You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-datasecuritybehaviors-table.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,12 +47,12 @@ For information on other tables in the advanced hunting schema, [see the advance
47
47
|-------------|-----------|-------------|
48
48
|`Timestamp`|`datetime`| Date and time when the record was generated or updated |
49
49
|`BehaviorId`|`string`| Unique identifier for the behavior |
50
-
|`ActionType`|`string`|Type of behavior. Refer to the catalog of behaviors detected by Microsoft Purview Insider Risk Management |
50
+
|`ActionType`|`string`|Type of behavior. Refer to the catalog of behaviors detected by Microsoft Purview Insider Risk Management.|
51
51
|`StartTime`|`datetime`|Date and time of the first activity related to the behavior|
52
52
|`EndTime`|`datetime`| Date and time of the last activity related to the behavior|
53
53
|`AttackTechniques`|`string`| MITRE ATT&CK techniques associated with the activity that triggered the behavior. Refer to subtechniques in the insider risk management behavior catalog.|
54
54
|`Categories`|`string`| Type of threat indicator or breach activity identified by the behavior|
55
-
|`ActivityType`|`enum`|Activity category based on categories in Microsoft Purview Insider Risk Management|
55
+
|`ActionCategory`|`enum`|Category of action that triggered the event |
56
56
|`Description`|`string`| Description of the behavior|
57
57
|`ServiceSource`|`string`| Product or service that identified the behavior|
58
58
|`DetectionSource`|`string`| Detection technology or sensor that identified the notable component or activity|
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-datasecurityevents-table.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ For information on other tables in the advanced hunting schema, [see the advance
50
50
|`DlpPolicyMatchInfo`|`string`| Information around the list of data loss prevention (DLP) policies matching this event|
51
51
|`DlpPolicyEnforcementMode`|`int`| Indicates the Data Loss Prevention policy that was enforced; value can be: 0 (None), 1 (Audit), 2 (Warn), 3 (Warn and bypass), 4 (Block), 5 (Allow)|
52
52
|`DlpPolicyRuleMatchInfo`|`dynamic`| Details of the data loss prevention (DLP) rules that matched with this event; in JSON array format|
53
-
|`FileRenameInfo`|`string`| Details of the file (file name and extension) prior to this event|
53
+
|`FileRenameInfo`|`string`| Details of the file (file name and extension) before this event|
54
54
|`PhysicalAccessPointId`|`string`| Unique identifier for the physical access point|
55
55
|`PhysicalAccessPointName`|`string`| Name of the physical access point|
56
56
|`PhysicalAccessStatus`|`string`| Status of physical access, whether it succeeded or failed|
@@ -67,7 +67,7 @@ For information on other tables in the advanced hunting schema, [see the advance
67
67
|`Department`|`string`| Name of the department that the account user belongs to|
68
68
|`SourceCodeInfo`|`string`| Details of the source code repository involved in the event|
69
69
|`CcPolicyMatchInfo`|`dynamic`| Details of the Communications Compliance policy matches for this event; in JSON array format |
70
-
|`IPAddress`|`string`| IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts|
70
+
|`IPAddress`|`string`| IP addresses of the clients on which the activity was performed; can contain multiple IPs if related to Microsoft Defender for Cloud Apps alerts|
71
71
|`Timestamp`|`datetime`| Date and time when the event was recorded|
72
72
|`DeviceSourceLocationType`|`int`| Indicates the type of location where the endpoint signals originated from; values can be: 0 (Unknown), 1 (Local), 2 (Remote), 3 (Removable), 4 (Cloud), 5 (File share)|
73
73
|`DeviceDestinationLocationType`|`int`| Indicates the type of location where the endpoint signals connected to; values can be: 0 (Unknown), 1 (Local), 2 (Remote), 3 (Removable), 4 (Cloud), 5 (File share)|
@@ -82,8 +82,8 @@ For information on other tables in the advanced hunting schema, [see the advance
82
82
|`InternetMessageId`|`string`|Public-facing identifier for the email or Teams message that is set by the sending email system |
83
83
|`NetworkMessageId`|`guid`| Unique identifier for the email, generated by Microsoft 365 |
84
84
|`EmailSubject`|`string`| Subject of the email|
85
-
|`ObjectId`|`string`|Unique identifier of the object that the recorded action was applied to, in case of files it includes the extension|
86
-
|`ObjectName`|`string`| Name of the object that the recorded action was applied to, in case of files it includes the extension|
85
+
|`ObjectId`|`string`|Unique identifier of the object that the recorded action was applied to, in case of files, it includes the extension|
86
+
|`ObjectName`|`string`| Name of the object that the recorded action was applied to, in case of files, it includes the extension|
87
87
|`ObjectType`|`string`| Type of object, such as a file or a folder, that the recorded action was applied to|
88
88
|`ObjectSize`|`int`| Size of the object in bytes|
89
89
|`IsHidden`|`bool`| Indicates whether the user has marked the content as hidden (True) or not (False) |
@@ -102,6 +102,7 @@ For information on other tables in the advanced hunting schema, [see the advance
102
102
|`Workload`|`string`| The Microsoft 365 service where the event occurred|
103
103
|`IrmActionCategory`|`enum`| A unique enumeration value indicating the activity category in Microsoft Purview Insider Risk Management|
104
104
|`SequenceCorrelationId`|`string`|Details of the sequence activity|
105
+
|`CloudAppAlertId`|`string`| Unique identifier for the alert in Microsoft Defender for Cloud Apps |
0 commit comments