"
},
{
"Description": "Source port on the remote device that initiated the activity",
"Type": "Int32",
"Entity": null,
"Name": "RequestSourcePort"
},
{
"Description": "User name of account used to remotely initiate the activity",
"Type": "String",
"Entity": null,
"Name": "RequestAccountName"
},
{
"Description": "Domain of the account used to remotely initiate the activity",
"Type": "String",
"Entity": null,
"Name": "RequestAccountDomain"
},
{
"Description": "Security Identifier (SID) of the account used to remotely initiate the activity",
"Type": "String",
"Entity": "UserSid",
"Name": "RequestAccountSid"
},
{
"Description": "Name of shared folder containing the file",
"Type": "String",
"Entity": null,
"Name": "ShareName"
},
{
"Description": "Label applied to an email, file, or other content to classify it for information protection",
"Type": "String",
"Entity": null,
"Name": "SensitivityLabel"
},
{
"Description": "Sublabel applied to an email, file, or other content to classify it for information protection; sensitivity sublabels are grouped under sensitivity labels but are treated independently",
"Type": "String",
"Entity": null,
"Name": "SensitivitySubLabel"
},
{
"Description": "Indicates whether the file is encrypted by Azure Information Protection",
"Type": "Boolean",
"Entity": null,
"Name": "IsAzureInfoProtectionApplied"
},
{
"Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
"Type": "Int64",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
"Type": "String",
"Entity": null,
"Name": "AppGuardContainerId"
},
{
"Description": "Additional information about the entity or event",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Windows session ID of the initiating process",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessSessionId"
},
{
"Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
"Type": "Boolean",
"Entity": null,
"Name": "IsInitiatingProcessRemoteSession"
},
{
"Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Machine",
"Name": "InitiatingProcessRemoteSessionDeviceName"
},
{
"Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Ip",
"Name": "InitiatingProcessRemoteSessionIP"
},
{
"Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessUniqueId"
}
],
"TableSection": "Devices",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceFileEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Registry key that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryKey"
},
{
"Description": "Data type, such as binary or string, of the registry value that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryValueType"
},
{
"Description": "Name of the registry value that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryValueName"
},
{
"Description": "Data of the registry value that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryValueData"
},
{
"Description": "Original registry key before it was modified",
"Type": "String",
"Entity": null,
"Name": "PreviousRegistryKey"
},
{
"Description": "Original name of the registry value before it was modified",
"Type": "String",
"Entity": null,
"Name": "PreviousRegistryValueName"
},
{
"Description": "Original data of the registry value before it was modified",
"Type": "String",
"Entity": null,
"Name": "PreviousRegistryValueData"
},
{
"Description": "Domain of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountDomain"
},
{
"Description": "User name of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountName"
},
{
"Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserSid",
"Name": "InitiatingProcessAccountSid"
},
{
"Description": "User principal name (UPN) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountUpn"
},
{
"Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserObjectId",
"Name": "InitiatingProcessAccountObjectId"
},
{
"Description": "SHA-1 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA1"
},
{
"Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA256"
},
{
"Description": "MD5 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessMD5"
},
{
"Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFileName"
},
{
"Description": "Size of the process (image file) that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessFileSize"
},
{
"Description": "Company name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoCompanyName"
},
{
"Description": "Product name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductName"
},
{
"Description": "Product version from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductVersion"
},
{
"Description": "Internal file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoInternalFileName"
},
{
"Description": "Original file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoOriginalFileName"
},
{
"Description": "Description from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoFileDescription"
},
{
"Description": "Process ID (PID) of the process that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessId"
},
{
"Description": "Command line used to run the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessCommandLine"
},
{
"Description": "Date and time when the process that initiated the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessCreationTime"
},
{
"Description": "Folder containing the process (image file) that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFolderPath"
},
{
"Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessParentId"
},
{
"Description": "Name of the parent process that spawned the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessParentFileName"
},
{
"Description": "Date and time when the parent of the process responsible for the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessParentCreationTime"
},
{
"Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessIntegrityLevel"
},
{
"Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessTokenElevation"
},
{
"Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
"Type": "Int64",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
"Type": "String",
"Entity": null,
"Name": "AppGuardContainerId"
},
{
"Description": "Windows session ID of the initiating process",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessSessionId"
},
{
"Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
"Type": "Boolean",
"Entity": null,
"Name": "IsInitiatingProcessRemoteSession"
},
{
"Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Machine",
"Name": "InitiatingProcessRemoteSessionDeviceName"
},
{
"Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Ip",
"Name": "InitiatingProcessRemoteSessionIP"
},
{
"Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessUniqueId"
}
],
"TableSection": "Devices",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceRegistryEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Type of logon session, specifically interactive, remote interactive (RDP), network, batch, and service",
"Type": "String",
"Entity": null,
"Name": "LogonType"
},
{
"Description": "Domain of the account",
"Type": "String",
"Entity": null,
"Name": "AccountDomain"
},
{
"Description": "User name of the account",
"Type": "String",
"Entity": null,
"Name": "AccountName"
},
{
"Description": "Security Identifier (SID) of the account",
"Type": "String",
"Entity": "UserSid",
"Name": "AccountSid"
},
{
"Description": "Protocol used during the communication",
"Type": "String",
"Entity": null,
"Name": "Protocol"
},
{
"Description": "Information explaining why the recorded action failed",
"Type": "String",
"Entity": null,
"Name": "FailureReason"
},
{
"Description": "Boolean indicator of whether the user is a local administrator on the machine",
"Type": "Boolean",
"Entity": null,
"Name": "IsLocalAdmin"
},
{
"Description": "Identifier for a logon session. This identifier is unique on the same machine only between restarts",
"Type": "Int64",
"Entity": null,
"Name": "LogonId"
},
{
"Description": "Name of the device that performed a remote operation on the affected machine. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name, or a host name without domain information.",
"Type": "String",
"Entity": "Machine",
"Name": "RemoteDeviceName"
},
{
"Description": "IP address that was being connected to",
"Type": "String",
"Entity": "Ip",
"Name": "RemoteIP"
},
{
"Description": "Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast",
"Type": "String",
"Entity": null,
"Name": "RemoteIPType"
},
{
"Description": "TCP port on the remote device that was being connected to",
"Type": "Int32",
"Entity": null,
"Name": "RemotePort"
},
{
"Description": "Domain of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountDomain"
},
{
"Description": "User name of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountName"
},
{
"Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserSid",
"Name": "InitiatingProcessAccountSid"
},
{
"Description": "User principal name (UPN) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountUpn"
},
{
"Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserObjectId",
