Skip to content

Commit 6204f81

Browse files
Merge pull request #2197 from MicrosoftDocs/maccruz-mdcloud
Added MDC in desc
2 parents 557c04e + 4f4e5f0 commit 6204f81

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

defender-xdr/advanced-hunting-cloudprocessevents-table.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,20 +28,20 @@ ms.date: 11/11/2024
2828
**Applies to:**
2929
- Microsoft Defender XDR
3030

31-
The `CloudProcessEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about process events in multicloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine. Use this reference to construct queries that return information from this table.
31+
The `CloudProcessEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about process events in multicloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine as protected by the organization's [Microsoft Defender for Cloud](/azure/defender-for-cloud/concept-integration-365#advanced-hunting-in-xdr). Use this reference to construct queries that return information from this table.
3232

3333
> [!IMPORTANT]
3434
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3535
36-
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
36+
For information on other tables in the advanced hunting schema, see the [advanced hunting reference](advanced-hunting-schema-tables.md).
3737

3838
| Column name | Data type | Description |
3939
|-------------|-----------|-------------|
4040
| `Timestamp` | `datetime` | Date and time when the event was recorded |
4141
| `AzureResourceId` | `string` | Unique identifier of the Azure resource associated with the process |
4242
| `AwsResourceName` | `string` | Unique identifier specific to Amazon Web Services devices, containing the Amazon resource name|
4343
| `GcpFullResourceName` | `string` | Unique identifier specific to Google Cloud Platform devices, containing a combination of zone and ID for GCP |
44-
| `ContainerImageName` | `string` | UThe container image name or ID, if it exists |
44+
| `ContainerImageName` | `string` | The container image name or ID, if it exists |
4545
| `KubernetesNamespace` | `string` | The Kubernetes namespace name |
4646
| `KubernetesPodName` | `string` | The Kubernetes pod name |
4747
| `KubernetesResource` | `string` | Identifier value that includes namespace, resource type and name |
@@ -76,7 +76,7 @@ To hunt for process events including a given term (represented by "x" in the que
7676
CloudProcessEvents | where ProcessCommandLine has "x"
7777
```
7878

79-
### Rare process events for a pod in a Kuberentes cluster
79+
### Rare process events for a pod in a Kubernetes cluster
8080
To investigate unusual process events invoked as part of a pod in a Kubernetes cluster:
8181

8282
```kusto

0 commit comments

Comments
 (0)