Collect Microsoft Graph API alert logs
This document describes how you can export Microsoft Graph API alert logs to Google Security Operations through a Google SecOps feed, and how Microsoft Graph API alert fields map to Google SecOps Unified Data Model (UDM) fields.
For more information, see Data ingestion to Google SecOps overview .
Overview
A typical deployment consists of Microsoft Graph API alerts and the Google SecOps feed configured to send logs to Google SecOps. Each customer deployment can differ and might be more complex.
The deployment contains the following components:
-
Microsoft Graph API alerts: The alerts that the Microsoft Graph API generates.
-
Google SecOps-managed feed. The Google SecOps-managed feed that fetches logs from Microsoft Graph Providers (Cloud) and writes logs to Google SecOps.
-
Google SecOps: Retains and analyzes the Microsoft Graph API alerts logs.
An ingestion label identifies the parser which normalizes raw log data
to structured UDM format. The information in this document applies to the parser
with the MICROSOFT_GRAPH_ALERT
ingestion label.
Before you begin
Ensure you have the following prerequisite:
- Access to Microsoft 365 E5
How to configure Microsoft Graph API alerts
Complete the following before you configure the Google SecOps feed:
- Sign in to the Azure portal.
- Click Azure Active Directory.
- Click App Registrations.
- Click New registrationsand create an application.
- Copy Client IDand Tenant ID, which are required when you configure the Google Security Operations feed.
- Click API permissions.
- Click Add a permissionand then select Microsoft Graphin the new pane.
- Click Application Permissions.
- Expand the SecurityActionsand SecurityEventssections, and select Read.Allpermissions.
- Click Add permissions.
- Click Grant Admin consent for Default Directory.
- In the Managemenu, click Certificates& secrets.
- Click New Client secret, and create a new key.
- Copy the secret key from the Valuefield. The secret key is displayed only at the time of creation and is required when you configure the Google Security Operations feed.
Set up feeds
There are two different entry points to set up feeds in the Google SecOps platform:
- SIEM Settings > Feeds > Add New
- Content Hub > Content Packs > Get Started
How to set up Microsoft Graph API alerts
To configure a single feed, follow these steps:
- Click the Azure platformpack.
- Locate the Microsoft Graph API alertsfeed.
-
Specify values for the following fields:
- Source Type: Third party API (recommended)
- OAUTH client ID: Specify the client ID that you obtained previously.
- OAUTH client secret: Specify the client secret that you obtained previously.
- Tenant ID: Specify the tenant ID that you obtained previously.
- API Full path: Microsoft Graph REST API endpoint URL.
- API Authentication Endpoint: Microsoft Active Directory Authentication Endpoint.
Advanced Options
- Feed Name: A prepopulated value that identifies the feed.
- Asset Namespace: Namespace associated with the feed .
- Ingestion Labels: Labels applied to all events from this feed.
-
Click Create feed.
To configure multiple feeds for different log types within this product family, see Configure feeds by product .
Supported Microsoft Graph API alerts log formats
The Microsoft Graph API alerts parser supports logs in JSON format.
Supported Microsoft Graph API alerts Sample Logs
-
JSON
{ "activityGroupName": null, "assignedTo": null, "azureSubscriptionId": null, "azureTenantId": "azureTenantId", "category": "UnfamiliarLocation", "closedDateTime": null, "cloudAppStates": [], "comments": [], "confidence": null, "createdDateTime": "2020-09-09T10:37:20.3271044Z", "description": "Sign-in with properties we have not seen recently for the given user", "detectionIds": [], "eventDateTime": "2020-09-09T10:37:20.3271044Z", "feedback": null, "fileStates": [], "historyStates": [], "hostStates": [], "id": "ID", "incidentIds": [], "lastModifiedDateTime": "2020-09-09T10:40:08.8987903Z", "malwareStates": [], "networkConnections": [], "processes": [], "recommendedActions": [], "registryKeyStates": [], "riskScore": null, "securityResources": [], "severity": "medium", "sourceMaterials": [], "status": "newAlert", "tags": [], "title": "Unfamiliar sign-in properties", "triggers": [], "userStates": [ { "aadUserId": "dummyuserid", "accountName": "USER1234", "domainName": "dummy_domain.com", "emailRole": "unknown", "isVpn": null, "logonDateTime": "2020-09-09T10:37:20.3271044Z", "logonId": null, "logonIp": "198.51.100.4", "logonLocation": "Chicago, Illinois, US", "logonType": null, "onPremisesSecurityIdentifier": null, "riskScore": null, "userAccountType": null, "userPrincipalName": "test@domain.com" } ], "vendorInformation": { "provider": "IPC", "providerVersion": null, "subProvider": null, "vendor": "Microsoft" }, "vulnerabilityStates": [] }
Field mapping reference
This section explains how the Google SecOps parser maps Microsoft Graph API alert fields to Google SecOps UDM fields.
