Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
maxLevel2
typeflat

Introduction

The tags beginning with edr.microsoft_defenderidentify events generated by the Microsoft Defender for Endpoint.

...

Tag structure

The full tag must have 4 levels. The first three are fixed asedr.microsoft_defender. The fourth level identifies the type of events sent.

...

Technology

...

Brand

...

Type

...

Subtype

...

edr

...

microsoft_defender

...

endpoint

...

software

...

vulnerabilities

...

alerts

Product / Service

Tags

Data tables

Microsoft Defender Endpoint

edr.microsoft_defender.advanced_hunting.device_process_events

edr.microsoft_defender.advanced_hunting.device_process_events

edr.microsoft_defender.alerts.events

edr.microsoft_defender.alerts.events

edr.microsoft_defender.endpoint.alerts

edr.microsoft_defender.endpoint.alerts

edr.microsoft_defender.endpoint.assesment_secure_configuration

edr.microsoft_defender.endpoint.assesment_secure_configuration

edr.microsoft_defender.endpoint.assesment_software_inventory

edr.microsoft_defender.endpoint.assesment_software_inventory

edr.microsoft_defender.endpoint.assesment_software_vulnerabilities

edr.microsoft_defender.endpoint.assesment_software_

inventory
  • investigations

  • assesment_secure_configuration

  • machines

  • recommendations

  • These are the valid tags and corresponding data tables that will receive the parsers' data:

    Tag

    Data table

    vulnerabilities

    edr.microsoft_defender.endpoint.investigations

    edr.microsoft_defender.endpoint.investigations

    edr.microsoft_defender.endpoint.machines

    edr.microsoft_defender.endpoint.machines

    edr.microsoft_defender.endpoint.recommendations

    edr.microsoft_defender.endpoint.recommendations

    edr.microsoft_defender.endpoint.software

    edr.microsoft_defender.endpoint.software

    edr.microsoft_defender.endpoint.vulnerabilities

    edr.microsoft_defender.endpoint.vulnerabilities

    Microsoft Defender for IoT

    edr.microsoft_defender.iot_security.alert

    edr.microsoft_defender.iot_security.alert

    Table structure

    These are the fields displayed in the tables:

    Rw ui tabs macro
    Rw tab
    titleTable 1-6

    ...

    ...

    Anchor
    edr.microsoft_defender.advanced_hunting.device_process_events
    edr.microsoft_defender.advanced_hunting.device_process_events
    edr.microsoft_defender.advanced_hunting.device_process_events

    Field

    Type

    Extra fields

    eventdate

    timestamp

    hostname

    str

    Timestamp

    timestamp

    DeviceId

    str

    DeviceName

    str

    ActionType

    str

    FileName

    str

    FolderPath

    str

    SHA1

    str

    SHA256

    str

    MD5

    str

    FileSize

    int4

    ProcessVersionInfoCompanyName

    str

    ProcessVersionInfoProductName

    str

    ProcessVersionInfoProductVersion

    str

    ProcessVersionInfoInternalFileName

    str

    ProcessVersionInfoOriginalFileName

    str

    ProcessVersionInfoFileDescription

    str

    ProcessId

    int4

    ProcessCommandLine

    str

    ProcessIntegrityLevel

    str

    ProcessTokenElevation

    str

    ProcessCreationTime

    str

    AccountDomain

    str

    AccountName

    str

    AccountSid

    str

    AccountUpn

    str

    AccountObjectId

    str

    LogonId

    int4

    InitiatingProcessAccountDomain

    str

    InitiatingProcessAccountName

    str

    InitiatingProcessAccountSid

    str

    InitiatingProcessAccountUpn

    str

    InitiatingProcessAccountObjectId

    str

    InitiatingProcessLogonId

    int4

    InitiatingProcessIntegrityLevel

    str

    InitiatingProcessTokenElevation

    str

    InitiatingProcessSHA1

    str

    InitiatingProcessSHA256

    str

    InitiatingProcessMD5

    str

    InitiatingProcessFileName

    str

    InitiatingProcessFileSize

    int4

    InitiatingProcessVersionInfoCompanyName

    str

    InitiatingProcessVersionInfoProductName

    str

    InitiatingProcessVersionInfoProductVersion

    str

    InitiatingProcessVersionInfoInternalFileName

    str

    InitiatingProcessVersionInfoOriginalFileName

    str

    InitiatingProcessVersionInfoFileDescription

    str

    InitiatingProcessId

    int4

    InitiatingProcessCommandLine

    str

    InitiatingProcessCreationTime

    str

    InitiatingProcessFolderPath

    str

    InitiatingProcessParentId

    int4

    InitiatingProcessParentFileName

    str

    InitiatingProcessParentCreationTime

    timestamp

    InitiatingProcessSignerType

    str

    InitiatingProcessSignatureStatus

    str

    ReportId

    int4

    AppGuardContainerId

    str

    AdditionalFields

    str

    hostchain

    str

    tag

    str

    rawMessage

    str

    Anchor
    edr.microsoft_defender.alerts.events
    edr.microsoft_defender.alerts.events
    edr.microsoft_defender.