"Name": "InitiatingProcessAccountObjectId"
},
{
"Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessIntegrityLevel"
},
{
"Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessTokenElevation"
},
{
"Description": "SHA-1 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA1"
},
{
"Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA256"
},
{
"Description": "MD5 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessMD5"
},
{
"Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFileName"
},
{
"Description": "Size of the process (image file) that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessFileSize"
},
{
"Description": "Company name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoCompanyName"
},
{
"Description": "Product name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductName"
},
{
"Description": "Product version from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductVersion"
},
{
"Description": "Internal file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoInternalFileName"
},
{
"Description": "Original file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoOriginalFileName"
},
{
"Description": "Description from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoFileDescription"
},
{
"Description": "Process ID (PID) of the process that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessId"
},
{
"Description": "Command line used to run the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessCommandLine"
},
{
"Description": "Date and time when the process that initiated the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessCreationTime"
},
{
"Description": "Folder containing the process (image file) that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFolderPath"
},
{
"Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessParentId"
},
{
"Description": "Name of the parent process that spawned the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessParentFileName"
},
{
"Description": "Date and time when the parent of the process responsible for the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessParentCreationTime"
},
{
"Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
"Type": "Int64",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
"Type": "String",
"Entity": null,
"Name": "AppGuardContainerId"
},
{
"Description": "Additional information about the entity or event",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Windows session ID of the initiating process",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessSessionId"
},
{
"Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
"Type": "Boolean",
"Entity": null,
"Name": "IsInitiatingProcessRemoteSession"
},
{
"Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Machine",
"Name": "InitiatingProcessRemoteSessionDeviceName"
},
{
"Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Ip",
"Name": "InitiatingProcessRemoteSessionIP"
},
{
"Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessUniqueId"
}
],
"TableSection": "Devices",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceLogonEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Name of the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FileName"
},
{
"Description": "Folder containing the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FolderPath"
},
{
"Description": "SHA-1 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA1"
},
{
"Description": "SHA-256 of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA256"
},
{
"Description": "MD5 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "MD5"
},
{
"Description": "Size of the file in bytes",
"Type": "Int64",
"Entity": null,
"Name": "FileSize"
},
{
"Description": "Domain of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountDomain"
},
{
"Description": "User name of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountName"
},
{
"Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserSid",
"Name": "InitiatingProcessAccountSid"
},
{
"Description": "User principal name (UPN) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountUpn"
},
{
"Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserObjectId",
"Name": "InitiatingProcessAccountObjectId"
},
{
"Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessIntegrityLevel"
},
{
"Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessTokenElevation"
},
{
"Description": "SHA-1 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA1"
},
{
"Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA256"
},
{
"Description": "MD5 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessMD5"
},
{
"Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFileName"
},
{
"Description": "Size of the process (image file) that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessFileSize"
},
{
"Description": "Company name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoCompanyName"
},
{
"Description": "Product name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductName"
},
{
"Description": "Product version from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductVersion"
},
{
"Description": "Internal file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoInternalFileName"
},
{
"Description": "Original file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoOriginalFileName"
},
{
"Description": "Description from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoFileDescription"
},
{
"Description": "Process ID (PID) of the process that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessId"
},
{
"Description": "Command line used to run the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessCommandLine"
},
{
"Description": "Date and time when the process that initiated the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessCreationTime"
},
{
"Description": "Folder containing the process (image file) that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFolderPath"
},
{
"Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessParentId"
},
{
"Description": "Name of the parent process that spawned the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessParentFileName"
},
{
"Description": "Date and time when the parent of the process responsible for the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessParentCreationTime"
},
{
"Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
"Type": "Int64",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
"Type": "String",
"Entity": null,
"Name": "AppGuardContainerId"
},
{
"Description": "Windows session ID of the initiating process",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessSessionId"
},
{
"Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
"Type": "Boolean",
"Entity": null,
"Name": "IsInitiatingProcessRemoteSession"
},
{
"Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Machine",
"Name": "InitiatingProcessRemoteSessionDeviceName"
},
{
"Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Ip",
"Name": "InitiatingProcessRemoteSessionIP"
},
{
"Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessUniqueId"
}
],
"TableSection": "Devices",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceImageLoadEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Name of the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FileName"
},
{
"Description": "Folder containing the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FolderPath"
},
{
"Description": "SHA-1 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA1"
},
{
"Description": "SHA-256 of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA256"
},
{
"Description": "MD5 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "MD5"
},
{
"Description": "Size of the file in bytes",
"Type": "Int64",
"Entity": null,
"Name": "FileSize"
},
{
"Description": "Domain of the account",
"Type": "String",
"Entity": null,
"Name": "AccountDomain"
},
{
"Description": "User name of the account",
"Type": "String",
"Entity": null,
"Name": "AccountName"
},
{
"Description": "Security Identifier (SID) of the account",
"Type": "String",
"Entity": "UserSid",
"Name": "AccountSid"
},
{
"Description": "URL or fully qualified domain name (FQDN) that was being connected to",
"Type": "String",
"Entity": "Url",
"Name": "RemoteUrl"
},
{
"Description": "Name of the device that performed a remote operation on the affected machine. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name, or a host name without domain information.",
"Type": "String",
"Entity": "Machine",
"Name": "RemoteDeviceName"
},
{
"Description": "Process ID (PID) of the newly created process",
"Type": "Int64",
"Entity": null,
"Name": "ProcessId"
},
{
"Description": "Command line used to create the new process",
"Type": "String",
"Entity": null,
"Name": "ProcessCommandLine"
},
{
"Description": "Date and time the process was created",
"Type": "DateTime",
"Entity": null,
"Name": "ProcessCreationTime"
},
{
"Description": "Indicates the type of token elevation applied to the newly created process. Possible values: TokenElevationTypeLimited (restricted), TokenElevationTypeDefault (standard), and TokenElevationTypeFull (elevated)",