Field mapping reference: Event Identifier to Event Type
The following table lists theMICROSOFT_GRAPH_ALERT
log types and their corresponding UDM event types. Event Identifier | Event Type | Security Category |
---|---|---|
Atypical travel
|
USER_UNCATEGORIZED
|
|
Anomalous Token
|
USER_RESOURCE_ACCESS
|
|
Default Mapping
|
USER_UNCATEGORIZED
|
|
Malware linked IP address
|
USER_LOGIN
|
|
Suspicious browser
|
USER_UNCATEGORIZED
|
|
Unfamiliar sign-in properties
|
USER_LOGIN
|
|
Malicious IP address
|
USER_LOGIN
|
|
Suspicious inbox manipulation rules
|
USER_UNCATEGORIZED
|
|
Password spray
|
USER_UNCATEGORIZED
|
AUTH_VIOLATION
|
Impossible travel
|
USER_UNCATEGORIZED
|
|
New country
|
USER_UNCATEGORIZED
|
|
Activity from anonymous IP address
|
USER_UNCATEGORIZED
|
|
Suspicious inbox forwarding
|
USER_UNCATEGORIZED
|
|
Mass Access to Sensitive Files
|
USER_RESOURCE_ACCESS
|
|
Additional risk detected
|
STATUS_UPDATE
|
|
Anonymous IP address
|
USER_LOGIN
|
|
Admin confirmed user compromised
|
USER_UNCATEGORIZED
|
|
Azure AD threat intelligence
|
USER_UNCATEGORIZED
|
|
Possible attempt to access Primary Refresh Token (PRT)
|
USER_RESOURCE_ACCESS
|
|
Verified threat actor IP
|
USER_LOGIN
|
|
Microsoft Entra threat intelligence (sign-in)
|
USER_UNCATEGORIZED
|
|
User reported suspicious activity
|
USER_UNCATEGORIZED
|
|
Suspicious API Traffic
|
USER_UNCATEGORIZED
|
|
Suspicious sending patterns
|
USER_UNCATEGORIZED
|
|
Leaked credentials
|
STATUS_UPDATE
|
|
Anomalous user activity
|
USER_UNCATEGORIZED
|
|
'Phish' malware was prevented
|
SCAN_HOST
|
MAIL_PHISHING
|
'AutoItinject' malware was detected
|
SCAN_HOST
|
|
'Agent' backdoor was detected
|
SCAN_UNCATEGORIZED
|
|
A malicious file was detected based on indication provided by O365
|
SCAN_FILE
|
|
An active 'Wacatac' malware was blocked
|
SCAN_UNCATEGORIZED
|
|
A suspicious file was observed
|
SCAN_FILE
|
|
'AutoItinject' malware was prevented
|
SCAN_HOST
|
|
'CoinMiner' unwanted software was prevented
|
SCAN_HOST
|
|
Right-to-Left-Override (RLO) technique observed
|
SCAN_FILE
|
SOCIAL_ENGINEERING
|
Connection to a custom network indicator
|
SCAN_UNCATEGORIZED
|
|
'Conteban' malware was detected
|
SCAN_HOST
|
SOFTWARE_PUA
|
EAF violation blocked by exploit protection
|
SCAN_UNCATEGORIZED
|
EXPLOIT
|
'EICAR_Test_File' malware was prevented
|
SCAN_HOST
|
SOFTWARE_MALICIOUS
|
'EncDoc' malware was prevented
|
SCAN_HOST
|
SOFTWARE_PUA
|
'Fuerboos' malware was detected
|
SCAN_HOST
|
SOFTWARE_PUA
|
'Laqma' malware was prevented
|
SCAN_HOST
|
SOFTWARE_PUA
|
'Locky' ransomware was prevented
|
SCAN_HOST
|
SOFTWARE_PUA
|
Microsoft Defender ATP detected 'Trojan.Generic.1218852' malware
|
SCAN_UNCATEGORIZED
|
SOFTWARE_MALICIOUS
|
'Oneeva' malware was prevented
|
SCAN_HOST
|
SOFTWARE_PUA
|
Password hashes dumped from LSASS memory
|
USER_UNCATEGORIZED
|
|
'PiriformBundler' unwanted software was prevented
|
SCAN_HOST
|
SOFTWARE_PUA
|
'Presenoker' unwanted software was prevented
|
SCAN_HOST
|
SOFTWARE_PUA
|
Sensitive credential memory read
|
SCAN_UNCATEGORIZED
|
|
Suspicious connection blocked by network protection
|
SCAN_UNCATEGORIZED
|
|
Test_Set Auditpol
|
SCAN_UNCATEGORIZED
|
|
Unsanctioned cloud app access was blocked
|
SCAN_UNCATEGORIZED
|
|
'Uwamson' malware was prevented
|
SCAN_HOST
|
SOFTWARE_PUA
|
'CoinMiner' unwanted software was detected
|
SCAN_HOST
|
SOFTWARE_PUA
|
Suspicious Microsoft Defender Antivirus exclusion
|
SCAN_UNCATEGORIZED
|
|
NT - Unknown process injecting dll into lsass or winlogon
|
SCAN_UNCATEGORIZED
|
|
Suspected SID-History injection
|
USER_CHANGE_PERMISSIONS
|
|
Suspected overpass-the-hash attack (Kerberos)
|
NETWORK_UNCATEGORIZED
|
|
Account enumeration reconnaissance
|
NETWORK_UNCATEGORIZED
|
|
Suspected Brute Force attack (LDAP)
|
USER_LOGIN
|
|
Suspected DCSync attack (replication of directory services)
|
NETWORK_UNCATEGORIZED
|
|
Network mapping reconnaissance (DNS)
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected over-pass-the-hash attack (forced encryption type)
|
NETWORK_UNCATEGORIZED
|
|
Suspected Golden Ticket usage (encryption downgrade)
|
USER_UNCATEGORIZED
|
|
Suspected Skeleton Key attack (encryption downgrade)
|
NETWORK_UNCATEGORIZED
|
|
User and IP address reconnaissance (SMB)
|
NETWORK_UNCATEGORIZED
|
|
Suspected Golden Ticket usage (forged authorization data)
|
USER_UNCATEGORIZED
|
|
Honeytoken authentication activity
|
USER_UNCATEGORIZED
|
|
Suspected identity theft (pass-the-hash)
|
USER_UNCATEGORIZED
|
DATA_EXFILTRATION
|
Suspected identity theft (pass-the-ticket)
|
USER_UNCATEGORIZED
|
EXPLOIT
|
Remote code execution attempt
|
USER_UNCATEGORIZED
|
|
Malicious request of Data Protection API master key
|
USER_UNCATEGORIZED
|
|
User and Group membership reconnaissance (SAMR)
|
USER_UNCATEGORIZED
|
|
Suspected Golden Ticket usage (time anomaly)
|
USER_UNCATEGORIZED
|
|
Suspected Brute Force attack (Kerberos, NTLM)
|
USER_LOGIN
|
|
Suspicious additions to sensitive groups
|
USER_CHANGE_PERMISSIONS
|
|
Suspicious VPN connection
|
USER_UNCATEGORIZED
|
|
