| | |
---|
Microsoft Defender Endpoint | edr.microsoft_defender.advanced_hunting.device_process_events
| edr.microsoft_defender.advanced_hunting.device_process_events
|
edr.microsoft_defender.alerts.events
| edr.microsoft_defender.alerts.events
|
edr.microsoft_defender.endpoint.alerts
| edr.microsoft_defender.endpoint.alerts
|
edr.microsoft_defender.endpoint.assesment_secure_configuration
| edr.microsoft_defender.endpoint.assesment_secure_configuration
|
edr.microsoft_defender.endpoint.assesment_software_inventory
| edr.microsoft_defender.endpoint.assesment_software_inventory
|
edr.microsoft_defender.endpoint.assesment_software_vulnerabilities
| edr.microsoft_defender.endpoint.assesment_software_vulnerabilities
|
edr.microsoft_defender.endpoint.investigations
| edr.microsoft_defender.endpoint.investigations
|
edr.microsoft_defender.endpoint.machines
| edr.microsoft_defender.endpoint.machines
|
edr.microsoft_defender.endpoint.recommendations
| edr.microsoft_defender.endpoint.recommendations
|
edr.microsoft_defender.endpoint.software
| edr.microsoft_defender.endpoint.software
|
edr.microsoft_defender.endpoint.vulnerabilities
| edr.microsoft_defender.endpoint.vulnerabilities
|
Microsoft Defender for IoT | edr.microsoft_defender.iot_security.alert
| edr.microsoft_defender.iot_security.alert
|