Files
windows-itpro-docs/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md
Marty Hernandez Avedon b8085f6524 Martyav mdatp screenshot update (#540)
Extensively updated screenshots and articles about Microsoft Defender ATP to reflect the branding change from Windows Defender ATP.

212 files were changed, most of them .pngs in the directory, windows/security/threat-protection/microsoft-defender-atp/images

This is a squash merge -- see the branch martyav-mdatp-screenshot-update for the full history of 81 separate commits.
2019-07-02 12:49:22 -04:00

13 KiB

title, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic, ms.date
title description keywords search.product search.appverid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.author author ms.localizationpriority manager audience ms.collection ms.topic ms.date
Microsoft Defender ATP alert API fields Understand how the alert API fields map to the values in Microsoft Defender Security Center alerts, alert fields, fields, api, fields, pull alerts, rest api, request, response eADQiWindows 10XVcnh met150 w10 deploy library security macapara mjcaparas medium dansimp ITPro M365-security-compliance article 10/16/2017

Microsoft Defender ATP SIEM alert API fields

Applies to:

Want to experience Microsoft Defender ATP? Sign up for a free trial.

Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center.

Alert API fields and portal mapping

The following table lists the available fields exposed in the alerts API payload. It shows examples for the populated values and a reference on how data is reflected on the portal.

The ArcSight field column contains the default mapping between the Microsoft Defender ATP fields and the built-in fields in ArcSight. You can download the mapping file from the portal when you enable the SIEM integration feature and you can modify it to match the needs of your organization. For more information, see Enable SIEM integration in Microsoft Defender ATP.

Field numbers match the numbers in the images below.

[!div class="mx-tableFixed"]

Portal label SIEM field name ArcSight field Example value Description
1 AlertTitle name Windows Defender AV detected 'Mikatz' high-severity malware Value available for every alert.
2 Severity deviceSeverity High Value available for every alert.
3 Category deviceEventCategory Malware Value available for every alert.
4 Detection source sourceServiceName Antivirus Windows Defender Antivirus or Microsoft Defender ATP. Value available for every alert.
5 MachineName sourceHostName desktop-4a5ngd6 Value available for every alert.
6 FileName fileName Robocopy.exe Available for alerts associated with a file or process.
7 FilePath filePath C:\Windows\System32\Robocopy.exe Available for alerts associated with a file or process.
8 UserDomain sourceNtDomain CONTOSO The domain of the user context running the activity, available for Microsoft Defender ATP behavioral based alerts.
9 UserName sourceUserName liz.bean The user context running the activity, available for Microsoft Defender ATP behavioral based alerts.
10 Sha1 fileHash 3da065e07b990034e9db7842167f70b63aa5329 Available for alerts associated with a file or process.
11 Sha256 deviceCustomString6 ebf54f745dc81e1958f75e4ca91dd0ab989fc9787bb6b0bf993e2f5 Available for Windows Defender AV alerts.
12 Md5 deviceCustomString5 db979c04a99b96d370988325bb5a8b21 Available for Windows Defender AV alerts.
13 ThreatName deviceCustomString1 HackTool:Win32/Mikatz!dha Available for Windows Defender AV alerts.
14 IpAddress sourceAddress 218.90.204.141 Available for alerts associated to network events. For example, 'Communication to a malicious network destination'.
15 Url requestUrl down.esales360.cn Available for alerts associated to network events. For example, 'Communication to a malicious network destination'.
16 RemediationIsSuccess deviceCustomNumber2 TRUE Available for Windows Defender AV alerts. ArcSight value is 1 when TRUE and 0 when FALSE.
17 WasExecutingWhileDetected deviceCustomNumber1 FALSE Available for Windows Defender AV alerts. ArcSight value is 1 when TRUE and 0 when FALSE.
18 AlertId externalId 636210704265059241_673569822 Value available for every alert.
19 LinkToWDATP flexString1 https://securitycenter.windows.com/alert/636210704265059241_673569822 Value available for every alert.
20 AlertTime deviceReceiptTime 2017-05-07T01:56:59.3191352Z The time the activity relevant to the alert occurred. Value available for every alert.
21 MachineDomain sourceDnsDomain contoso.com Domain name not relevant for AAD joined machines. Value available for every alert.
22 Actor deviceCustomString4 BORON Available for alerts related to a known actor group.
21+5 ComputerDnsName No mapping liz-bean.contoso.com The machine fully qualified domain name. Value available for every alert.
LogOnUsers sourceUserId contoso\liz-bean; contoso\jay-hardee The domain and user of the interactive logon user/s at the time of the event. Note: For machines on Windows 10 version 1607, the domain information will not be available.
InternalIPv4List No mapping 192.168.1.7, 10.1.14.1 List of IPV4 internal IPs for active network interfaces.
InternalIPv6List No mapping fd30:0000:0000:0001:ff4e:003e:0009:000e, FE80:CD00:0000:0CDE:1257:0000:211E:729C List of IPV6 internal IPs for active network interfaces.
Internal field LastProcessedTimeUtc No mapping 2017-05-07T01:56:58.9936648Z Time when event arrived at the backend. This field can be used when setting the request parameter for the range of time that alerts are retrieved.
Not part of the schema deviceVendor Static value in the ArcSight mapping - 'Microsoft'.
Not part of the schema deviceProduct Static value in the ArcSight mapping - 'Microsoft Defender ATP'.
Not part of the schema deviceVersion Static value in the ArcSight mapping - '2.0', used to identify the mapping versions.

Image of alert with numbers

Image of alert details pane with numbers

Image of artifact timeline with numbers

Image of artifact timeline with numbers

Image machine view

Image browser URL

Image actor alert