"Type": "String",
"Entity": null,
"Name": "ProcessTokenElevation"
},
{
"Description": "Identifier for a logon session. This identifier is unique on the same machine only between restarts",
"Type": "Int64",
"Entity": null,
"Name": "LogonId"
},
{
"Description": "Registry key that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryKey"
},
{
"Description": "Name of the registry value that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryValueName"
},
{
"Description": "Data of the registry value that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryValueData"
},
{
"Description": "IP address that was being connected to",
"Type": "String",
"Entity": "Ip",
"Name": "RemoteIP"
},
{
"Description": "TCP port on the remote device that was being connected to",
"Type": "Int32",
"Entity": null,
"Name": "RemotePort"
},
{
"Description": "IP address assigned to the local machine used during communication",
"Type": "String",
"Entity": "Ip",
"Name": "LocalIP"
},
{
"Description": "TCP port on the local machine used during communication",
"Type": "Int32",
"Entity": null,
"Name": "LocalPort"
},
{
"Description": "URL where the file was downloaded from",
"Type": "String",
"Entity": "Url",
"Name": "FileOriginUrl"
},
{
"Description": "IP address where the file was downloaded from",
"Type": "String",
"Entity": "Ip",
"Name": "FileOriginIP"
},
{
"Description": "SHA-1 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA1"
},
{
"Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessSHA256"
},
{
"Description": "MD5 hash of the process (image file) that initiated the event",
"Type": "String",
"Entity": "File",
"Name": "InitiatingProcessMD5"
},
{
"Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFileName"
},
{
"Description": "Size of the process (image file) that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessFileSize"
},
{
"Description": "Folder containing the process (image file) that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessFolderPath"
},
{
"Description": "Process ID (PID) of the process that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessId"
},
{
"Description": "Command line used to run the process that initiated the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessCommandLine"
},
{
"Description": "Date and time when the process that initiated the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessCreationTime"
},
{
"Description": "Domain of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountDomain"
},
{
"Description": "User name of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountName"
},
{
"Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserSid",
"Name": "InitiatingProcessAccountSid"
},
{
"Description": "User principal name (UPN) of the account that ran the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessAccountUpn"
},
{
"Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
"Type": "String",
"Entity": "UserObjectId",
"Name": "InitiatingProcessAccountObjectId"
},
{
"Description": "Company name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoCompanyName"
},
{
"Description": "Product name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductName"
},
{
"Description": "Product version from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoProductVersion"
},
{
"Description": "Internal file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoInternalFileName"
},
{
"Description": "Original file name from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoOriginalFileName"
},
{
"Description": "Description from the version information of the process (image file) responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessVersionInfoFileDescription"
},
{
"Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessParentId"
},
{
"Description": "Name of the parent process that spawned the process responsible for the event",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessParentFileName"
},
{
"Description": "Date and time when the parent of the process responsible for the event was started",
"Type": "DateTime",
"Entity": null,
"Name": "InitiatingProcessParentCreationTime"
},
{
"Description": "Identifier for a logon session of the process that initiated the event. This identifier is unique on the same machine only between restarts.",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessLogonId"
},
{
"Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
"Type": "Int64",
"Entity": null,
"Name": "ReportId"
},
{
"Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
"Type": "String",
"Entity": null,
"Name": "AppGuardContainerId"
},
{
"Description": "Additional information about the entity or event",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Windows session ID of the initiating process",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessSessionId"
},
{
"Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
"Type": "Boolean",
"Entity": null,
"Name": "IsInitiatingProcessRemoteSession"
},
{
"Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Machine",
"Name": "InitiatingProcessRemoteSessionDeviceName"
},
{
"Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
"Type": "String",
"Entity": "Ip",
"Name": "InitiatingProcessRemoteSessionIP"
},
{
"Description": "Windows session ID of the created process",
"Type": "Int64",
"Entity": null,
"Name": "CreatedProcessSessionId"
},
{
"Description": "Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
"Type": "Boolean",
"Entity": null,
"Name": "IsProcessRemoteSession"
},
{
"Description": "Device name of the remote device from which the created process’s RDP session was initiated",
"Type": "String",
"Entity": "Machine",
"Name": "ProcessRemoteSessionDeviceName"
},
{
"Description": "IP address of the remote device from which the created process’s RDP session was initiated",
"Type": "String",
"Entity": "Ip",
"Name": "ProcessRemoteSessionIP"
},
{
"Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
"Type": "String",
"Entity": null,
"Name": "InitiatingProcessUniqueId"
}
],
"TableSection": "Devices",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "SHA-1 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA1"
},
{
"Description": "Indicates whether the file is signed",
"Type": "Boolean",
"Entity": null,
"Name": "IsSigned"
},
{
"Description": "Indicates whether signature information was read as embedded content in the file itself or read from an external catalog file",
"Type": "String",
"Entity": null,
"Name": "SignatureType"
},
{
"Description": "Information about the signer of the file",
"Type": "String",
"Entity": null,
"Name": "Signer"
},
{
"Description": "Unique hash value identifying the signer",
"Type": "String",
"Entity": null,
"Name": "SignerHash"
},
{
"Description": "Information about the issuing certificate authority (CA)",
"Type": "String",
"Entity": null,
"Name": "Issuer"
},
{
"Description": "Unique hash value identifying issuing certificate authority (CA)",
"Type": "String",
"Entity": null,
"Name": "IssuerHash"
},
{
"Description": "Identifier for the certificate that is unique to the issuing certificate authority (CA)",
"Type": "String",
"Entity": null,
"Name": "CertificateSerialNumber"
},
{
"Description": "JSON array listing the URLs of network shares that contain certificates and certificate revocation lists (CRLs)",
"Type": "String",
"Entity": null,
"Name": "CrlDistributionPointUrls"
},
{
"Description": "Date and time the certificate was created",
"Type": "DateTime",
"Entity": null,
"Name": "CertificateCreationTime"
},
{
"Description": "Date and time the certificate is set to expire",
"Type": "DateTime",
"Entity": null,
"Name": "CertificateExpirationTime"
},
{
"Description": "Date and time the certificate was countersigned",
"Type": "DateTime",
"Entity": null,
"Name": "CertificateCountersignatureTime"
},
{
"Description": "Indicates whether the file is trusted based on the results of the WinVerifyTrust function, which checks for unknown root certificate information, invalid signatures, revoked certificates, and other questionable attributes",
"Type": "Boolean",
"Entity": null,
"Name": "IsTrusted"
},
{
"Description": "Indicates whether the signer of the root certificate is Microsoft",
"Type": "Boolean",
"Entity": null,
"Name": "IsRootSignerMicrosoft"
},
{
"Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
"Type": "Int64",
"Entity": null,
"Name": "ReportId"
}
],
"TableSection": "Devices",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceFileCertificateInfo"
},
{
"Schema": [
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
"Type": "String",
"Entity": null,
"Name": "OSPlatform"
},
{
"Description": "Version of the operating system running on the machine",
"Type": "String",
"Entity": null,
"Name": "OSVersion"
},
{
"Description": "Architecture of the operating system running on the machine",
"Type": "String",
"Entity": null,
"Name": "OSArchitecture"
},
{
"Description": "Name of the software vendor",
"Type": "String",
