Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Product / Service

Tags

Data tables

Microsoft Defender Endpoint

edr.microsoft_defender.advanced_hunting.device_process_events

edr.microsoft_defender.advanced_hunting.device_process_events

edr.microsoft_defender.alerts.events

edr.microsoft_defender.alerts.events

edr.microsoft_defender.endpoint.alerts

edr.microsoft_defender.endpoint.alerts

edr.microsoft_defender.endpoint.assesment_secure_configuration

edr.microsoft_defender.endpoint.assesment_secure_configuration

edr.microsoft_defender.endpoint.assesment_software_inventory

edr.microsoft_defender.endpoint.assesment_software_inventory

edr.microsoft_defender.endpoint.assesment_software_vulnerabilities

edr.microsoft_defender.endpoint.assesment_software_vulnerabilities

edr.microsoft_defender.endpoint.investigations

edr.microsoft_defender.endpoint.investigations

edr.microsoft_defender.endpoint.machines

edr.microsoft_defender.endpoint.machines

edr.microsoft_defender.endpoint.recommendations

edr.microsoft_defender.endpoint.recommendations

edr.microsoft_defender.endpoint.software

edr.microsoft_defender.endpoint.software

edr.microsoft_defender.endpoint.vulnerabilities

edr.microsoft_defender.endpoint.vulnerabilities

Microsoft Defender for IoT

edr.microsoft_defender.iot_security.alert

edr.microsoft_defender.iot_security.alert

Table structure

These are the fields displayed in the tables:

Rw ui tabs macro
Rw tab
titleTable 1-6

Anchor
edr.microsoft_defender.advanced_hunting.device_process_events
edr.microsoft_defender.advanced_hunting.device_process_events
edr.microsoft_defender.advanced_hunting.device_process_events

Field

Type

Extra fields

eventdate

timestamp

hostname

str

Timestamp

timestamp

DeviceId

str

DeviceName

str

ActionType

str

FileName

str

FolderPath

str

SHA1

str

SHA256

str

MD5

str

FileSize

int4

ProcessVersionInfoCompanyName

str

ProcessVersionInfoProductName

str

ProcessVersionInfoProductVersion

str

ProcessVersionInfoInternalFileName

str

ProcessVersionInfoOriginalFileName

str

ProcessVersionInfoFileDescription

str

ProcessId

int4

ProcessCommandLine

str

ProcessIntegrityLevel

str

ProcessTokenElevation

str

ProcessCreationTime

str

AccountDomain

str

AccountName

str

AccountSid

str

AccountUpn

str

AccountObjectId

str

LogonId

int4

InitiatingProcessAccountDomain

str

InitiatingProcessAccountName

str

InitiatingProcessAccountSid

str

InitiatingProcessAccountUpn

str

InitiatingProcessAccountObjectId

str

InitiatingProcessLogonId

int4

InitiatingProcessIntegrityLevel

str

InitiatingProcessTokenElevation

str

InitiatingProcessSHA1

str

InitiatingProcessSHA256

str

InitiatingProcessMD5

str

InitiatingProcessFileName

str

InitiatingProcessFileSize

int4

InitiatingProcessVersionInfoCompanyName

str

InitiatingProcessVersionInfoProductName

str

InitiatingProcessVersionInfoProductVersion

str

InitiatingProcessVersionInfoInternalFileName

str

InitiatingProcessVersionInfoOriginalFileName

str

InitiatingProcessVersionInfoFileDescription

str

InitiatingProcessId

int4

InitiatingProcessCommandLine

str

InitiatingProcessCreationTime

str

InitiatingProcessFolderPath

str

InitiatingProcessParentId

int4

InitiatingProcessParentFileName

str

InitiatingProcessParentCreationTime

timestamp

InitiatingProcessSignerType

str

InitiatingProcessSignatureStatus

str

ReportId

int4

AppGuardContainerId

str

AdditionalFields

str

hostchain

str

tag

str

rawMessage

str

Anchor
edr.microsoft_defender.alerts.events
edr.microsoft_defender.alerts.events
edr.microsoft_defender.alerts.events

Field

Type

Field transformation

Source field name

Extra fields

eventdate

timestamp

 

 

hostname

str

 

 

id

str

 

 

incidentId

int8

 

 

investigationId

int8

 

 

assignedTo

str

 

 

severity

str

 

 

status

str

 

 

classification

str

 

 

determination

str

 

 

investigationState

str

 

 

detectionSource

str

 

 

detectorId

str

 

 

category

str

 

 

threatFamilyName

str

 

 

title

str

 

 

description

str

 

 

alertCreationTime

str

 

 

firstEventTime

str

 

 

lastEventTime

str

 

 

lastUpdateTime

str

 

 

resolvedTime

str

 

 

machineId

str

 

 

computerDnsName

str

 