    ...

    alerts.events

    Field

    Type

    Field transformation

    Source field name

    Extra fields

    eventdate

    timestamp

     

     

    hostname

    str

     

     

    id

    str

     

     

    incidentId

    int8

     

     

    investigationId

    int8

     

     

    assignedTo

    str

     

     

    severity

    str

     

     

    status

    str

     

     

    classification

    str

     

     

    determination

    str

     

     

    investigationState

    str

     

     

    detectionSource

    str

     

     

    detectorId

    str

     

     

    category

    str

     

     

    threatFamilyName

    str

     

     

    title

    str

     

     

    description

    str

     

     

    alertCreationTime

    str

     

     

    firstEventTime

    str

     

     

    lastEventTime

    str

     

     

    lastUpdateTime

    str

     

     

    resolvedTime

    str

     

     

    machineId

    str

     

     

    computerDnsName

    str

     

     

    rbacGroupName

    str

     

     

    aadTenantId

    str

     

     

    threatName

    str

     

     

    mitreTechniques_str

    str

    Code Block
    join(mitreTechniques, ',')

    mitreTechniques

    relatedUser__userName

    str

     

     

    relatedUser__domainName

    str

     

     

    comments__comment_str

    str

    Code Block
    join(comments__comment, ',')

    comments__comment

    comments__createdBy_str

    str

    Code Block
    join(comments__createdBy, ',')

    comments__createdBy

    comments__createdTime_str

    str

    Code Block
    join(comments__createdTime, ',')

    comments__createdTime

    evidence__entityType_str

    str

    Code Block
    join(evidence__entityType, ',')

    evidence__entityType

    evidence__evidenceCreationTime_str

    str

    Code Block
    join(evidence__evidenceCreationTime, ',')

    evidence__evidenceCreationTime

    evidence__sha1_str

    str

    Code Block
    join(evidence__sha1, ',')

    evidence__sha1

    evidence__sha256_str

    str

    Code Block
    join(evidence__sha256, ',')

    evidence__sha256

    evidence__fileName_str

    str

    Code Block
    join(evidence__fileName, ',')

    evidence__fileName

    evidence__filePath_str

    str

    Code Block
    join(evidence__filePath, ',')

    evidence__filePath

    evidence__processId_str

    str

    Code Block
    replace(replace(stringify(json(evidence__processId)), "[", ""), "]", "")

    evidence__processId

    evidence__processCommandLine_str

    str

    Code Block
    join(evidence__processCommandLine, ',')

    evidence__processCommandLine

    evidence__processCreationTime_str

    str

    Code Block
    join(evidence__processCreationTime, ',')

    evidence__processCreationTime

    evidence__parentProcessId_str

    str

    Code Block
    replace(replace(stringify(json(evidence__parentProcessId)), "[", ""), "]", "")

    evidence__parentProcessId

    evidence__parentProcessCreationTime_str

    str

    Code Block
    join(evidence__parentProcessCreationTime, ',')

    evidence__parentProcessCreationTime

    evidence__parentProcessFileName_str

    str

    Code Block
    join(evidence__parentProcessFileName, ',')

    evidence__parentProcessFileName

    evidence__parentProcessFilePath_str

    str

    Code Block
    join(evidence__parentProcessFilePath, ',')

    evidence__parentProcessFilePath

    evidence__ipAddress_str

    str

    Code Block
    join(evidence__ipAddress, ',')

    evidence__ipAddress

    evidence__url_str

    str

    Code Block
    join(evidence__url, ',')

    evidence__url

    evidence__registryKey_str

    str

    Code Block
    join(evidence__registryKey, ',')

    evidence__registryKey

    evidence__registryHive_str

    str

    Code Block
    join(evidence__registryHive, ',')

    evidence__registryHive

    evidence__registryValueType_str

    str

    Code Block
    join(evidence__registryValueType, ',')

    evidence__registryValueType

    evidence__registryValue_str

    str

    Code Block
    join(evidence__registryValue, ',')

