|
| 1 | +--- |
| 2 | +title: Microsoft Sentinel security alert schema reference |
| 3 | +description: This article displays the schema of security alerts in Microsoft Sentinel. |
| 4 | +services: sentinel |
| 5 | +cloud: na |
| 6 | +documentationcenter: na |
| 7 | +author: yelevin |
| 8 | +ms.topic: reference |
| 9 | +ms.date: 11/17/2021 |
| 10 | +ms.author: yelevin |
| 11 | + |
| 12 | +--- |
| 13 | + |
| 14 | +# Microsoft Sentinel security alert schema reference |
| 15 | + |
| 16 | +[!INCLUDE [Banner for top of topics](./includes/banner.md)] |
| 17 | + |
| 18 | +This article lists supported Azure and third-party data source schemas, with links to their reference documentation. |
| 19 | + |
| 20 | +## Schema definitions |
| 21 | + |
| 22 | +| Column Name | Type | Descrption | Yechiel's Comments | |
| 23 | +| --- | --- | --- | --- | |
| 24 | +| **AlertLink** | string | Link to the alert in the portal of the originating product. | | |
| 25 | +| **AlertName** | string | Display name of the alert. For scheduled rules, it will be taken from the rule name. | ASC wanted to deprecate one (display and alert name) but left the 2 <br>For non-scheduled rules, what will this say? | |
| 26 | +| **AlertSeverity** | string | Severity of the alert (informational, low, medium, high). | | |
| 27 | +| **AlertType** | string | The type of alert. Alerts of the same type should have the same name. For scheduled rules, this will be populated by the rule ID. | For other rule types, what is this? The alert type (anomaly, NRT, Microsoft Security, etc.)? | |
| 28 | +| **CompromisedEntity** | string | Display name of the main entity being alerted on. | | |
| 29 | +| **ConfidenceLevel** | string | The confidence level of this alert: how sure the provider is that this is not a false positive. | | |
| 30 | +| **ConfidenceScore** | real | The confidence score of the alert, if applicable. This property allows for a more fine-grained representation of the confidence level of the alert compared to the ConfidenceLevel field. Valid values are in the range of 0.0-1.0 (inclusive). | | |
| 31 | +| **Description** | string | The description of the alert. | | |
| 32 | +| **DisplayName** | string | Display name of the alert. For scheduled rules it will be taken from the rule name. | ASC wanted to deprecate one (display and alert name) but left the 2 | |
| 33 | +| **EndTime** | datetime | The end time of the impact of the alert (the time of the last event or activity included in the alert). For scheduled rule alerts, this is the value of the TimeGenerated field for the last event captured by the query. | | |
| 34 | +| **Entities** | string | A list of entities related to the alert. This list can include a combination of entities of different types. The entities' types can be any of those defined in the documentation (link - https://docs.microsoft.com/en-us/azure/sentinel/entities-reference). | | |
| 35 | +| **ExtendedLinks** | string | A bag (a collection) for all links related to the alert. This bag can include a combination of links of different types. | | |
| 36 | +| **ExtendedProperties** | string | A collection of other properties of the alert, including user-defined properties. Any custom details defined in the alert, and any dynamic content in the alert details, are stored here. | | |
| 37 | +| **IsIncident** | boolean | DEPRECATED. Will always be set to *false*. | was used before for ASC they had Alert (incident) and alert | |
| 38 | +| **ProcessingEndTime** | datetime | The time of the alert's publishing. For scheduled rule alerts, this is the value of the TimeGenerated field. | | |
| 39 | +| **ProductComponentName** | string | The name of the component of the product that generated the alert. | | |
| 40 | +| **ProductName** | string | The name of the product that published the alert. | | |
| 41 | +| **ProviderName** | string | The name of the alert provider ***------------------(e.g. Scheduled alert - ASI Scheduled Alerts, NRT - ASI NRT Alerts, Azure defender - Azure Security Center)------------------*** | This needs to be better differentiated from ProductName. Maybe a footnote (or a cross-reference) explaining what an alert provider is? | |
| 42 | +| **RemediationSteps** | string | Manual action items to take to remediate the alert. | | |
| 43 | +| **ResourceId** | string | A unique identifier for the resource that the alert is associated with. | | |
| 44 | +| **SourceComputerId** | string | DEPRECATED. Was the agent ID that created the alert. | | |
| 45 | +| **SourceSystem** | string | DEPRECATED. Will always be populated with the string "Detection". | Not to document? Because deprecated? | |
| 46 | +| **StartTime** | datetime | The start time of the impact of the alert (the time of the first event or activity included in the alert). For scheduled rule alerts, this is the value of the TimeGenerated field for the first event captured by the query. | | |
| 47 | +| **Status** | string | The status of the alert within the life cycle. [New / InProgress / Resolved / Dismissed / Unknown] | | |
| 48 | +| **SystemAlertId** | string | Internal unique ID for the alert in Sentinel. | | |
| 49 | +| **Tactics** | string | MITRE tactics associated with the alert, in comma-separated list form. | | |
| 50 | +| **TenantId** | string | Unique ID of the tenant. | Not to document | |
| 51 | +| **TimeGenerated** | datetime | The time the alert was generated (in UTC). | | |
| 52 | +| **Type** | string | The name of the table. | | |
| 53 | +| **VendorName** | string | The vendor of the product that produces the alert. | Is this ever anything besides the manufacturer of ProductName/ProviderName? | |
| 54 | +| **VendorOriginalId** | string | Unique id for the specific alert instance set by the provider. | | |
| 55 | +| **WorkspaceResourceGroup** | string | The Azure resource group for the Log Analytics workspace storing this alert | DEPRECATED | |
| 56 | +| **WorkspaceSubscriptionId** | string | The Azure subscription ID for the Log Analytics workspace storing this alert | DEPRECATED | |
| 57 | +| | | | | |
| 58 | + |
| 59 | +## Next steps |
| 60 | + |
| 61 | +Learn more about security alerts and analytics rules: |
| 62 | + |
| 63 | +- [Detect threats out-of-the-box](detect-threats-built-in.md) |
| 64 | + |
| 65 | +- [Create custom analytics rules to detect threats](detect-threats-custom.md) |
| 66 | + |
| 67 | +- [Export and import analytics rules to and from ARM templates](import-export-analytics-rules.md) |
0 commit comments