"Entity": null,
"Name": "SoftwareVendor"
},
{
"Description": "Name of the software product",
"Type": "String",
"Entity": null,
"Name": "SoftwareName"
},
{
"Description": "Version number of the software product",
"Type": "String",
"Entity": null,
"Name": "SoftwareVersion"
},
{
"Description": "Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system",
"Type": "String",
"Entity": null,
"Name": "CveId"
},
{
"Description": "Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape",
"Type": "String",
"Entity": null,
"Name": "VulnerabilitySeverityLevel"
},
{
"Description": "Name or description of the security update provided by the software vendor to address the vulnerability",
"Type": "String",
"Entity": null,
"Name": "RecommendedSecurityUpdate"
},
{
"Description": "Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles",
"Type": "String",
"Entity": null,
"Name": "RecommendedSecurityUpdateId"
},
{
"Description": "Array of tags relevant to the CVE; example: ZeroDay, NoSecurityUpdate",
"Type": "Object",
"Entity": null,
"Name": "CveTags"
},
{
"Description": "Indicates the status of the workaround mitigation for the CVE on this device (possible values: applied, not applied, partially applied, pending reboot)",
"Type": "String",
"Entity": null,
"Name": "CveMitigationStatus"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmSoftwareVulnerabilities"
},
{
"Schema": [
{
"Description": "Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system",
"Type": "String",
"Entity": null,
"Name": "CveId"
},
{
"Description": "Severity score assigned to the security vulnerability under the Common Vulnerability Scoring System (CVSS)",
"Type": "Double",
"Entity": null,
"Name": "CvssScore"
},
{
"Description": "Cvss Vector is a compressed textual representation that reflects the values used to derive the score",
"Type": "String",
"Entity": null,
"Name": "CvssVector"
},
{
"Description": "Cve Supportability is an indicator to indicate whether Microsoft supports the Cve or supports it in a Premium plan",
"Type": "String",
"Entity": null,
"Name": "CveSupportability"
},
{
"Description": "Indicates whether exploit code for the vulnerability is publicly available",
"Type": "String",
"Entity": null,
"Name": "IsExploitAvailable"
},
{
"Description": "Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape",
"Type": "String",
"Entity": null,
"Name": "VulnerabilitySeverityLevel"
},
{
"Description": "Date and time the item or related metadata was last modified",
"Type": "DateTime",
"Entity": null,
"Name": "LastModifiedTime"
},
{
"Description": "Date vulnerability was disclosed to the public",
"Type": "DateTime",
"Entity": null,
"Name": "PublishedDate"
},
{
"Description": "Description of the vulnerability and associated risks",
"Type": "String",
"Entity": null,
"Name": "VulnerabilityDescription"
},
{
"Description": "List of all software products affected by the vulnerability",
"Type": "String",
"Entity": null,
"Name": "AffectedSoftware"
},
{
"Description": "Represents the probability that a vulnerability will be exploited. This probability is expressed as a number between 0 and 1 (0%-100%) according to the EPSS model.",
"Type": "Double",
"Entity": null,
"Name": "EpssScore"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmSoftwareVulnerabilitiesKB"
},
{
"Schema": [
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
"Type": "String",
"Entity": null,
"Name": "OSPlatform"
},
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for a specific configuration",
"Type": "String",
"Entity": null,
"Name": "ConfigurationId"
},
{
"Description": "Category or grouping to which the configuration belongs",
"Type": "String",
"Entity": null,
"Name": "ConfigurationCategory"
},
{
"Description": "Subcategory or subgrouping to which the configuration belongs. In many cases, this describes specific capabilities or features.",
"Type": "String",
"Entity": null,
"Name": "ConfigurationSubcategory"
},
{
"Description": "Rated impact of the configuration to the overall configuration score (1-10)",
"Type": "Double",
"Entity": null,
"Name": "ConfigurationImpact"
},
{
"Description": "Indicates whether the configuration or policy is properly configured",
"Type": "Boolean",
"Entity": null,
"Name": "IsCompliant"
},
{
"Description": "Indicates whether the configuration or policy is applicable",
"Type": "Boolean",
"Entity": null,
"Name": "IsApplicable"
},
{
"Description": "Configuration context data of the machine",
"Type": "Object",
"Entity": null,
"Name": "Context"
},
{
"Description": "Indicates whether there will be user impact if the configuration will be applied",
"Type": "Boolean",
"Entity": null,
"Name": "IsExpectedUserImpact"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmSecureConfigurationAssessment"
},
{
"Schema": [
{
"Description": "Unique identifier for a specific configuration",
"Type": "String",
"Entity": null,
"Name": "ConfigurationId"
},
{
"Description": "Rated impact of the configuration to the overall configuration score (1-10)",
"Type": "Double",
"Entity": null,
"Name": "ConfigurationImpact"
},
{
"Description": "Display name of the configuration",
"Type": "String",
"Entity": null,
"Name": "ConfigurationName"
},
{
"Description": "Description of the configuration",
"Type": "String",
"Entity": null,
"Name": "ConfigurationDescription"
},
{
"Description": "Description of any associated risks",
"Type": "String",
"Entity": null,
"Name": "RiskDescription"
},
{
"Description": "Category or grouping to which the configuration belongs",
"Type": "String",
"Entity": null,
"Name": "ConfigurationCategory"
},
{
"Description": "Subcategory or subgrouping to which the configuration belongs. In many cases, this describes specific capabilities or features.",
"Type": "String",
"Entity": null,
"Name": "ConfigurationSubcategory"
},
{
"Description": "List of industry benchmarks recommending the same or similar configuration",
"Type": "Object",
"Entity": null,
"Name": "ConfigurationBenchmarks"
},
{
"Description": "Labels representing various attributes used to identify or categorize a security configuration",
"Type": "Object",
"Entity": null,
"Name": "Tags"
},
{
"Description": "Recommended actions to reduce or address any associated risks",
"Type": "String",
"Entity": null,
"Name": "RemediationOptions"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmSecureConfigurationAssessmentKB"
},
{
"Schema": [
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
"Type": "String",
"Entity": null,
"Name": "OSPlatform"
},
{
"Description": "Version of the operating system running on the machine",
"Type": "String",
"Entity": null,
"Name": "OSVersion"
},
{
"Description": "Unique identifier for a specific configuration",
"Type": "String",
"Entity": null,
"Name": "ConfigurationId"
},
{
"Description": "Unique identifier for the profile",
"Type": "String",
"Entity": null,
"Name": "ProfileId"
},
{
"Description": "Indicates whether the device that initiated the event is compliant or not",
"Type": "Boolean",
"Entity": null,
"Name": "IsCompliant"
},
{
"Description": "Indicates whether the configuration or policy is applicable",
"Type": "Boolean",
"Entity": null,
"Name": "IsApplicable"
},
{
"Description": "The registry path or other location used to determine the current device setting",
"Type": "Object",
"Entity": null,
"Name": "Source"
},
{
"Description": "Set of expected values for the current device setting to be complaint",
"Type": "Object",
"Entity": null,
"Name": "RecommendedValue"
},
{
"Description": "Set of detected values found on the device",
"Type": "Object",
"Entity": null,
"Name": "CurrentValue"
},
{
"Description": "Indicates whether the device is exempt from having the baseline configuration",
"Type": "Boolean",
"Entity": null,
"Name": "IsExempt"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceBaselineComplianceAssessment"
},
{
"Schema": [
{
"Description": "Unique identifier for a specific configuration",
"Type": "String",
"Entity": null,
"Name": "ConfigurationId"
},
{
"Description": "Display name of the configuration",
"Type": "String",
"Entity": null,
"Name": "ConfigurationName"
},
{
"Description": "Description of the configuration",
"Type": "String",
"Entity": null,
"Name": "ConfigurationDescription"
},
{
"Description": "Description of any associated risks and rationale behind the configuration",
"Type": "String",
"Entity": null,
"Name": "ConfigurationRationale"
},
{
"Description": "Category or grouping to which the configuration belongs",
"Type": "String",
"Entity": null,
"Name": "ConfigurationCategory"
},
{
"Description": "List of benchmark compliance levels for which the configuration is applicable",
"Type": "Object",
"Entity": null,
"Name": "BenchmarkProfileLevels"
},
{
"Description": "Unique Common Configuration Enumeration (CCE) identifier for the configuration",
"Type": "String",
"Entity": null,
"Name": "CCEReference"
},
{
"Description": "Recommended actions to reduce or address any associated risks",
"Type": "String",
"Entity": null,
"Name": "RemediationOptions"
},
{
