|
| 1 | +--- |
| 2 | +title: DisruptionAndResponseEvents table in the advanced hunting schema |
| 3 | +description: Learn about the DisruptionAndResponseEvents table in the advanced hunting schema |
| 4 | +search.appverid: met150 |
| 5 | +ms.service: defender-xdr |
| 6 | +ms.subservice: adv-hunting |
| 7 | +f1.keywords: |
| 8 | + - NOCSH |
| 9 | +ms.author: maccruz |
| 10 | +author: schmurky |
| 11 | +ms.localizationpriority: medium |
| 12 | +manager: dansimp |
| 13 | +audience: ITPro |
| 14 | +ms.collection: |
| 15 | +- m365-security |
| 16 | +- tier3 |
| 17 | +ms.custom: |
| 18 | +- cx-ti |
| 19 | +- cx-ah |
| 20 | +ms.topic: reference |
| 21 | +ms.date: 06/11/2025 |
| 22 | +--- |
| 23 | + |
| 24 | +# DisruptionAndResponseEvents |
| 25 | + |
| 26 | +[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)] |
| 27 | + |
| 28 | + |
| 29 | + |
| 30 | +The `DisruptionAndResponseEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information automatic attack disruption events in Microsoft Defender for Endpoint. [ADD MORE DESCRIPTION] Use this reference to construct queries that return information from this table. |
| 31 | + |
| 32 | +> [!TIP] |
| 33 | +> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR. |
| 34 | +
|
| 35 | +For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md). |
| 36 | + |
| 37 | + |
| 38 | +| Column name | Data type | Description | |
| 39 | +|-------------|-----------|-------------| |
| 40 | +| `Timestamp` | `datetime` | Date and time when the event was recorded | |
| 41 | +| `ActionType` | `string` | Type of disruption action taken | |
| 42 | +| `DeviceId` | `string` | Unique identifier for the device that reported the event; the reporting device can be the device that reported the event, the device that blocked the access, or the compromised device itself | |
| 43 | +| `SourceDeviceId` | `string` | Unique identifier for the device that blocked the traffic or access attempt | |
| 44 | +| `TargetDeviceId` | `string` | Unique identifier for the device that was contained by other devices in the network | |
| 45 | +| `TargetDeviceName ` | `string` | Name of the device that the compromised account attempted to access | |
| 46 | +| `TargetDomainName ` | `string` | Domain name of the device that the compromised account attempted to access | |
| 47 | +| `DeviceName` | `string` | Name of the device that reported the event; the reporting device can be the device that reported the event, the device that blocked the access, or the compromised device itself | |
| 48 | +| `DomainName` | `string` | Domain name that the device that reported the event is joined to; the reporting device can be the device that reported the event, the device that blocked the access, or the compromised device itself | |
| 49 | +| `InitiatingProcessId ` | `integer` | Process ID (PID) of the process that triggered that block action, based on the perspective of the device that logged the event | |
| 50 | +| `InitiatingProcessFileName` | `string` |Name of the process that triggered the block action, based on the perspective of the device that logged the event | |
| 51 | +| `SourceUserSid` | `string` | The compromised account’s security identifier | |
| 52 | +| `SourceUserName` | `string` | The compromised account’s user name | |
| 53 | +| `SourceUserDomainName` | `string` | The compromised account’s domain name | |
| 54 | +| `SourceIPAddress` | `string` | IP address where the attacker communication came from, if the IP was not blocked by automatic attack disruption | |
| 55 | +| `SourcePort` | `integer` | Port where the attacker communication came from | |
| 56 | +| `IPAddress` | `string` | IP address that was blocked by automatic attack disruption | |
| 57 | +| `Port` | `string` | Port that was blocked by automatic attack disruption | |
| 58 | +| `SourceDeviceName` | `string` | Host name of the device where the attack came from | |
| 59 | +| `SourceDomainName` | `string` | Domain name of the attacker device | |
| 60 | +| `AuthenticationProtocol` | `string` | Authentication protocol that the compromised user used to sign in; possible values: Undefined, NTLM, Kerberos | |
| 61 | +| `Service` | `string` | Name of the service the attacker attempted to use, if the attacker signed in using Kerberos or NTLM | |
| 62 | +| `InterfaceUuidSourceDomainName` | `string` | Unique identifier (UUID) for the Remote Procedure Call (RPC) interface that the attacker attempted to access | |
| 63 | +| `InterfaceFriendlyName` | `string` |Friendly name of the interface represented by the interface UUID | |
| 64 | +| `FileName` | `string` | Name of the file that the attacker attempted to access | |
| 65 | +| `ShareName` | `string` | Name of the share location that the attacker attempted to access | |
| 66 | +| `LogonType` | `string` | Type of logon session the user attempted; possible values: interactive, remote interactive (RDP), network, batch job, service | |
| 67 | +| `LogonId ` | `long` | Identifier for a logon session. This identifier is unique on the same device only between restarts. | |
| 68 | +| `SessionId ` | `long` | Domain name of the attacker device | |
| 69 | +| `CompromisedAccountCount` | `integer` | Number of compromised accounts that are part of the policy | |
| 70 | +| `PolicyId` | `string` | Unique identifier for the policy | |
| 71 | +| `PolicyName` | `string` | Name of the policy | |
| 72 | +| `PolicyVersion` | `string` | Version of the policy Version of the policy | |
| 73 | +| `PolicyHash` | `string` | Unique hash of the policy | |
| 74 | +| `DataSources` | `array` |Products or services that provided information for the event | |
| 75 | + |
| 76 | +## Related topics |
| 77 | +- [Advanced hunting overview](advanced-hunting-overview.md) |
| 78 | +- [Learn the query language](advanced-hunting-query-language.md) |
| 79 | +- [Use shared queries](advanced-hunting-shared-queries.md) |
| 80 | +- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) |
| 81 | +- [Understand the schema](advanced-hunting-schema-tables.md) |
| 82 | +- [Apply query best practices](advanced-hunting-best-practices.md) |
0 commit comments