 

rbacGroupName

str

 

 

aadTenantId

str

 

 

threatName

str

 

 

mitreTechniques_str

str

Code Block
join(mitreTechniques, ',')

mitreTechniques

relatedUser__userName

str

 

 

relatedUser__domainName

str

 

 

comments__comment_str

str

Code Block
join(comments__comment, ',')

comments__comment

comments__createdBy_str

str

Code Block
join(comments__createdBy, ',')

comments__createdBy

comments__createdTime_str

str

Code Block
join(comments__createdTime, ',')

comments__createdTime

evidence__entityType_str

str

Code Block
join(evidence__entityType, ',')

evidence__entityType

evidence__evidenceCreationTime_str

str

Code Block
join(evidence__evidenceCreationTime, ',')

evidence__evidenceCreationTime

evidence__sha1_str

str

Code Block
join(evidence__sha1, ',')

evidence__sha1

evidence__sha256_str

str

Code Block
join(evidence__sha256, ',')

evidence__sha256

evidence__fileName_str

str

Code Block
join(evidence__fileName, ',')

evidence__fileName

evidence__filePath_str

str

Code Block
join(evidence__filePath, ',')

evidence__filePath

evidence__processId_str

str

Code Block
replace(replace(stringify(json(evidence__processId)), "[", ""), "]", "")

evidence__processId

evidence__processCommandLine_str

str

Code Block
join(evidence__processCommandLine, ',')

evidence__processCommandLine

evidence__processCreationTime_str

str

Code Block
join(evidence__processCreationTime, ',')

evidence__processCreationTime

evidence__parentProcessId_str

str

Code Block
replace(replace(stringify(json(evidence__parentProcessId)), "[", ""), "]", "")

evidence__parentProcessId

evidence__parentProcessCreationTime_str

str

Code Block
join(evidence__parentProcessCreationTime, ',')

evidence__parentProcessCreationTime

evidence__parentProcessFileName_str

str

Code Block
join(evidence__parentProcessFileName, ',')

evidence__parentProcessFileName

evidence__parentProcessFilePath_str

str

Code Block
join(evidence__parentProcessFilePath, ',')

evidence__parentProcessFilePath

evidence__ipAddress_str

str

Code Block
join(evidence__ipAddress, ',')

evidence__ipAddress

evidence__url_str

str

Code Block
join(evidence__url, ',')

evidence__url

evidence__registryKey_str

str

Code Block
join(evidence__registryKey, ',')

evidence__registryKey

evidence__registryHive_str

str

Code Block
join(evidence__registryHive, ',')

evidence__registryHive

evidence__registryValueType_str

str

Code Block
join(evidence__registryValueType, ',')

evidence__registryValueType

evidence__registryValue_str

str

Code Block
join(evidence__registryValue, ',')

evidence__registryValue

evidence__accountName_str

str

Code Block
join(evidence__accountName, ',')

evidence__accountName

evidence__domainName_str

str

Code Block
join(evidence__domainName, ',')

evidence__domainName

evidence__userSid_str

str

Code Block
join(evidence__userSid, ',')

evidence__userSid

evidence__aadUserId_str

str

Code Block
join(evidence__aadUserId, ',')

evidence__aadUserId

evidence__userPrincipalName_str

str

Code Block
join(evidence__userPrincipalName, ',')

evidence__userPrincipalName

evidence__detectionStatus_str

str

Code Block
join(evidence__detectionStatus, ',')

evidence__detectionStatus

hostchain

str

 

 

tag

str

 

 

rawMessage

str

 

 

Anchor
edr.microsoft_defender.endpoint.alerts
edr.microsoft_defender.endpoint.alerts
edr.microsoft_defender.endpoint.alerts