Suspicious service creation
|
SERVICE_CREATION
|
|
Suspected Golden Ticket usage (nonexistent account)
|
USER_UNCATEGORIZED
|
|
Suspected DCShadow attack (domain controller promotion)
|
STATUS_UPDATE
|
|
Suspected DCShadow attack (domain controller replication request)
|
STATUS_UPDATE
|
|
Data exfiltration over SMB
|
STATUS_UPDATE
|
DATA_EXFILTRATION
|
Suspicious communication over DNS
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected Golden Ticket usage (ticket anomaly)
|
USER_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected Brute Force attack (SMB)
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected use of Metasploit hacking framework
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected WannaCry ransomware attack
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Remote code execution over DNS
|
NETWORK_UNCATEGORIZED
|
|
Suspected NTLM relay attack
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Security principal reconnaissance (LDAP)
|
STATUS_UPDATE
|
|
Suspected NTLM authentication tampering
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected Golden Ticket usage (ticket anomaly using RBCD)
|
USER_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected rogue Kerberos certificate usage
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspicious Kerberos delegation attempt using BronzeBit method (CVE-2020-17049 exploitation)
|
STATUS_UPDATE
|
NETWORK_SUSPICIOUS
|
Active Directory attributes reconnaissance (LDAP)
|
STATUS_UPDATE
|
|
Suspected SMB packet manipulation (CVE-2020-0796 exploitation)
|
STATUS_UPDATE
|
|
Suspected Kerberos SPN exposure
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected Netlogon privilege elevation attempt (CVE-2020-1472 exploitation)
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected AS-REP Roasting attack
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected AD FS DKM key read
|
STATUS_UPDATE
|
|
Exchange Server Remote Code Execution (CVE-2021-26855)
|
STATUS_UPDATE
|
|
Suspected exploitation attempt on Windows Print Spooler service
|
NETWORK_UNCATEGORIZED
|
|
Suspicious network connection over Encrypting File System Remote Protocol
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspected suspicious Kerberos ticket request
|
STATUS_UPDATE
|
|
Suspicious modification of a sAMNameAccount attribute (CVE-2021-42278 and CVE-2021-42287 exploitation)
|
STATUS_UPDATE
|
|
Suspected brute-force attack (Kerberos, NTLM)
|
USER_UNCATEGORIZED
|
AUTH_VIOLATION
|
Suspicious modification of the trust relationship of AD FS server
|
SETTING_MODIFICATION
|
|
Suspicious modification of a dNSHostName attribute (CVE-2022-26923)
|
SETTING_MODIFICATION
|
|
Suspicious Kerberos delegation attempt by a newly created computer
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspicious modification of the Resource Based Constrained Delegation attribute by a machine account
|
SETTING_MODIFICATION
|
|
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
|
USER_LOGIN
|
|
Suspicious certificate usage over Kerberos protocol (PKINIT)
|
STATUS_UPDATE
|
EXPLOIT
|
Suspected DFSCoerce attack using Distributed File System Protocol
|
USER_LOGIN
|
|
Honeytoken user attributes modified
|
SETTING_MODIFICATION
|
|
Honeytoken group membership changed
|
GROUP_MODIFICATION
|
|
Honeytoken was queried via LDAP
|
STATUS_UPDATE
|
|
Suspicious modification of domain AdminSdHolder
|
SETTING_MODIFICATION
|
|
Suspected account takeover using shadow credentials
|
USER_RESOURCE_ACCESS
|
EXPLOIT
|
Suspicious Domain Controller certificate request (ESC8)
|
STATUS_UPDATE
|
|
Suspicious deletion of the certificate database entries
|
STATUS_UPDATE
|
|
Suspicious disable of audit filters of AD CS
|
SETTING_MODIFICATION
|
|
Suspicious modifications to the AD CS security permissions/settings
|
SETTING_MODIFICATION
|
|
Account Enumeration reconnaissance (LDAP) (Preview)
|
STATUS_UPDATE
|
|
Directory Services Restore Mode Password Change (Preview)
|
SETTING_MODIFICATION
|
|
Honeytoken was queried via SAM-R
|
STATUS_UPDATE
|
|
User and group membership reconnaissance (SAMR)
|
USER_RESOURCE_ACCESS
|
|
A potentially malicious URL click was detected
|
USER_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
A user clicked through to a potentially malicious URL
|
USER_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Admin Submission result completed
|
STATUS_UPDATE
|
|
Admin triggered manual investigation of email
|
EMAIL_TRANSACTION
|
|
Admin triggered user compromise investigation
|
EMAIL_TRANSACTION
|
|
Administrative action submitted by an Administrator
|
EMAIL_UNCATEGORIZED
|
|
Creation of forwarding/redirect rule
|
USER_UNCATEGORIZED
|
|
eDiscovery search started or exported
|
USER_UNCATEGORIZED
|
|
Email messages containing malicious file removed after delivery
|
EMAIL_TRANSACTION
|
MAIL_PHISHING
|
Email messages containing malicious URL removed after delivery
|
EMAIL_TRANSACTION
|
MAIL_PHISHING
|
Email messages containing malware removed after delivery
|
EMAIL_TRANSACTION
|
MAIL_PHISHING
|
