Skip to content

Commit 02067d3

Browse files
Merge pull request #2789 from MicrosoftDocs/main
Publish main to live, 02/14/25, 3:30 PM PT
2 parents 3eeec1f + 4c62f98 commit 02067d3

25 files changed

+210
-3
lines changed

defender-xdr/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -227,7 +227,11 @@
227227
- name: CloudAuditEvents
228228
href: advanced-hunting-cloudauditevents-table.md
229229
- name: CloudProcessEvents
230-
href: advanced-hunting-cloudprocessevents-table.md
230+
href: advanced-hunting-cloudprocessevents-table.md
231+
- name: DataSecurityBehaviors
232+
href: advanced-hunting-datasecuritybehaviors-table.md
233+
- name: DataSecurityEvents
234+
href: advanced-hunting-datasecurityevents-table.md
231235
- name: DeviceBaselineComplianceAssessment
232236
href: advanced-hunting-devicebaselinecomplianceassessment-table.md
233237
- name: DeviceBaselineComplianceAssessmentKB
Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
---
2+
title: DataSecurityBehaviors table in the advanced hunting schema
3+
description: Learn about the DataSecurityBehaviors table of the advanced hunting schema, which contains insights about potentially suspicious user behaviors that violate the user-defined or default policies configured in the Microsoft Purview suite of solutions.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: maccruz
10+
author: schmurky
11+
ms.localizationpriority: medium
12+
manager: dansimp
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
ms.topic: reference
21+
ms.date: 02/11/2025
22+
---
23+
24+
# DataSecurityBehaviors (Preview)
25+
26+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
27+
28+
**Applies to:**
29+
30+
- Microsoft Defender XDR
31+
- Microsoft Purview
32+
33+
34+
35+
> [!IMPORTANT]
36+
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
37+
38+
The `DataSecurityBehaviors` table in the [advanced hunting](advanced-hunting-overview.md) schema contains insights about potentially suspicious user behaviors that violate the user-defined or default policies configured in the Microsoft Purview suite of solutions.
39+
40+
Insights cover a range of data security related behaviors like behaviors involving exfiltration, obfuscation, risky interactions with AI applications, and others. Insights are generated by aggregating user behaviors over a calendar day and comparing them with previous activity, peer group activity, or other activities done by the user. Insights also capture summaries of various risk pivots like sensitive data, risky destinations, and the like.
41+
42+
Use this reference to construct queries that return information from this table.
43+
44+
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
45+
46+
| Column name | Data type | Description |
47+
|-------------|-----------|-------------|
48+
|`Timestamp` | `datetime` | Date and time when the record was generated or updated |
49+
|`BehaviorId` | `string` | Unique identifier for the behavior |
50+
|`ActionType`| `string`|Type of behavior. Refer to the catalog of behaviors detected by Microsoft Purview Insider Risk Management |
51+
|`StartTime`| `datetime` |Date and time of the first activity related to the behavior|
52+
|`EndTime`| `datetime`| Date and time of the last activity related to the behavior|
53+
|`AttackTechniques`| `string`| MITRE ATT&CK techniques associated with the activity that triggered the behavior. Refer to subtechniques in the insider risk management behavior catalog.|
54+
|`Categories`| `string`| Type of threat indicator or breach activity identified by the behavior|
55+
|`ActivityType`| `enum`| Activity category based on categories in Microsoft Purview Insider Risk Management|
56+
|`Description`| `string`| Description of the behavior|
57+
|`ServiceSource`| `string`| Product or service that identified the behavior|
58+
|`DetectionSource`| `string`| Detection technology or sensor that identified the notable component or activity|
59+
|`ActivityCount`| `int`| Total user activity events recorded under this behavior|
60+
|`IsAnomalous`| `bool`| Indicates if this user behavior is anomalous by itself or based on insider risk management global settings|
61+
|`IsContentHidden`| `bool`| Indicates if the behavior involves hidden content on a device|
62+
|`AccountUpn`| `string`| User principal name (UPN) of the account|
63+
|`AccountEmail`| `string`| Email address of the account|
64+
|`Application`| `string` |Application that performed the recorded action|
65+
|`DeviceInfo`| `dynamic`| List of device information for the device involved in this behavior, including device ID, device name, and the number of events in which the device is involved; in JSON array format|
66+
|`SensitivityLabelInfo`| `dynamic`| List of sensitivity labels assigned to content involved in this behavior, including the unique identifier for the Microsoft Information Protection sensitivity label assigned to the related content, the name of the sensitivity label, and the number of events in the behavior involving this label; in JSON array format|
67+
|`SensitiveInfoTypesInfo`| `dynamic` |List of sensitive info types detected in the content involved in this behavior, including the unique identifier for the sensitive info type, the name of the sensitive info type, and the number of events in the behavior involving this sensitive info type; in JSON array format|
68+
|`UrlDomainInfo`| `dynamic`| List of websites or service URLs involved in the behavior, including the name of the URL domain, the direction of data (sent or received from domain), type of URL domain (customer-configured or based on watchlists), and the number of events in the behavior involving the specific domain; in JSON array format|
69+
