Skip to content

Commit d0bf6af

Browse files
vakohlbatamig
andauthored
Apply suggestions from code review
Co-authored-by: Batami Gold <[email protected]>
1 parent a20ca1b commit d0bf6af

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/sentinel/normalization-schema-alert.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: vakohl
1616

1717
The Microsoft Sentinel Alert Schema is designed to normalize security-related alerts from various products into a standardized format within Microsoft Advanced Security Information Model (ASIM). This schema focuses exclusively on security events, ensuring consistent and efficient analysis across different data sources.
1818

19-
The Alert Schema represents various types of security alerts, such as threats, suspicious activities, user behavior anomalies and compliance violations. These alerts are reported by different security products and systems, including but not limited to EDRs, antivirus softwares, intrusion detection systems, data loss prevention tools etc.
19+
The Alert Schema represents various types of security alerts, such as threats, suspicious activities, user behavior anomalies and compliance violations. These alerts are reported by different security products and systems, including but not limited to EDRs, antivirus software, intrusion detection systems, data loss prevention tools etc.
2020

2121
For more information about normalization in Microsoft Sentinel, see [Normalization and the Advanced Security Information Model (ASIM)](normalization.md).
2222

@@ -100,7 +100,7 @@ The following list mentions fields that have specific guidelines for Alert event
100100
|-------|-------|------|-------------|
101101
| **EventType** | Mandatory | Enumerated | Type of the event.<br><br>Supported values are:<br>-`Alert` |
102102
| **EventSubType** | Recommended | Enumerated | Specifies the subtype or category of the alert event, providing more granular detail within the broader event classification. This field helps distinguish the nature of the detected issue, improving incident prioritization and response strategies.<br><br>Supported values include:<br>- `Threat` (Represents a confirmed or highly likely malicious activity that could compromise the system or network)<br>- `Suspicious Activity` (Flags behavior or events that appear unusual or suspicious, though not yet confirmed as malicious)<br>- `Anomaly` (Identifies deviations from normal patterns that could indicate a potential security risk or operational issue)<br>- `Compliance Violation` (Highlights activities that breach regulatory, policy, or compliance standards) |
103-
| **EventUid** | Mandatory | string | A machine-readable, alphanumeric string that uniquely identifies an alert within a system. <br> e.g. `ca66e2bdc45f2d8840b367e067` |
103+
| **EventUid** | Mandatory | string | A machine-readable, alphanumeric string that uniquely identifies an alert within a system. <br> e.g. `A1bC2dE3fH4iJ5kL6mN7oP8qR9s` |
104104
| **EventMessage** | Optional | string | Detailed information about the alert, including its context, cause, and potential impact. <br> e.g. `Potential use of the Rubeus tool for kerberoasting, a technique used to extract service account credentials from Kerberos tickets.` |
105105
| **IpAddr** | Alias | | Alias or friendly name for `DvcIpAddr` field. |
106106
| **Hostname** | Alias | | Alias or friendly name for `DvcHostname` field. |
@@ -132,10 +132,10 @@ The following table covers fields that provide critical insights into the rules
132132
| **AlertOriginalStatus** | Optional | string | The status of the alert as reported by the originating system. |
133133
| **DetectionMethod** | Optional | Enumerated | Provides detailed information about the specific detection method, technology, or data source that contributed to the generation of the alert. This field offers greater insight into how the alert was detected or triggered, aiding in the understanding of the detection context and reliability.<br><br>Supported values include:<br>- `EDR`: Endpoint Detection and Response systems that monitor and analyze endpoint activities to identify threats.<br>- `Behavioral Analytics`: Techniques that detect abnormal patterns in user, device, or system behavior.<br>- `Reputation`: Threat detection based on the reputation of IP addresses, domains, or files.<br>- `Threat Intelligence`: External or internal intelligence feeds providing data on known threats or adversary tactics.<br>- `Intrusion Detection`: Systems that monitor network traffic or activities for signs of intrusions or attacks.<br>- `Automated Investigation`: Automated systems that analyze and investigate alerts, reducing manual workload.<br>- `Antivirus`: Traditional antivirus engines that detect malware based on signatures and heuristics.<br>- `Data Loss Prevention`: Solutions focused on preventing unauthorized data transfers or leaks.<br>- `User Defined Blocked List`: Custom lists defined by users to block specific IPs, domains, or files.<br>- `Cloud Security Posture Management`: Tools that assess and manage security risks in cloud environments.<br>- `Cloud Application Security`: Solutions that secure cloud applications and data.<br>-`Scheduled Alerts`: Alerts generated based on predefined schedules or thresholds.<br>- `Other`: Any other detection method not covered by the above categories. |
134134
| **Rule** | Alias | string | Either the value of RuleName or the value of RuleNumber. If the value of RuleNumber is used, the type should be converted to string. |
135-
| **RuleNumber** | Optional | int | The number of the rule associated with the alert.<br><br>e.g. `600708` |
135+
| **RuleNumber** | Optional | int | The number of the rule associated with the alert.<br><br>e.g. `123456` |
136136
| **RuleName** | Optional | string | The name or ID of the rule associated with the alert.<br><br>e.g. `Server PSEXEC Execution via Remote Access` |
137137
| **RuleDescription** | Optional | string | Description of the rule associated with the alert.<br><br>e.g. `This rule detects remote execution on a server using PSEXEC, which may indicate unauthorized administrative activity or lateral movement within the network` |
138-
| **ThreatId** | Optional | string | The ID of the threat or malware identified in the alert.<br><br> e.g. `7570037250905284790` |
138+
| **ThreatId** | Optional | string | The ID of the threat or malware identified in the alert.<br><br> e.g. `1234567891011121314` |
139139
| **ThreatName** | Optional | string | The name of the threat or malware identified in the alert.<br><br> e.g. `Init.exe` |
140140
| **ThreatFirstReportedTime** | Optional | datetime | Date and time when the threat was first reported.<br><br> e.g. `2024-09-19T10:12:10.0000000Z` |
141141
| **ThreatLastReportedTime** | Optional | datetime | Date and time when the threat was last reported.<br><br> e.g. `2024-09-19T10:12:10.0000000Z` |
@@ -158,15 +158,15 @@ This section defines fields related to the identification and classification of
158158