"Description": "Industry benchmark recommending the configuration",
"Type": "String",
"Entity": null,
"Name": "ConfigurationBenchmark"
},
{
"Description": "The registry path or other location used to determine the current device setting",
"Type": "Object",
"Entity": null,
"Name": "Source"
},
{
"Description": "Set of expected values for the current device setting to be complaint",
"Type": "Object",
"Entity": null,
"Name": "RecommendedValue"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceBaselineComplianceAssessmentKB"
},
{
"Schema": [
{
"Description": "Unique identifier for the profile",
"Type": "String",
"Entity": null,
"Name": "ProfileId"
},
{
"Description": "Display name of the profile",
"Type": "String",
"Entity": null,
"Name": "ProfileName"
},
{
"Description": "Optional description providing additional information related to the profile",
"Type": "String",
"Entity": null,
"Name": "ProfileDescription"
},
{
"Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
"Type": "String",
"Entity": null,
"Name": "OSPlatform"
},
{
"Description": "Version of the operating system running on the machine",
"Type": "String",
"Entity": null,
"Name": "OSVersion"
},
{
"Description": "Industry benchmark on top of which the profile was created",
"Type": "String",
"Entity": null,
"Name": "BaseBenchmark"
},
{
"Description": "Version of the industry benchmark on top of which the profile was created",
"Type": "String",
"Entity": null,
"Name": "BenchmarkVersion"
},
{
"Description": "Benchmark compliance level set for the profile",
"Type": "String",
"Entity": null,
"Name": "BenchmarkProfileLevel"
},
{
"Description": "Indicator of the profile status - can be Enabled or Disabled",
"Type": "Boolean",
"Entity": null,
"Name": "Status"
},
{
"Description": "Identity of the user account who created the profile",
"Type": "String",
"Entity": null,
"Name": "CreatedBy"
},
{
"Description": "Date and time when the profile was created",
"Type": "DateTime",
"Entity": null,
"Name": "CreatedOn"
},
{
"Description": "Identity of the user account who last updated the profile",
"Type": "String",
"Entity": null,
"Name": "LastUpdatedBy"
},
{
"Description": "Date and time when the profile was last updated",
"Type": "DateTime",
"Entity": null,
"Name": "LastUpdatedOn"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceBaselineComplianceProfiles"
},
{
"Schema": [
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
"Type": "String",
"Entity": null,
"Name": "OSPlatform"
},
{
"Description": "Version of the operating system running on the machine",
"Type": "String",
"Entity": null,
"Name": "OSVersion"
},
{
"Description": "Architecture of the operating system running on the machine",
"Type": "String",
"Entity": null,
"Name": "OSArchitecture"
},
{
"Description": "Name of the software vendor",
"Type": "String",
"Entity": null,
"Name": "SoftwareVendor"
},
{
"Description": "Name of the software product",
"Type": "String",
"Entity": null,
"Name": "SoftwareName"
},
{
"Description": "Version number of the software product",
"Type": "String",
"Entity": null,
"Name": "SoftwareVersion"
},
{
"Description": "Indicates the lifecycle stage of the software product relative to its specified end-of-support (EOS) or end-of-life (EOL) date",
"Type": "String",
"Entity": null,
"Name": "EndOfSupportStatus"
},
{
"Description": "End-of-support (EOS) or end-of-life (EOL) date of the software product",
"Type": "DateTime",
"Entity": null,
"Name": "EndOfSupportDate"
},
{
"Description": "The standard Common Platform Enumeration (CPE) name of the software product version",
"Type": "String",
"Entity": null,
"Name": "ProductCodeCpe"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmSoftwareInventory"
},
{
"Schema": [
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Unique identifier for the certificate",
"Type": "String",
"Entity": null,
"Name": "Thumbprint"
},
{
"Description": "The location of the certificate",
"Type": "String",
"Entity": null,
"Name": "Path"
},
{
"Description": "Unique identifier for the certificate within a certificate authority's systems",
"Type": "String",
"Entity": null,
"Name": "SerialNumber"
},
{
"Description": "Entity that a certificate belongs to; can be a device, an individual, or an organization",
"Type": "String",
"Entity": null,
"Name": "IssuedTo"
},
{
"Description": "Entity that verified the information and signed the certificate",
"Type": "String",
"Entity": null,
"Name": "IssuedBy"
},
{
"Description": "Easy-to-understand version of a certificate's title",
"Type": "String",
"Entity": null,
"Name": "FriendlyName"
},
{
"Description": "Hashing algorithm and encryption algorithm used",
"Type": "String",
"Entity": null,
"Name": "SignatureAlgorithm"
},
{
"Description": "Size of the key used in the signature algorithm",
"Type": "String",
"Entity": null,
"Name": "KeySize"
},
{
"Description": "The date and time beyond which the certificate is no longer valid",
"Type": "String",
"Entity": null,
"Name": "ExpirationDate"
},
{
"Description": "The earliest date and time when the certificate became valid",
"Type": "String",
"Entity": null,
"Name": "IssueDate"
},
{
"Description": "Indicates if the holder of the certificate is a CA or end entity",
"Type": "String",
"Entity": null,
"Name": "SubjectType"
},
{
"Description": "The valid cryptographic uses of the certificate's public key",
"Type": "String",
"Entity": null,
"Name": "KeyUsage"
},
{
"Description": "Other valid uses for the certificate",
"Type": "String",
"Entity": null,
"Name": "ExtendedKeyUsage"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmCertificateInfo"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Date and time when the service last saw the device",
"Type": "DateTime",
"Entity": null,
"Name": "LastSeenTime"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
"Type": "String",
"Entity": null,
"Name": "OSPlatform"
},
{
"Description": "Additional information about the entity or event",
"Type": "Object",
"Entity": null,
"Name": "AdditionalFields"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmInfoGathering"
},
{
"Schema": [
{
"Description": "Unique identifier for the piece of information gathered",
"Type": "DateTime",
"Entity": null,
"Name": "IgId"
},
{
"Description": "Name of the field where this information appears in the AdditionalFields column of the DeviceTvmInfoGathering table",
"Type": "DateTime",
"Entity": null,
"Name": "FieldName"
},
{
"Description": "Description of the information gathered",
"Type": "String",
"Entity": null,
"Name": "Description"
},
{
"Description": "List of categories that the information belongs to, in JSON array format",
"Type": "String",
"Entity": null,
"Name": "Categories"
},
{
"Description": "The data structure of the information gathered",
"Type": "String",
"Entity": null,
"Name": "DataStructure"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmInfoGatheringKB"
},
{
"Schema": [
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Name of the software vendor",
"Type": "String",
"Entity": null,
"Name": "SoftwareVendor"
},
{
"Description": "Name of the software product",
"Type": "String",
"Entity": null,
"Name": "SoftwareName"
},
{
"Description": "Version number of the software product",
"Type": "String",
"Entity": null,
"Name": "SoftwareVersion"
},
{
"Description": "Registry paths on which evidence indicating the existence of a software on a device was detected",
"Type": "Object",
"Entity": null,
"Name": "RegistryPaths"
},
{
"Description": "Disk paths on which file level evidence indicating the existence of a software on a device was detected",
"Type": "Object",
"Entity": null,
"Name": "DiskPaths"
},
{
"Description": "Date and time when the service last saw the device",
"Type": "DateTime",
"Entity": null,
"Name": "LastSeenTime"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmSoftwareEvidenceBeta"
},
{
"Schema": [
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Name of the web browser with the extension",
"Type": "String",
"Entity": null,
"Name": "BrowserName"
},
{
"Description": "Unique identifier for the browser extension",
"Type": "String",
"Entity": null,
"Name": "ExtensionId"
},
{
"Description": "Name of the extension",
"Type": "String",
"Entity": null,
"Name": "ExtensionName"
},
{
"Description": "Description from the publisher about the extension",
"Type": "String",
"Entity": null,
"Name": "ExtensionDescription"
},
{
"Description": "Version number of the extension",
"Type": "String",
"Entity": null,
"Name": "ExtensionVersion"
},
{
"Description": "Risk level for the extension based on the permissions it has requested",
"Type": "String",
"Entity": null,
"Name": "ExtensionRisk"
},
{
"Description": "Name of the vendor offering the extension",
"Type": "String",
"Entity": null,
"Name": "ExtensionVendor"
},
{
"Description": "Whether the extension is turned on or off on the devices",
"Type": "Boolean",
"Entity": null,
"Name": "IsActivated"
},
{
"Description": "Date and time when the browser extension was first installed",
"Type": "DateTime",
"Entity": null,