    evidence__registryValue

    evidence__accountName_str

    str

    Code Block
    join(evidence__accountName, ',')

    evidence__accountName

    evidence__domainName_str

    str

    Code Block
    join(evidence__domainName, ',')

    evidence__domainName

    evidence__userSid_str

    str

    Code Block
    join(evidence__userSid, ',')

    evidence__userSid

    evidence__aadUserId_str

    str

    Code Block
    join(evidence__aadUserId, ',')

    evidence__aadUserId

    evidence__userPrincipalName_str

    str

    Code Block
    join(evidence__userPrincipalName, ',')

    evidence__userPrincipalName

    evidence__detectionStatus_str

    str

    Code Block
    join(evidence__detectionStatus, ',')

    evidence__detectionStatus

    hostchain

    str

     

     

    tag

    str

     

     

    rawMessage

    str

     

     

    Anchor
    edr.microsoft_defender.endpoint.

    ...

    alerts
    edr.microsoft_defender.endpoint.alerts
    edr.microsoft_defender.endpoint.alerts

    Field

    Type

    Extra fields

    eventdate

    timestamp

    hostname

    str

    at_odata_context

    str

    id

    str

    incidentId

    str

    investigationId

    str

    assignedTo

    str

    severity

    str

    status

    str

    classification

    str

    determination

    str

    investigationState

    str

    detectionSource

    str

    detectorId

    str

    category

    str

    threatFamilyName

    str

    title

    str

    description

    str

    alertCreationTime

    timestamp

    firstEventTime

    timestamp

    lastEventTime

    timestamp

    lastUpdateTime

    timestamp

    resolvedTime

    timestamp

    machineId

    str

    computerDnsName

    str

    rbacGroupName

    str

    aadTenantId

    str

    threatName

    str

    mitreTechniques

    str

    loggedOnUsers

    str

    comments

    str

    domains

    str

    at_devo_pulling_id

    str

    related_files

    int4

    related_ips

    int4

    related_machines

    int4

    related_domains

    int4

    related_users

    int4

    relatedUser_userName

    str

    relatedUser_domainName

    str

    related_evidences

    int4

    related_loggedOnUsers

    int4

    raw_evidences

    str

    evidence_entityType

    str

    evidence_evidenceCreationTime

    timestamp

    evidence_sha1

    str

    evidence_sha256

    str

    evidence_fileName

    str

    evidence_filePath

    str

    evidence_processId

    str

    evidence_processCommandLine

    str

    evidence_processCreationTime

    timestamp

    evidence_parentProcessId

    str

    evidence_parentProcessCreationTime

    timestamp

    evidence_parentProcessFileName

    str

    evidence_parentProcessFilePath

    str

    evidence_ipAddress

    str

    evidence_url

    str

    evidence_registryKey

    str

    evidence_registryHive

    str

    evidence_registryValueType

    str

    evidence_registryValue

    str

    evidence_registryValueName

    str

    evidence_accountName

    str

    evidence_domainName

    str

    evidence_userSid

    str

    evidence_aadUserId

    str

    evidence_userPrincipalName

    str

    evidence_detectionStatus

    str

    hostchain

    str

    tag

    str

    rawMessage

    str

    Anchor
    edr.microsoft_defender.endpoint

    ...

    .assessment_secure_configuration
    edr.microsoft_defender.endpoint.assessment_secure_configuration
    edr.microsoft_defender.endpoint.assessment

    ...

    _secure_configuration

    Field

    Type

    Extra fields

    eventdate

    timestamp

    hostname

    str

    at_devo_pulling_id

    str

    DeviceId

    str

    DeviceName

    str

    OSPlatform

    str

    OSVersion

    str

    Timestamp

    timestamp

    ConfigurationId

    str

    ConfigurationCategory

    str

    ConfigurationSubcategory

    str

    ConfigurationImpact

    int4

    IsApplicable

    bool

    ConfigurationName

    str

    RecommendationReference

    str

    RbacGroupId

    int4

    RbacGroupName

    str

    IsCompliant

    bool

    hostchain

    str

    tag

    str

    rawMessage

    str

    Anchor
    edr.microsoft_defender.endpoint.assessment_software

    ...

