Schema Tables Flashcards

(62 cards)

1
Q

AADSignInEventsBeta / EntraidSignInEvents

A

Microsoft Entra interactive and non-interactive sign-ins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AADSpnSignInEventsBeta / EntraidSpnSignInEvents

A

Microsoft Entra service principal and managed identity sign-ins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

differences between EntraidSignInEvents and EntraidSpnSignInEvents

A

EntraIdSignInEvents-
Monitoring and troubleshooting user authentication, including MFA, device info, and conditional access policies.

EntraIdSpnSignInEvents-
Monitoring and troubleshooting application authentication, service-to-service communication, and non-interactive processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AlertEvidence

A

Files, IP addresses, URLs, users, or devices associated with alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AlertInfo

A

Alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity, including severity information and threat categorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AlertEvidence vs AlertInfo

A

AlertInfo to get a list of alerts and overview of alert.

AlertEvidence for more granual information on the alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BehaviorEntities

A

Behavior data types in Microsoft Defender for Cloud Apps (not available for GCC)

The BehaviorEntities table in the Microsoft Defender XDR advanced hunting schema contains detailed information about the specific entities (users, devices, files, IP addresses, etc.) involved in an identified behavior.
Behaviors are an abstract data layer, sourced primarily from Microsoft Defender for Cloud Apps, that provide contextual insight into events, bridging the gap between raw event data and full-blown security alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BehaviorInfo

A

Alerts from Microsoft Defender for Cloud Apps (not available for GCC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CloudAppEvents

A

Events involving accounts and objects in Office 365 and other cloud apps and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CloudAuditEvents

A

Cloud audit events for various cloud platforms protected by the organization’s Microsoft Defender for Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CloudAppEvents vs CloudAuditEvents

A

CloudAppEvents
Events involving accounts and objects in Office 365 and other connected third-party cloud apps (like Dropbox, Box, AWS, Azure, GCP user activities).

CloudAuditEvents
Cloud audit events for various cloud platforms, with a strong focus on infrastructure and resource management operations (e.g., Azure Resource Manager operations, Kubernetes API calls).

Use the CloudAppEvents table to hunt for activities related to what users are doing within specific cloud applications (e.g., “Who downloaded this file from SharePoint?”).
Use the CloudAuditEvents table to hunt for activities related to how your cloud infrastructure is being managed or accessed (e.g., “Was a suspicious operation performed on an Azure resource group?” or “Were any unusual Kubernetes API calls made?”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CloudProcessEvents

A

Cloud process events for various cloud platforms protected by the organization’s Microsoft Defender for Containers

This table is populated by data collected through Microsoft Defender for Cloud and provides crucial visibility into the runtime environment of services like Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), and Google Kubernetes Engine (GKE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CloudStorageAggregatedEvents

A

Cloud storage activity and related events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DataSecurityBehaviors

A

Insights about potentially suspicious user behaviors that violate user-defined or default policies configured in the Microsoft Purview suite of solutions

contains insights about potentially suspicious user behaviors that violate the user-defined or default policies configured in the Microsoft Purview suite of solutions.

Insights cover a range of data security related behaviors like behaviors involving exfiltration, obfuscation, risky interactions with AI applications, and others. Insights are generated by aggregating user behaviors over a calendar day and comparing them with previous activity, peer group activity, or other activities done by the user. Insights also capture summaries of various risk pivots like sensitive data, risky destinations, and the like.

This advanced hunting table is populated by records from Microsoft Purview Insider Risk Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DataSecurityEvents

A

Information about user activities that violate user-defined or default policies in the Microsoft Purview suite of solutions

Each log represents a single user activity enriched with proprietary Microsoft detections (like sensitive info types) and user-defined enrichment labels like domain categories, sensitivity labels, and others.

This advanced hunting table is populated by records from Microsoft Purview Insider Risk Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DataSecurityBehaviors vs DataSecurityEvents

A

DataSecurityEvents gives you the “forest” of individual data points you can filter and analyze to pinpoint exact actions.
DataSecurityBehaviors provides a summary “tree” of user activities, highlighting patterns and anomalies flagged by Microsoft Purview’s machine learning, making it easier to spot potential insider threats without processing massive amounts of raw data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DeviceBaselineComplianceAssessment

A

Baseline compliance assessment snapshot, which indicates the status of various security configurations related to baseline profiles on devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DeviceBaselineComplianceAssessmentKB

A

Information about various security configurations used by baseline compliance to assess devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DeviceBaselineComplianceProfiles

A

Baseline profiles used for monitoring device baseline compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DeviceBaselineComplianceProfiles vs DeviceBaselineComplianceAssessmentKB vs DeviceBaselineComplianceAssessment

A

DeviceBaselineComplianceProfiles
to understand your organization’s specific baseline configurations.