|`SharepointSiteInfo`| `dynamic`| List of SharePoint sites involved in this behavior, including the unique identifier for the SharePoint site, the name of the SharePoint site, and the number of events in the behavior involving the SharePoint site; in JSON array format|
70+
|`RecipientEmailInfo`| `dynamic`| List of information about the recipient involved in the behavior, including the email address of the recipient and the number of events in the behavior involving the recipient; in JSON array format|
71+
|`RemovableMediaInfo`| `dynamic`| List of any removable media involved in the behavior, including the serial number of the removable media device, the manufacturer of the removable media device, and the model of the removable device; in JSON array format|
72+
|`PrinterName`| `dynamic` |List of printers involved in the behavior; in array format|
73+
|`PriorityContentMatchInfo` |`dynamic`| List of priority content matches identified within this behavior and their associated details. Priority content definitions are done by the admins for each Insider risk management policy. Displayed in JSON array format.|
74+
75+
## Related articles
76+
77+
- [Advanced hunting overview](advanced-hunting-overview.md)
78+
- [Learn the query language](advanced-hunting-query-language.md)
79+
- [Use shared queries](advanced-hunting-shared-queries.md)
80+
- [Understand the schema](advanced-hunting-schema-tables.md)
81+
- [Apply query best practices](advanced-hunting-best-practices.md)
82+
83+
84+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
title: DataSecurityEvents table in the advanced hunting schema
3+
description: Learn about the DataSecurityEvents table of the advanced hunting schema, which contains information about user activities that violate user-defined or default policies in the Microsoft Purview suite of solutions.
4+
ms.service: defender-xdr
5+
ms.subservice: adv-hunting
6+
f1.keywords:
7+
- NOCSH
8+
ms.author: maccruz
9+
author: schmurky
10+
ms.localizationpriority: medium
11+
manager: dansimp
12+
audience: ITPro
13+
ms.collection:
14+
- m365-security
15+
- tier3
16+
ms.custom:
17+
- cx-ti
18+
- cx-ah
19+
ms.topic: reference
20+
ms.date: 02/11/2025
21+
---
22+
23+
# DataSecurityEvents (Preview)
24+
25+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
26+
27+
**Applies to:**
28+
29+
- Microsoft Defender XDR
30+
- Microsoft Purview
31+
32+
33+
34+
> [!IMPORTANT]
35+
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
36+
37+
The `DataSecurityEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about user activities that violate user-defined or default policies in the Microsoft Purview suite of solutions. Each log represents a single user activity enriched with proprietary Microsoft detections (like sensitive info types) and user-defined enrichment labels like domain categories, sensitivity labels, and others.
38+
39+
Use this reference to construct queries that return information from this table.
40+
41+
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
42+
43+
| Column name | Data type | Description |
44+
|-------------|-----------|-------------|
45+
|`ApplicationNames`| `string`|List of application names used or related to the event|
46+
|`DeviceId`| `string`| Unique identifier for the device in Microsoft Defender for Endpoint|
47+
|`DeviceName`| `string`| Fully qualified domain name(FQDN) of the device|
48+
|`AadDeviceId`| `guid`| Unique identifier for the device in Microsoft Entra ID|
49+
|`IsManagedDevice`| `bool`| Indicates if the device is managed by the organization (True) or not (False)|
50+
|`DlpPolicyMatchInfo`| `string`| Information around the list of data loss prevention (DLP) policies matching this event|
51+
|`DlpPolicyEnforcementMode`| `int`| Indicates the Data Loss Prevention policy that was enforced; value can be: 0 (None), 1 (Audit), 2 (Warn), 3 (Warn and bypass), 4 (Block), 5 (Allow)|
52+
|`DlpPolicyRuleMatchInfo`| `dynamic`| Details of the data loss prevention (DLP) rules that matched with this event; in JSON array format|
53+
|`FileRenameInfo`|`string`| Details of the file (file name and extension) prior to this event|
54+
|`PhysicalAccessPointId`| `string`| Unique identifier for the physical access point|
55+
|`PhysicalAccessPointName`| `string`| Name of the physical access point|
56+
|`PhysicalAccessStatus` |`string`| Status of physical access, whether it succeeded or failed|
57+
|`PhysicalAssetTag`|`string` |Tag assigned to the asset as configured in Microsoft Insider Risk Management global settings|
58+
|`RemovableMediaManufacturer`|`string`| Manufacturer name of the removable device|
59+
|`RemovableMediaModel`| `string`| Model name of the removable device|
60+
|`RemovableMediaSerialNumber`| `string`|Serial number of the removable device|
61+
|`TeamsChannelName`|`string`| Name of the Teams channel|
62+
|`TeamsChannelType`| `string`| Type of the Teams channel|
63+
|`TeamsTeamName`| `string` |Name of the Teams team |
64+
|`UserAlternateEmails`| `string`| Alternate emails or aliases of the user|
65+
|`AccountUpn`| `string`| User principal name (UPN) of the account|
66+
|`AccountObjectId`| `string`| Unique identifier for the account in Microsoft Entra ID|
67+
|`Department`|`string`| Name of the department that the account user belongs to|
68+
|`SourceCodeInfo`| `string`| Details of the source code repository involved in the event|
69+
|`CcPolicyMatchInfo`| `dynamic` | Details of the Communications Compliance policy matches for this event; in JSON array format |
70+
|`IPAddress`| `string`| IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts|
71+
|`Timestamp`| `datetime`| Date and time when the event was recorded|
72+
|`DeviceSourceLocationType`| `int`| Indicates the type of location where the endpoint signals originated from; values can be: 0 (Unknown), 1 (Local), 2 (Remote), 3 (Removable), 4 (Cloud), 5 (File share)|
73+
