Skip to content

Commit 8eab7f5

Browse files
committed
Edits
1 parent 5fb6663 commit 8eab7f5

File tree

2 files changed

+16
-16
lines changed

2 files changed

+16
-16
lines changed

defender-xdr/advanced-hunting-datasecuritybehaviors-table.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -62,15 +62,15 @@ For information on other tables in the advanced hunting schema, [see the advance
6262
|`AccountUpn`| `string`| User principal name (UPN) of the account|
6363
|`AccountEmail`| `string`| Email address of the account|
6464
|`Application`| `string` |Application that performed the recorded action|
65-
|`DeviceInfo`| `string`| List of device information for the device involved in this behavior, including device ID, device name, and the number of events in which the device is involved; displayed in JSON array format|
66-
|`SensitivityLabelInfo`| `string`| List of sensitivity labels assigned to content involved in this behavior, including the unique identifier for the Microsoft Information Protection sensitivity label assigned to the related content, the name of the sensitivity label, and the number of events in the behavior involving this label; displayed in JSON array format|
67-
|`SensitiveInfoTypesInfo`| `string` |List of sensitive info types detected in the content involved in this behavior, including the unique identifier for the sensitive info type, the name of the sensitive info type, and the number of events in the behavior involving this sensitive info type; displayed in JSON array format|
68-
|`UrlDomainInfo`| `string`| List of websites or service URLs involved in the behavior, including the name of the URL domain, the direction of data (sent or received from domain), type of URL domain (customer-configured or based on watchlists), and the number of events in the behavior involving the specific domain; displayed in JSON array format|
69-
|`SharepointSiteInfo`| `string`| List of SharePoint sites involved in this behavior, including the unique identifier for the SharePoint site, the name of the SharePoint site, and the number of events in the behavior involving the SharePoint site; displayed in JSON array format|
70-
|`RecipientEmailInfo`| `string`| List of information about the recipient involved in the behavior, including the email address of the recipient and the number of events in the behavior involving the recipient; displayed in JSON array format|
71-
|`RemovableMediaInfo`| `string`| List of any removable media involved in the behavior, including the serial number of the removable media device, the manufacturer of the removable media device, and the model of the removable device; displayed in JSON array format|
72-
|`PrinterName`| `string` |List of printers involved in the behavior; displayed in array format|
73-
|`PriorityContentMatchInfo` |`string`| List of priority content matches identified within this behavior and thier associated details. Priority content definitions are done by the admins for each Insider risk management policy.|
65+
|`DeviceInfo`| `dynamic`| List of device information for the device involved in this behavior, including device ID, device name, and the number of events in which the device is involved; in JSON array format|
66+
|`SensitivityLabelInfo`| `dynamic`| List of sensitivity labels assigned to content involved in this behavior, including the unique identifier for the Microsoft Information Protection sensitivity label assigned to the related content, the name of the sensitivity label, and the number of events in the behavior involving this label; in JSON array format|
67+
|`SensitiveInfoTypesInfo`| `dynamic` |List of sensitive info types detected in the content involved in this behavior, including the unique identifier for the sensitive info type, the name of the sensitive info type, and the number of events in the behavior involving this sensitive info type; in JSON array format|
68+
|`UrlDomainInfo`| `dynamic`| List of websites or service URLs involved in the behavior, including the name of the URL domain, the direction of data (sent or received from domain), type of URL domain (customer-configured or based on watchlists), and the number of events in the behavior involving the specific domain; in JSON array format|
69+
|`SharepointSiteInfo`| `dynamic`| List of SharePoint sites involved in this behavior, including the unique identifier for the SharePoint site, the name of the SharePoint site, and the number of events in the behavior involving the SharePoint site; in JSON array format|
70+
|`RecipientEmailInfo`| `dynamic`| List of information about the recipient involved in the behavior, including the email address of the recipient and the number of events in the behavior involving the recipient; in JSON array format|
71+
|`RemovableMediaInfo`| `dynamic`| List of any removable media involved in the behavior, including the serial number of the removable media device, the manufacturer of the removable media device, and the model of the removable device; in JSON array format|
72+
|`PrinterName`| `dynamic` |List of printers involved in the behavior; in array format|
73+
|`PriorityContentMatchInfo` |`dynamic`| List of priority content matches identified within this behavior and thier associated details. Priority content definitions are done by the admins for each Insider risk management policy. Displayed in JSON array format.|
7474