Provides details on the customized baseline profiles that an administrator has created and defined in the organization. Information about how baselines are configured (e.g., profile name, associated OS platform, creation time, exception details).

DeviceBaselineComplianceAssessmentKB
to reference the industry-standard definitions for security settings.

Contains a knowledge base of the general security configurations and recommended values. Details on what the ideal setting should be (e.g., “Minimum password length should be 14”), independent of any specific device or custom profile.

DeviceBaselineComplianceAssessment
to view the actual compliance status of each individual device.

Contains the snapshot of the actual assessment results for each device against the defined profiles. Device-specific compliance status (Compliant, NonCompliant, etc.), the actual current value of a setting on the device, the expected value, and the specific DeviceId.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DeviceEvents

A

Multiple event types, including events triggered by security controls such as Microsoft Defender Antivirus and exploit protection

Endpoint activity, covering network connections, USB events, scheduled tasks, login events, shell commands, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DeviceFileCertificateInfo

A

Certificate information of signed files obtained from certificate verification events on endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DeviceFileEvents

A

File creation, modification, and other file system events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DeviceImageLoadEvents

A

DLL loading events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DeviceInfo
Machine information, including OS information
26
DeviceLogonEvents
Sign-ins and other authentication events on devices
27
DeviceNetworkEvents
Network connection and related events
28
DeviceNetworkInfo
Network properties of devices, including physical adapters, IP and MAC addresses, as well as connected networks and domains
29
DeviceProcessEvents
Process creation and related events
30
DeviceRegistryEvents
Creation and modification of registry entries
31
DeviceTvmBrowserExtensions
Browser extension installations found on devices from Microsoft Defender Vulnerability Management
32
DeviceTvmBrowserExtensionsKB
Browser extension details and permission information used in the Microsoft Defender Vulnerability Management browser extensions page
33
DeviceTvmCertificateInfo
Certificate information for devices in the organization from Microsoft Defender Vulnerability Management
34
DeviceTvmHardwareFirmware
Hardware and firmware information of devices as checked by Defender Vulnerability Management
35
DeviceTvmInfoGathering
Defender Vulnerability Management assessment events including configuration and attack surface area states
36
DeviceTvmInfoGatheringKB
Metadata for assessment events collected in the DeviceTvmInfogathering table
37
DeviceTvmSecureConfigurationAssessment
Microsoft Defender Vulnerability Management assessment events, indicating the status of various security configurations on devices
38
DeviceTvmSecureConfigurationAssessmentKB
Knowledge base of various security configurations used by Microsoft Defender Vulnerability Management to assess devices; includes mappings to various standards and benchmarks
39
DeviceTvmSoftwareEvidenceBeta
Evidence info about where a specific software was detected on a device
40
DeviceTvmSoftwareInventory
Inventory of software installed on devices, including their version information and end-of-support status
41
DeviceTvmSoftwareVulnerabilities
Software vulnerabilities found on devices and the list of available security updates that address each vulnerability
42
DeviceTvmSoftwareVulnerabilitiesKB
Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available
43
DisruptionAndResponseEvents
Automatic attack disruption events in Microsoft Defender XDR
44
EmailAttachmentInfo
Information about files attached to emails
45
EmailEvents
Microsoft 365 email events, including email delivery and blocking events
46
EmailPostDeliveryEvents
Security events that occur post-delivery, after Microsoft 365 delivers the emails to the recipient mailbox
47
EmailUrlInfo
Information about URLs on emails
48
EntraIdSignInEvents
Microsoft Entra interactive and non-interactive sign-ins
49
EntraIdSpnSignInEvents
Microsoft Entra service principal and managed identity sign-ins
50
ExposureGraphEdges
Microsoft Security Exposure Management exposure graph edge information provides visibility into relationships between entities and assets in the graph
51
ExposureGraphNodes
Microsoft Security Exposure Management exposure graph node information, about organizational entities and their properties
52
GraphApiAuditEvents
Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant
53
IdentityDirectoryEvents
Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller.
54
IdentityEvents
Information about identity events obtained from other cloud identity service providers
55
IdentityInfo
Account information from various sources, including Microsoft Entra ID
56
IdentityLogonEvents
Authentication events on Active Directory and Microsoft online services
57
IdentityQueryEvents
Queries for Active Directory objects, such as users, groups, devices, and domains
58
MessageEvents
Messages sent and received within your organization at the time of delivery
59
MessagePostDeliveryEvents
Security events that occurred after the delivery of a Microsoft Teams message in your organization
60
MessageUrlInfo
URLs sent through Microsoft Teams messages in your organization
61
OAuthAppInfo
Microsoft 365-connected OAuth applications registered with Microsoft Entra ID and available in the Defender for Cloud Apps app governance capability
62
UrlClickEvents
Safe Links clicks from email messages, Teams, and Office 365 apps