159159
| Field | Class | Type | Description |
160160
|-------|-------|------|-------------|
161-
| **UserId** | Optional | string | A machine-readable, alphanumeric, unique representation of the user associated with the alert.<br><br>e.g. `00urjk4znu3BcncfY0h7` |
161+
| **UserId** | Optional | string | A machine-readable, alphanumeric, unique representation of the user associated with the alert.<br><br>e.g. `A1bC2dE3fH4iJ5kL6mN7o` |
162162
| **UserIdType** | Conditional | Enumerated | The type of the user ID, such as `GUID`, `SID`, or `Email`.<br><br>Supported values are:<br>- `GUID`<br>- `SID`<br>- `Email`<br>- `Username`<br>- `Phone`<br>- `Other` |
163163
| **Username** | Recommended | string | Name of the user associated with the alert, including domain information when available.<br><br>e.g. `Contoso\JSmith` or `[email protected]` |
164164
| **User** | Alias | string | Alias or friendly name for `Username` field. |
165165
| **UsernameType** | Conditional | UsernameType | Specifies the type of the user name stored in the `Username` field. For more information, and list of allowed values, see [UsernameType](normalization-about-schemas.md#usernametype) in the [Schema Overview article](normalization-about-schemas.md).<br><br>e.g. `Windows` |
166166
| **UserType** | Optional | UserType | The type of the Actor. For more information, and list of allowed values, see [UserType](normalization-about-schemas.md#usertype) in the [Schema Overview article](normalization-about-schemas.md).<br><br> e.g. `Guest`|
167167
| **OriginalUserType** | Optional | string | The user type as reported by the reporting device. |
168-
| **UserSessionId** | Optional | string | The unique ID of the user's session associated with the alert.<br><br>e.g. `d73f9a8b-61a5-4c49-9d7f-bc3e3e7b5a12` |
169-
| **UserScopeId** | Optional | string | The scope ID, such as Microsoft Entra Directory ID, in which UserId and Username are defined.<br><br>e.g. `a2f6789c-1234-45de-9abc-5678def01234` |
168+
| **UserSessionId** | Optional | string | The unique ID of the user's session associated with the alert.<br><br>e.g. `a1bc2de3-fh4i-j5kl-6mn7-op8qr9st0u` |
169+
| **UserScopeId** | Optional | string | The scope ID, such as Microsoft Entra Directory ID, in which UserId and Username are defined.<br><br>e.g. `a1bc2de3-fh4i-j5kl-6mn7-op8qrs` |
170170
| **UserScope** | Optional | string | The scope, such as Microsoft Entra tenant, in which UserId and Username are defined. or more information and list of allowed values, see [UserScope](normalization-about-schemas.md#userscope) in the [Schema Overview article](normalization-about-schemas.md).<br><br>e.g. `Contoso Directory` |
171171

172172
### Process Fields
@@ -175,7 +175,7 @@ This section allows you to capture details related to a process entity involved
175175

176176
| Field | Class | Type | Description |
177177
|-------|-------|------|-------------|
178-
| **ProcessId** | Optional | string | The process ID (PID) associated with the alert.<br><br>e.g. `48610176` |
178+
| **ProcessId** | Optional | string | The process ID (PID) associated with the alert.<br><br>e.g. `12345678` |
179179
| **ProcessCommandLine** | Optional | string | Command line used to start the process.<br><br>e.g. `"choco.exe" -v` |
180180
| **ProcessName** | Optional | string | Name of the process.<br><br>e.g. `C:\Windows\explorer.exe` |
181181
| **ProcessFileCompany** | Optional | string | Company that created the process image file.<br><br>e.g. `Microsoft` |
@@ -189,9 +189,9 @@ This section enables you to capture details related to a file entity involved in
189189
| **FileName** | Optional | string | Name of the file associated with the alert, without path or a location.<br><br>e.g. `Notepad.exe` |
190190
| **FilePath** | Optional | string | he full, normalized path of the target file, including the folder or location, the file name, and the extension.<br><br>e.g. `C:\Windows\System32\notepad.exe` |
191191
| **FileSHA1** | Optional | string | SHA1 hash of the file.<br><br>e.g. `d55c5a4df19b46db8c54` |
192-
| **FileSHA256** | Optional | string | SHA256 hash of the file.<br><br>e.g. `e81bb824c4a09a811af17deae22f22dd` |
193-
| **FileMD5** | Optional | string | MD5 hash of the file.<br><br>e.g. `75a599802f1fa166cdadb360960b1dd0` |
194-
| **FileSize** | Optional | long | Size of the file in bytes.<br><br>e.g. `834936` |
192+
| **FileSHA256** | Optional | string | SHA256 hash of the file.<br><br>e.g. `a1bc2de3fh4ij5kl6mn7op8qrs2de3` |
193+
| **FileMD5** | Optional | string | MD5 hash of the file.<br><br>e.g. `j5kl6mn7op8qr9st0uv1wx2yz3ab4c` |
194+
| **FileSize** | Optional | long | Size of the file in bytes.<br><br>e.g. `123456` |
195195

196196
### Url Field
197197

0 commit comments

Comments
 (0)