Field

Type

Extra fields

eventdate

timestamp

hostname

str

at_odata_context

str

id

str

incidentId

str

investigationId

str

assignedTo

str

severity

str

status

str

classification

str

determination

str

investigationState

str

detectionSource

str

detectorId

str

category

str

threatFamilyName

str

title

str

description

str

alertCreationTime

timestamp

firstEventTime

timestamp

lastEventTime

timestamp

lastUpdateTime

timestamp

resolvedTime

timestamp

machineId

str

computerDnsName

str

rbacGroupName

str

aadTenantId

str

threatName

str

mitreTechniques

str

loggedOnUsers

str

comments

str

domains

str

at_devo_pulling_id

str

related_files

int4

related_ips

int4

related_machines

int4

related_domains

int4

related_users

int4

relatedUser_userName

str

relatedUser_domainName

str

related_evidences

int4

related_loggedOnUsers

int4

raw_evidences

str

evidence_entityType

str

evidence_evidenceCreationTime

timestamp

evidence_sha1

str

evidence_sha256

str

evidence_fileName

str

evidence_filePath

str

evidence_processId

str

evidence_processCommandLine

str

evidence_processCreationTime

timestamp

evidence_parentProcessId

str

evidence_parentProcessCreationTime

timestamp

evidence_parentProcessFileName

str

evidence_parentProcessFilePath

str

evidence_ipAddress

str

evidence_url

str

evidence_registryKey

str

evidence_registryHive

str

evidence_registryValueType

str

evidence_registryValue

str

evidence_registryValueName

str

evidence_accountName

str

evidence_domainName

str

evidence_userSid

str

evidence_aadUserId

str

evidence_userPrincipalName

str

evidence_detectionStatus

str

hostchain

str

tag

str

rawMessage

str

Anchor
edr.microsoft_defender.endpoint.assessment_secure_configuration
edr.microsoft_defender.endpoint.assessment_secure_configuration
edr.microsoft_defender.endpoint.assessment_secure_configuration

Field

Type

Extra fields

eventdate

timestamp

hostname

str

at_devo_pulling_id

str

DeviceId

str

DeviceName

str

OSPlatform

str

OSVersion

str

Timestamp

timestamp

ConfigurationId

str

ConfigurationCategory

str

ConfigurationSubcategory

str

ConfigurationImpact

int4

IsApplicable

bool

ConfigurationName

str

RecommendationReference

str

RbacGroupId

int4

RbacGroupName

str

IsCompliant

bool

hostchain

str

tag

str

rawMessage

str

Anchor
edr.microsoft_defender.endpoint.assessment_software_inventory
edr.microsoft_defender.endpoint.assessment_software_inventory
edr.microsoft_defender.endpoint.assessment_software_inventory

Field

Type

Extra fields

eventdate

timestamp

hostname

str

at_devo_pulling_id

str

DeviceId

str

DeviceName

str

OSPlatform

str

SoftwareVendor

str

SoftwareName

str

SoftwareVersion

str

NumberOfWeaknesses

int4

DiskPaths

str

RegistryPaths_str

str

SoftwareFirstSeenTimestamp

timestamp

SoftwareLastSeenTimestamp

timestamp

EndOfSupportStatus

str

EndOfSupportDate

str

RbacGroupId

int4

RbacGroupName

str

hostchain

str

tag

str

rawMessage

str

Rw tab
titleTables 67-912

Anchor
edr.microsoft_defender.endpoint.investigations
edr.microsoft_defender.endpoint.investigations
edr.microsoft_defender.endpoint.investigations

Field

Type

Extra fields

eventdate

timestamp

hostname

str

at_devo_pulling_id

str

id

str

startTime

timestamp

endTime

timestamp

state

str

cancelledBy

str

statusDetails

str

machineId

str

computerDnsName

str

triggeringAlertId

str

hostchain

str

tag

str

rawMessage

str

Anchor
edr.microsoft_defender.endpoint.machines
edr.microsoft_defender.endpoint.machines
edr.microsoft_defender.endpoint.machines

Field

Type

Extra fields

eventdate

timestamp

hostname

str

id

str

computerDnsName

str

firstSeen

timestamp

lastSeen

timestamp

osPlatform

str

osVersion

str

osProcessor

str

version

str

lastIpAddress

ip4

lastExternalIpAddress

ip4

agentVersion

str

osBuild

int4

healthStatus

str

deviceValue

str

rbacGroupId

int4

rbacGroupName

str

riskScore

str

exposureLevel

str

isAadJoined

bool

aadDeviceId

str

machineTags

str

defenderAvStatus

str

onboardingStatus

str

osArchitecture

str

managedBy

str

managedByStatus

str

ipAddresses

str

vmMetadata

str

at_devo_pulling_id

str

related_logon_users

int4

related_alerts

int4

related_vulnerabilities

int4

related_recommendations

int4

hostchain

str

tag

str

rawMessage

str

Anchor
edr.microsoft_defender.endpoint.recommendations
edr.microsoft_defender.endpoint.recommendations
edr.microsoft_defender.endpoint.recommendations

Field

Type

Extra fields

eventdate

timestamp

hostname

str

id

str

productName

str

recommendationName

str

weaknesses

int4

vendor

str

recommendedVersion

str

recommendedVendor

str

recommendedProgram

str

recommendationCategory

str

subCategory

str

severityScore

float8

publicExploit

bool

activeAlert

bool

associatedThreats

str

remediationType

str

status

str

configScoreImpact

float8

exposureImpact

float8

totalMachineCount

int4

exposedMachinesCount

int4

nonProductivityImpactedAssets

int4

relatedComponent

str

hasUnpatchableCve

bool

at_devo_pulling_id

str

related_software

int4

related_machines

int4

related_vulnerabilities

int4

hostchain

str

tag

str

rawMessage

str

Anchor
edr.microsoft_defender.endpoint.software
edr.microsoft_defender.endpoint.software
edr.microsoft_defender.endpoint.software