Email messages containing phish URLs removed after delivery
|
EMAIL_TRANSACTION
|
MAIL_PHISHING
|
Email messages from a campaign removed after delivery
|
EMAIL_TRANSACTION
|
MAIL_PHISHING
|
Email messages removed after delivery
|
EMAIL_TRANSACTION
|
MAIL_PHISHING
|
Messages containing malicious entity not removed after delivery
|
EMAIL_TRANSACTION
|
MAIL_PHISHING
|
Email reported by user as malware or phish
|
EMAIL_TRANSACTION
|
MAIL_PHISHING
|
Email sending limit exceeded
|
EMAIL_UNCATEGORIZED
|
|
Form blocked due to potential phishing attempt
|
STATUS_UPDATE
|
MAIL_PHISHING
|
Form flagged and confirmed as phishing
|
STATUS_UPDATE
|
MAIL_PHISHING
|
Messages have been delayed
|
EMAIL_UNCATEGORIZED
|
|
Malware campaign detected after delivery
|
EMAIL_TRANSACTION
|
|
Malware campaign detected and blocked
|
EMAIL_TRANSACTION
|
|
Malware campaign detected in SharePoint and OneDrive
|
STATUS_UPDATE
|
|
Malware not zapped because ZAP is disabled
|
STATUS_UPDATE
|
|
Phish delivered due to an ETR override
|
EMAIL_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Phish delivered due to an IP allow policy
|
EMAIL_TRANSACTION
|
NETWORK_SUSPICIOUS
|
Phish not zapped because ZAP is disabled
|
EMAIL_TRANSACTION
|
NETWORK_SUSPICIOUS
|
Phish delivered due to tenant or user override1
|
EMAIL_TRANSACTION
|
|
Suspicious email forwarding activity
|
EMAIL_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspicious email sending patterns detected
|
EMAIL_UNCATEGORIZED
|
EXPLOIT
|
Tenant Allow/Block List entry is about to expire
|
STATUS_UPDATE
|
|
Tenant restricted from sending email
|
EMAIL_UNCATEGORIZED
|
|
Tenant restricted from sending unprovisioned email
|
EMAIL_UNCATEGORIZED
|
|
Unusual external user file activity
|
FILE_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Unusual volume of external file sharing
|
FILE_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Unusual volume of file deletion
|
FILE_DELETION
|
DATA_DESTRUCTION
|
Unusual increase in email reported as phish
|
EMAIL_TRANSACTION
|
NETWORK_SUSPICIOUS
|
User impersonation phish delivered to inbox/folder
|
USER_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
User requested to release a quarantined message
|
USER_UNCATEGORIZED
|
|
User restricted from sending email
|
USER_UNCATEGORIZED
|
|
User restricted from sharing forms and collecting responses
|
USER_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Elevation of Exchange admin privilege
|
USER_UNCATEGORIZED
|
|
Activity by terminated user
|
USER_UNCATEGORIZED
|
ACL_VIOLATION
|
DLP-Detect Highly Sensitive Data Movement
|
USER_UNCATEGORIZED
|
NETWORK_MALICIOUS
|
DLP-Sensitive Data Movement
|
USER_UNCATEGORIZED
|
|
Email reported by user as junk
|
EMAIL_TRANSACTION
|
|
Suspicious massive data read
|
USER_UNCATEGORIZED
|
|
Activity from infrequent country
|
USER_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Malware detection
|
USER_UNCATEGORIZED
|
|
Activity from anonymous IP addresses
|
USER_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Ransomware activity
|
USER_UNCATEGORIZED
|
|
Activity performed by terminated user
|
USER_UNCATEGORIZED
|
POLICY_VIOLATION
|
Activity from suspicious IP addresses
|
USER_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspicious inbox forwarding
|
EMAIL_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspicious inbox manipulation rules
|
STATUS_UPDATE
|
NETWORK_SUSPICIOUS
|
Suspicious email deletion activity
|
EMAIL_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Suspicious OAuth app file download activities
|
SCAN_HOST
|
|
Unusual ISP for an OAuth App
|
NETWORK_UNCATEGORIZED
|
SOFTWARE_PUA
|
Unusual multiple file download activities
|
USER_UNCATEGORIZED
|
|
Unusual file share activities
|
USER_UNCATEGORIZED
|
|
Unusual file deletion activities
|
USER_UNCATEGORIZED
|
|
Unusual impersonated activities
|
USER_UNCATEGORIZED
|
|
Unusual administrative activities
|
USER_UNCATEGORIZED
|
|
Unusual Power BI report sharing activities (preview)
|
USER_UNCATEGORIZED
|
|
Unusual multiple VM creation activities (preview)
|
USER_UNCATEGORIZED
|
|
Unusual multiple storage deletion activities (preview)
|
USER_UNCATEGORIZED
|
|
Unusual region for cloud resource (preview)
|
USER_UNCATEGORIZED
|
|
Unusual file access
|
USER_UNCATEGORIZED
|
|
Multiple failed login attempts
|
USER_LOGIN
|
AUTH_VIOLATION
|
Data exfiltration to unsanctioned apps
|
USER_UNCATEGORIZED
|
DATA_EXFILTRATION
|
Multiple delete VM activities
|
USER_UNCATEGORIZED
|
DATA_DESTRUCTION
|
Misleading OAuth app name
|
SCAN_UNCATEGORIZED
|
POLICY_VIOLATION
|
Misleading publisher name for an OAuth app
|
SCAN_UNCATEGORIZED
|
POLICY_VIOLATION
|
Malicious OAuth app consent
|
SCAN_UNCATEGORIZED
|
|
Activity from a TOR IP address
|
USER_LOGIN
|
ACL_VIOLATION
|
Impossible travel activity
|
USER_UNCATEGORIZED
|
POLICY_VIOLATION
|
Activity from Nigeria
|
USER_UNCATEGORIZED
|
POLICY_VIOLATION
|
Activity from an anonymous proxy
|
USER_UNCATEGORIZED
|
|
Block download based on real-time content inspection
|
USER_UNCATEGORIZED
|
|
Investigation priority score increase
|
