Skip to content

Commit eb3bc6f

Browse files
Merge pull request #4199 from MicrosoftDocs/maccruz-ahschemareview
AH prereq update
2 parents 60f60df + 397c1cb commit eb3bc6f

File tree

76 files changed

+407
-278
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+407
-278
lines changed

defender-xdr/advanced-hunting-aadsignineventsbeta-table.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,15 +17,16 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 04/03/2024
24+
ms.date: 03/28/2025
2225
---
2326

2427
# AADSignInEventsBeta
2528

26-
**Applies to:**
2729

28-
- Microsoft Defender XDR
2930

3031
> [!IMPORTANT]
3132
> The `AADSignInEventsBeta` table is currently in beta and is being offered on a short-term basis to allow you to hunt through Microsoft Entra sign-in events. Customers need to have a Microsoft Entra ID P2 license to collect and view activities for this table. All sign-in schema information will eventually move to the `IdentityLogonEvents` table.

defender-xdr/advanced-hunting-aadspnsignineventsbeta-table.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,14 +17,15 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 04/03/2024
24+
ms.date: 03/28/2025
2225
---
2326

2427
# AADSpnSignInEventsBeta
2528

26-
**Applies to:**
27-
- Microsoft Defender XDR
2829

2930
> [!IMPORTANT]
3031
> The `AADSpnSignInEventsBeta` table is currently in beta and is being offered on a short-term basis to allow you to hunt through Microsoft Entra sign-in events. Customers need to have a Microsoft Entra ID P2 license to collect and view activities for this table. Microsoft will eventually move all sign-in schema information to the `IdentityLogonEvents` table.

defender-xdr/advanced-hunting-alertevidence-table.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,20 +17,23 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 04/03/2024
24+
ms.date: 03/28/2025
2225
---
2326

2427
# AlertEvidence
2528

2629
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2730

2831

29-
**Applies to:**
30-
- Microsoft Defender XDR
3132

3233
The `AlertEvidence` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about various entities—files, IP addresses, URLs, users, or devices—associated with alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity. Use this reference to construct queries that return information from this table.
3334

35+
This advanced hunting table is populated by records from various Microsoft Defender services. If your organization hasn’t deployed the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy services in Defender XDR, read [Deploy supported services](deploy-supported-services.md).
36+
3437
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
3538

3639
| Column name | Data type | Description |

defender-xdr/advanced-hunting-alertinfo-table.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,22 +17,25 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 04/03/2024
24+
ms.date: 03/28/2025
2225
---
2326

2427
# AlertInfo
2528

2629
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2730

2831

29-
**Applies to:**
30-
- Microsoft Defender XDR
3132

3233

3334
## Get access
3435
To use advanced hunting or other [Microsoft Defender XDR](microsoft-365-defender.md) capabilities, you need an appropriate role in Microsoft Entra ID. [Read about required roles and permissions for advanced hunting](custom-roles.md).
3536

37+
This advanced hunting table is populated by records from various Microsoft Defender services. If your organization hasn’t deployed the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy services in Defender XDR, read [Deploy supported services](deploy-supported-services.md).
38+
3639
Also, your access to endpoint data is determined by role-based access control (RBAC) settings in Microsoft Defender for Endpoint. [Read about managing access to Microsoft Defender XDR](m365d-permissions.md).
3740

3841
## AlertInfo

defender-xdr/advanced-hunting-assignedipaddresses-function.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,18 +17,17 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 04/03/2024
24+
ms.date: 03/28/2025
2225
---
2326

2427
# AssignedIPAddresses()
2528

2629
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2730

28-
29-
**Applies to:**
30-
- Microsoft Defender XDR
31-
3231
Use the `AssignedIPAddresses()` function in your [advanced hunting](advanced-hunting-overview.md) queries to quickly obtain the latest IP addresses that have been assigned to a device. If you specify a timestamp argument, this function obtains the most recent IP addresses at the specified time.
3332

3433
This function returns a table with the following columns:

defender-xdr/advanced-hunting-behaviorentities-table.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,18 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 12/29/2023
24+
ms.date: 03/28/2025
2225
---
2326

