Skip to content

Commit 49f8df9

Browse files
Merge pull request #4665 from MicrosoftDocs/main
[AutoPublish] main to live - 08/05 04:30 PDT | 08/05 17:00 IST
2 parents f896730 + 23ff73a commit 49f8df9

File tree

4 files changed

+165
-5
lines changed

4 files changed

+165
-5
lines changed

CloudAppSecurityDocs/behaviors.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Investigate behaviors with advanced hunting | Microsoft Defender for Cloud Apps
33
description: Learn how to investigate Microsoft Defender for Cloud App behaviors with Microsoft Defender XDR advanced hunting.
4-
ms.date: 09/07/2023
4+
ms.date: 08/05/2025
55
ms.topic: how-to
66
#CustomerIntent: As a Defender for Cloud Apps customer, I want to understand how behaviors work so that I can investigate more effectively.
77
---
@@ -10,9 +10,9 @@ ms.topic: how-to
1010

1111

1212

13-
While some anomaly detections focus primarily on detecting problematic security scenarios, others can help identifying and investigating anomalous user behavior that doesn't necessarily indicate a compromise. In such cases, Microsoft Defender for Cloud Apps uses a separate data type, called *behaviors*.
13+
While some anomaly detections focus primarily on detecting problematic security scenarios, others can help identifying and investigating anomalous user behavior that doesn't necessarily indicate a compromise. In such cases, Microsoft Defender for Cloud Apps and Microsoft Defender for Cloud use a separate data type, called *behaviors*.
1414

15-
This article describes how to investigate Defender for Cloud Apps behaviors with Microsoft Defender XDR advanced hunting.
15+
This article describes how to investigate Defender for Cloud Apps and Defender for Cloud behaviors with Microsoft Defender XDR advanced hunting.
1616

1717
Have feedback to share? Fill out our [feedback form](https://forms.office.com/r/x0mX5hBkGu)!
1818

@@ -27,7 +27,7 @@ While behaviors might be related to security scenarios, they're not necessarily
2727
2828
## Supported detections
2929

30-
Behaviors currently support low-fidelity, Defender for Cloud Apps detections, that may not meet the standard for alerts but are still useful in providing context during an investigation. Currently supported detections include:
30+
Behaviors currently support low-fidelity, Defender for Cloud Apps and Defender for Cloud detections, that may not meet the standard for alerts but are still useful in providing context during an investigation. Currently supported detections include:
3131