7575
## Related articles
7676

defender-xdr/advanced-hunting-datasecurityevents-table.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ For information on other tables in the advanced hunting schema, [see the advance
4949
|`IsManagedDevice`| `bool`| Indicates if the device is managed by the organization (True) or not (False)|
5050
|`DlpPolicyMatchInfo`| `string`| Information around the list of data loss prevention (DLP) policies matching this event|
5151
|`DlpPolicyEnforcementMode`| `int`| Indicates the Data Loss Prevention policy that was enforced; value can be: 0 (None), 1 (Audit), 2 (Warn), 3 (Warn and bypass), 4 (Block), 5 (Allow)|
52-
|`DlpPolicyRuleMatchInfo`| `string`| Details of the data loss prevention (DLP) rules that matched with this event; displayed in JSON array format|
52+
|`DlpPolicyRuleMatchInfo`| `dynamic`| Details of the data loss prevention (DLP) rules that matched with this event; in JSON array format|
5353
|`FileRenameInfo`|`string`| Details of the file (file name and extension) prior to this event|
5454
|`PhysicalAccessPointId`| `string`| Unique identifier for the physical access point|
5555
|`PhysicalAccessPointName`| `string`| Name of the physical access point|
@@ -66,19 +66,19 @@ For information on other tables in the advanced hunting schema, [see the advance
6666
|`AccountObjectId`| `string`| Unique identifier for the account in Microsoft Entra ID|
6767
|`Department`|`string`| Name of the department that the account user belongs to|
6868
|`SourceCodeInfo`| `string`| Details of the source code repository involved in the event|
69-
|`CcPolicyMatchInfo`| `JSON object` | Details of the Communications Compliance policy matches for this event |
69+
|`CcPolicyMatchInfo`| `dynamic` | Details of the Communications Compliance policy matches for this event; in JSON array format |
7070
|`IPAddress`| `string`| IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts|
7171
|`Timestamp`| `datetime`| Date and time when the event was recorded|
7272
|`DeviceSourceLocationType`| `int`| Indicates the type of location where the endpoint signals originated from; values can be: 0 (Unknown), 1 (Local), 2 (Remote), 3 (Removable), 4 (Cloud), 5 (File share)|
7373
|`DeviceDestinationLocationType`| Int| Indicates the type of location where the endpoint signals connected to; values can be: 0 (Unknown), 1 (Local), 2 (Remote), 3 (Removable), 4 (Cloud), 5 (File share)|
74-
|`IrmPolicyMatchInfo`| `JSON Object`| Details of Insider Risk Management policy matches for the content involved in the event |
74+
|`IrmPolicyMatchInfo`| `dynamic`| Details of Insider Risk Management policy matches for the content involved in the event; in JSON array format |
7575
|`UnallowedUrlDomains`| `string`| Websites or service URLs involved in this event that are configured as Unallowed in Insider Risk Management global settings|
7676
|`ExternalUrlDomains`| `string`| Websites or service URLs involved in this event that are classified as External in Insider Risk Management global settings|
7777
|`UrlDomainInfo`| `string`| Details about the websites or service URLs involved in the event|
7878
|`SourceUrlDomain`| `string`| Domain where the device and email signals originated|
7979
|`TargetUrlDomain`| `string`| Domain where the content was shared with or the user has browsed to|
8080
|`EmailAttachmentCount`|`int`| Number of email attachments |
81-
|`EmailAttachmentInfo`| Array<JSON Object>| Details of email attachments|
81+
|`EmailAttachmentInfo`| `dynamic`| Details of email attachments; in JSON array format|
8282
|`InternetMessageId`|`string` |Public-facing identifier for the email or Teams message that is set by the sending email system |
8383
|`NetworkMessageId`| `guid`| Unique identifier for the email, generated by Microsoft 365 |
8484
|`EmailSubject`| `string`| Subject of the email|
@@ -89,14 +89,14 @@ For information on other tables in the advanced hunting schema, [see the advance
8989
|`IsHidden`| `bool`| Indicates whether the user has marked the content as hidden (True) or not (False) |
9090
|`ActivityId` |`guid`| Unique identifier of the activity log|
9191
|`ActionType`|`string`| Type of activity that triggered the event|
92-
|`SensitiveInfoTypeInfo`| Array<JSON Object>| Details of Data Loss Prevention sensitive info types detected in the impacted asset|
92+
|`SensitiveInfoTypeInfo`| `dynamic`| Details of Data Loss Prevention sensitive info types detected in the impacted asset|
9393
|`SensitivityLabelId`|`string`|The current Microsoft Information Protection sensitivity label ID associated with the item|
9494
|`SharepointSiteSensitivityLabelIds`|`string`| The current Microsoft Information Protection sensitivity label ID assigned to the parent site of the item related to SharePoint activities |
9595
|`PreviousSensitivityLabelId`| `string`|The previous Microsoft Information Protection sensitivity label ID associated with the item in case of activities where the sensitivity label was changed|
9696
|`Operation`| `string`| Name of the admin activity|
9797
|`RecipientEmailAddress`| `string`| Email address of the recipient, or email address of the recipient after distribution list expansion|
98-
|`SiteUrl`| `string` | xxx |
99-
|`SourceRelativeUrl`| `string`| xxx |
98+
|`SiteUrl`| `string` | The URL of the site where the file or folder accessed by the user is located |
99+
|`SourceRelativeUrl`| `string`| The URL of the folder that contains the file accessed by the user |
100100
|`TargetFilePath`| `string`| Target file path of endpoint activities|
101101
|`PrinterName`| `string`| List of printers involved in the behavior|
102102
|`Workload`|`string`| The Microsoft 365 service where the event occurred|

0 commit comments

Comments
 (0)