    _inventory
    edr.microsoft_defender.endpoint.assessment_software_inventory
    edr.microsoft_defender.endpoint.assessment_software_inventory

    Field

    Type

    Extra fields

    eventdate

    timestamp

    hostname

    str

    at_devo_pulling_id

    str

    DeviceId

    str

    DeviceName

    str

    OSPlatform

    str

    SoftwareVendor

    str

    SoftwareName

    str

    SoftwareVersion

    str

    NumberOfWeaknesses

    int4

    DiskPaths

    str

    RegistryPaths_str

    str

    SoftwareFirstSeenTimestamp

    timestamp

    SoftwareLastSeenTimestamp

    timestamp

    EndOfSupportStatus

    str

    EndOfSupportDate

    str

    RbacGroupId

    int4

    RbacGroupName

    str

    hostchain

    str

    tag

    str

    rawMessage

    str

    Rw tab
    titleTables 7-12

    ...

    Anchor
    edr.microsoft_defender.endpoint.investigations
    edr.microsoft_defender.endpoint.investigations
    edr.microsoft_defender.endpoint.investigations

    Field

    Type

    Extra fields

    eventdate

    timestamp

    hostname

    str

    at_devo_pulling_id

    str

    id

    str

    startTime

    timestamp

    endTime

    timestamp

    state

    str

    cancelledBy

    str

    statusDetails

    str

    machineId

    str

    computerDnsName

    str

    triggeringAlertId

    str

    hostchain

    str

    tag

    str

    rawMessage

    str

    Anchor
    edr.microsoft_defender.endpoint.machines
    edr.microsoft_defender.endpoint.machines
    edr.microsoft_defender.endpoint.machines

    Field

    Type

    Extra fields

    eventdate

    timestamp

    hostname

    str

    id

    str

    computerDnsName

    str

    firstSeen

    timestamp

    lastSeen

    timestamp

    osPlatform

    str

    osVersion

    str

    osProcessor

    str

    version

    str

    lastIpAddress

    ip4

    lastExternalIpAddress

    ip4

    agentVersion

    str

    osBuild

    int4

    healthStatus

    str

    deviceValue

    str

    rbacGroupId

    int4

    rbacGroupName

    str

    riskScore

    str

    exposureLevel

    str

    isAadJoined

    bool

    aadDeviceId

    str

    machineTags

    str

    defenderAvStatus

    str

    onboardingStatus

    str

    osArchitecture

    str

    managedBy

    str

    managedByStatus

    str

    ipAddresses

    str

    vmMetadata

    str

    at_devo_pulling_id

    str

    related_logon_users

    int4

    related_alerts

    int4

    related_vulnerabilities

    int4

    related_recommendations

    int4

    hostchain

    str

    tag

    str

    rawMessage

    str

    Anchor
    edr.microsoft_defender.endpoint.

    ...

    recommendations
    edr.microsoft_defender.endpoint.recommendations
    edr.microsoft_defender.endpoint.

    ...

    recommendations

    Field

    Type

    Extra fields

    eventdate

    timestamp

    hostname

    str

    id

    str

    productName

    str

    recommendationName

    str

    weaknesses

    int4

    vendor

    str

    recommendedVersion

    str

    recommendedVendor

    str

    recommendedProgram

    str

    recommendationCategory

    str

    subCategory

    str

    severityScore

    float8

    publicExploit

    bool

    activeAlert

    bool

    associatedThreats

    str

    remediationType

    str

    status

    str

    configScoreImpact

    float8

    exposureImpact

    float8

    totalMachineCount

    int4

    exposedMachinesCount

    int4

    nonProductivityImpactedAssets

    int4

    relatedComponent

    str

    hasUnpatchableCve

    bool

    at_devo_pulling_id

    str

    related_software

    int4

    related_machines

    int4

    related_vulnerabilities

    int4

    hostchain

    str

    tag

    str

    rawMessage

    str

    Anchor
    edr.microsoft_defender.endpoint.software

    ...

    edr.microsoft_defender.endpoint.software
    edr.microsoft_defender.endpoint.software

    Field

    Type

    Extra fields

    eventdate

    timestamp

    hostname

    str

    id

    str

    name

    str

    vendor

    str

    weaknesses

    int4

    publicExploit

    bool

    activeAlert

    bool

    exposedMachines

    int4

    installedMachines

    int4

    impactScore

    float8

    isNormalized

    bool

    category

    str

    distributions

    str

    related_vulnerabilities

    int4

    related_machines

    int4

    related_version_distribution

    int4

    related_missing_kbs

    int4

    hostchain

    str

    tag

    str

    rawMessage

    str

    Anchor
    edr.microsoft_defender.endpoint.

    ...

    vulnerabilities
    edr.microsoft_defender.endpoint.vulnerabilities
    edr.microsoft_defender.endpoint

    ...

