|
| 1 | +--- |
| 2 | +title: DataSecurityEvents table in the advanced hunting schema |
| 3 | +description: Learn about the DataSecurityBehaviors table of the advanced hunting schema, which contains information about user activities that violate customer defined or default policies in Microsoft Purview suite of solutions. |
| 4 | +search.appverid: met150 |
| 5 | +ms.service: defender-xdr |
| 6 | +ms.subservice: adv-hunting |
| 7 | +f1.keywords: |
| 8 | + - NOCSH |
| 9 | +ms.author: maccruz |
| 10 | +author: schmurky |
| 11 | +ms.localizationpriority: medium |
| 12 | +manager: dansimp |
| 13 | +audience: ITPro |
| 14 | +ms.collection: |
| 15 | +- m365-security |
| 16 | +- tier3 |
| 17 | +ms.custom: |
| 18 | +- cx-ti |
| 19 | +- cx-ah |
| 20 | +ms.topic: reference |
| 21 | +ms.date: 02/11/2025 |
| 22 | +--- |
| 23 | + |
| 24 | +# DataSecurityEvents (Preview) |
| 25 | + |
| 26 | +[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)] |
| 27 | + |
| 28 | +**Applies to:** |
| 29 | + |
| 30 | +- Microsoft Defender XDR |
| 31 | +- Microsoft Purview |
| 32 | + |
| 33 | + |
| 34 | + |
| 35 | +> [!IMPORTANT] |
| 36 | +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. |
| 37 | +
|
| 38 | +The `DataSecurityBehaviors` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about user activities that violate customer defined or default policies in Microsoft Purview suite of solutions. Each record represents a single user activity enriched with proprietary Microsoft detections (like sensitive info types) and customer-defined enrichment labels like domain categories, sensitivity labels, and the like. |
| 39 | + |
| 40 | +Use this reference to construct queries that return information from this table. |
| 41 | + |
| 42 | +For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md). |
| 43 | + |
| 44 | +| Column name | Data type | Description | |
| 45 | +|-------------|-----------|-------------| |
| 46 | +|`Application`| `string`|Application that performed the recorded action| |
| 47 | +|`DeviceId`| `string`| Device ID provided by Microsoft Defender for Endpoint| |
| 48 | +|`DeviceName`| `string`| Fully Qualified Domain Name(FQDN) of the device| |
| 49 | +|`AadDeviceId`| `guid`| Unique identifier for the device in the Azure Active Directory on which the activity was performed| |
| 50 | +|`IsManagedDevice`| `bool`| Indicates if the device is managed by the organization| |
| 51 | +|`DlpPolicyMatchInfo`| `string`| Information around the list of DLP policies matching this event; displayed in JSON array format| |
| 52 | +|`DLPPolicyEnforcementMode`| `int`| Indicates whether the DLP enforcement mode is one of audit/warn(block with override)/block/allow(audit without alerts)| |
| 53 | +|`DlpPolicyRuleMatchInfo`| `string`| Details of DLP policy rules that matched with this event; displayed in JSON array format| |
| 54 | +|`FileRenameInfo`|`string`| Details of the file prior to this event| |
| 55 | +|`PreviousFileName` |`string`|Details of the file prior to this event| |
| 56 | +|`PrevioudFileExtension`|`string`| Extension of the file prior to this event| |
| 57 | +|`PhysicalAccessPointId`| `string`| Unique identifier for the Physical access point| |
| 58 | +|`PhysicalAccessPointName`| `string`| Name of the Physical access point| |
| 59 | +|`PhysicalAccessStatus` |`string`| The status of physical access whether it succeeded or failed| |
| 60 | +|`PhysicalAssetTag`|`string` |The tag assigned to the asset as per the config defined in Microsoft Insider Risk Management global settings| |
| 61 | +|`RemovableMediaManufacturer`|`string`| The manufacturer name of the removable device| |
| 62 | +|`RemovableMediaModel`| `string`| The model name of the removable device| |
| 63 | +|`RemovableMediaSerialNumber`| `string`|The serial number of the removable device| |
| 64 | +|`TeamsChannelName`|`string`| Name of the teams channel| |
| 65 | +|`TeamsChannelType`| `string`g| Type of the teams channel| |
| 66 | +|`TeamsTeamName`| `string` |Name of the team| |
| 67 | +|`UserAlternateEmails`| `string`| Comma separated string of alternate mails or aliases of user| |
| 68 | +|`AccountUpn`| `string`| User principal name (UPN) of the account| |
| 69 | +|`AccountObjectId`| `string`| Unique identifier for the account in Microsoft Entra ID| |
| 70 | +|`Department`|`string`| Department of the user/actor| |
| 71 | +|`SourceCodeInfo`| `string`| Captures the details of the source code in related activities| |
| 72 | +|`CcPolicyMatchInfo`| JSON object | xxx |
| 73 | +|`IPAddress`| `string`| Comma separated string of IP Addresses of the clients on which the activity was performed. This can contain multiple IPs if the activity is related to MCAS alerts.| |
