Skip to content

Latest commit

 

History

History
110 lines (95 loc) · 10.8 KB

advanced-hunting-schema-tables.md

File metadata and controls

110 lines (95 loc) · 10.8 KB
title description search.appverid ms.service ms.subservice f1.keywords ms.author author ms.localizationpriority manager audience ms.collection ms.custom ms.topic ms.date
Data tables in the Microsoft Defender XDR advanced hunting schema
Learn about the tables in the advanced hunting schema to understand the data you can run threat hunting queries on.
met150
defender-xdr
adv-hunting
NOCSH
maccruz
schmurky
medium
dansimp
ITPro
m365-security
tier3
cx-ti
cx-ah
reference
11/20/2024

Understand the advanced hunting schema

[!INCLUDE Microsoft Defender XDR rebranding]

Applies to:

  • Microsoft Defender XDR

[!INCLUDE Prerelease information]

The advanced hunting schema is made up of multiple tables that provide either event information or information about devices, alerts, identities, and other entity types. To effectively build queries that span multiple tables, you need to understand the tables and the columns in the advanced hunting schema.

Get schema information

While constructing queries, use the built-in schema reference to quickly get the following information about each table in the schema:

  • Tables description—type of data contained in the table and the source of that data.
  • Columns—all the columns in the table.
  • Action types—possible values in the ActionType column representing the event types supported by the table. This information is provided only for tables that contain event information.
  • Sample query—example queries that feature how the table can be utilized.

Access the schema reference

To quickly access the schema reference, select the View reference action next to the table name in the schema representation. You can also select Schema reference to search for a table.

:::image type="content" source="/defender/media/understand-schema-1.png" alt-text="The Schema Reference page on the Advanced Hunting page in the Microsoft Defender portal" lightbox="/defender/media/understand-schema-1.png":::

Learn the schema tables

The following reference lists all the tables in the schema. Each table name links to a page describing the column names for that table. Table and column names are also listed in Microsoft Defender XDR as part of the schema representation on the advanced hunting screen.

Table name Description
AADSignInEventsBeta Microsoft Entra interactive and non-interactive sign-ins
AADSpnSignInEventsBeta Microsoft Entra service principal and managed identity sign-ins
AlertEvidence Files, IP addresses, URLs, users, or devices associated with alerts
AlertInfo Alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity, including severity information and threat categorization
BehaviorEntities (Preview) Behavior data types in Microsoft Defender for Cloud Apps (not available for GCC)
BehaviorInfo (Preview) Alerts from Microsoft Defender for Cloud Apps (not available for GCC)
CloudAppEvents Events involving accounts and objects in Office 365 and other cloud apps and services
CloudAuditEvents (Preview) Cloud audit events for various cloud platforms protected by the organization's Microsoft Defender for Cloud
CloudProcessEvents (Preview) Cloud process events for various cloud platforms protected by the organization's Microsoft Defender for Containers
DeviceBaselineComplianceAssessment (Preview) Baseline compliance assessment snapshot, which indicates the status of various security configurations related to baseline profiles on devices
DeviceBaselineComplianceAssessmentKB (Preview) Information about various security configurations used by baseline compliance to assess devices
DeviceBaselineComplianceProfiles (Preview) Baseline profiles used for monitoring device baseline compliance
DeviceEvents Multiple event types, including events triggered by security controls such as Microsoft Defender Antivirus and exploit protection
DeviceFileCertificateInfo Certificate information of signed files obtained from certificate verification events on endpoints
DeviceFileEvents File creation, modification, and other file system events
DeviceImageLoadEvents DLL loading events
DeviceInfo Machine information, including OS information
DeviceLogonEvents Sign-ins and other authentication events on devices
DeviceNetworkEvents Network connection and related events
DeviceNetworkInfo Network properties of devices, including physical adapters, IP and MAC addresses, as well as connected networks and domains
DeviceProcessEvents Process creation and related events
DeviceRegistryEvents Creation and modification of registry entries
DeviceTvmBrowserExtensions (Preview) Browser extension installations found on devices from Microsoft Defender Vulnerability Management
DeviceTvmBrowserExtensionsKB (Preview) Browser extension details and permission information used in the Microsoft Defender Vulnerability Management browser extensions page
DeviceTvmCertificateInfo (Preview) Certificate information for devices in the organization from Microsoft Defender Vulnerability Management
DeviceTvmHardwareFirmware Hardware and firmware information of devices as checked by Defender Vulnerability Management
DeviceTvmInfoGathering Defender Vulnerability Management assessment events including configuration and attack surface area states
DeviceTvmInfoGatheringKB Metadata for assessment events collected in the DeviceTvmInfogathering table
DeviceTvmSecureConfigurationAssessment Microsoft Defender Vulnerability Management assessment events, indicating the status of various security configurations on devices
DeviceTvmSecureConfigurationAssessmentKB Knowledge base of various security configurations used by Microsoft Defender Vulnerability Management to assess devices; includes mappings to various standards and benchmarks
DeviceTvmSoftwareEvidenceBeta Evidence info about where a specific software was detected on a device
DeviceTvmSoftwareInventory Inventory of software installed on devices, including their version information and end-of-support status
DeviceTvmSoftwareVulnerabilities Software vulnerabilities found on devices and the list of available security updates that address each vulnerability
DeviceTvmSoftwareVulnerabilitiesKB Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available
EmailAttachmentInfo Information about files attached to emails
EmailEvents Microsoft 365 email events, including email delivery and blocking events
EmailPostDeliveryEvents Security events that occur post-delivery, after Microsoft 365 delivers the emails to the recipient mailbox
EmailUrlInfo Information about URLs on emails
ExposureGraphEdges Microsoft Security Exposure Management exposure graph edge information provides visibility into relationships between entities and assets in the graph
ExposureGraphNodes Microsoft Security Exposure Management exposure graph node information, about organizational entities and their properties
IdentityDirectoryEvents Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller.
IdentityInfo Account information from various sources, including Microsoft Entra ID
IdentityLogonEvents Authentication events on Active Directory and Microsoft online services
IdentityQueryEvents Queries for Active Directory objects, such as users, groups, devices, and domains
UrlClickEvents Safe Links clicks from email messages, Teams, and Office 365 apps

Related topics