Skip to content

Commit 9ff73a2

Browse files
committed
draft
1 parent ebb816f commit 9ff73a2

File tree

1 file changed

+82
-0
lines changed

1 file changed

+82
-0
lines changed
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: DisruptionAndResponseEvents table in the advanced hunting schema
3+
description: Learn about the DisruptionAndResponseEvents table in the advanced hunting schema
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: maccruz
10+
author: schmurky
11+
ms.localizationpriority: medium
12+
manager: dansimp
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
ms.topic: reference
21+
ms.date: 06/11/2025
22+
---
23+
24+
# DisruptionAndResponseEvents
25+
26+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
27+
28+
29+
30+
The `DisruptionAndResponseEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information automatic attack disruption events in Microsoft Defender for Endpoint. [ADD MORE DESCRIPTION] Use this reference to construct queries that return information from this table.
31+
32+
> [!TIP]
33+
> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
34+
35+
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
36+
37+
38+
| Column name | Data type | Description |
39+
|-------------|-----------|-------------|
40+
| `Timestamp` | `datetime` | Date and time when the event was recorded |
41+
| `ActionType` | `string` | Type of disruption action taken |
42+
| `DeviceId` | `string` | Unique identifier for the device that reported the event; the reporting device can be the device that reported the event, the device that blocked the access, or the compromised device itself |
43+
| `SourceDeviceId` | `string` | Unique identifier for the device that blocked the traffic or access attempt |
44+
| `TargetDeviceId` | `string` | Unique identifier for the device that was contained by other devices in the network |
45+
| `TargetDeviceName ` | `string` | Name of the device that the compromised account attempted to access |
46+
| `TargetDomainName ` | `string` | Domain name of the device that the compromised account attempted to access |
47+
| `DeviceName` | `string` | Name of the device that reported the event; the reporting device can be the device that reported the event, the device that blocked the access, or the compromised device itself |
48+
| `DomainName` | `string` | Domain name that the device that reported the event is joined to; the reporting device can be the device that reported the event, the device that blocked the access, or the compromised device itself |
49+
| `InitiatingProcessId ` | `integer` | Process ID (PID) of the process that triggered that block action, based on the perspective of the device that logged the event |
50+
| `InitiatingProcessFileName` | `string` |Name of the process that triggered the block action, based on the perspective of the device that logged the event |
51+
| `SourceUserSid` | `string` | The compromised account’s security identifier |
52+
| `SourceUserName` | `string` | The compromised account’s user name |
53+
| `SourceUserDomainName` | `string` | The compromised account’s domain name |
54+
| `SourceIPAddress` | `string` | IP address where the attacker communication came from, if the IP was not blocked by automatic attack disruption |
55+
| `SourcePort` | `integer` | Port where the attacker communication came from |
56+
| `IPAddress` | `string` | IP address that was blocked by automatic attack disruption |
57+
| `Port` | `string` | Port that was blocked by automatic attack disruption |
58+
| `SourceDeviceName` | `string` | Host name of the device where the attack came from |
59+
| `SourceDomainName` | `string` | Domain name of the attacker device |
60+
| `AuthenticationProtocol` | `string` | Authentication protocol that the compromised user used to sign in; possible values: Undefined, NTLM, Kerberos |
61+
| `Service` | `string` | Name of the service the attacker attempted to use, if the attacker signed in using Kerberos or NTLM |
62+
| `InterfaceUuidSourceDomainName` | `string` | Unique identifier (UUID) for the Remote Procedure Call (RPC) interface that the attacker attempted to access |
63+
| `InterfaceFriendlyName` | `string` |Friendly name of the interface represented by the interface UUID |
64+
| `FileName` | `string` | Name of the file that the attacker attempted to access |
65+
| `ShareName` | `string` | Name of the share location that the attacker attempted to access |
66+
| `LogonType` | `string` | Type of logon session the user attempted; possible values: interactive, remote interactive (RDP), network, batch job, service |
67+
| `LogonId ` | `long` | Identifier for a logon session. This identifier is unique on the same device only between restarts. |
68+
| `SessionId ` | `long` | Domain name of the attacker device |
69+
| `CompromisedAccountCount` | `integer` | Number of compromised accounts that are part of the policy |
70+
| `PolicyId` | `string` | Unique identifier for the policy |
71+
| `PolicyName` | `string` | Name of the policy |
72+
| `PolicyVersion` | `string` | Version of the policy Version of the policy |
73+
| `PolicyHash` | `string` | Unique hash of the policy |
74+
| `DataSources` | `array` |Products or services that provided information for the event |
75+
76+
## Related topics
77+
- [Advanced hunting overview](advanced-hunting-overview.md)
78+
- [Learn the query language](advanced-hunting-query-language.md)
79+
- [Use shared queries](advanced-hunting-shared-queries.md)
80+
- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)
81+
- [Understand the schema](advanced-hunting-schema-tables.md)
82+
- [Apply query best practices](advanced-hunting-best-practices.md)

0 commit comments

Comments
 (0)