3232
|Alert name |Policy name |ActionType (Hunting)|
3333
|---------|---------|---------|
Lines changed: 157 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,157 @@
1+
---
2+
title: CloudStorageAggregatedEvents table in the advanced hunting schema
3+
description: Learn about the CloudStorageAggregatedEvents table in the advanced hunting schema, which contains information about storage activity and related events.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: pauloliveria
10+
author: poliveria
11+
ms.localizationpriority: medium
12+
manager: orspodek
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
23+
ms.topic: reference
24+
ms.date: 08/05/2025
25+
---
26+
27+
# CloudStorageAggregatedEvents (Preview)
28+
29+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
30+
31+
The `CloudStorageAggregatedEvents` table in the [advanced hunting](advanced-hunting-overview.md) contains information about storage activity and related events. Use this reference to construct queries that return information from this table.
32+
33+
> [!IMPORTANT]
34+
> Some information relates to prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
35+
36+
This advanced hunting table is populated by records from [Microsoft Defender for Cloud](/azure/defender-for-cloud/concept-integration-365#advanced-hunting-in-xdr). If your organization doesn't have Microsoft Defender for Cloud, queries that use the table aren’t going to work or return any results. For more information about prerequisites in integrating Defender for Cloud with Defender XDR, read [Microsoft Defender XDR integration](/azure/defender-for-cloud/concept-integration-365).
37+
38+
39+
For information on other tables in the advanced hunting schema, see the [advanced hunting reference](advanced-hunting-schema-tables.md).
40+
41+
| Column name | Data type | Description |
42+
|-------------|-----------|-------------|
43+
| `DataAggregationStartTime` | `datetime` | The start time during which the data was aggregated |
44+
| `DataAggregationEndTime` | `datetime` | The end time during which the data was aggregated |
45+
| `DataSource` | `string` | The source of the aggregated logs |
46+
| `SubscriptionId` | `string` | Unique identifier assigned to the Azure subscription |
47+
| `ResourceGroup` | `string` | Name of the resource group where the storage account resides |
48+
| `StorageAccount` | `string` | The identifier for the storage account |
49+
| `StorageContainer` | `string` | The identifier for the storage container |
50+
| `StorageFileShare` | `string` | The identifier for the storage file share |
51+
| `ServiceType` | `string` | Specifies the type of storage service (for example, Blob, ADLS Gen2, Files.REST, Files.SMB) |
52+
| `IpAddress` | `string` | The IP addresses from which the storage was accessed |
53+
| `UserAgentHeader` | `string` | Details of the user agent accessing the storage (for example, browser or application) |
54+
| `OperationNamesList` | `object` | A list of storage operations performed (for example, CreateContainer, DeleteContainer) |
55+
| `AuthenticationType` | `string` | The authentication method used to access the storage (for example, AccountKey, SAS, Oauth) |
56+
| `AccountObjectId` | `string` | The unique identifier of the object is making the storage access |
57+
| `AccountTenantId` | `long` | The unique identifier of the Azure tenant |
58+
| `AccountApplicationId` | `string` | The application ID associated with the storage access |
59+
| `AccountUpn` | `string` | The user principal name of the accessing user |
60+
| `AccountType` | `long` | The account type used |
61+
| `OperationsCount` | `int` | The total number of storage operations performed |
62+
| `SuccessfulOperationsCount` | `int` | The count of successful storage operations |
63+
| `FailedOperationsCount` | `int` | The count of failed storage operations |
64+
| `FirstEventTimestamp` | `datetime` | The timestamp of the first observed operation in the aggregation period |
65+
| `LastEventTimestamp` | `datetime` | The timestamp of the last observed operation in the aggregation period |
66+
| `TotalResponseLength` | `int` | The total response length of all GET operations during the aggregation period |
67+
| `SuccessfulReadOperations` | `int` | The count of successful read operations |
68+
| `DistinctGetOperations` | `int` | The count of distinct GET operations performed |
69+
| `AnonymousSuccessfulOperations` | `int` | The count of successful anonymous operations |
70+
| `HasAnonymousResourceNotFoundFailures` | `bool` | Indicates whether anonymous resource not found failures occurred |
71+
| `CountryName` | `string` | The name of the country from where the storage was accessed |
72+
| `CityName` | `string` | The name of the city from where the storage was accessed |
73+
| `ProvinceName` | `string` | The name of the province or state from where the storage was accessed |
74+
| `ClientSystemServiceName` | `string` | The name of the system service is in the data center |
75+
| `ClientCloudPlatformName` | `string` | The name of the cloud platform where the data center is located |
76+
| `IsTorExitNode` | `bool` | Indicates whether the IP address is a Tor exit node |
77+
| `IsKnownSuspiciousIp` | `bool` | Indicates whether the IP address is known to be suspicious |
78+
| `IsPrivateIp` | `bool` | Indicates whether the IP address is private |
79+
| `SuspiciousUserAgentName` | `string` | The name of the suspicious user agent accessing the storage |
80+
| `HashReputationMd5List` | `object` | A list of MD5 hash reputations for the accessed resources |
81+
| `AzureResourceId` | `string` | The Azure Resource ID of the storage account |
82+
| `Location` | `string` | The location of the storage account (region) |
83+
| `Timestamp` | `datetime` | Indicate the time when the record was generated |
84+
| `ReportId` | `string` | GUID to identify the record in the specific table |
85+
| `ActionType` | `string` | Type of action (aggregated logs) |
86+
| `AdditionalFields` | `dynamic` | Additional information about the event in JSON array format |
87+
88+
89+
## Sample queries
90+
91+
To detect failed anonymous authentication attempts:
92+
93+
```kusto
94+
CloudStorageAggregatedEvents
95+
| where FailedOperationsCount > 0
96+
| where AuthenticationType == "Anonymous"
97+
| project StorageAccount, FailedOperationsCount, OperationNamesList, AdditionalFields
98+
```
99+
100+
To list unusual authentication methods used:
101+
102+
```kusto
103+
// Define a list of expected authentication types
104+
let ExpectedAuthTypes = dynamic(["AccountKey", "SAS", "Oauth"]);
105+
CloudStorageAggregatedEvents
106+
| where DataAggregationEndTime >= ago(7d)
107+
| where not(AuthenticationType in (ExpectedAuthTypes))
108+
| summarize TotalOperations = sum(OperationsCount) by StorageAccount, AuthenticationType
109+
```
110+
To find storage accounts with a high number of failed operations:
111+
112+
```kusto
113+
CloudStorageAggregatedEvents
114+
| where DataAggregationEndTime >= ago(7d)
115+
| summarize TotalFailedOperations = sum(FailedOperationsCount) by StorageAccount
116+
| where TotalFailedOperations > 100
117+
| order by TotalFailedOperations desc
118+
```
119+
120+
To monitor anonymous successful operations:
121+
122+
```kusto
123+
CloudStorageAggregatedEvents
124+
| where DataAggregationEndTime >= ago(7d)
125+
| where AuthenticationType == "Anonymous" and SuccessfulOperationsCount > 0
126+
| project StorageAccount, SuccessfulOperationsCount, OperationNamesList, AdditionalFields
127+
```
128+
129+
To detect access to sensitive containers or file shares:
130+
131+
```kusto
132+
CloudStorageAggregatedEvents
133+
| where DataAggregationEndTime >= ago(7d)
134+
| where AuthenticationType == "Anonymous" and SuccessfulOperationsCount > 0
135+
| project StorageAccount, SuccessfulOperationsCount, OperationNamesList, AdditionalFields
136+
```
137+
138+
To detect suspicious file uploads with known malicious hashes:
139+
140+
```kusto
141+
CloudStorageAggregatedEvents
142+
| where DataAggregationEndTime >= ago(7d)
143+
| where isnotempty(Md5Hashes)
144+
| mv-expand HashReputation = Md5Hashes
145+
| extend HashDetails = parse_json(HashReputation)
146+
| project StorageAccount, AccountUpn, OperationNamesList, HashMd5 = HashDetails.md5Hash, ResourcePath = HashDetails.resourcePath, OperationType = HashDetails.operationType, ETag = HashDetails.etag
147+
```
148+
149+
## Related topics
150+
151+
- [Advanced hunting overview](advanced-hunting-overview.md)
152+
- [Learn the query language](advanced-hunting-query-language.md)
153+
- [Use shared queries](advanced-hunting-shared-queries.md)
154+
- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)
155+
- [Understand the schema](advanced-hunting-schema-tables.md)
156+
- [Apply query best practices](advanced-hunting-best-practices.md)
157+

