Skip to content

Commit 63b6799

Browse files
authored
Merge pull request #1290 from MicrosoftDocs/maccruz-deviceevents
New columns
2 parents 7b3dad3 + f78ec8b commit 63b6799

7 files changed

+50
-7
lines changed

defender-xdr/advanced-hunting-deviceevents-table.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceEvents
@@ -92,6 +92,16 @@ For information on other tables in the advanced hunting schema, [see the advance
9292
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
9393
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
9494
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
95+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
96+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
97+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
98+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
99+
| `CreatedProcessSessionId` | `long` | Windows session ID of the created process |
100+
|`IsProcessRemoteSession` | `bool` | Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
101+
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created process’s RDP session was initiated |
102+
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created process’s RDP session was initiated |
103+
104+
95105

96106
## Related topics
97107
- [Advanced hunting overview](advanced-hunting-overview.md)

defender-xdr/advanced-hunting-devicefileevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceFileEvents
@@ -89,6 +89,11 @@ For information on other tables in the advanced hunting schema, [see the advance
8989
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
9090
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
9191
| `AdditionalFields` | `string` | Additional information about the entity or event |
92+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
93+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
94+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
95+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
96+
9297

9398
> [!NOTE]
9499
> File hash information will always be shown when it is available. However, there are several possible reasons why a SHA1, SHA256, or MD5 cannot be calculated. For instance, the file might be located in remote storage, locked by another process, compressed, or marked as virtual. In these scenarios, the file hash information appears empty.

defender-xdr/advanced-hunting-deviceimageloadevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceImageLoadEvents
@@ -73,6 +73,11 @@ For information on other tables in the advanced hunting schema, [see the advance
7373
| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
7474
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
7575
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
76+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
77+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
78+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
79+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
80+
7681

7782
## Related topics
7883
- [Advanced hunting overview](advanced-hunting-overview.md)

defender-xdr/advanced-hunting-devicelogonevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 01/16/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceLogonEvents
@@ -82,6 +82,11 @@ For information on other tables in the advanced hunting schema, [see the advance
8282
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
8383
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
8484
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
85+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
86+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
87+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
88+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
89+
8590

8691
> [!NOTE]
8792
> The collection of DeviceLogonEvents is not supported on Windows 7 or Windows Server 2008R2 devices onboarded to Defender for Endpoint. We recommend upgrading to a more recent operating system for optimal visibility into user logon activity.

defender-xdr/advanced-hunting-devicenetworkevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceNetworkEvents
@@ -78,6 +78,11 @@ For information on other tables in the advanced hunting schema, [see the advance
7878
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
7979
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
8080
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
81+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
82+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
83+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
84+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
85+
8186

8287
## Related topics
8388
- [Advanced hunting overview](advanced-hunting-overview.md)

defender-xdr/advanced-hunting-deviceprocessevents-table.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceProcessEvents
@@ -96,6 +96,14 @@ For information on other tables in the advanced hunting schema, [see the advance
9696
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
9797
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
9898
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
99+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
100+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
101+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
102+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
103+
| `CreatedProcessSessionId` | `long` | Windows session ID of the created process |
104+
|`IsProcessRemoteSession` | `bool` | Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
105+
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created process’s RDP session was initiated |
106+
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created process’s RDP session was initiated |
99107

100108

101109
## Related topics

defender-xdr/advanced-hunting-deviceregistryevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceRegistryEvents
@@ -74,6 +74,11 @@ For information on other tables in the advanced hunting schema, [see the advance
7474
| `InitiatingProcessTokenElevation` | `string` | Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event |
7575
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
7676
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
77+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
78+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
79+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
80+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
81+
7782

7883
## Related topics
7984
- [Advanced hunting overview](advanced-hunting-overview.md)

0 commit comments

Comments
 (0)