Field

Type

Extra fields

eventdate

timestamp

hostname

str

id

str

name

str

vendor

str

weaknesses

int4

publicExploit

bool

activeAlert

bool

exposedMachines

int4

installedMachines

int4

impactScore

float8

isNormalized

bool

category

str

distributions

str

related_vulnerabilities

int4

related_machines

int4

related_version_distribution

int4

related_missing_kbs

int4

hostchain

str

tag

str

rawMessage

str

Anchor
edr.microsoft_defender.endpoint.vulnerabilities
edr.microsoft_defender.endpoint.vulnerabilities
edr.microsoft_defender.endpoint.vulnerabilities

Field

Type

Extra fields

eventdate

timestamp

hostname

str

at_odata_context

str

id

str

name

str

description

str

severity

str

cvssV3

float8

exposedMachines

int4

publishedOn

timestamp

updatedOn

timestamp

publicExploit

bool

exploitVerified

bool

exploitInKit

bool

exploitTypes

str

exploitUris

str

at_devo_pulling_id

str

related_machines

int4

hostchain

str

tag

str

rawMessage

str

Anchor
edr.microsoft_defender.iot_security.alert
edr.microsoft_defender.iot_security.alert
edr.microsoft_defender.iot_security.alert

Field

Type

Field transformation

Source field name

Extra fields

eventdate

timestamp

 

 

hostname

str

 

 

id

str

 

 

name

str

 

 

type

str

 

 

tenant_id

str

 

 

kind

str

 

 

location

str

 

 

resource_group

str

 

 

subscription_id

str

 

 

managed_by

str

 

 

sku

str

 

 

plan

str

 

 

properties__product_component_name

str

 

 

properties__azure_resource_id

str

 

 

properties__extended_properties__device_resource_ids

str

 

 

properties__extended_properties__alert_management_uri

str

 

 

properties__extended_properties__device_id

str

 

 

properties__extended_properties__site_display_name

str

 

 

properties__extended_properties__source_device_address_ip4

ip4

Code Block
ip4(properties__extended_properties__source_device_address)

properties__extended_properties__source_device_address

properties__extended_properties__source_device_address_ip6

ip6

Code Block
ip6(properties__extended_properties__source_device_address)

properties__extended_properties__source_device_address

properties__extended_properties__compromised_entity_id

str

 

 

properties__extended_properties__sensor_version

str

 

 

properties__extended_properties__source_device_ip4

ip4

Code Block
ip4(properties__extended_properties__source_device)

properties__extended_properties__source_device

properties__extended_properties__source_device_ip6

ip6

Code Block
ip6(properties__extended_properties__source_device)

properties__extended_properties__source_device

properties__extended_properties__sensor_zone

str

 

 

properties__extended_properties__sensor_type

str

 

 

properties__extended_properties__protocol

str

 

 

properties__extended_properties__sensor_id

str

 

 

properties__extended_properties__category

str

 

 

properties__extended_properties_plc_new_operating_mode

str

 

 

properties__extended_properties__destination_device_address_ip4

ip4

Code Block
ip4(properties__extended_properties__destination_device_address)

properties__extended_properties__destination_device_address

properties__extended_properties__destination_device_address_ip6

ip6

Code Block
ip6(properties__extended_properties__destination_device_address)

properties__extended_properties__destination_device_address

properties__alert_learn_status

str

 

 

properties__system_alert_id

str

 

 

properties__start_time_utc

timestamp

Code Block
parsedate(properties__start_time_utc_str, ifthenelse(length(properties__start_time_utc_str) = 25, dateformat("YYYY-MM-DD[T]HH:mm:ssZZ", "UTC"), dateformat("YYYY-MM-DD[T]HH:mm:ss.SSSSSSS[Z]", "UTC")))

properties__start_time_utc_str

properties__display_name

str

 

 

properties__severity

str

 

 

properties__techniques

str

 

 

properties__end_time_utc_str

str

 

 

properties__end_time_utc

timestamp

Code Block
parsedate(properties__end_time_utc_str, ifthenelse(length(properties__end_time_utc_str) = 25, dateformat("YYYY-MM-DD[T]HH:mm:ssZZ", "UTC"), dateformat("YYYY-MM-DD[T]HH:mm:ss.SSSSSSS[Z]", "UTC")))

properties__end_time_utc_str

properties__alert_type

str

 

 

properties__entities

str

 

 

properties__status

str

 

 

properties__intent

str

 

 

tags

str

 

 

identity

str

 

 

zones

str

 

 

extended_location

str

 

 

at_devo_environment

str

 

 

at_devo_pulling_id

str

 

 

hostchain

str

 

 

tag

str

 

 

rawMessage

str