| 74 | +|`Timestamp`| `datetime`| Time stamp of the event| |
| 75 | +|DeviceSourceLocationType| `int`| Type of the source location for endpoint signals. Represented by a resolved enum value| |
| 76 | +|`DeviceDestinationLocationType`| Int| Destination location of the activity. Represented by a resolved enum value| |
| 77 | +|`IrmPolicyMatchInfo`| JSON Object| xxx | |
| 78 | +|`UnallowedUrlDomains`| `string`| List of websites, service URLs involved in this event that are configured as Unallowed in IRM Global settings| |
| 79 | +|`ExternalUrlDomains`| `string`| List of websites, service URLs involved in this event that are classified as external in IRM Global settings| |
| 80 | +|`UrlDomainInfo`| `string`| List of websites, service URLs in the behavior involved in the behavior| |
| 81 | +|`SourceUrlDomain`| `string`| Originating domain for the endpoint and email signals| |
| 82 | +|`TargetUrlDomain`| `string`| Details of the target domain that content is shared with or user has browsed to| |
| 83 | +|`EmailAttachmentCount`|`int`| xxx | |
| 84 | +|`EmailAttachmentInfo`| Array<JSON Object>| Details of email attachments| |
| 85 | +|`InternetMessageId`|`string` |The internet message id of the entity related to email or teams message. This field is relevant to exchange infra | |
| 86 | +|`NetworkMessageId`| `guid`| The network message id of the entity related to email. This field is relevant to exchange infra | |
| 87 | +|`EmailSubject`| `string`| Subject of the email| |
| 88 | +|`ObjectId`| `string` |File full path (URL). For SharePoint and OneDrive for Business activity, the full path name of the file or folder accessed by the user. For MCAS alerts it is the alert id. For emails it is internet message id.| |
| 89 | +|`ObjectName`| `string`| Name on the item on which the activity was done. In case of files it includes the extension also.| |
| 90 | +|`ObjectType`| `string`| A unique enumeration value indicates type included in the activity.| |
| 91 | +|`ObjectSize`| `int`| Size of the item in bytes.| |
| 92 | +|`IsHidden`| `bool`| Indicates whether the user marks the content as hidden. |
| 93 | +|`Id` |`guid`| Unique id of the activity log| |
| 94 | +|`ActionType`|`string`| This field gives a more verbose context around the type of activity done as per the audit operation and some specific fields (in case of few specific operation). This is a comma separated list which might have multiple activity description for some particular activities like for FileCreated operation it can be "Hidden File Created" or "Sensitive File Created" or both.| |
| 95 | +|`SensitiveInfoTypeInfo`| Array<JSON Object>| Information regarding the DLP sensitive information.| |
| 96 | +|`SensitivtyLabelIds`|`string`| The current MIP sensitivity label ID associated with the item.| |
| 97 | +|`SharepointSiteSensitivityLabelIds`|`string`| The MIP sensitivity label ID assigned to the parent site of the item related to SharePoint activities.| |
| 98 | +|`PreviousSensitivityLabelId`| `string`| The old MIP sensitivity label Id for the item in case of activities where sensitive label was changed like SpoFileLabelDowngraded, SpoFileLabelRemoved, SpoSiteLabelRemoved.| |
| 99 | +|`Operation`| `string`| The name of the admin activity.| |
| 100 | +|`RecipientEmailAddress`| `string`| Comma separated list of recipients for the corresponding activity. It could be the recipients of email, SharePoint shared items, teams message, teams channel member addition action etc.| |
| 101 | +|`SiteUrl`| `string` | xxx | |
| 102 | +|`SourceRelativeUrl`| `string`| xxx | |
| 103 | +|`TargetFilePath`| `string`| Target file path for end point activities.| |
| 104 | +|`PrinterName`| `string`| List of printers involved in the behavior| |
| 105 | +|`Workload`|`string`| The Microsoft 365 service where the activity occurred.| |
| 106 | +|`IrmActionCategory`| `enum`| A unique enumeration value indicating the activity category in Microsoft Purview Insider risk management.| |
| 107 | +|`SequenceCorrelationId`| xx |Details of the sequence activity| |
| 108 | + |
| 109 | + |
| 110 | +## Related articles |
| 111 | + |
| 112 | +- [Advanced hunting overview](advanced-hunting-overview.md) |
| 113 | +- [Learn the query language](advanced-hunting-query-language.md) |
| 114 | +- [Use shared queries](advanced-hunting-shared-queries.md) |
| 115 | +- [Understand the schema](advanced-hunting-schema-tables.md) |
| 116 | +- [Apply query best practices](advanced-hunting-best-practices.md) |
| 117 | + |
| 118 | + |
| 119 | +[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)] |
0 commit comments