Skip to content

Commit 9458536

Browse files
Merge pull request #4449 from MicrosoftDocs/main
[AutoPublish] main to live - 07/09 01:35 PDT | 07/09 14:05 IST
2 parents aa9587a + 5d20aeb commit 9458536

File tree

5 files changed

+77
-5
lines changed

5 files changed

+77
-5
lines changed

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -307,6 +307,8 @@
307307
href: advanced-hunting-exposuregraphedges-table.md
308308
- name: ExposureGraphNodes
309309
href: advanced-hunting-exposuregraphnodes-table.md
310+
- name: GraphApiAuditEvents
311+
href: advanced-hunting-graphapiauditevents-table.md
310312
- name: IdentityDirectoryEvents
311313
href: advanced-hunting-identitydirectoryevents-table.md
312314
- name: IdentityInfo
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
---
2+
title: GraphApiAuditEvents table in the advanced hunting schema
3+
description: Learn about the GraphApiAuditEvents table in the advanced hunting schema, which provides information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: pauloliveria
10+
author: poliveria
11+
ms.localizationpriority: medium
12+
manager: orspodek
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
ms.topic: reference
21+
ms.date: 07/09/2025
22+
---
23+
24+
# GraphApiAuditEvents (Preview)
25+
26+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
27+
28+
29+
> [!IMPORTANT]
30+
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
31+
32+
The `GraphApiAuditEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant. Use this reference to construct queries that return information from this table.
33+
34+
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
35+
36+
37+
| Column name | Data type | Description |
38+
|-------------|-----------|-------------|
39+
| `IdentityProvider` | `string` | Identity provider that authenticated the subject of the token |
40+
| `ApiVersion` | `string` | The API version of the event |
41+
| `ApplicationId` | `string` | Unique identifier for the application |
42+
| `IPAddress` | `string` | The IP address of the client from where the request was made |
43+
| `ClientRequestId` | `string` | Identifier for the client request sent; if none is available, the operation identifier is used instead |
44+
| `EntityType ` | `string` | Type of object, such as a file, a process, a device, or a user, that made the request |
45+
| `RequestUri` | `string` | Uniform resource identifier (URI) of the request |
46+
| `AccountObjectId` | `string` | Unique identifier for the account making the request |
47+
| `OperationId` | `string` | Identifier for a batch of requests; the same identifier is used for all requests in a batch but if requests are non-batched, the identifier is unique per request |
48+
| `Location` | `string` | Name of the region that served the request |
49+
| `RequestDuration` | `string` | Duration of the request in milliseconds |
50+
| `RequestId` | `string` | Unique identifier of the request |
51+
| `RequestMethod` | `string` | HTTP method of the request |
52+
| `Timestamp` | `string` | Date and time when the request was recorded |
53+
| `ResponseStatusCode` | `string` | HTTP response status code for the request |
54+
| `Scopes` | `string` | Scopes in token claims |
55+
| `UniqueTokenIdentifier` | `string` | Unique identifier embedded in every access token and ID token that were issued |
56+
57+
58+
## Related articles
59+
60+
- [Advanced hunting overview](advanced-hunting-overview.md)
61+
- [Learn the query language](advanced-hunting-query-language.md)
62+
- [Use shared queries](advanced-hunting-shared-queries.md)
63+
- [Understand the schema](advanced-hunting-schema-tables.md)
64+
- [Apply query best practices](advanced-hunting-best-practices.md)
65+
66+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 03/28/2025
24+
ms.date: 07/09/2025
2525
---
2626

2727
# Understand the advanced hunting schema
@@ -97,6 +97,7 @@ The following reference lists all the tables in the schema. Each table name link
9797
| **[EmailUrlInfo](advanced-hunting-emailurlinfo-table.md)** | Information about URLs on emails |
9898
| **[ExposureGraphEdges](advanced-hunting-exposuregraphedges-table.md)** | Microsoft Security Exposure Management exposure graph edge information provides visibility into relationships between entities and assets in the graph |
9999
| **[ExposureGraphNodes](advanced-hunting-exposuregraphnodes-table.md)** | Microsoft Security Exposure Management exposure graph node information, about organizational entities and their properties |
100+
| **[GraphApiAuditEvents](advanced-hunting-graphapiauditevents-table.md)** (Preview) | Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant |
100101
| **[IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md)** | Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller. |
101102
| **[IdentityInfo](advanced-hunting-identityinfo-table.md)** | Account information from various sources, including Microsoft Entra ID |
102103
| **[IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md)** | Authentication events on Active Directory and Microsoft online services |

defender-xdr/whats-new.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-xdr
66
ms.author: diannegali
77
author: diannegali
88
ms.localizationpriority: medium
9-
ms.date: 04/09/2025
9+
ms.date: 07/09/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -33,6 +33,8 @@ For more information on what's new with other Microsoft Defender security produc
3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

3535
## July 2025
36+
- (Preview) The [GraphApiAuditEvents](advanced-hunting-graphapiauditevents-table.md) table in advanced hunting is now available for preview. This table contains information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant.
37+
3638
- (Preview) The [`DisruptionAndResponseEvents`](advanced-hunting-disruptionandresponseevents-table.md) table, now available in advanced hunting, contains information about [automatic attack disruption](automatic-attack-disruption.md) events in Microsoft Defender XDR. These events include both block and policy application events related to triggered attack disruption policies, and automatic actions that were taken across related workloads. Increase your visibility and awareness of active, complex attacks disrupted by attack disruption to understand the attacks' scope, context, impact, and actions taken.
3739

3840
## June 2025

unified-secops-platform/cases-overview.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,6 @@ To start using case management, select **Cases** in the Defender portal to acces
7777

7878
:::image type="content" source="media/cases-overview/cases-queue-view.png" alt-text="Screenshot of the cases queue in the Defender portal.":::
7979

80-
The maximum allowed per tenant is 100,000 cases.
8180

8281
## Case details
8382

@@ -127,8 +126,6 @@ Alternatively, if the IR team needs to escalate one or more incidents to the hun
127126

128127
:::image type="content" source="media/cases-overview/link-incident-from-incident-graph.png" alt-text="Screenshot showing the link incident option from ellipses menu in the incident view.":::
129128

130-
Each case has a threshold of 100 linked incidents.
131-
132129
### Activity log
133130

134131
Need to write down notes, or that key detection logic to pass along? Create rich text comments and review the audit events in the activity log. Comments are a great place to quickly add information—including such things as queries, tables, links, and structured content—to a case.
@@ -145,6 +142,10 @@ Share reports, emails, screenshots, log files, and more, all centralized in the
145142

146143
To add attachments to your case, go to the **Case details** page, select the **Attachments** tab, select **Upload**, select your file, and wait for the upload to complete. Once uploaded, the file is scanned in the background for malware. When the scan is complete, anyone with access to the case can download the file. If the file you want to upload is actually a malware sample, you can wrap it in a password-protected ZIP file.
147144

145+
## Limitations
146+
147+
See [Case management limits](/azure/sentinel/sentinel-service-limits#case-management-limits).
148+
148149
## Related content
149150

150151
- [Microsoft Sentinel blog - Improve SecOps collaboration with case management](https://techcommunity.microsoft.com/blog/MicrosoftSentinelBlog/improve-secops-collaboration-with-case-management/4369044)

0 commit comments

Comments
 (0)