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 07/09/2025
24+
ms.date: 08/05/2025
2525
---
2626

2727
# Understand the advanced hunting schema
@@ -63,6 +63,7 @@ The following reference lists all the tables in the schema. Each table name link
6363
| **[CloudAppEvents](advanced-hunting-cloudappevents-table.md)** | Events involving accounts and objects in Office 365 and other cloud apps and services |
6464
| **[CloudAuditEvents](advanced-hunting-cloudauditevents-table.md)** (Preview)| Cloud audit events for various cloud platforms protected by the organization's Microsoft Defender for Cloud |
6565
| **[CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md)** (Preview)| Cloud process events for various cloud platforms protected by the organization's Microsoft Defender for Containers |
66+
| **[CloudStorageAggregatedEvents](advanced-hunting-cloudstorageaggregatedevents-table.md)** (Preview)| Cloud storage activity and related events |
6667
| **[DataSecurityBehaviors](advanced-hunting-datasecuritybehaviors-table.md)** (Preview)| Insights about potentially suspicious user behaviors that violate user-defined or default policies configured in the Microsoft Purview suite of solutions|
6768
| **[DataSecurityEvents](advanced-hunting-datasecurityevents-table.md)** (Preview)| Information about user activities that violate user-defined or default policies in the Microsoft Purview suite of solutions |
6869
| **[DeviceBaselineComplianceAssessment](advanced-hunting-devicebaselinecomplianceassessment-table.md)** (Preview) | Baseline compliance assessment snapshot, which indicates the status of various security configurations related to baseline profiles on devices |

defender-xdr/whats-new.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,8 @@ You can also get product updates and important notifications through the [messag
4141
- You can now view the details pane even for analytics rules.
4242
- You can now perform the following actions on analytics rules: Turn on/off, Delete, Edit.
4343
- (Preview) In advanced hunting, the number of [query results](advanced-hunting-query-results.md) displayed in the Microsoft Defender portal has been increased to 100,000.
44+
- (Preview) The [`CloudStorageAggregatedEvents`](advanced-hunting-cloudstorageaggregatedevents-table.md) table in advanced hunting is now available for preview. This table contains information about storage activity and related events.
45+
- (Preview) Advanced hunting now lets you investigate Microsoft Defender for Cloud behaviors. For more information, see [Investigate behaviors with advanced hunting](/defender-cloud-apps/behaviors).
4446

4547
## July 2025
4648
- (Preview) The [`GraphApiAuditEvents`](advanced-hunting-graphapiauditevents-table.md) table in advanced hunting is now available for preview. This table contains information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant.

0 commit comments

Comments
 (0)