"Name": "InstallationTime"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmBrowserExtensions"
},
{
"Schema": [
{
"Description": "Name of the web browser with the extension",
"Type": "String",
"Entity": null,
"Name": "BrowserName"
},
{
"Description": "Unique identifier for the browser extension",
"Type": "String",
"Entity": null,
"Name": "ExtensionId"
},
{
"Description": "Name of the extension",
"Type": "String",
"Entity": null,
"Name": "ExtensionName"
},
{
"Description": "Description from the publisher about the extension",
"Type": "String",
"Entity": null,
"Name": "ExtensionDescription"
},
{
"Description": "Version number of the extension",
"Type": "String",
"Entity": null,
"Name": "ExtensionVersion"
},
{
"Description": "Risk level for the extension based on the permissions it has requested",
"Type": "String",
"Entity": null,
"Name": "ExtensionRisk"
},
{
"Description": "Unique identifier for the permission",
"Type": "String",
"Entity": null,
"Name": "PermissionId"
},
{
"Description": "Name given to each permission based on what the extension is asking for",
"Type": "String",
"Entity": null,
"Name": "PermissionName"
},
{
"Description": "Explanation of what the permission is supposed to do",
"Type": "String",
"Entity": null,
"Name": "PermissionDescription"
},
{
"Description": "Risk level for the permission based on the type of access it would allow",
"Type": "String",
"Entity": null,
"Name": "PermissionRisk"
},
{
"Description": "Whether the permission is required for the extension to run, or optional",
"Type": "Boolean",
"Entity": null,
"Name": "IsPermissionRequired"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmBrowserExtensionsKB"
},
{
"Schema": [
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Type of hardware or firmware component",
"Type": "String",
"Entity": null,
"Name": "ComponentType"
},
{
"Description": "Manufacturer of hardware or firmware component",
"Type": "String",
"Entity": null,
"Name": "Manufacturer"
},
{
"Description": "Name of hardware or firmware component",
"Type": "String",
"Entity": null,
"Name": "ComponentName"
},
{
"Description": "Component family or class, a grouping of components that have similar features or characteristics as determined by the manufacturer",
"Type": "String",
"Entity": null,
"Name": "ComponentFamily"
},
{
"Description": "Component version (e.g., BIOS version)",
"Type": "String",
"Entity": null,
"Name": "ComponentVersion"
},
{
"Description": "Additional information about the entity or event",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
}
],
"TableSection": "Tvm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "DeviceTvmHardwareFirmware"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Cloud enviorment source of the cloud audit event. Cloud be Azure, AWS, GCP, AliCloud or other",
"Type": "String",
"Entity": null,
"Name": "AuditSource"
},
{
"Description": "Data source of the cloud audit event. Could be Azure ARM Logs, AWS CloudTrail, GCP Logging or other",
"Type": "String",
"Entity": null,
"Name": "DataSource"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Audit event operation name as appeared in the raw event schema. Usually includes both resource type and operation",
"Type": "String",
"Entity": null,
"Name": "OperationName"
},
{
"Description": "An identifier for the Azure cloud resource as found by Microsoft Defender for Cloud.",
"Type": "String",
"Entity": null,
"Name": "AzureResourceId"
},
{
"Description": "An identifier for the Aws cloud resource as found by Microsoft Defender for Cloud.",
"Type": "String",
"Entity": null,
"Name": "AwsResourceName"
},
{
"Description": "An identifier for the Google cloud resource as found by Microsoft Defender for Cloud.",
"Type": "String",
"Entity": null,
"Name": "GcpFullResourceName"
},
{
"Description": "An identifier for the account as found by Microsoft Defender for Cloud. Could be Microsoft Entra ID, user principal name, IaM role or other identifiers",
"Type": "String",
"Entity": null,
"Name": "Account"
},
{
"Description": "The client IP address used to access the cloud resource or control plane",
"Type": "String",
"Entity": "Ip",
"Name": "IPAddress"
},
{
"Description": "Indicates whether the IP address belongs to a known anonymous proxy",
"Type": "Boolean",
"Entity": null,
"Name": "IsAnonymousProxy"
},
{
"Description": "Two-letter code indicating the country where the client IP address is geolocated",
"Type": "String",
"Entity": null,
"Name": "CountryCode"
},
{
"Description": "City where the client IP address is geolocated",
"Type": "String",
"Entity": null,
"Name": "City"
},
{
"Description": "Internet service provider associated with the IP address",
"Type": "String",
"Entity": null,
"Name": "ISP"
},
{
"Description": "User agent information from the web browser or other client application",
"Type": "String",
"Entity": null,
"Name": "UserAgent"
},
{
"Description": "Raw event information from the source application or service in JSON format",
"Type": "Object",
"Entity": null,
"Name": "RawEventData"
},
{
"Description": "Additional information about the entity or event",
"Type": "Object",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
}
],
"TableSection": "Cloud",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "CloudAuditEvents"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier of the Azure resource associated with the process",
"Type": "String",
"Entity": null,
"Name": "AzureResourceId"
},
{
"Description": "Unique identifier specific to Amazon Web Services devices, containing the Amazon resource name",
"Type": "String",
"Entity": null,
"Name": "AwsResourceName"
},
{
"Description": "Unique identifier specific to Google Cloud Platform devices, containing a combination of zone and ID for GCP",
"Type": "String",
"Entity": null,
"Name": "GcpFullResourceName"
},
{
"Description": "The container image name or ID, if it exists",
"Type": "String",
"Entity": null,
"Name": "ContainerImageName"
},
{
"Description": "The Kubernetes namespace name",
"Type": "String",
"Entity": null,
"Name": "KubernetesNamespace"
},
{
"Description": "The Kubernetes pod name",
"Type": "String",
"Entity": null,
"Name": "KubernetesPodName"
},
{
"Description": "Unique identifier for the Kubernetes resource that includes the namespace, resource type and name",
"Type": "String",
"Entity": null,
"Name": "KubernetesResource"
},
{
"Description": "Name of the container in Kubernetes or another runtime environment",
"Type": "String",
"Entity": null,
"Name": "ContainerName"
},
{
"Description": "The container identifier in Kubernetes or another runtime environment",
"Type": "String",
"Entity": null,
"Name": "ContainerId"
},
{
"Description": "Type of activity that triggered the event",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Name of the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FileName"
},
{
"Description": "Folder containing the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FolderPath"
},
{
"Description": "Process ID (PID) of the newly created process",
"Type": "Int64",
"Entity": null,
"Name": "ProcessId"
},
{
"Description": "The name of the process",
"Type": "String",
"Entity": null,
"Name": "ProcessName"
},
{
"Description": "The name of the parent process",
"Type": "String",
"Entity": null,
"Name": "ParentProcessName"
},
{
"Description": "The process ID (PID) of the parent process",
"Type": "Int64",
"Entity": null,
"Name": "ParentProcessId"
},
{
"Description": "Command line used to create the new process",
"Type": "String",
"Entity": null,
"Name": "ProcessCommandLine"
},
{
"Description": "Date and time the process was created",
"Type": "DateTime",
"Entity": null,
"Name": "ProcessCreationTime"
},
{
"Description": "Current working directory of the running process",
"Type": "String",
"Entity": null,
"Name": "ProcessCurrentWorkingDirectory"
},
{
"Description": "User name of the account",
"Type": "String",
"Entity": null,
"Name": "AccountName"
},
{
"Description": "Identifier for a logon session. This identifier is unique on the same machine only between restarts",
"Type": "Int64",
"Entity": null,
"Name": "LogonId"
},
{
"Description": "Process ID (PID) of the process that initiated the event",
"Type": "Int64",
"Entity": null,
"Name": "InitiatingProcessId"
},
{
"Description": "Additional information about the entity or event",
"Type": "Object",
"Entity": null,
"Name": "AdditionalFields"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
}
],
"TableSection": "Cloud",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "CloudProcessEvents"
},
{
"Schema": [
{
"Description": "Unique node identifier",
"Type": "String",
"Entity": null,
"Name": "NodeId"
},
{
"Description": "Label of node",
"Type": "String",
"Entity": null,
"Name": "NodeLabel"
},
{
"Description": "Node display name",
"Type": "String",
"Entity": null,
"Name": "NodeName"
},
{
"Description": "Categories of the node",
"Type": "Object",
"Entity": null,
"Name": "Categories"
},
{
"Description": "Properties of the node, including insights related to the resource, such as whether the resource is exposed to the internet, or vulnerable to remote code execution",
