Skip to content

Commit 48efafc

Browse files
committed
Update advanced hunting tables to Preview status
Marked CampaignInfo and FileMaliciousContentInfo tables as (Preview) in documentation, added important notice about prereleased product, and updated the schema reference and what's new page to reflect their preview availability.
1 parent d27a09f commit 48efafc

File tree

4 files changed

+14
-11
lines changed

4 files changed

+14
-11
lines changed

defender-xdr/advanced-hunting-campaigninfo-table.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,12 @@ ms.topic: reference
2424
ms.date: 12/01/2025
2525
---
2626

27-
# CampaignInfo
27+
# CampaignInfo (Preview)
2828

2929
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3030

31-
31+
> [!IMPORTANT]
32+
> Some information relates to prereleased product which might be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3233
3334

3435
The `CampaignInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about email campaigns identified by Microsoft Defender for Office 365. Use this reference to construct queries that return information from this table.
@@ -37,8 +38,7 @@ This advanced hunting table is populated by records from Defender for Office 365
3738

3839
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
3940

40-
> [!IMPORTANT]
41-
> Some information relates to prereleased product which might be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
41+
4242

4343
| Column name | Data type | Description |
4444
|-------------|-----------|-------------|

defender-xdr/advanced-hunting-filemaliciouscontentinfo-table.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,13 @@ ms.topic: reference
2424
ms.date: 12/01/2025
2525
---
2626

27-
# FileMaliciousContentInfo
27+
# FileMaliciousContentInfo (Preview)
2828

2929
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3030

31+
> [!IMPORTANT]
32+
> Some information relates to prereleased product which might be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
33+
3134
The `FileMaliciousContentInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about files that were identified as malicious by Microsoft Defender for Office 365 in SharePoint Online, OneDrive, and Microsoft Teams. Use this reference to construct queries that return information from this table.
3235

3336
> [!TIP]
@@ -37,8 +40,7 @@ This advanced hunting table is populated by records from Defender for Office 365
3740

3841
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
3942

40-
> [!IMPORTANT]
41-
> Some information relates to prereleased product which might be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
43+
4244

4345
| Column name | Data type | Description |
4446
|-------------|-----------|-------------|

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ The following reference lists all the tables in the schema. Each table name link
102102
| **[EntraIdSpnSignInEvents](advanced-hunting-entraidspnsigninevents-table.md)** (Preview)| Microsoft Entra service principal and managed identity sign-ins |
103103
| **[ExposureGraphEdges](advanced-hunting-exposuregraphedges-table.md)** | Microsoft Security Exposure Management exposure graph edge information provides visibility into relationships between entities and assets in the graph |
104104
| **[ExposureGraphNodes](advanced-hunting-exposuregraphnodes-table.md)** | Microsoft Security Exposure Management exposure graph node information, about organizational entities and their properties |
105-
| **[FileMaliciousContentInfo](advanced-hunting-emailurlinfo-table.md)** | Files that were identified as malicious by Microsoft Defender for Office 365 in SharePoint Online, OneDrive, and Microsoft Teams |
105+
| **[FileMaliciousContentInfo](advanced-hunting-emailurlinfo-table.md)** (Preview) | Files that were identified as malicious by Microsoft Defender for Office 365 in SharePoint Online, OneDrive, and Microsoft Teams |
106106
| **[GraphApiAuditEvents](advanced-hunting-graphapiauditevents-table.md)** (Preview) | Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant |
107107
| **[IdentityAccountInfo](advanced-hunting-identityaccountinfo-table.md)** (Preview) | Account information from various sources, including Microsoft Entra ID. This table also includes information and link to the identity that owns the account. |
108108
| **[IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md)** | Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller. |

defender-xdr/whats-new.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,10 +33,11 @@ For more information on what's new with other Microsoft Defender security produc
3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

3535
## December 2025
36+
- (Preview) The following advanced hunting schema tables are now available for preview:
37+
- The [`CampaignInfo`](advanced-hunting-campaigninfo-table.md) table contains contains information about email campaigns identified by Microsoft Defender for Office 365
38+
- The [`FileMaliciousContentInfo`](advanced-hunting-filemaliciouscontentinfo-table.md) table contains information about files that were identified as malicious by Microsoft Defender for Office 365 in SharePoint Online, OneDrive, and Microsoft Teams
3639
- (GA) The [hunting graph](advanced-hunting-graph.md) in advanced hunting is now generally available. It also now has two new predefined threat scenarios that you can use to render your hunts as interactive graphs.
37-
- (GA) Advanced hunting now supports custom functions that use tabular parameters. With tabular parameters, you can pass entire tables as inputs. This approach lets you build more modular, reusable, and expressive logic across your hunting queries. [Learn more](advanced-hunting-custom-functions.md#create-custom-functions-with-tabular-parameters)
38-
- (GA) The [`CampaignInfo`](advanced-hunting-campaigninfo-table.md) table is now available in advanced hunting. Use it to hunt through information about email campaigns identified by Microsoft Defender for Office 365.
39-
- (GA) The [`FileMaliciousContentInfo](advanced-hunting-filemaliciouscontentinfo-table.md) table is now available in advanced hunting. Use it to hunt through information about files that were identified as malicious by Microsoft Defender for Office 365 in SharePoint Online, OneDrive, and Microsoft Teams.
40+
- (GA) Advanced hunting now supports custom functions that use tabular parameters. With tabular parameters, you can pass entire tables as inputs. This approach lets you build more modular, reusable, and expressive logic across your hunting queries. [Learn more](advanced-hunting-custom-functions.md#create-custom-functions-with-tabular-parameters)
4041

4142
## November 2025
4243
- Microsoft Sentinel customers using the Defender portal, or the Azure portal with the Microsoft Sentinel Defender XDR data connector, now also benefit from Microsoft Threat Intelligence alerts that highlight activity from nation-state actors, major ransomware campaigns, and fraudulent operations. To view these alert types, you must have the **Security Administrator** or **Global Administrator** role. The **Service Source**, **Detection Source**, and **Product Name** values for these alerts are listed as *Microsoft Threat Intelligence*. For more information, see [Incidents and alerts in the Microsoft Defender portal](incidents-overview.md).

0 commit comments

Comments
 (0)