Skip to content

Commit aa66c2a

Browse files
Merge pull request #239566 from yelevin/yelevin/entities-reference
Common account name warning
2 parents 30d8808 + a8d26c6 commit aa66c2a

File tree

1 file changed

+24
-10
lines changed

1 file changed

+24
-10
lines changed

articles/sentinel/entities-reference.md

Lines changed: 24 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,21 +2,21 @@
22
title: Microsoft Sentinel entity types reference | Microsoft Docs
33
description: This article displays the Microsoft Sentinel entity types and their required identifiers.
44
author: yelevin
5-
ms.topic: reference
6-
ms.date: 07/06/2022
75
ms.author: yelevin
6+
ms.topic: reference
7+
ms.date: 05/29/2023
88
ms.custom: ignite-fall-2021
99
---
1010

1111
# Microsoft Sentinel entity types reference
1212

1313
## Entity types and identifiers
1414

15-
The following table shows the **entity types** currently available for mapping in Microsoft Sentinel, and the **attributes** available as **identifiers** for each entity type - which appear in the **Identifiers** drop-down list in the [entity mapping](map-data-fields-to-entities.md) section of the [analytics rule wizard](detect-threats-custom.md).
15+
The following table shows the **entity types** currently available for mapping in Microsoft Sentinel, and the **attributes** available as **identifiers** for each entity type. These attributes appear in the **Identifiers** drop-down list in the [entity mapping](map-data-fields-to-entities.md) section of the [analytics rule wizard](detect-threats-custom.md).
1616

17-
Each one of the identifiers in the **required identifiers** column is minimally necessary to identify its entity. However, a required identifier might not, by itself, be sufficient to provide *unique* identification. The more identifiers used, the greater the likelihood of unique identification. You can use up to three identifiers for a single entity mapping.
17+
Each one of the identifiers in the **required identifiers** column is necessary to identify its entity. However, a required identifier might not, by itself, be sufficient to provide *unique* identification. The more identifiers used, the greater the likelihood of unique identification. You can use up to three identifiers for a single entity mapping.
1818

19-
For best results - for guaranteed unique identification - you should use identifiers from the **strongest identifiers** column whenever possible. The use of multiple strong identifiers enables correlation between strong identifiers from varying data sources and schemas. This in turn allows Microsoft Sentinel to provide more comprehensive insights for a given entity.
19+
For best results—for guaranteed unique identification—you should use identifiers from the **strongest identifiers** column whenever possible. The use of multiple strong identifiers enables correlation between strong identifiers from varying data sources and schemas. This correlation in turn allows Microsoft Sentinel to provide more comprehensive insights for a given entity.
2020

2121
| Entity type | Identifiers | Required identifiers | Strongest identifiers |
2222
| - | - | - | - |
@@ -43,7 +43,7 @@ For best results - for guaranteed unique identification - you should use identif
4343

4444
## Entity type schemas
4545

46-
The following is a more in-depth look at the full schemas of each entity type. You'll notice that many of these schemas include links to other entity types - for example, the User account schema includes a link to the Host entity type, as one attribute of a user account is the host it's defined on. These externally linked entities can't be used as identifiers for entity mapping, but they are very useful in giving a complete picture of entities on entity pages and the investigation graph.
46+
The following section contains a more in-depth look at the full schemas of each entity type. You'll notice that many of these schemas include links to other entity types—for example, the User account schema includes a link to the Host entity type, since one attribute of a user account is the host it's defined on. These externally linked entities can't be used as identifiers for the purpose of entity mapping, but they are very useful in giving a complete picture of entities on entity pages and the investigation graph.
4747

4848
> [!NOTE]
4949
> A question mark following the value in the **Type** column indicates the field is nullable.
@@ -85,6 +85,20 @@ Weak identifiers of an account entity:
8585

8686
- Name
8787

88+
> [!NOTE]
89+
> If the **Account** entity is defined using the **Name** identifier, and the Name value of a particular entity is one of the following generic, commonly built-in account names, then that entity will be dropped from its alert.
90+
> - ADMIN
91+
> - ADMINISTRATOR
92+
> - SYSTEM
93+
> - ROOT
94+
> - ANONYMOUS
95+
> - AUTHENTICATED USER
96+
> - NETWORK
97+
> - NULL
98+
> - LOCAL SYSTEM
99+
> - LOCALSYSTEM
100+
> - NETWORK SERVICE
101+
88102
## Host
89103

90104
| Field | Type | Description |
@@ -135,8 +149,8 @@ Strong identifiers of an IP entity:
135149
| Type | String | ‘malware’ |
136150
| Name | String | The malware name by the vendor, such as `Win32/Toga!rfn`. |
137151
| Category | String | The malware category by the vendor, e.g. Trojan. |
138-
| Files | List\<Entity> | List of linked file entities on which the malware was found. Can contain the File entities inline or as reference.<br>See the File entity for additional details on structure. |
139-
| Processes | List\<Entity> | List of linked process entities on which the malware was found. This would often be used when the alert triggered on fileless activity.<br>See the [Process](#process) entity for additional details on structure. |
152+
| Files | List\<Entity> | List of linked file entities on which the malware was found. Can contain the File entities inline or as reference.<br>See the [File](#file) entity for more details on structure. |
153+
| Processes | List\<Entity> | List of linked process entities on which the malware was found. This would often be used when the alert triggered on fileless activity.<br>See the [Process](#process) entity for more details on structure. |
140154

141155
Strong identifiers of a malware entity:
142156

@@ -166,8 +180,8 @@ Strong identifiers of a file entity:
166180
| CommandLine | String | The command line used to create the process. |
167181
| ElevationToken | Enum? | The elevation token associated with the process.<br>Possible values:<li>TokenElevationTypeDefault<li>TokenElevationTypeFull<li>TokenElevationTypeLimited |
168182
| CreationTimeUtc | DateTime? | The time when the process started to run. |
169-
| ImageFile | Entity (File) | Can contain the File entity inline or as reference.<br>See the File entity for additional details on structure. |
170-
| Account | Entity | The account running the processes.<br>Can contain the [Account](#user-account) entity inline or as reference.<br>See the [Account](#user-account) entity for additional details on structure. |
183+
| ImageFile | Entity (File) | Can contain the File entity inline or as reference.<br>See the [File](#file) entity for more details on structure. |
184+
| Account | Entity | The account running the processes.<br>Can contain the Account entity inline or as reference.<br>See the [Account](#user-account) entity for more details on structure. |
171185
| ParentProcess | Entity (Process) | The parent process entity. <br>Can contain partial data, i.e. only the PID. |
172186
| Host | Entity | The host on which the process was running. |
173187
| LogonSession | Entity (HostLogonSession) | The session in which the process was running. |

0 commit comments

Comments
 (0)