"Type": "Object",
"Entity": null,
"Name": "NodeProperties"
},
{
"Description": "All known node identifiers",
"Type": "Object",
"Entity": null,
"Name": "EntityIds"
}
],
"TableSection": "Xspm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "ExposureGraphNodes"
},
{
"Schema": [
{
"Description": "Unique edge id Unique identifier for the relationship/edge",
"Type": "String",
"Entity": null,
"Name": "EdgeId"
},
{
"Description": "Label of edge",
"Type": "String",
"Entity": null,
"Name": "EdgeLabel"
},
{
"Description": "Node ID of the edge's source",
"Type": "String",
"Entity": null,
"Name": "SourceNodeId"
},
{
"Description": "Display name of source node",
"Type": "String",
"Entity": null,
"Name": "SourceNodeName"
},
{
"Description": "Label of the edge source node",
"Type": "String",
"Entity": null,
"Name": "SourceNodeLabel"
},
{
"Description": "Categories of the source node",
"Type": "Object",
"Entity": null,
"Name": "SourceNodeCategories"
},
{
"Description": "Node ID of the edge's target",
"Type": "String",
"Entity": null,
"Name": "TargetNodeId"
},
{
"Description": "Display name of target node",
"Type": "String",
"Entity": null,
"Name": "TargetNodeName"
},
{
"Description": "Label of the edge target node",
"Type": "String",
"Entity": null,
"Name": "TargetNodeLabel"
},
{
"Description": "Categories of the target node",
"Type": "Object",
"Entity": null,
"Name": "TargetNodeCategories"
},
{
"Description": "Optional data relevant for the relationship between the nodes",
"Type": "Object",
"Entity": null,
"Name": "EdgeProperties"
}
],
"TableSection": "Xspm",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "ExposureGraphEdges"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Application that performed the recorded action",
"Type": "String",
"Entity": null,
"Name": "Application"
},
{
"Description": "Unique identifier for the application ",
"Type": "String",
"Entity": null,
"Name": "ApplicationId"
},
{
"Description": "Indicates whether the sign-in was initiated by a managed identity",
"Type": "Boolean",
"Entity": null,
"Name": "IsManagedIdentity"
},
{
"Description": "Contains the error code if a sign-in error occurs. To find a description of a specific error code, visit https://aka.ms/AADsigninsErrorCodes",
"Type": "Int32",
"Entity": null,
"Name": "ErrorCode"
},
{
"Description": "Unique identifier of the sign-in event",
"Type": "String",
"Entity": null,
"Name": "CorrelationId"
},
{
"Description": "Name of the service principal that initiated the sign-in",
"Type": "String",
"Entity": null,
"Name": "ServicePrincipalName"
},
{
"Description": "Unique identifier of the service principal that initiated the sign-in",
"Type": "String",
"Entity": null,
"Name": "ServicePrincipalId"
},
{
"Description": "Display name of the resource accessed. The display name can contain any character.",
"Type": "String",
"Entity": null,
"Name": "ResourceDisplayName"
},
{
"Description": "Unique identifier of the resource accessed",
"Type": "String",
"Entity": null,
"Name": "ResourceId"
},
{
"Description": "Unique identifier of the tenant of the resource accessed",
"Type": "String",
"Entity": null,
"Name": "ResourceTenantId"
},
{
"Description": "IP address assigned to the device during communication",
"Type": "String",
"Entity": "Ip",
"Name": "IPAddress"
},
{
"Description": "Country/Region where the account user is located",
"Type": "String",
"Entity": null,
"Name": "Country"
},
{
"Description": "State where the sign-in occurred, if available",
"Type": "String",
"Entity": null,
"Name": "State"
},
{
"Description": "City where the client IP address is geolocated",
"Type": "String",
"Entity": null,
"Name": "City"
},
{
"Description": "The north to south coordinates of the sign-in location",
"Type": "String",
"Entity": null,
"Name": "Latitude"
},
{
"Description": "The east to west coordinates of the sign-in location",
"Type": "String",
"Entity": null,
"Name": "Longitude"
},
{
"Description": "Unique identifier of the request",
"Type": "String",
"Entity": null,
"Name": "RequestId"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
}
],
"TableSection": "Itp",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "AADSpnSignInEventsBeta"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Application that performed the recorded action",
"Type": "String",
"Entity": null,
"Name": "Application"
},
{
"Description": "Unique identifier for the application ",
"Type": "String",
"Entity": null,
"Name": "ApplicationId"
},
{
"Description": "Type of logon session, specifically interactive, remote interactive (RDP), network, batch, and service",
"Type": "String",
"Entity": null,
"Name": "LogonType"
},
{
"Description": "Information about the Microsoft Entra ID endpoint that the request was sent to and the type of request sent during sign in",
"Type": "String",
"Entity": null,
"Name": "EndpointCall"
},
{
"Description": "Contains the error code if a sign-in error occurs. To find a description of a specific error code, visit https://aka.ms/AADsigninsErrorCodes",
"Type": "Int32",
"Entity": null,
"Name": "ErrorCode"
},
{
"Description": "Unique identifier of the sign-in event",
"Type": "String",
"Entity": null,
"Name": "CorrelationId"
},
{
"Description": "Unique number assigned to a user by a website's server for the duration of the visit or session",
"Type": "String",
"Entity": null,
"Name": "SessionId"
},
{
"Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
"Type": "String",
"Entity": null,
"Name": "AccountDisplayName"
},
{
"Description": "Unique identifier for the account in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "AccountObjectId"
},
{
"Description": "User principal name (UPN) of the account",
"Type": "String",
"Entity": null,
"Name": "AccountUpn"
},
{
"Description": "Indicates whether a user inside the network does not belong to the organization’s domain",
"Type": "Boolean",
"Entity": null,
"Name": "IsExternalUser"
},
{
"Description": "Indicates whether the user that signed in is a guest in the tenant",
"Type": "Boolean",
"Entity": null,
"Name": "IsGuestUser"
},
{
"Description": "On-premises user principal name (UPN) of the user signing in to Microsoft Entra ID",
"Type": "String",
"Entity": null,
"Name": "AlternateSignInName"
},
{
"Description": "Date and time when the user that signed in last changed their password",
"Type": "DateTime",
"Entity": null,
"Name": "LastPasswordChangeTimestamp"
},
{
"Description": "Display name of the resource accessed. The display name can contain any character.",
"Type": "String",
"Entity": null,
"Name": "ResourceDisplayName"
},
{
"Description": "Unique identifier of the resource accessed",
"Type": "String",
"Entity": null,
"Name": "ResourceId"
},
{
"Description": "Unique identifier of the tenant of the resource accessed",
"Type": "String",
"Entity": null,
"Name": "ResourceTenantId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "Unique identifier for the device in Microsoft Entra ID",
"Type": "String",
"Entity": null,
"Name": "AadDeviceId"
},
{
"Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
"Type": "String",
"Entity": null,
"Name": "OSPlatform"
},
{
"Description": "Indicates the trust type of the device that signed in. For managed device scenarios only. Possible values are Workplace, AzureAd, and ServerAd.",
"Type": "String",
"Entity": null,
"Name": "DeviceTrustType"
},
{
"Description": "Indicates whether the endpoint has been onboarded to and is managed by Microsoft Defender for Endpoint",
"Type": "Boolean",
"Entity": null,
"Name": "IsManaged"
},
{
"Description": "Indicates whether the device that initiated the event is compliant or not",
"Type": "Boolean",
"Entity": null,
"Name": "IsCompliant"
},
{
"Description": "Details about the authentication processor",
"Type": "String",
"Entity": null,
"Name": "AuthenticationProcessingDetails"
},
{
"Description": "Type of authentication required for the sign-in. Possible values: multiFactorAuthentication (MFA was required) and singleFactorAuthentication (no MFA was required).",
"Type": "String",
"Entity": null,
"Name": "AuthenticationRequirement"
},
{
"Description": "Indicates if the token issuer is Microsoft Entra ID (0) or Active Directory Federation Services (1)",
"Type": "String",
"Entity": null,
"Name": "TokenIssuerType"
},
{
"Description": "Aggregated risk level during sign-in. Possible values: 0 (aggregated risk level not set), 1 (none), 10 (low), 50 (medium), or 100 (high).",
"Type": "Int32",
"Entity": null,
"Name": "RiskLevelAggregated"
},
{
"Description": "User risk level at sign-in",
"Type": "Int32",
"Entity": null,
"Name": "RiskLevelDuringSignIn"
},
{
"Description": "Array of risk event types applicable to the event",
"Type": "String",
"Entity": null,
"Name": "RiskEventTypes"
},
{
"Description": "Indicates risky user state. Possible values: 0 (none), 1 (confirmed safe), 2 (remediated), 3 (dismissed), 4 (at risk), or 5 (confirmed compromised).",
"Type": "Int32",
"Entity": null,
"Name": "RiskState"
