title | description | search.appverid | ms.service | ms.subservice | f1.keywords | ms.author | author | ms.localizationpriority | manager | audience | ms.collection | ms.custom | ms.topic | ms.date | |||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
AlertInfo table in the advanced hunting schema |
Learn about alert generation events in the AlertInfo table of the advanced hunting schema |
met150 |
defender-xdr |
adv-hunting |
|
maccruz |
schmurky |
medium |
dansimp |
ITPro |
|
|
reference |
04/03/2024 |
[!INCLUDE Microsoft Defender XDR rebranding]
Applies to:
- Microsoft Defender XDR
To use advanced hunting or other Microsoft Defender XDR capabilities, you need an appropriate role in Microsoft Entra ID. Read about required roles and permissions for advanced hunting.
Also, your access to endpoint data is determined by role-based access control (RBAC) settings in Microsoft Defender for Endpoint. Read about managing access to Microsoft Defender XDR.
The AlertInfo
table in the advanced hunting schema contains information about alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity. Use this reference to construct queries that return information from this table.
For information on other tables in the advanced hunting schema, see the advanced hunting reference.
Column name | Data type | Description |
---|---|---|
Timestamp |
datetime |
Date and time when the record was generated |
AlertId |
string |
Unique identifier for the alert |
Title |
string |
Title of the alert |
Category |
string |
Type of threat indicator or breach activity identified by the alert |
Severity |
string |
Indicates the potential impact (high, medium, or low) of the threat indicator or breach activity identified by the alert |
ServiceSource |
string |
Product or service that provided the alert information |
DetectionSource |
string |
Detection technology or sensor that identified the notable component or activity |
AttackTechniques |
string |
MITRE ATT&CK techniques associated with the activity that triggered the alert |