Skip to content

Latest commit

 

History

History
105 lines (91 loc) · 8.64 KB

advanced-hunting-devicelogonevents-table.md

File metadata and controls

105 lines (91 loc) · 8.64 KB
title description search.appverid ms.service ms.subservice f1.keywords ms.author author ms.localizationpriority manager audience ms.collection ms.custom ms.topic ms.date
DeviceLogonEvents table in the advanced hunting schema
Learn about authentication or sign-in events in the DeviceLogonEvents table of the advanced hunting schema
met150
defender-xdr
adv-hunting
NOCSH
maccruz
schmurky
medium
dansimp
ITPro
m365-security
tier3
cx-ti
cx-ah
reference
09/06/2024

DeviceLogonEvents

[!INCLUDE Microsoft Defender XDR rebranding]

Applies to:

  • Microsoft Defender XDR
  • Microsoft Defender for Endpoint

The DeviceLogonEvents table in the advanced hunting schema contains information about user logons and other authentication events on devices. Use this reference to construct queries that return information from this table.

Tip

For detailed information about the events types (ActionType values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

Column name Data type Description
Timestamp datetime Date and time when the event was recorded
DeviceId string Unique identifier for the device in the service
DeviceName string Fully qualified domain name (FQDN) of the device
ActionType string Type of activity that triggered the event
LogonType string Type of logon session, specifically:

- Interactive - User physically interacts with the device using the local keyboard and screen

- Remote interactive (RDP) logons - User interacts with the device remotely using Remote Desktop, Terminal Services, Remote Assistance, or other RDP clients

- Network - Session initiated when the device is accessed using PsExec or when shared resources on the device, such as printers and shared folders, are accessed

- Batch - Session initiated by scheduled tasks

- Service - Session initiated by services as they start
AccountDomain string Domain of the account
AccountName string User name of the account
AccountSid string Security Identifier (SID) of the account
Protocol string Protocol used during the communication
FailureReason string Information explaining why the recorded action failed
IsLocalAdmin boolean Boolean indicator of whether the user is a local administrator on the device
LogonId long Identifier for a logon session. This identifier is unique on the same device only between restarts.
RemoteDeviceName string Name of the device that performed a remote operation on the affected device. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name or a host name without domain information.
RemoteIP string IP address of the device from which the logon attempt was performed
RemoteIPType string Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast
RemotePort int TCP port on the remote device that was being connected to
InitiatingProcessAccountDomain string Domain of the account that ran the process responsible for the event
InitiatingProcessAccountName string User name of the account that ran the process responsible for the event
InitiatingProcessAccountSid string Security Identifier (SID) of the account that ran the process responsible for the event
InitiatingProcessAccountUpn string User principal name (UPN) of the account that ran the process responsible for the event
InitiatingProcessAccountObjectId string Microsoft Entra object ID of the user account that ran the process responsible for the event
InitiatingProcessIntegrityLevel string Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.
InitiatingProcessTokenElevation string Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event
InitiatingProcessSHA1 string SHA-1 hash of the process (image file) that initiated the event
InitiatingProcessSHA256 string SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.
InitiatingProcessMD5 string MD5 hash of the process (image file) that initiated the event
InitiatingProcessFileName string Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead
InitiatingProcessFileSize long Size of the file that ran the process responsible for the event
InitiatingProcessVersionInfoCompanyName string Company name from the version information of the process (image file) responsible for the event
InitiatingProcessVersionInfoProductName string Product name from the version information of the process (image file) responsible for the event
InitiatingProcessVersionInfoProductVersion string Product version from the version information of the process (image file) responsible for the event
InitiatingProcessVersionInfoInternalFileName string Internal file name from the version information of the process (image file) responsible for the event
InitiatingProcessVersionInfoOriginalFileName string Original file name from the version information of the process (image file) responsible for the event
InitiatingProcessVersionInfoFileDescription string Description from the version information of the process (image file) responsible for the event
InitiatingProcessId long Process ID (PID) of the process that initiated the event
InitiatingProcessCommandLine string Command line used to run the process that initiated the event
InitiatingProcessCreationTime datetime Date and time when the process that initiated the event was started
InitiatingProcessFolderPath string Folder containing the process (image file) that initiated the event
InitiatingProcessParentId long Process ID (PID) of the parent process that spawned the process responsible for the event
InitiatingProcessParentFileName string Name or full path of the parent process that spawned the process responsible for the event
InitiatingProcessParentCreationTime datetime Date and time when the parent of the process responsible for the event was started
ReportId long Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.
AppGuardContainerId string Identifier for the virtualized container used by Application Guard to isolate browser activity
AdditionalFields string Additional information about the event in JSON array format
InitiatingProcessSessionId long Windows session ID of the initiating process
IsInitiatingProcessRemoteSession bool Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)
InitiatingProcessRemoteSessionDeviceName string Device name of the remote device from which the initiating process’s RDP session was initiated
InitiatingProcessRemoteSessionIP string IP address of the remote device from which the initiating process’s RDP session was initiated

Note

The collection of DeviceLogonEvents is not supported on Windows 7 or Windows Server 2008R2 devices onboarded to Defender for Endpoint. We recommend upgrading to a more recent operating system for optimal visibility into user logon activity.

Related topics