diff --git a/windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md
index 2d146c99a0..1732c065bd 100644
--- a/windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md
+++ b/windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md
@@ -36,240 +36,39 @@ The ArcSight field column contains the default mapping between the Windows Defen
Field numbers match the numbers in the images below.
-
-
- Portal label |
- SIEM field name |
- ArcSight field |
- Example value |
- Description |
- |
-
-
- 1 |
- AlertTitle |
- name |
- A dll was unexpectedly loaded into a high integrity process without a UAC prompt |
- Value available for every alert. |
- |
-
-
- 2 |
- Severity |
- deviceSeverity |
- Medium |
- Value available for every alert. |
- |
-
-
- 3 |
- Category |
- deviceEventCategory |
- Privilege Escalation |
- Value available for every alert. |
- |
-
-
- 4 |
- Source |
- sourceServiceName |
- WindowsDefenderATP |
- Windows Defender Antivirus or Windows Defender ATP. Value available for every alert. |
- |
-
-
- 5 |
- MachineName |
- sourceHostName |
- liz-bean |
- Value available for every alert. |
- |
-
-
- 6 |
- FileName |
- fileName |
- Robocopy.exe |
- Available for alerts associated with a file or process. |
- |
-
-
- 7 |
- FilePath |
- filePath |
- C:\Windows\System32\Robocopy.exe |
- Available for alerts associated with a file or process. \ |
- |
-
-
- 8 |
- UserDomain |
- sourceNtDomain |
- contoso |
- The domain of the user context running the activity, available for Windows Defender ATP behavioral based alerts. |
- |
-
-
- 9 |
- UserName |
- sourceUserName |
- liz-bean |
- The user context running the activity, available for Windows Defender ATP behavioral based alerts. |
- |
-
-
- 10 |
- Sha1 |
- fileHash |
- 5b4b3985339529be3151d331395f667e1d5b7f35 |
- Available for alerts associated with a file or process. |
- |
-
-
- 11 |
- Md5 |
- deviceCustomString5 |
- 55394b85cb5edddff551f6f3faa9d8eb |
- Available for Windows Defender AV alerts. |
- |
-
-
- 12 |
- Sha256 |
- deviceCustomString6 |
- 9987474deb9f457ece2a9533a08ec173a0986fa3aa6ac355eeba5b622e4a43f5 |
- Available for Windows Defender AV alerts. |
- |
-
-
- 13 |
- ThreatName |
- eviceCustomString1 |
- Trojan:Win32/Skeeyah.A!bit |
- Available for Windows Defender AV alerts. |
- |
-
-
- 14 |
- IpAddress |
- sourceAddress |
- 218.90.204.141 |
- Available for alerts associated to network events. For example, 'Communication to a malicious network destination'. |
- |
-
-
- 15 |
- Url |
- requestUrl |
- down.esales360.cn |
- Availabe for alerts associated to network events. For example, 'Communication to a malicious network destination'. |
- |
-
-
- 16 |
- RemediationIsSuccess |
- deviceCustomNumber2 |
- TRUE |
- Available for Windows Defender AV alerts. ArcSight value is 1 when TRUE and 0 when FALSE. |
- |
-
-
- 17 |
- WasExecutingWhileDetected |
- deviceCustomNumber1 |
- FALSE |
- Available for Windows Defender AV alerts. ArcSight value is 1 when TRUE and 0 when FALSE. |
- |
-
-
- 18 |
- AlertId |
- externalId |
- 636210704265059241_673569822 |
- Value available for every alert. |
- |
-
-
- 19 |
- LinkToWDATP |
- flexString1 |
- `https://securitycenter.windows.com/alert/636210704265059241_673569822` |
- Value available for every alert. |
- |
-
-
- 20 |
- AlertTime |
- deviceReceiptTime |
- 2017-05-07T01:56:59.3191352Z |
- The time the activity relevant to the alert occurred. Value available for every alert. |
- |
-
-
- 21 |
- MachineDomain |
- sourceDnsDomain |
- contoso.com |
- Domain name not relevant for AAD joined machines. Value available for every alert. |
- |
-
-
- 22 |
- Actor |
- deviceCustomString4 |
- |
- Available for alerts related to a known actor group. |
- |
-
-
- 21+5 |
- ComputerDnsName |
- No mapping |
- liz-bean.contoso.com |
- The machine fully qualified domain name. Value available for every alert. |
- |
-
-
- |
- LogOnUsers |
- sourceUserId |
- contoso\liz-bean; contoso\jay-hardee |
- The domain and user of the interactive logon user/s at the time of the event. Note: For machines on Windows 10 version 1607, the domain information will not be available. |
- |
-
-
- Internal field |
- LastProcessedTimeUtc |
- No mapping |
- 2017-05-07T01:56:58.9936648Z |
- Time when event arrived at the backend. This field can be used when setting the request parameter for the range of time that alerts are retrieved. |
- |
-
-
- |
- Not part of the schema |
- deviceVendor |
- |
- Static value in the ArcSight mapping - 'Microsoft'. |
- |
-
-
- |
- Not part of the schema |
- deviceProduct |
- |