|`DeviceDestinationLocationType`| `int`| Indicates the type of location where the endpoint signals connected to; values can be: 0 (Unknown), 1 (Local), 2 (Remote), 3 (Removable), 4 (Cloud), 5 (File share)|
74+
|`IrmPolicyMatchInfo`| `dynamic`| Details of Insider Risk Management policy matches for the content involved in the event; in JSON array format |
75+
|`UnallowedUrlDomains`| `string`| Websites or service URLs involved in this event that is configured as Unallowed in Insider Risk Management global settings|
76+
|`ExternalUrlDomains`| `string`| Websites or service URLs involved in this event that is classified as External in Insider Risk Management global settings|
77+
|`UrlDomainInfo`| `string`| Details about the websites or service URLs involved in the event|
78+
|`SourceUrlDomain`| `string`| Domain where the device and email signals originated|
79+
|`TargetUrlDomain`| `string`| Domain where the content was shared with or the user has browsed to|
80+
|`EmailAttachmentCount`|`int`| Number of email attachments |
81+
|`EmailAttachmentInfo`| `dynamic`| Details of email attachments; in JSON array format|
82+
|`InternetMessageId`|`string` |Public-facing identifier for the email or Teams message that is set by the sending email system |
83+
|`NetworkMessageId`| `guid`| Unique identifier for the email, generated by Microsoft 365 |
84+
|`EmailSubject`| `string`| Subject of the email|
85+
|`ObjectId`| `string` |Unique identifier of the object that the recorded action was applied to, in case of files it includes the extension|
86+
|`ObjectName`| `string`| Name of the object that the recorded action was applied to, in case of files it includes the extension|
87+
|`ObjectType`| `string`| Type of object, such as a file or a folder, that the recorded action was applied to|
88+
|`ObjectSize`| `int`| Size of the object in bytes|
89+
|`IsHidden`| `bool`| Indicates whether the user has marked the content as hidden (True) or not (False) |
90+
|`ActivityId` |`guid`| Unique identifier of the activity log|
91+
|`ActionType`|`string`| Type of activity that triggered the event|
92+
|`SensitiveInfoTypeInfo`| `dynamic`| Details of Data Loss Prevention sensitive info types detected in the impacted asset|
93+
|`SensitivityLabelId`|`string`|The current Microsoft Information Protection sensitivity label ID associated with the item|
94+
|`SharepointSiteSensitivityLabelIds`|`string`| The current Microsoft Information Protection sensitivity label ID assigned to the parent site of the item related to SharePoint activities |
95+
|`PreviousSensitivityLabelId`| `string`|The previous Microsoft Information Protection sensitivity label ID associated with the item in case of activities where the sensitivity label was changed|
96+
|`Operation`| `string`| Name of the admin activity|
97+
|`RecipientEmailAddress`| `string`| Email address of the recipient, or email address of the recipient after distribution list expansion|
98+
|`SiteUrl`| `string` | The URL of the site where the file or folder accessed by the user is located |
99+
|`SourceRelativeUrl`| `string`| The URL of the folder that contains the file accessed by the user |
100+
|`TargetFilePath`| `string`| Target file path of endpoint activities|
101+
|`PrinterName`| `string`| List of printers involved in the behavior|
102+
|`Workload`|`string`| The Microsoft 365 service where the event occurred|
103+
|`IrmActionCategory`| `enum`| A unique enumeration value indicating the activity category in Microsoft Purview Insider Risk Management|
104+
|`SequenceCorrelationId`|`string` |Details of the sequence activity|
105+
106+
107+
## Related articles
108+
109+
- [Advanced hunting overview](advanced-hunting-overview.md)
110+
- [Learn the query language](advanced-hunting-query-language.md)
111+
- [Use shared queries](advanced-hunting-shared-queries.md)
112+
- [Understand the schema](advanced-hunting-schema-tables.md)
113+
- [Apply query best practices](advanced-hunting-best-practices.md)
114+
115+
116+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,8 @@ The following reference lists all the tables in the schema. Each table name link
6262
| **[BehaviorInfo](advanced-hunting-behaviorinfo-table.md)** (Preview) | Alerts from Microsoft Defender for Cloud Apps (not available for GCC) |
6363
| **[CloudAppEvents](advanced-hunting-cloudappevents-table.md)** | Events involving accounts and objects in Office 365 and other cloud apps and services |
6464
| **[CloudAuditEvents](advanced-hunting-cloudauditevents-table.md)** (Preview)| Cloud audit events for various cloud platforms protected by the organization's Microsoft Defender for Cloud |
65+
| **[DataSecurityBehaviors](advanced-hunting-datasecuritybehaviors-table.md)** (Preview)| Insights about potentially suspicious user behaviors that violate user-defined or default policies configured in the Microsoft Purview suite of solutions|
66+
| **[DataSecurityEvents](advanced-hunting-datasecurityevents-table.md)** (Preview)| Information about user activities that violate user-defined or default policies in the Microsoft Purview suite of solutions |
6567
| **[CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md)** (Preview)| Cloud process events for various cloud platforms protected by the organization's Microsoft Defender for Containers |
6668
| **[DeviceBaselineComplianceAssessment](advanced-hunting-devicebaselinecomplianceassessment-table.md)** (Preview) | Baseline compliance assessment snapshot, which indicates the status of various security configurations related to baseline profiles on devices |
6769
| **[DeviceBaselineComplianceAssessmentKB](advanced-hunting-devicebaselinecomplianceassessmentkb-table.md)** (Preview) | Information about various security configurations used by baseline compliance to assess devices |