USER_UNCATEGORIZED
|
|
Mass delete
|
USER_UNCATEGORIZED
|
DATA_DESTRUCTION
|
Mass download by a single user - External users
|
USER_RESOURCE_ACCESS
|
|
Mass download by a single user - Internal
|
USER_RESOURCE_ACCESS
|
|
Mass share
|
USER_UNCATEGORIZED
|
|
Multiple Power BI report sharing activities
|
USER_UNCATEGORIZED
|
|
New high upload volume app
|
STATUS_UPDATE
|
POLICY_VIOLATION
|
New high volume app
|
STATUS_UPDATE
|
POLICY_VIOLATION
|
New risky app
|
STATUS_UPDATE
|
POLICY_VIOLATION
|
Ransomware activity
|
USER_UNCATEGORIZED
|
|
Suspicious administrative activity
|
USER_RESOURCE_ACCESS
|
|
Unknown login to Exchange Online
|
USER_UNCATEGORIZED
|
|
Unusual addition of credentials to an OAuth app
|
USER_RESOURCE_ACCESS
|
|
Tracking Online Meeting App Usage
|
STATUS_UPDATE
|
|
Mass download by a single user
|
USER_UNCATEGORIZED
|
|
Mass download
|
USER_UNCATEGORIZED
|
|
New popular app
|
STATUS_UPDATE
|
POLICY_VIOLATION
|
Compromised account
|
STATUS_UPDATE
|
|
New admin user
|
STATUS_UPDATE
|
|
New location
|
STATUS_UPDATE
|
|
Inactive account
|
STATUS_UPDATE
|
|
Ransomware activity
|
USER_UNCATEGORIZED
|
|
Unexpected admin location
|
STATUS_UPDATE
|
|
Suspicious activity alert
|
STATUS_UPDATE
|
|
Suspicious cloud use alert
|
STATUS_UPDATE
|
|
Activity policy violation
|
STATUS_UPDATE
|
POLICY_VIOLATION
|
File policy violation
|
STATUS_UPDATE
|
POLICY_VIOLATION
|
Proxy policy violation
|
STATUS_UPDATE
|
POLICY_VIOLATION
|
Field policy violation
|
STATUS_UPDATE
|
POLICY_VIOLATION
|
New service discovered
|
STATUS_UPDATE
|
|
Use of personal account
|
STATUS_UPDATE
|
|
Failed logon attempts
|
USER_UNCATEGORIZED
|
|
Anomalous SSH login detected
|
USER_LOGIN
|
|
Identity - Suspicious granting of permissions to an account
|
USER_CHANGE_PERMISSIONS
|
|
Endpoint - NT - Suspicious Oracle Query - Attempted Password Hash Exfiltration
|
USER_UNCATEGORIZED
|
DATA_EXFILTRATION
|
Suspicious Resource deployment
|
USER_RESOURCE_ACCESS
|
|
Endpoint - NT - Anomalous BITS download URL destination - Rule
|
STATUS_UPDATE
|
|
Azure High Risk User account - Signin
|
USER_LOGIN
|
|
Azure VWAN Tunnel Down - Run the RRAS Scrip
|
STATUS_UPDATE
|
|
Brute force attack against Azure Portal
|
USER_LOGIN
|
|
Changes made to AWS CloudTrail logs
|
STATUS_UPDATE
|
|
Endpoint - NT - A .js file executed inside zip archive. Locky - Rule
|
STATUS_UPDATE
|
|
Endpoint - NT - New service created with anomalous name and ImagePath under users. - Rul
|
SERVICE_CREATION
|
|
Endpoint - NT - New service created with possibly obfuscated powershell commandline ImagePath - Rule
|
SERVICE_CREATION
|
|
Endpoint - NT - Powershell CommandLine Longer than 2000 Characters
|
USER_UNCATEGORIZED
|
|
Endpoint - NT - Scheduled task created with anomalous location under user profile - Rule
|
SCHEDULED_TASK_CREATION
|
|
Failed AzureAD logons but success logon to AWS Console
|
USER_UNCATEGORIZED
|
|
General Policy - Deny Prior Threats
|
USER_UNCATEGORIZED
|
|
High count of failed attempts from same client IP
|
USER_UNCATEGORIZED
|
|
High count of failed logons by a user
|
USER_UNCATEGORIZED
|
|
High Risk Travel Alert
|
USER_UNCATEGORIZED
|
|
Identity - AD user created password not set with 24-48 hours
|
USER_UNCATEGORIZED
|
|
Identity - Attempts to sign in to disabled accounts
|
USER_LOGIN
|
|
Identity - Attempt to bypass conditional access rule in Azure AD
|
USER_UNCATEGORIZED
|
|
Identity - New user created and added to the built-in administrators group
|
USER_CREATION
|
|
Identity - NT - Pulse VPN Brute Force Attempt
|
USER_UNCATEGORIZED
|
|
Identity - User account created and deleted within 10 mins
|
USER_UNCATEGORIZED
|
|
Login to AWS Management Console without MFA
|
STATUS_UPDATE
|
|
Monitor AWS Credential abuse or hijacking
|
STATUS_UPDATE
|
|
Network - FirepowerAlertTest
|
STATUS_UPDATE
|
|
Network - NT - Email detected from tiscali.it may be part of phishing campaign - Rule
|
EMAIL_UNCATEGORIZED
|
|
Network - NT - Phishing attachment delivered - Rule
|
EMAIL_UNCATEGORIZED
|
|
Network - NT - Phishing Link Clicked
|
EMAIL_UNCATEGORIZED
|
|
Network - NT - Malware attachment delivered - Rule
|
EMAIL_UNCATEGORIZED
|
|
Network - NT - Possible Ursnif/Gozi Phish
|
EMAIL_UNCATEGORIZED
|
|
Network - NT - Recently Created Domain Referenced in Inbound Email
|
EMAIL_UNCATEGORIZED
|
|
Network - NT - Sender Domain in Inbound Email Recently Created
|
EMAIL_UNCATEGORIZED
|
|
Network - NT - StealthWatch Detected a Concerning Host
|
STATUS_UPDATE
|
|
Network - Rare RDP Connections
|
NETWORK_UNCATEGORIZED
|
|
Network - SSH Potential Brute Force
|
USER_LOGIN
|
|
NT - Anomalous attempt to reset Domain Admin or Enterprise Admin account password
|
USER_UNCATEGORIZED
|
|
NTC3 Testing Rule AR466
|
STATUS_UPDATE
|
|
NT - Degraded Workspace Performance Warning, Last 4 hours
|
STATUS_UPDATE
|
|
NT - LogSource Increasing or Decreasing over Last 4 Hour
|
STATUS_UPDATE
|
|
NT - StealthWatch Detected Potential Exploitation Activity
|
STATUS_UPDATE
|
|
NT - Usage of jsc.exe. Possible malware recompilation on endpoint - Endpoint
|
STATUS_UPDATE