- Static value in the ArcSight mapping - 'Windows Defender ATP'. |
- |
-
-
- |
- Not part of the schema |
- deviceVersion |
- |
- Static value in the ArcSight mapping - '2.0', used to identify the mapping versions. |
- |
-
-
+> [!div class="mx-tableFixed"]
+| Portal label | SIEM field name | ArcSight field | Example value | Description |
+|------------------|---------------------------|---------------------|------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| 1 | AlertTitle | name | A dll was unexpectedly loaded into a high integrity process without a UAC prompt | Value available for every alert. |
+| 2 | Severity | deviceSeverity | Medium | Value available for every alert. |
+| 3 | Category | deviceEventCategory | Privilege Escalation | Value available for every alert. |
+| 4 | Source | sourceServiceName | WindowsDefenderATP | Windows Defender Antivirus or Windows Defender ATP. Value available for every alert. |
+| 5 | MachineName | sourceHostName | liz-bean | Value available for every alert. |
+| 6 | FileName | fileName | Robocopy.exe | Available for alerts associated with a file or process. |
+| 7 | FilePath | filePath | C:\Windows\System32\Robocopy.exe | Available for alerts associated with a file or process. |
+| 8 | UserDomain | sourceNtDomain | contoso | The domain of the user context running the activity, available for Windows Defender ATP behavioral based alerts. |
+| 9 | UserName | sourceUserName | liz-bean | The user context running the activity, available for Windows Defender ATP behavioral based alerts. |
+| 10 | Sha1 | fileHash | 5b4b3985339529be3151d331395f667e1d5b7f35 | Available for alerts associated with a file or process. |
+| 11 | Md5 | deviceCustomString5 | 55394b85cb5edddff551f6f3faa9d8eb | Available for Windows Defender AV alerts. |
+| 12 | Sha256 | deviceCustomString6 | 9987474deb9f457ece2a9533a08ec173a0986fa3aa6ac355eeba5b622e4a43f5 | Available for Windows Defender AV alerts. |
+| 13 | ThreatName | eviceCustomString1 | Trojan:Win32/Skeeyah.A!bit | Available for Windows Defender AV alerts. |
+| 14 | IpAddress | sourceAddress | 218.90.204.141 | Available for alerts associated to network events. For example, 'Communication to a malicious network destination'. |
+| 15 | Url | requestUrl | down.esales360.cn | Availabe for alerts associated to network events. For example, 'Communication to a malicious network destination'. |
+| 16 | RemediationIsSuccess | deviceCustomNumber2 | TRUE | Available for Windows Defender AV alerts. ArcSight value is 1 when TRUE and 0 when FALSE. |
+| 17 | WasExecutingWhileDetected | deviceCustomNumber1 | FALSE | Available for Windows Defender AV alerts. ArcSight value is 1 when TRUE and 0 when FALSE. |
+| 18 | AlertId | externalId | 636210704265059241_673569822 | Value available for every alert. |
+| 19 | LinkToWDATP | flexString1 | `https://securitycenter.windows.com/alert/636210704265059241_673569822` | Value available for every alert. |
+| 20 | AlertTime | deviceReceiptTime | 2017-05-07T01:56:59.3191352Z | The time the activity relevant to the alert occurred. Value available for every alert. |
+| 21 | MachineDomain | sourceDnsDomain | contoso.com | Domain name not relevant for AAD joined machines. Value available for every alert. |
+| 22 | Actor | deviceCustomString4 | | Available for alerts related to a known actor group. |
+| 21+5 | ComputerDnsName | No mapping | liz-bean.contoso.com | The machine fully qualified domain name. Value available for every alert. |
+| | LogOnUsers | sourceUserId | contoso\liz-bean; contoso\jay-hardee | The domain and user of the interactive logon user/s at the time of the event. Note: For machines on Windows 10 version 1607, the domain information will not be available. |
+| | InternalIPv4List | No mapping | 192.168.1.7, 10.1.14.1 | |
+| | InternalIPv4List | No mapping | fd30:0000:0000:0001:ff4e:003e:0009:000e, FE80:CD00:0000:0CDE:1257:0000:211E:729C | |
+| Internal field | LastProcessedTimeUtc | No mapping | 2017-05-07T01:56:58.9936648Z | Time when event arrived at the backend. This field can be used when setting the request parameter for the range of time that alerts are retrieved. |
+| | Not part of the schema | deviceVendor | | Static value in the ArcSight mapping - 'Microsoft'. |
+| | Not part of the schema | deviceProduct | | Static value in the ArcSight mapping - 'Windows Defender ATP'. |
+| | Not part of the schema | deviceVersion | | Static value in the ArcSight mapping - '2.0', used to identify the mapping versions. |1234567891011121314151617181920212223242526272829303132
