Skip to content

Commit 0f4ea67

Browse files
authored
Merge branch 'main' into WI473943-account-view-manual-account-correlation
2 parents 99aee22 + 790235d commit 0f4ea67

File tree

5 files changed

+103
-9
lines changed

5 files changed

+103
-9
lines changed

defender-for-cloud-apps/policy-template-reference.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
---
22
title: Microsoft Defender for Cloud Apps policy templates
33
description: This article provides information on policy templates included in Microsoft Defender for Cloud Apps.
4-
ms.date: 01/29/2023
4+
ms.date: 11/16/2025
55
ms.topic: how-to
6-
ms.reviewer: Ronen-Refaeli
6+
ms.reviewer: MayaAbelson
7+
78
---
89

910
# Defender for Cloud Apps policy templates
@@ -13,7 +14,6 @@ We recommend that you simplify policy creation by starting with existing templat
1314
For the full list of templates, check the Microsoft Defender Portal.
1415

1516

16-
1717
## Policy template highlights
1818

1919
|Risk category|Template name|Description|
@@ -33,10 +33,6 @@ For the full list of templates, check the Microsoft Defender Portal.
3333
|Cloud discovery|New risky app|Alert when new apps are discovered with risk score lower than 6 and that are used by more than 50 users with a total daily use of more than 50 MB.|
3434
|Cloud discovery|New sales app|Alert when new sales apps are discovered that are used by more than 50 users with a total daily use of more than 50 MB.|
3535
|Cloud discovery|New vendor management system apps|Alert when new vendor management system apps are discovered that are used by more than 50 users with a total daily use of more than 50 MB.|
36-
|DLP|Externally shared source code|Alert when a file containing source code is shared outside your organization.|
37-
|DLP|File containing PCI detected in the cloud (built-in DLP engine)|Alert when a file with payment card information (PCI) is detected by the Microsoft Defender for Cloud Apps built-in data loss prevention (DLP) engine in a sanctioned cloud app.|
38-
|DLP|File containing PHI detected in the cloud (built-in DLP engine)|Alert when a file with protected health information (PHI) is detected by the Microsoft Defender for Cloud Apps built-in data loss prevention (DLP) engine in a sanctioned cloud app.|
39-
|DLP|File containing private information detected in the cloud (built-in DLP engine)|Alert when a file with personal data is detected by the Microsoft Defender for Cloud Apps built-in data loss prevention (DLP) engine in a sanctioned cloud app.|
4036
|Threat detection|Administrative activity from a non-corporate IP address|Alert when an admin user performs an administrative activity from an IP address that isn't included in the corporate IP address range category. First configure your corporate IP addresses by going to the Settings page, and setting **IP address ranges**.|
4137
|Threat detection|Log on from a risky IP address|Alert when a user signs into your sanctioned apps from a risky IP address. By default, the Risky IP address category contains addresses that have IP address tags of Anonymous proxy, TOR, or Botnet. You can add more IP addresses to this category in the IP address ranges settings page.|
4238
|Threat detection|Mass download by a single user|Alert when a single user performs more than 50 downloads within 1 minute.|

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -315,6 +315,8 @@
315315
href: advanced-hunting-exposuregraphnodes-table.md
316316
- name: GraphApiAuditEvents
317317
href: advanced-hunting-graphapiauditevents-table.md
318+
- name: IdentityAccountInfo
319+
href: advanced-hunting-identityaccountinfo-table.md
318320
- name: IdentityDirectoryEvents
319321
href: advanced-hunting-identitydirectoryevents-table.md
320322
- name: IdentityEvents
Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
---
2+
title: IdentityAccountInfo table in the advanced hunting schema
3+
description: Learn about the IdentityAccountInfo table in the advanced hunting schema, which provides account information from various sources, including Microsoft Entra ID.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: pauloliveria
10+
author: poliveria
11+
ms.localizationpriority: medium
12+
manager: orspodek
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
ms.topic: reference
21+
ms.date: 11/17/2025
22+
---
23+
24+
# IdentityAccountInfo (Preview)
25+
26+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
27+
28+
> [!IMPORTANT]
29+
> Some information relates to prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
30+
31+
The `IdentityAccountInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about account information from various sources, including Microsoft Entra ID. This table also includes information and link to the identity that owns the account. Use this reference to construct queries that return information from this table.
32+
33+
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
34+
35+
36+
| Column name | Data type | Description |
37+
|-------------|-----------|-------------|
38+
| `Timestamp` | `datetime` | The date and time that the line was written to the database.<br><br>This is used when there are multiple lines for each identity, such as when a change is detected, or if 24 hours have passed since the last database line was added. |
39+
| `ReportId` | `string` | Unique identifier for the event |
40+
| `SourceProviderAccountId` | `string` | Identifier for the account in the source provider (for example, object ID for a Microsoft Entra ID account) |
41+
| `AccountId` | `string` | Internal identifier for the account |
42+
| `IdentityId` | `string` | Identifier for the identity that the account is linked to |
43+
| `IsPrimary ` | `bool` | Indicates if this account is considered as primary account for the linked identity |
44+
| `IdentityLinkType` | `string` | Type of linkage between the account and identity; possible values: Manual, Strong identifiers |
45+
| `IdentityLinkReason` | `string` | Reason for linking the account and identity. If the linkage type is manual, the value will be the justification comment added by the user. |
46+
| `IdentityLinkTime` | `datetime` | Date and time the account was linked to the identity |
47+
| `IdentityLinkBy` | `string` | The entity that linked the account to the identity. If the linkage type is based on strong identifiers, the value will be System |
48+
| `DisplayName` | `string` | Name of the account user displayed in the address book. Typically a combination of a given or first name, a middle initial, and a last name or surname. |
49+
| `AccountUpn` | `string` | User principal name (UPN) of the account |
50+
| `EmailAddress` | `string` | SMTP address of the account |
51+
| `CriticalityLevel` | `int` | The criticality score of the account |
52+
| `DefenderRiskLevel` | `int` | The risk level of the account as calculated by Microsoft Defender |
53+
| `DefenderRiskUpdateTime` | `datetime` | Date and time Microsoft Defender last updated the risk level of the account |
54+
| `Type` | `string` | Type of identity; possible values: User, ServiceAccount |
55+
| `GivenName` | `string` | Given name or first name of the account user |
56+
| `Surname` | `string` | Surname, family name, or last name of the account user |
57+
| `EmployeeId` | `string` | Employee identifier assigned to the user by the organization |
58+
| `Department` | `string` | Name of the department that the account user belongs to |
59+
| `JobTitle` | `string` | Job title of the account user |
60+
| `Address` | `string` | Address of the account user |
61+
| `City` | `string` | City where the account user is located |
62+
| `Country` | `string` | Country/Region where the account user is located |
63+
| `Phone` | `string` | The listed phone number of the account user |
64+
| `Manager` | `string` | The listed manager of the account user |
65+
| `Sid` | `string` | Security identifier (SID) of the account |
66+
| `AccountStatus` | `string` | The status of the account; possible values: Disabled, Enabled, Deleted |
67+
| `SourceProvider` | `string` | Source application or service of the account (for example, Microsoft Entra ID) |
68+
| `SourceProviderInstanceId` | `string` | The identifier of the source application or service of the account. For example, in Microsoft Entra ID, this is the organization Globally Unique Identifier (GUID). |
69+
| `SourceProviderInstanceDisplayName` | `string` | The display name of the source application or service of the account |
70+
| `AuthenticationMethod` | `string` | Authentication method used to allow the account user to sign into the account; possible values: Credentials, Federated, Hybrid |
71+
| `AuthenticationSourceAcccountId` | `string` | The identifier of the federating account, if the authentication method is Federated |
72+
| `EnrolledMfas` | `dynamic` | Types of multifactor authentication methods configured for the account user and their status |
73+
| `LastPasswordChangeTime` | `datetime` | Date and time the account password was last changed |
74+
| `GroupMembership` | `dynamic` | Group identifiers assigned to the account |
75+
| `AssignedRoles` | `dynamic` | Role identifiers assigned to the account |
76+
| `EligibleRoles` | `dynamic` | Identifiers for roles the account are eligible to use (for example, Microsoft Entra Privileged Identity Management roles) |
77+
| `TenantMembershipType` | `string` | User type; possible values: Guest, Member |
78+
| `CreatedDateTime ` | `datetime` | Date and time when the user account was created |
79+
| `DeletedDateTime` | `datetime` | Date and time when the user account was deleted |
80+
| `Tags` | `dynamic` | Tags assigned to the account by Defender for Identity |
81+
| `SourceProvderRiskLevel` | `dynamic` | Risk level of the account as it appears in the source provider; possible values: Low, Medium, High |
82+
| `AdditionalFields` | `dynamic` | Additional information about the entity or event |
83+
| `TenantId` | `string` | Universally unique identifier (UUID) for the tenant |
84+
85+
86+
## Related articles
87+
88+
- [Advanced hunting overview](advanced-hunting-overview.md)
89+
- [Learn the query language](advanced-hunting-query-language.md)
90+
- [Use shared queries](advanced-hunting-shared-queries.md)
91+
- [Understand the schema](advanced-hunting-schema-tables.md)
92+
- [Apply query best practices](advanced-hunting-best-practices.md)
93+
94+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 11/04/2025
24+
ms.date: 11/17/2025
2525
---
2626

2727
# Understand the advanced hunting schema
@@ -102,6 +102,7 @@ The following reference lists all the tables in the schema. Each table name link
102102
| **[ExposureGraphEdges](advanced-hunting-exposuregraphedges-table.md)** | Microsoft Security Exposure Management exposure graph edge information provides visibility into relationships between entities and assets in the graph |
103103
| **[ExposureGraphNodes](advanced-hunting-exposuregraphnodes-table.md)** | Microsoft Security Exposure Management exposure graph node information, about organizational entities and their properties |
104104
| **[GraphApiAuditEvents](advanced-hunting-graphapiauditevents-table.md)** (Preview) | Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant |
105+
| **[IdentityAccountInfo](advanced-hunting-identityaccountinfo-table.md)** (Preview) | Account information from various sources, including Microsoft Entra ID. This table also includes information and link to the identity that owns the account. |
105106
| **[IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md)** | Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller. |
106107
| **[IdentityEvents](advanced-hunting-identityevents-table.md)** (Preview) | Information about identity events obtained from other cloud identity service providers |
107108
| **[IdentityInfo](advanced-hunting-identityinfo-table.md)** | Account information from various sources, including Microsoft Entra ID |

defender-xdr/whats-new.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-xdr
66
ms.author: guywild
77
author: guywi-ms
88
ms.localizationpriority: medium
9-
ms.date: 11/03/2025
9+
ms.date: 11/17/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -33,6 +33,7 @@ For more information on what's new with other Microsoft Defender security produc
3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

3535
## November 2025
36+
- (Preview) The [`IdentityAccountInfo`](advanced-hunting-identityaccountinfo-table.md) table in advanced hunting is now available for preview. This table contains information about account information from various sources, including Microsoft Entra ID. It also includes information and link to the identity that owns the account.
3637
- (Preview) Threat analytics now has an **Indicators** tab that provides a list of all indicators of compromise (IOCs) associated with a threat. Microsoft researchers update these IOCs in real time as they find new evidence related to the threat. This information helps your security operations center (SOC) and threat intelligence analysts with remediation and proactive hunting. [Learn more](threat-analytics-indicators.md)
3738
- (Preview) The overview section of [threat analytics](threat-analytics.md) now includes additional details about a threat, such as alias, origin, and related intelligence, providing you with more insights on what the threat is and how it might impact your organization.
3839

0 commit comments

Comments
 (0)