|
|
Sign-ins from IPs that attempt sign-ins to disabled accounts
|
STATUS_UPDATE
|
|
Test
Endpoint - MDATP Machine Isolated Test
|
USER_UNCATEGORIZED
|
|
Test- Security Event log Deleted/Cleared
|
USER_UNCATEGORIZED
|
|
Network - NT - Malware url delivered - Rule
|
STATUS_UPDATE
|
|
Endpoint - NT - New service created with anomalous name and ImagePath under users. - Rule
|
STATUS_UPDATE
|
|
A logon from a malicious IP has been detected. [seen multiple times]
|
USER_LOGIN
|
NETWORK_MALICIOUS
|
Adaptive application control policy violation was audited
|
STATUS_UPDATE
|
POLICY_VIOLATION
|
Addition of Guest account to Local Administrators group
|
GROUP_MODIFICATION
|
|
An event log was cleared
|
STATUS_UPDATE
|
|
Antimalware Action Failed
|
STATUS_UPDATE
|
|
Antimalware Action Taken
|
STATUS_UPDATE
|
|
Antimalware broad files exclusion in your virtual machine
|
STATUS_UPDATE
|
|
Antimalware disabled and code execution in your virtual machine
|
STATUS_UPDATE
|
|
Antimalware disabled in your virtual machine
|
STATUS_UPDATE
|
|
Antimalware file exclusion and code execution in your virtual machine
|
STATUS_UPDATE
|
|
Antimalware file exclusion in your virtual machine
|
STATUS_UPDATE
|
|
Antimalware real-time protection was disabled in your virtual machine
|
STATUS_UPDATE
|
|
Antimalware real-time protection was disabled temporarily in your virtual machine
|
STATUS_UPDATE
|
|
Antimalware real-time protection was disabled temporarily while code was executed in your virtual machine
|
STATUS_UPDATE
|
|
Antimalware scans blocked for files potentially related to malware campaigns on your virtual machine (Preview)
|
STATUS_UPDATE
|
|
Antimalware temporarily disabled in your virtual machine
|
STATUS_UPDATE
|
|
Antimalware unusual file exclusion in your virtual machine
|
STATUS_UPDATE
|
|
Communication with suspicious domain identified by threat intelligence
|
STATUS_UPDATE
|
|
Detected actions indicative of disabling and deleting IIS log files
|
FILE_MODIFICATION
|
|
Detected anomalous mix of upper and lower case characters in command-line
|
PROCESS_UNCATEGORIZED
|
|
Detected change to a registry key that can be abused to bypass UAC
|
REGISTRY_MODIFICATION
|
|
Detected decoding of an executable using built-in certutil.exe tool
|
PROCESS_UNCATEGORIZED
|
|
Detected enabling of the WDigest UseLogonCredential registry key
|
REGISTRY_MODIFICATION
|
|
Detected encoded executable in command line data
|
PROCESS_UNCATEGORIZED
|
|
Detected obfuscated command line
|
PROCESS_UNCATEGORIZED
|
|
Detected possible execution of keygen executable
|
PROCESS_UNCATEGORIZED
|
|
Detected possible execution of malware dropper
|
STATUS_UPDATE
|
|
Detected possible local reconnaissance activity
|
PROCESS_UNCATEGORIZED
|
|
Detected potentially suspicious use of Telegram tool
|
DEVICE_PROGRAM_DOWNLOAD
|
SOFTWARE_SUSPICIOUS
|
Detected suppression of legal notice displayed to users at logon
|
REGISTRY_MODIFICATION
|
|
Detected suspicious combination of HTA and PowerShell
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious commandline arguments
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious commandline used to start all executables in a directory
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious credentials in commandline
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious document credentials
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious execution of VBScript.Encode command
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious execution via rundll32.exe
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious file cleanup commands
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious file creation
|
FILE_CREATION
|
|
Detected suspicious named pipe communications
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious network activity
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Detected suspicious new firewall rule
|
DEVICE_CONFIG_UPDATE
|
NETWORK_SUSPICIOUS
|
Detected suspicious use of Cacls to lower the security state of the system
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious use of FTP -s Switch
|
PROCESS_UNCATEGORIZED
|
|
Detected suspicious use of Pcalua.exe to launch executable code
|
PROCESS_UNCATEGORIZED
|
|
Detected the disabling of critical services
|
PROCESS_UNCATEGORIZED
|
|
Digital currency mining related behavior detected
|
PROCESS_UNCATEGORIZED
|
|
Dynamic PS script construction
|
PROCESS_UNCATEGORIZED
|
|
Executable found running from a suspicious location
|
PROCESS_UNCATEGORIZED
|
|
Fileless attack behavior detected
|
PROCESS_UNCATEGORIZED
|
|
Fileless attack technique detected
|
PROCESS_UNCATEGORIZED
|
|
Fileless attack toolkit detected
|
PROCESS_UNCATEGORIZED
|
|
High risk software detected
|
STATUS_UPDATE
|
|
Local Administrators group members were enumerated
|
GROUP_MODIFICATION
|
|
Malicious firewall rule created by ZINC server implant [seen multiple times]
|
SETTING_MODIFICATION
|
|
Malicious SQL activity
|
PROCESS_UNCATEGORIZED
|
|
Multiple Domain Accounts Queried
|
STATUS_UPDATE
|
|
