windows-itpro-docs/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-filecreationevents-table.md
lomayor d37bd86752 AH-SEO-optimization
Legacy files renamed, redirected. Meta desc and keywords enhanced
2019-10-08 18:21:28 -07:00

6.0 KiB

title, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic, ms.date
title description keywords search.product search.appverid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.author author ms.localizationpriority manager audience ms.collection ms.topic ms.date
FileCreationEvents table in the Advanced hunting schema Learn about file-related events in the FileCreationEvents table of the Advanced hunting schema advanced hunting, threat hunting, cyber threat hunting, search, query, telemetry, schema reference, kusto, table, column, data type, description, filecreationevents, files, path, hash, sha1, sha256, md5 eADQiWindows 10XVcnh met150 w10 deploy library security lomayor lomayor medium dansimp ITPro M365-security-compliance article 10/08/2019

FileCreationEvents

Applies to:

Want to experience Microsoft Defender ATP? Sign up for a free trial.

The FileCreationEvents table in the Advanced hunting schema contains information about file creation, modification, and other file system events. Use this reference to construct queries that return information from the table.

For information on other tables in the Advanced hunting schema, see the Advanced hunting schema reference.

Column name Data type Description
EventTime datetime Date and time when the event was recorded
MachineId string Unique identifier for the machine in the service
ComputerName string Fully qualified domain name (FQDN) of the machine
ActionType string Type of activity that triggered the event
FileName string Name of the file that the recorded action was applied to
FolderPath string Folder containing the file that the recorded action was applied to
SHA1 string SHA-1 of the file that the recorded action was applied to
SHA256 string SHA-256 of the file that the recorded action was applied to. This field is usually not populated—use the SHA1 column when available
MD5 string MD5 hash of the file that the recorded action was applied to
FileOriginUrl string URL where the file was downloaded from
FileOriginReferrerUrl string URL of the web page that links to the downloaded file
FileOriginIP string IP address where the file was downloaded from
InitiatingProcessAccountDomain string Domain of the account that ran the process responsible for the event
InitiatingProcessAccountName string User name of the account that ran the process responsible for the event
InitiatingProcessAccountSid string Security Identifier (SID) of the account that ran the process responsible for the event
InitiatingProcessMD5 string MD5 hash of the process (image file) that initiated the event
InitiatingProcessSHA1 string SHA-1 of the process (image file) that initiated the event
InitiatingProcessFolderPath string Folder containing the process (image file) that initiated the event
InitiatingProcessFileName string Name of the process that initiated the event
InitiatingProcessId int Process ID (PID) of the process that initiated the event
InitiatingProcessCommandLine string Command line used to run the process that initiated the event
InitiatingProcessCreationTime datetime Date and time when the process that initiated the event was started
InitiatingProcessIntegrityLevel string Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources
InitiatingProcessTokenElevation string Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event
InitiatingProcessParentId int Process ID (PID) of the parent process that spawned the process responsible for the event
InitiatingProcessParentFileName string Name of the parent process that spawned the process responsible for the event
InitiatingProcessParentCreationTime datetime Date and time when the parent of the process responsible for the event was started
RequestProtocol string Network protocol, if applicable, used to initiate the activity: Unknown, Local, SMB, or NFS
ShareName string Name of shared folder containing the file
RequestSourceIP string IPv4 or IPv6 address of the remote device that initiated the activity
RequestSourcePort string Source port on the remote device that initiated the activity
RequestAccountName string User name of account used to remotely initiate the activity
RequestAccountDomain string Domain of the account used to remotely initiate the activity
RequestAccountSid string Security Identifier (SID) of the account to remotely initiate the activity
ReportId long Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the ComputerName and EventTime columns
AppGuardContainerId string Identifier for the virtualized container used by Application Guard to isolate browser activity
SensitivityLabel string Label applied to an email, file, or other content to classify it for information protection
SensitivitySubLabel string Sublabel applied to an email, file, or other content to classify it for information protection; sensitivity sublabels are grouped under sensitivity labels but are treated independently
IsAzureInfoProtectionApplied boolean Indicates whether the file is encrypted by Azure Information Protection