Skip to content

Commit 6dff897

Browse files
authored
Merge pull request #2840 from MicrosoftDocs/maccruz-datasecip
Added columns based on task
2 parents f0d7b3d + a705809 commit 6dff897

File tree

2 files changed

+7
-6
lines changed

2 files changed

+7
-6
lines changed

defender-xdr/advanced-hunting-datasecuritybehaviors-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,12 +47,12 @@ For information on other tables in the advanced hunting schema, [see the advance
4747
|-------------|-----------|-------------|
4848
|`Timestamp` | `datetime` | Date and time when the record was generated or updated |
4949
|`BehaviorId` | `string` | Unique identifier for the behavior |
50-
|`ActionType`| `string`|Type of behavior. Refer to the catalog of behaviors detected by Microsoft Purview Insider Risk Management |
50+
|`ActionType`| `string`|Type of behavior. Refer to the catalog of behaviors detected by Microsoft Purview Insider Risk Management. |
5151
|`StartTime`| `datetime` |Date and time of the first activity related to the behavior|
5252
|`EndTime`| `datetime`| Date and time of the last activity related to the behavior|
5353
|`AttackTechniques`| `string`| MITRE ATT&CK techniques associated with the activity that triggered the behavior. Refer to subtechniques in the insider risk management behavior catalog.|
5454
|`Categories`| `string`| Type of threat indicator or breach activity identified by the behavior|
55-
|`ActivityType`| `enum`| Activity category based on categories in Microsoft Purview Insider Risk Management|
55+
|`ActionCategory`| `enum`| Category of action that triggered the event |
5656
|`Description`| `string`| Description of the behavior|
5757
|`ServiceSource`| `string`| Product or service that identified the behavior|
5858
|`DetectionSource`| `string`| Detection technology or sensor that identified the notable component or activity|

defender-xdr/advanced-hunting-datasecurityevents-table.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ For information on other tables in the advanced hunting schema, [see the advance
5050
|`DlpPolicyMatchInfo`| `string`| Information around the list of data loss prevention (DLP) policies matching this event|
5151
|`DlpPolicyEnforcementMode`| `int`| Indicates the Data Loss Prevention policy that was enforced; value can be: 0 (None), 1 (Audit), 2 (Warn), 3 (Warn and bypass), 4 (Block), 5 (Allow)|
5252
|`DlpPolicyRuleMatchInfo`| `dynamic`| Details of the data loss prevention (DLP) rules that matched with this event; in JSON array format|
53-
|`FileRenameInfo`|`string`| Details of the file (file name and extension) prior to this event|
53+
|`FileRenameInfo`|`string`| Details of the file (file name and extension) before this event|
5454
|`PhysicalAccessPointId`| `string`| Unique identifier for the physical access point|
5555
|`PhysicalAccessPointName`| `string`| Name of the physical access point|
5656
|`PhysicalAccessStatus` |`string`| Status of physical access, whether it succeeded or failed|
@@ -67,7 +67,7 @@ For information on other tables in the advanced hunting schema, [see the advance
6767
|`Department`|`string`| Name of the department that the account user belongs to|
6868
|`SourceCodeInfo`| `string`| Details of the source code repository involved in the event|
6969
|`CcPolicyMatchInfo`| `dynamic` | Details of the Communications Compliance policy matches for this event; in JSON array format |
70-
|`IPAddress`| `string`| IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts|
70+
|`IPAddress`| `string`| IP addresses of the clients on which the activity was performed; can contain multiple IPs if related to Microsoft Defender for Cloud Apps alerts|
7171
|`Timestamp`| `datetime`| Date and time when the event was recorded|
7272
|`DeviceSourceLocationType`| `int`| Indicates the type of location where the endpoint signals originated from; values can be: 0 (Unknown), 1 (Local), 2 (Remote), 3 (Removable), 4 (Cloud), 5 (File share)|
7373
|`DeviceDestinationLocationType`| `int`| Indicates the type of location where the endpoint signals connected to; values can be: 0 (Unknown), 1 (Local), 2 (Remote), 3 (Removable), 4 (Cloud), 5 (File share)|
@@ -82,8 +82,8 @@ For information on other tables in the advanced hunting schema, [see the advance
8282
|`InternetMessageId`|`string` |Public-facing identifier for the email or Teams message that is set by the sending email system |
8383
|`NetworkMessageId`| `guid`| Unique identifier for the email, generated by Microsoft 365 |
8484
|`EmailSubject`| `string`| Subject of the email|
85-
|`ObjectId`| `string` |Unique identifier of the object that the recorded action was applied to, in case of files it includes the extension|
86-
|`ObjectName`| `string`| Name of the object that the recorded action was applied to, in case of files it includes the extension|
85+
|`ObjectId`| `string` |Unique identifier of the object that the recorded action was applied to, in case of files, it includes the extension|
86+
|`ObjectName`| `string`| Name of the object that the recorded action was applied to, in case of files, it includes the extension|
8787
|`ObjectType`| `string`| Type of object, such as a file or a folder, that the recorded action was applied to|
8888
|`ObjectSize`| `int`| Size of the object in bytes|
8989
|`IsHidden`| `bool`| Indicates whether the user has marked the content as hidden (True) or not (False) |
@@ -102,6 +102,7 @@ For information on other tables in the advanced hunting schema, [see the advance
102102
|`Workload`|`string`| The Microsoft 365 service where the event occurred|
103103
|`IrmActionCategory`| `enum`| A unique enumeration value indicating the activity category in Microsoft Purview Insider Risk Management|
104104
|`SequenceCorrelationId`|`string` |Details of the sequence activity|
105+
|`CloudAppAlertId`|`string` | Unique identifier for the alert in Microsoft Defender for Cloud Apps |
105106

106107

107108
## Related articles

0 commit comments

Comments
 (0)