},
{
"Description": "User agent information from the web browser or other client application",
"Type": "String",
"Entity": null,
"Name": "UserAgent"
},
{
"Description": "Indicates the client app used",
"Type": "String",
"Entity": null,
"Name": "ClientAppUsed"
},
{
"Description": "Details about the version of the browser used to sign in",
"Type": "String",
"Entity": null,
"Name": "Browser"
},
{
"Description": "Details of the conditional access policies applied to the sign-in event",
"Type": "String",
"Entity": null,
"Name": "ConditionalAccessPolicies"
},
{
"Description": "Status of the conditional access policies applied to the sign-in. Possible values are 0 (policies applied), 1 (attempt to apply policies failed), or 2 (policies not applied).",
"Type": "Int32",
"Entity": null,
"Name": "ConditionalAccessStatus"
},
{
"Description": "IP address assigned to the device during communication",
"Type": "String",
"Entity": "Ip",
"Name": "IPAddress"
},
{
"Description": "Country/Region where the account user is located",
"Type": "String",
"Entity": null,
"Name": "Country"
},
{
"Description": "State where the sign-in occurred, if available",
"Type": "String",
"Entity": null,
"Name": "State"
},
{
"Description": "City where the client IP address is geolocated",
"Type": "String",
"Entity": null,
"Name": "City"
},
{
"Description": "The north to south coordinates of the sign-in location",
"Type": "String",
"Entity": null,
"Name": "Latitude"
},
{
"Description": "The east to west coordinates of the sign-in location",
"Type": "String",
"Entity": null,
"Name": "Longitude"
},
{
"Description": "Network location details of the authentication processor of the sign-in event",
"Type": "String",
"Entity": null,
"Name": "NetworkLocationDetails"
},
{
"Description": "Unique identifier of the request",
"Type": "String",
"Entity": null,
"Name": "RequestId"
},
{
"Description": "Unique identifier for the event",
"Type": "String",
"Entity": null,
"Name": "ReportId"
}
],
"TableSection": "Itp",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "AADSignInEventsBeta"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the behavior",
"Type": "String",
"Entity": null,
"Name": "BehaviorId"
},
{
"Description": "Type of behavior",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Description of behavior",
"Type": "String",
"Entity": null,
"Name": "Description"
},
{
"Description": "Type of threat indicator or breach activity identified by the behavior",
"Type": "String",
"Entity": null,
"Name": "Categories"
},
{
"Description": "MITRE ATT&CK techniques associated with the activity that triggered the behavior",
"Type": "String",
"Entity": null,
"Name": "AttackTechniques"
},
{
"Description": "Product or service that identified the behavior",
"Type": "String",
"Entity": null,
"Name": "ServiceSource"
},
{
"Description": "Detection technology or sensor that identified the notable component or activity",
"Type": "String",
"Entity": null,
"Name": "DetectionSource"
},
{
"Description": "Products or services that provided information for the behavior",
"Type": "String",
"Entity": null,
"Name": "DataSources"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "User principal name (UPN) of the account",
"Type": "String",
"Entity": null,
"Name": "AccountUpn"
},
{
"Description": "Unique identifier for the account in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "AccountObjectId"
},
{
"Description": "Date and time of the first activity related to the behavior",
"Type": "DateTime",
"Entity": null,
"Name": "StartTime"
},
{
"Description": "Date and time of the last activity related to the behavior",
"Type": "DateTime",
"Entity": null,
"Name": "EndTime"
},
{
"Description": "Additional information about the behavior",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
}
],
"TableSection": "AlertsAndObservations",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "BehaviorInfo"
},
{
"Schema": [
{
"Description": "Date and time when the record was generated",
"Type": "DateTime",
"Entity": null,
"Name": "Timestamp"
},
{
"Description": "Unique identifier for the behavior",
"Type": "String",
"Entity": null,
"Name": "BehaviorId"
},
{
"Description": "Type of behavior",
"Type": "String",
"Entity": null,
"Name": "ActionType"
},
{
"Description": "Type of threat indicator or breach activity identified by the behavior",
"Type": "String",
"Entity": null,
"Name": "Categories"
},
{
"Description": "Product or service that identified the behavior",
"Type": "String",
"Entity": null,
"Name": "ServiceSource"
},
{
"Description": "Detection technology or sensor that identified the notable component or activity",
"Type": "String",
"Entity": null,
"Name": "DetectionSource"
},
{
"Description": "Products or services that provided information for the behavior",
"Type": "String",
"Entity": null,
"Name": "DataSources"
},
{
"Description": "Type of object, such as a file, a process, a device, or a user",
"Type": "String",
"Entity": null,
"Name": "EntityType"
},
{
"Description": "Indicates whether the entity is impacted or merely related",
"Type": "String",
"Entity": null,
"Name": "EntityRole"
},
{
"Description": "The role of the entity in the behavior",
"Type": "String",
"Entity": null,
"Name": "DetailedEntityRole"
},
{
"Description": "Name of the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FileName"
},
{
"Description": "Folder containing the file that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "FolderPath"
},
{
"Description": "SHA-1 hash of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA1"
},
{
"Description": "SHA-256 of the file that the recorded action was applied to",
"Type": "String",
"Entity": "File",
"Name": "SHA256"
},
{
"Description": "Size of the file in bytes",
"Type": "Int64",
"Entity": null,
"Name": "FileSize"
},
{
"Description": "Malware family that the suspicious or malicious file or process has been classified under",
"Type": "String",
"Entity": null,
"Name": "ThreatFamily"
},
{
"Description": "IP address that was being connected to",
"Type": "String",
"Entity": "Ip",
"Name": "RemoteIP"
},
{
"Description": "URL or fully qualified domain name (FQDN) that was being connected to",
"Type": "String",
"Entity": "Url",
"Name": "RemoteUrl"
},
{
"Description": "User name of the account",
"Type": "String",
"Entity": null,
"Name": "AccountName"
},
{
"Description": "Domain of the account",
"Type": "String",
"Entity": null,
"Name": "AccountDomain"
},
{
"Description": "Security Identifier (SID) of the account",
"Type": "String",
"Entity": "UserSid",
"Name": "AccountSid"
},
{
"Description": "Unique identifier for the account in Microsoft Entra ID",
"Type": "String",
"Entity": "UserObjectId",
"Name": "AccountObjectId"
},
{
"Description": "User principal name (UPN) of the account",
"Type": "String",
"Entity": null,
"Name": "AccountUpn"
},
{
"Description": "Unique identifier for the device in the service",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceId"
},
{
"Description": "Fully qualified domain name (FQDN) of the device",
"Type": "String",
"Entity": "Machine",
"Name": "DeviceName"
},
{
"Description": "IP address assigned to the local machine used during communication",
"Type": "String",
"Entity": "Ip",
"Name": "LocalIP"
},
{
"Description": "Unique identifier for the email, generated by Office 365",
"Type": "String",
"Entity": null,
"Name": "NetworkMessageId"
},
{
"Description": "Subject of the email",
"Type": "String",
"Entity": null,
"Name": "EmailSubject"
},
{
"Description": "Identifier for the group of similar emails clustered based on heuristic analysis of their contents",
"Type": "String",
"Entity": null,
"Name": "EmailClusterId"
},
{
"Description": "Application that performed the recorded action",
"Type": "String",
"Entity": null,
"Name": "Application"
},
{
"Description": "Unique identifier for the application ",
"Type": "Int32",
"Entity": null,
"Name": "ApplicationId"
},
{
"Description": "Unique identifier of the third-party OAuth application",
"Type": "String",
"Entity": null,
"Name": "OAuthApplicationId"
},
{
"Description": "Command line used to create the new process",
"Type": "String",
"Entity": null,
"Name": "ProcessCommandLine"
},
{
"Description": "Registry key that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryKey"
},
{
"Description": "Name of the registry value that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryValueName"
},
{
"Description": "Data of the registry value that the recorded action was applied to",
"Type": "String",
"Entity": null,
"Name": "RegistryValueData"
},
{
"Description": "Additional information about the behavior",
"Type": "String",
"Entity": null,
"Name": "AdditionalFields"
}
],
"TableSection": "AlertsAndObservations",
"TableRetention": {
"HotDays": 30,
"ColdDays": 0,
"TotalInteractiveDays": 30
},
"TableType": "Regular",
"UsxResourceType": "Defender",
"Tags": null,
"HasData": true,
"Name": "BehaviorEntities"
}
],
"Functions": null
}
@alwashali
Copy link
Author

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment