Skip to content

Commit 3e29c41

Browse files
committed
new table
1 parent cb0a6b4 commit 3e29c41

File tree

3 files changed

+97
-1
lines changed

3 files changed

+97
-1
lines changed
Lines changed: 92 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,92 @@
1+
---
2+
title: IdentityAccountInfo table in the advanced hunting schema
3+
description: Learn about the IdentityAccountInfo table in the advanced hunting schema, which provides account information from various sources, including Microsoft Entra ID.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: pauloliveria
10+
author: poliveria
11+
ms.localizationpriority: medium
12+
manager: orspodek
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
ms.topic: reference
21+
ms.date: 09/01/2025
22+
---
23+
24+
# IdentityAccountInfo (Preview)
25+
26+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
27+
28+
> [!IMPORTANT]
29+
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
30+
31+
The `IdentityAccountInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about account information from various sources, including Microsoft Entra ID. This table also includes information and link to the identity that owns the account. Use this reference to construct queries that return information from this table.
32+
33+
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
34+
35+
36+
| Column name | Data type | Description |
37+
|-------------|-----------|-------------|
38+
| `Timestamp` | `datetime` | The date and time that the line was written to the database.<br><br>This is used when there are multiple lines for each identity, such as when a change is detected, or if 24 hours have passed since the last database line was added. |
39+
| `ReportId` | `string` | Unique identifier for the event |
40+
| `SourceProviderAccountId` | `string` | Identifier for the account in the source provider (for example, object ID for a Microsoft Entra ID account) |
41+
| `AccountId` | `string` | Internal identifier for the account |
42+
| `IdentityId` | `string` | Identifier for the identity that the account is linked to |
43+
| `IsPrimary ` | `bool` | Indicates if this account is considered as primary account for the linked identity |
44+
| `IdentityLinkType` | `string` | Type of linkage between the account and identity; possible values: Manual, Strong identifiers |
45+
| `IdentityLinkReason` | `string` | Reason for linking the account and identity. If the linkage type is manual, the value will be the justification comment added by the user. |
46+
| `IdentityLinkTime` | `datetime` | Date and time the account was linked to the identity |
47+
| `IdentityLinkBy` | `string` | The entity that linked the account to the identity. If the linkage type is based on strong identifiers, the value will be System |
48+
| `DisplayName` | `string` | Name of the account user displayed in the address book. Typically a combination of a given or first name, a middle initial, and a last name or surname. |
49+
| `AccountUpn` | `string` | User principal name (UPN) of the account |
50+
| `EmailAddress` | `string` | SMTP address of the account |
51+
| `CriticalityLevel` | `int` | The criticality score of the account |
52+
| `Type` | `string` | Type of identity; possible values: User, ServiceAccount |
53+
| `GivenName` | `string` | Given name or first name of the account user |
54+
| `Surname` | `string` | Surname, family name, or last name of the account user |
55+
| `EmployeeId` | `string` | Employee identifier assigned to the user by the organization |
56+
| `Department` | `string` | Name of the department that the account user belongs to |
57+
| `JobTitle` | `string` | Job title of the account user |
58+
| `Address` | `string` | Address of the account user |
59+
| `City` | `string` | City where the account user is located |
60+
| `Country` | `string` | Country/Region where the account user is located |
61+
| `Phone` | `string` | The listed phone number of the account user |
62+
| `Manager` | `string` | The listed manager of the account user |
63+
| `Sid` | `string` | Security identifier (SID) of the account |
64+
| `AccountStatus` | `string` | The status of the account; possible values: Disabled, Enabled, Deleted |
65+
| `SourceProvider` | `string` | Source application or service of the account (for example, Microsoft Entra ID) |
66+
| `SourceProviderInstanceId` | `string` | The identifier of the source application or service of the account. For example, in Microsoft Entra ID, this is the organization Globally Unique Identifier (GUID). |
67+
| `SourceProviderInstanceDisplayName` | `string` | The display name of the source application or service of the account |
68+
| `AuthenticationMethod` | `string` | Authentication method used to allow the account user to sign into the account; possible values: Credentials, Federated, Hybrid |
69+
| `AuthenticationSourceAcccountId` | `string` | The identifer of the federating account, if the authentication method is Federated |
70+
| `EnrolledMfas` | `dynamic` | Types of multifactor authentication methods configured for the account user and their status |
71+
| `LastPasswordChangeTime` | `datetime` | Date and time the account password was last changed |
72+
| `GroupMembership` | `dynamic` | Group identifiers assigned to the account |
73+
| `AssignedRoles` | `dynamic` | Role identifiers assigned to the account |
74+
| `EligibleRoles` | `dynamic` | Identifers for roles the account are eligible to use (for example, Microsoft Entra Privileged Identity Management roles) |
75+
| `TenantMembershipType` | `string` | User type; possible values: Guest, Member |
76+
| `CreatedDateTime ` | `datetime` | Date and time when the user account was created |
77+
| `DeletedDateTime` | `datetime` | Date and time when the user account was deleted |
78+
| `Tags` | `dynamic` | Tags assigned to the account by Defender for Identity |
79+
| `SourceProvderRiskLevel` | `dynamic` | Risk level of the account as it appears in the source provider; possible values: Low, Medium, High |
80+
| `AdditionalFields` | `dynamic` | Additional information about the entity or event |
81+
| `TenantId` | `string` | Universally unique identifier (UUID) for the tenant |
82+
83+
84+
## Related articles
85+
86+
- [Advanced hunting overview](advanced-hunting-overview.md)
87+
- [Learn the query language](advanced-hunting-query-language.md)
88+
- [Use shared queries](advanced-hunting-shared-queries.md)
89+
- [Understand the schema](advanced-hunting-schema-tables.md)
90+
- [Apply query best practices](advanced-hunting-best-practices.md)
91+
92+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 08/05/2025
24+
ms.date: 09/01/2025
2525
---
2626

2727
# Understand the advanced hunting schema
@@ -99,6 +99,7 @@ The following reference lists all the tables in the schema. Each table name link
9999
| **[ExposureGraphEdges](advanced-hunting-exposuregraphedges-table.md)** | Microsoft Security Exposure Management exposure graph edge information provides visibility into relationships between entities and assets in the graph |
100100
| **[ExposureGraphNodes](advanced-hunting-exposuregraphnodes-table.md)** | Microsoft Security Exposure Management exposure graph node information, about organizational entities and their properties |
101101
| **[GraphApiAuditEvents](advanced-hunting-graphapiauditevents-table.md)** (Preview) | Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant |
102+
| **[IdentityAccountInfo](advanced-hunting-identityaccountinfo-table.md)** (Preview) | Account information from various sources, including Microsoft Entra ID. This table also includes information and link to the identity that owns the account. |
102103
| **[IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md)** | Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller. |
103104
| **[IdentityInfo](advanced-hunting-identityinfo-table.md)** | Account information from various sources, including Microsoft Entra ID |
104105
| **[IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md)** | Authentication events on Active Directory and Microsoft online services |

defender-xdr/whats-new.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,9 @@ For more information on what's new with other Microsoft Defender security produc
3232

3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

35+
## September 2025
36+
- (Preview) The [`IdentityAccountInfo`](advanced-hunting-identityaccountinfo-table.md) table in advanced hunting is now available for preview. This table contains information about account information from various sources, including Microsoft Entra ID. It also includes information and link to the identity that owns the account.
37+
3538
## August 2025
3639
- (GA) [Microsoft Defender Experts for XDR](dex-xdr-overview.md) and [Microsoft Defender Experts for Hunting](defender-experts-for-hunting.md) customers can now expand their service coverage to include server and cloud workloads protected by Microsoft Defender for Cloud through the respective add-ons, **Microsoft Defender Experts for Servers** and **Microsoft Defender Experts for Hunting - Servers**. [Learn more](faq-cloud-coverage-defender-experts.md)
3740
- (GA) Defender Experts for XDR customers can now [incorporate third-party network signals](third-party-enrichment-defender-experts.md) for enrichment, which could allow our security analysts to not only gain a more comprehensive view of an attack's path that allows for faster and more thorough detection and response, but also provide customers with a more holistic view of the threat in their environments.

0 commit comments

Comments
 (0)