Possible credential dumping detected [seen multiple times]
|
STATUS_UPDATE
|
|
Potential attempt to bypass AppLocker detected
|
PROCESS_UNCATEGORIZED
|
|
Rare SVCHOST service group executed
|
USER_UNCATEGORIZED
|
|
Sticky keys attack detected
|
STATUS_UPDATE
|
|
Successful brute force attack
|
USER_LOGIN
|
|
Suspect integrity level indicative of RDP hijacking
|
PROCESS_PRIVILEGE_ESCALATION
|
|
Suspect service installation
|
SERVICE_CREATION
|
|
Suspected Kerberos Golden Ticket attack parameters observed
|
STATUS_UPDATE
|
|
Suspicious Account Creation Detected
|
USER_CREATION
|
|
Suspicious Activity Detected
|
PROCESS_INJECTION
|
|
Suspicious authentication activity
|
USER_RESOURCE_ACCESS
|
|
Suspicious code segment detected
|
STATUS_UPDATE
|
|
Suspicious double extension file executed
|
PROCESS_UNCATEGORIZED
|
|
Suspicious download using Certutil detected [seen multiple times]
|
PROCESS_UNCATEGORIZED
|
|
Suspicious download using Certutil detected
|
PROCESS_UNCATEGORIZED
|
|
Suspicious PowerShell Activity Detected
|
PROCESS_UNCATEGORIZED
|
|
Suspicious PowerShell cmdlets executed
|
PROCESS_UNCATEGORIZED
|
|
Suspicious process executed [seen multiple times]
|
PROCESS_UNCATEGORIZED
|
|
Suspicious process executed
|
PROCESS_UNCATEGORIZED
|
|
Suspicious process name detected [seen multiple times]
|
PROCESS_UNCATEGORIZED
|
|
Suspicious process name detected
|
PROCESS_UNCATEGORIZED
|
|
Suspicious SQL activity
|
PROCESS_UNCATEGORIZED
|
|
Suspicious SVCHOST process executed
|
PROCESS_UNCATEGORIZED
|
|
Suspicious system process executed
|
PROCESS_UNCATEGORIZED
|
|
Suspicious Volume Shadow Copy Activity
|
RESOURCE_DELETION
|
|
Suspicious WindowPosition registry value detected
|
REGISTRY_MODIFICATION
|
|
Suspiciously named process detected
|
PROCESS_UNCATEGORIZED
|
|
Unusual config reset in your virtual machine
|
SETTING_MODIFICATION
|
|
Unusual process execution detected
|
PROCESS_UNCATEGORIZED
|
|
Unusual user password reset in your virtual machine
|
USER_CHANGE_PASSWORD
|
|
Unusual user SSH key reset in your virtual machine
|
STATUS_UPDATE
|
|
VBScript HTTP object allocation detected
|
FILE_CREATION
|
|
Suspicious installation of GPU extension in your virtual machine (Preview)
|
SERVICE_CREATION
|
|
A history file has been cleared
|
STATUS_UPDATE
|
|
Behavior similar to ransomware detected [seen multiple times]
|
SCAN_UNCATEGORIZED
|
|
Container with a miner image detected
|
SCAN_UNCATEGORIZED
|
|
Detected anomalous mix of upper and lower case characters in command line
|
PROCESS_UNCATEGORIZED
|
|
Detected file download from a known malicious source
|
SCAN_UNCATEGORIZED
|
|
Disabling of auditd logging [seen multiple times]
|
STATUS_UPDATE
|
|
Exploitation of Xorg vulnerability [seen multiple times]
|
STATUS_UPDATE
|
|
Failed SSH brute force attack
|
USER_LOGIN
|
|
Hidden file execution detected
|
PROCESS_UNCATEGORIZED
|
|
New SSH key added [seen multiple times]
|
SETTING_MODIFICATION
|
|
New SSH key added
|
SETTING_MODIFICATION
|
|
Possible backdoor detected [seen multiple times]
|
FILE_UNCATEGORIZED
|
|
Possible exploitation of the mailserver detected
|
SCAN_UNCATEGORIZED
|
|
Possible malicious web shell detected
|
SCAN_UNCATEGORIZED
|
|
Possible password change using crypt-method detected [seen multiple times]
|
USER_CHANGE_PASSWORD
|
|
Process associated with digital currency mining detected [seen multiple times]
|
PROCESS_UNCATEGORIZED
|
|
Process associated with digital currency mining detected
|
PROCESS_UNCATEGORIZED
|
|
Python encoded downloader detected [seen multiple times]
|
SCAN_UNCATEGORIZED
|
|
Screenshot taken on host [seen multiple times]
|
STATUS_UPDATE
|
|
Shellcode detected [seen multiple times]
|
PROCESS_UNCATEGORIZED
|
|
Successful SSH brute force attack
|
USER_LOGIN
|
|
Suspicious kernel module detected [seen multiple times]
|
PROCESS_MODULE_LOAD
|
|
Suspicious password access [seen multiple times]
|
STATUS_UPDATE
|
|
Suspicious password access
|
STATUS_UPDATE
|
|
Suspicious request to the Kubernetes Dashboard
|
STATUS_UPDATE
|
|
Anomalous network protocol usage
|
NETWORK_UNCATEGORIZED
|
|
Anonymity network activity
|
NETWORK_UNCATEGORIZED
|
|
Anonymity network activity using web proxy
|
NETWORK_UNCATEGORIZED
|
|
Attempted communication with suspicious sinkholed domain
|
NETWORK_UNCATEGORIZED
|
|
Communication with possible phishing domain
|
NETWORK_UNCATEGORIZED
|
|
Communication with suspicious algorithmically generated domain
|
NETWORK_UNCATEGORIZED
|
|
Communication with suspicious random domain name
|
NETWORK_UNCATEGORIZED
|
|
Digital currency mining activity
|
NETWORK_UNCATEGORIZED
|
|
Network intrusion detection signature activation
|
NETWORK_UNCATEGORIZED
|
|
Possible data download via DNS tunnel
|
NETWORK_UNCATEGORIZED
|
|
Possible data exfiltration via DNS tunnel
|
NETWORK_UNCATEGORIZED
|
DATA_EXFILTRATION
|
Possible data transfer via DNS tunnel
|
NETWORK_UNCATEGORIZED
|
|
Suspicious failure installing GPU extension in your subscription (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious installation of a GPU extension was detected on your virtual machine (Preview)