    .vulnerabilities

    Field

    Type

    Extra fields

    eventdate

    timestamp

    hostname

    str

    at_odata_context

    str

    id

    str

    name

    str

    description

    str

    severity

    str

    cvssV3

    float8

    exposedMachines

    int4

    publishedOn

    timestamp

    updatedOn

    timestamp

    publicExploit

    bool

    exploitVerified

    bool

    exploitInKit

    bool

    exploitTypes

    str

    exploitUris

    str

    at_devo_pulling_id

    str

    related_machines

    int4

    hostchain

    str

    tag

    str

    rawMessage

    str

    Anchor
    edr.microsoft_defender.iot_security.alert
    edr.microsoft_defender.iot_security.alert
    edr.microsoft_defender.iot_security.alert

    Field

    Type

    Field transformation

    Source field name

    Extra fields

    eventdate

    timestamp

     

     

    hostname

    str

     

     

    id

    str

     

     

    name

    str

     

     

    type

    str

     

     

    tenant_id

    str

     

     

    kind

    str

     

     

    location

    str

     

     

    resource_group

    str

     

     

    subscription_id

    str

     

     

    managed_by

    str

     

     

    sku

    str

     

     

    plan

    str

     

     

    properties__product_component_name

    str

     

     

    properties__azure_resource_id

    str

     

     

    properties__extended_properties__device_resource_ids

    str

     

     

    properties__extended_properties__alert_management_uri

    str

     

     

    properties__extended_properties__device_id

    str

     

     

    properties__extended_properties__site_display_name

    str

     

     

    properties__extended_properties__source_device_address_ip4

    ip4

    Code Block
    ip4(properties__extended_properties__source_device_address)

    properties__extended_properties__source_device_address

    properties__extended_properties__source_device_address_ip6

    ip6

    Code Block
    ip6(properties__extended_properties__source_device_address)

    properties__extended_properties__source_device_address

    properties__extended_properties__compromised_entity_id

    str

     

     

    properties__extended_properties__sensor_version

    str

     

     

    properties__extended_properties__source_device_ip4

    ip4

    Code Block
    ip4(properties__extended_properties__source_device)

    properties__extended_properties__source_device

    properties__extended_properties__source_device_ip6

    ip6

    Code Block
    ip6(properties__extended_properties__source_device)

    properties__extended_properties__source_device

    properties__extended_properties__sensor_zone

    str

     

     

    properties__extended_properties__sensor_type

    str

     

     

    properties__extended_properties__protocol

    str

     

     

    properties__extended_properties__sensor_id

    str

     

     

    properties__extended_properties__category

    str

     

     

    properties__extended_properties_plc_new_operating_mode

    str

     

     

    properties__extended_properties__destination_device_address_ip4

    ip4

    Code Block
    ip4(properties__extended_properties__destination_device_address)

    properties__extended_properties__destination_device_address

    properties__extended_properties__destination_device_address_ip6

    ip6

    Code Block
    ip6(properties__extended_properties__destination_device_address)

    properties__extended_properties__destination_device_address

    properties__alert_learn_status

    str

     

     

    properties__system_alert_id

    str

     

     

    properties__start_time_utc

    timestamp

    Code Block
    parsedate(properties__start_time_utc_str, ifthenelse(length(properties__start_time_utc_str) = 25, dateformat("YYYY-MM-DD[T]HH:mm:ssZZ", "UTC"), dateformat("YYYY-MM-DD[T]HH:mm:ss.SSSSSSS[Z]", "UTC")))

    properties__start_time_utc_str

    properties__display_name

    str

     

     

    properties__severity

    str

     

     

    properties__techniques

    str

     

     

    properties__end_time_utc_str

    str

     

     

    properties__end_time_utc

    timestamp

    Code Block
    parsedate(properties__end_time_utc_str, ifthenelse(length(properties__end_time_utc_str) = 25, dateformat("YYYY-MM-DD[T]HH:mm:ssZZ", "UTC"), dateformat("YYYY-MM-DD[T]HH:mm:ss.SSSSSSS[Z]", "UTC")))

    properties__end_time_utc_str

    properties__alert_type

    str

     

     

    properties__entities

    str

     

     

    properties__status

    str

     

     

    properties__intent

    str

     

     

    tags

    str

     

     

    identity

    str

     

     

    zones

    str

     

     

    extended_location

    str

     

     

    at_devo_environment

    str

     

     

    at_devo_pulling_id

    str

     

     

    hostchain

    str

     

     

    tag

    str

     

     

    rawMessage

    str