|
| 1 | +--- |
| 2 | +title: FileMaliciousContentInfo table in the advanced hunting schema |
| 3 | +description: Learn about the FileMaliciousContentInfo table of the advanced hunting schema |
| 4 | +search.appverid: met150 |
| 5 | +ms.service: defender-xdr |
| 6 | +ms.subservice: adv-hunting |
| 7 | +f1.keywords: |
| 8 | + - NOCSH |
| 9 | +ms.author: pauloliveria |
| 10 | +author: poliveria |
| 11 | +ms.localizationpriority: medium |
| 12 | +manager: orspodek |
| 13 | +audience: ITPro |
| 14 | +ms.collection: |
| 15 | +- m365-security |
| 16 | +- tier3 |
| 17 | +ms.custom: |
| 18 | +- cx-ti |
| 19 | +- cx-ah |
| 20 | +appliesto: |
| 21 | + - Microsoft Defender XDR |
| 22 | + - Microsoft Sentinel in the Microsoft Defender portal |
| 23 | +ms.topic: reference |
| 24 | +ms.date: 12/01/2025 |
| 25 | +--- |
| 26 | + |
| 27 | +# FileMaliciousContentInfo (Preview) |
| 28 | + |
| 29 | +[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)] |
| 30 | + |
| 31 | +> [!IMPORTANT] |
| 32 | +> Some information relates to prereleased product which might be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. |
| 33 | +
|
| 34 | +The `FileMaliciousContentInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about files that were identified as malicious by Microsoft Defender for Office 365 in SharePoint Online, OneDrive, and Microsoft Teams. Use this reference to construct queries that return information from this table. |
| 35 | + |
| 36 | +> [!TIP] |
| 37 | +> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR. |
| 38 | +
|
| 39 | +This advanced hunting table is populated by records from Defender for Office 365. If your organization didn't deploy the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy Defender for Office 365 in Defender XDR, read [Deploy supported services](deploy-supported-services.md). |
| 40 | + |
| 41 | +For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md). |
| 42 | + |
| 43 | + |
| 44 | + |
| 45 | +| Column name | Data type | Description | |
| 46 | +|-------------|-----------|-------------| |
| 47 | +| `Timestamp` | `datetime` | Date and time when the event was generated | |
| 48 | +| `Workload`| `string` | Information about the workload from which the URL originated from | |
| 49 | +| `FileName`| `string` | Name of the file that the recorded action was applied to | |
| 50 | +| `FolderPath`| `string` | Path of the folder containing the file that the recorded action was applied to | |
| 51 | +| `FileSize`| `long` | Size of the file in bytes | |
| 52 | +| `SHA256`| `string` | SHA-256 of the file that the recorded action was applied to | |
| 53 | +| `FileOwnerDisplayName`| `string` | Account recorded as owner of the file | |
| 54 | +| `FileOwnerUpn`| `string` | Account recorded as owner of the file| |
| 55 | +| `DocumentId`| `string` | Unique identifier of the file | |
| 56 | +| `ThreatTypes`| `dynamic` | Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats | |
| 57 | +| `ThreatNames`| `string` | Detection name for malware or other threats found| |
| 58 | +| `DetectionMethods`| `string` | Methods used to detect malware, phishing, or other threats found in the email | |
| 59 | +| `LastModifyingAccountUpn`| `string` | Account that last modified this file | |
| 60 | +| `LastModifiedTime`| `datetime` |Date and time the item or related metadata was last modified| |
| 61 | +| `FileCreationTime `| `datetime` | Timestamp of the file creation| |
| 62 | +| `ReportId`| `string` | Unique identifier for the event | |
| 63 | + |
| 64 | + |
| 65 | + |
| 66 | +## Read more |
| 67 | + |
| 68 | +- [Advanced hunting overview](advanced-hunting-overview.md) |
| 69 | +- [Learn the query language](advanced-hunting-query-language.md) |
| 70 | +- [Use shared queries](advanced-hunting-shared-queries.md) |
| 71 | +- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) |
| 72 | +- [Understand the schema](advanced-hunting-schema-tables.md) |
| 73 | +- [Apply query best practices](advanced-hunting-best-practices.md) |
0 commit comments