2427
# BehaviorEntities (Preview)
2528

2629
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2730

28-
**Applies to:**
29-
- Microsoft Defender XDR
31+
3032

3133
The `BehaviorEntities` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about behaviors in Microsoft Defender for Cloud Apps. Use this reference to construct queries that return information from this table.
3234

@@ -36,6 +38,13 @@ The `BehaviorEntities` table in the [advanced hunting](advanced-hunting-overview
3638
3739
Behaviors are a type of data in Microsoft Defender XDR based on one or more raw events. Behaviors provide contextual insight into events and can, but not necessarily, indicate malicious activity. [Read more about behaviors](/defender-cloud-apps/behaviors)
3840

41+
This advanced hunting table is populated by records from Microsoft Defender for Cloud Apps. If your organization hasn’t deployed the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy services in Defender XDR, read [Deploy supported services](deploy-supported-services.md).
42+
43+
To make sure the `BehaviorEntities` table is populated by Microsoft Defender for Cloud Apps data:
44+
1. Go to the Defender portal and select **Settings > Cloud apps > App connectors**.
45+
2. In the **Select Microsoft 365 components** page, select the **Microsoft 365 activities** checkbox.
46+
For detailed instructions, see: [Connect Microsoft 365 to Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-office-365#prerequisites)
47+
3948
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
4049

4150
| Column name | Data type | Description |

defender-xdr/advanced-hunting-behaviorinfo-table.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,18 +17,18 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 12/29/2023
24+
ms.date: 03/28/2025
2225
---
2326

2427
# BehaviorInfo (Preview)
2528

2629
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2730

2831

29-
**Applies to:**
30-
- Microsoft Defender XDR
31-
3232

3333

3434

@@ -39,6 +39,14 @@ The `BehaviorInfo` table in the [advanced hunting](advanced-hunting-overview.md)
3939
4040
Behaviors are a type of data in Microsoft Defender XDR based on one or more raw events. Behaviors provide contextual insight into events and can, but not necessarily, indicate malicious activity. [Read more about behaviors](/defender-cloud-apps/behaviors)
4141

42+
43+
This advanced hunting table is populated by records from Microsoft Defender for Cloud Apps. If your organization hasn’t deployed the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy services in Defender XDR, read [Deploy supported services](deploy-supported-services.md).
44+
45+
To make sure the `BehaviorInfo` table is populated by Microsoft Defender for Cloud Apps data:
46+
1. Go to the Defender portal and select **Settings > Cloud apps > App connectors**.
47+
2. In the **Select Microsoft 365 components** page, select the **Microsoft 365 activities** checkbox.
48+
For detailed instructions, see: [Connect Microsoft 365 to Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-office-365#prerequisites)
49+
4250
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
4351

4452
| Column name | Data type | Description |

defender-xdr/advanced-hunting-best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.topic: best-practice
2121
appliesto:
2222
- Microsoft Defender XDR
2323
- Microsoft Sentinel in the Microsoft Defender portal
24-
ms.date: 02/24/2025
24+
ms.date: 03/28/2025
2525
---
2626

2727
# Advanced hunting query best practices

defender-xdr/advanced-hunting-cloudappevents-table.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
2124
ms.date: 05/15/2025
2225
---
@@ -25,14 +28,15 @@ ms.date: 05/15/2025
2528

2629
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2730

28-
**Applies to:**
29-
- Microsoft Defender XDR
31+
3032

3133
The `CloudAppEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about events involving accounts and objects in Office 365 and other [cloud apps and services](#apps-and-services-covered). Use this reference to construct queries that return information from this table.
3234

3335
## Prerequisites
36+
This advanced hunting table is populated by records from Microsoft Defender for Cloud Apps. If your organization hasn’t deployed the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy Defender for Cloud Apps in Defender XDR, read [Deploy supported services](deploy-supported-services.md).
37+
3438

35-
To make sure the `CloudAppEvents` data is populated:
39+
To make sure the `CloudAppEvents` table is populated:
3640

3741
1. Go to the Defender portal and select **Settings > Cloud apps > App connectors**.
3842

defender-xdr/advanced-hunting-custom-functions.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,11 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: how-to
21-
ms.date: 04/22/2024
24+
ms.date: 03/28/2025
2225
---
2326

2427
# Use custom functions

0 commit comments

Comments
 (0)