2019-10-31 17:34:13 -07:00

3.8 KiB

title, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic, ms.date
title description keywords search.product search.appverid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.author author ms.localizationpriority manager audience ms.collection ms.topic ms.date
Advanced hunting schema reference Learn about the tables in the Advanced hunting schema to understand the data you can run threat hunting queries on advanced hunting, threat hunting, cyber threat hunting, search, query, telemetry, schema reference, kusto, table, data eADQiWindows 10XVcnh met150 w10 deploy library security lomayor lomayor medium dansimp ITPro M365-security-compliance article 10/08/2019

Understand the Advanced hunting schema

Applies to:

Want to experience Microsoft Defender ATP? Sign up for a free trial.

[!includePrerelease information]

The Advanced hunting schema is made up of multiple tables that provide either event information or information about machines and other entities. To effectively build queries that span multiple tables, you need to understand the tables and the columns in the Advanced hunting schema.

Schema tables

The following reference lists all the tables in the Advanced hunting schema. Each table name links to a page describing the column names for that table.

Table and column names are also listed within the Microsoft Defender Security Center, in the schema representation on the Advanced hunting screen.

Table name Description
AlertEvents Alerts on Microsoft Defender Security Center
MachineInfo Machine information, including OS information
MachineNetworkInfo Network properties of machines, including adapters, IP and MAC addresses, as well as connected networks and domains
ProcessCreationEvents Process creation and related events
NetworkCommunicationEvents Network connection and related events
FileCreationEvents File creation, modification, and other file system events
RegistryEvents Creation and modification of registry entries
LogonEvents Sign-ins and other authentication events
ImageLoadEvents DLL loading events
MiscEvents Multiple event types, including events triggered by security controls such as Windows Defender Antivirus and exploit protection
DeviceTvmSoftwareInventoryVulnerabilities Vulnerabilities in your software inventory
DeviceTvmSoftwareVulnerabilitiesKB Publicly-available vulnerabilities and whether they exist in your software inventory
DeviceTvmSecureConfigurationAssessment Security configuration assessment information
DeviceTvmSecureConfigurationAssessmentKB Basis of security configuration assessment such as security industry standards and benchmarks