defender-xdr/irm-investigate-alerts-defender.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -119,8 +119,8 @@ Use advanced hunting to further investigate insider risk events and behaviors. R
119119
|:---|:---|
120120
|[AlertInfo](advanced-hunting-alertinfo-table.md)|Insider risk management alerts are available as part the AlertInfo table, which contains information about alerts from various Microsoft security solutions.|
121121
|[AlertEvidence](advanced-hunting-alertevidence-table.md)|Insider risk management alerts are available as part of the AlertEvidence table, which contains information about entities associated with alerts from various Microsoft security solutions.|
122-
|DataSecurityBehaviors|This table contains insights into potentially suspicious user behavior that violates the default or customer-defined policies in Microsoft Purview.|
123-
|DataSecurityEvents|This table contains enriched events about user activities that violate the default or customer-defined policies in Microsoft Purview.|
122+
|[DataSecurityBehaviors](advanced-hunting-datasecuritybehaviors-table.md)|This table contains insights into potentially suspicious user behavior that violates the default or customer-defined policies in Microsoft Purview.|
123+
|[DataSecurityEvents](advanced-hunting-datasecurityevents-table.md)|This table contains enriched events about user activities that violate the default or customer-defined policies in Microsoft Purview.|
124124

125125
In the example below, we use the **DataSecurityEvents** table to investigate potentially suspicious user behavior. In this case, the user uploaded a file to Google Drive, which can be viewed as suspicious behavior if a company doesn't support file uploads to Google Drive.
126126

defender-xdr/whats-new.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ You can also get product updates and important notifications through the [messag
3535
## February 2025
3636
- (Preview) The `PrivilegedEntraPimRoles` column is available for preview in the advanced hunting [IdentityInfo](advanced-hunting-identityinfo-table.md) table.
3737

38+
3839
## January 2025
3940

4041
- (Preview) Device activity events from Microsoft Sentinel's device [entity pages](/azure/sentinel/entity-pages) are now visible in the *Timeline* tab on the [Device entity page](./entity-page-device.md#timeline-tab) in the Defender portal, in addition to remaining visible on the [*Sentinel events* tab](./entity-page-device.md#sentinel-events-tab).
23.9 KB
Loading
7.07 KB
Loading
19.2 KB
Loading
17.3 KB
Loading

0 commit comments

Comments
 (0)