|
SCAN_UNCATEGORIZED
|
|
Run Command with a suspicious script was detected on your virtual machine (Preview)
|
PROCESS_UNCATEGORIZED
|
|
Suspicious unauthorized Run Command usage was detected on your virtual machine (Preview)
|
PROCESS_UNCATEGORIZED
|
|
Suspicious Run Command usage was detected on your virtual machine (Preview)
|
PROCESS_UNCATEGORIZED
|
|
Suspicious usage of multiple monitoring or data collection extensions was detected on your virtual machines (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious installation of disk encryption extensions was detected on your virtual machines (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious usage of VMAccess extension was detected on your virtual machines (Preview)
|
SCAN_UNCATEGORIZED
|
|
Desired State Configuration (DSC) extension with a suspicious script was detected on your virtual machine (Preview)
|
PROCESS_UNCATEGORIZED
|
|
Suspicious usage of a Desired State Configuration (DSC) extension was detected on your virtual machines (Preview)
|
PROCESS_UNCATEGORIZED
|
|
Custom script extension with a suspicious script was detected on your virtual machine (Preview)
|
PROCESS_UNCATEGORIZED
|
|
Suspicious failed execution of custom script extension in your virtual machine
|
PROCESS_UNCATEGORIZED
|
|
Unusual deletion of custom script extension in your virtual machine
|
PROCESS_UNCATEGORIZED
|
|
Unusual execution of custom script extension in your virtual machine
|
PROCESS_UNCATEGORIZED
|
|
Custom script extension with suspicious entry-point in your virtual machine
|
PROCESS_UNCATEGORIZED
|
|
Custom script extension with suspicious payload in your virtual machine
|
PROCESS_UNCATEGORIZED
|
|
An attempt to run Linux commands on a Windows App Service
|
PROCESS_UNCATEGORIZED
|
|
An IP that connected to your Azure App Service FTP Interface was found in Threat Intelligence
|
NETWORK_UNCATEGORIZED
|
|
Attempt to run high privilege command detected
|
PROCESS_UNCATEGORIZED
|
|
Connection to web page from anomalous IP address detected
|
SCAN_NETWORK
|
|
Dangling DNS record for an App Service resource detected
|
RESOURCE_DELETION
|
|
Detected suspicious file download
|
SCAN_UNCATEGORIZED
|
|
Executable decoded using certutil
|
PROCESS_UNCATEGORIZED
|
|
Microsoft Defender for Cloud test alert for App Service (not a threat)
|
STATUS_UPDATE
|
|
NMap scanning detected
|
SCAN_UNCATEGORIZED
|
|
Phishing content hosted on Azure Webapps
|
SCAN_UNCATEGORIZED
|
|
PHP file in upload folder
|
SCAN_UNCATEGORIZED
|
|
Possible Cryptocoinminer download detected
|
SCAN_UNCATEGORIZED
|
|
Possible data exfiltration detected
|
NETWORK_UNCATEGORIZED
|
DATA_EXFILTRATION
|
Potential dangling DNS record for an App Service resource detected
|
RESOURCE_DELETION
|
|
Potential reverse shell detected
|
SCAN_UNCATEGORIZED
|
|
Raw data download detected
|
SCAN_UNCATEGORIZED
|
|
Saving curl output to disk detected
|
PROCESS_UNCATEGORIZED
|
|
Spam folder referrer detected
|
SCAN_UNCATEGORIZED
|
|
Suspicious access to possibly vulnerable web page detected
|
SCAN_UNCATEGORIZED
|
|
Suspicious domain name reference
|
SCAN_UNCATEGORIZED
|
|
Suspicious PHP execution detected
|
SCAN_UNCATEGORIZED
|
|
Suspicious User Agent detected
|
SCAN_UNCATEGORIZED
|
|
Suspicious WordPress theme invocation detected
|
SCAN_UNCATEGORIZED
|
|
Vulnerability scanner detected
|
SCAN_UNCATEGORIZED
|
|
Web fingerprinting detected
|
SCAN_UNCATEGORIZED
|
|
Website is tagged as malicious in threat intelligence feed
|
STATUS_UPDATE
|
|
Exposed Postgres service with trust authentication configuration in Kubernetes detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Exposed Postgres service with risky configuration in Kubernetes detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Attempt to create a new Linux namespace from a container detected
|
SCAN_UNCATEGORIZED
|
|
Abnormal activity of managed identity associated with Kubernetes (Preview)
|
SCAN_UNCATEGORIZED
|
|
Abnormal Kubernetes service account operation detected
|
SCAN_UNCATEGORIZED
|
|
An uncommon connection attempt detected
|
SCAN_UNCATEGORIZED
|
|
Attempt to stop apt-daily-upgrade.timer service detected
|
SCAN_UNCATEGORIZED
|
|
Behavior similar to common Linux bots detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Command within a container running with high privileges
|
STATUS_UPDATE
|
|
Container running in privileged mode
|
STATUS_UPDATE
|
|
Container with a sensitive volume mount detected
|
SCAN_UNCATEGORIZED
|
|
CoreDNS modification in Kubernetes detected
|
SCAN_UNCATEGORIZED
|
|
Creation of admission webhook configuration detected
|
SCAN_UNCATEGORIZED
|
|
Detected suspicious use of the nohup command
|
SCAN_UNCATEGORIZED
|
|
Detected suspicious use of the useradd command
|
SCAN_UNCATEGORIZED
|
|
Digital currency mining container detected
|
SCAN_UNCATEGORIZED
|
|
Docker build operation detected on a Kubernetes node
|
SCAN_UNCATEGORIZED
|
|
Exposed Kubeflow dashboard detected
|
SCAN_UNCATEGORIZED
|
|
Exposed Kubernetes dashboard detected
|
SCAN_UNCATEGORIZED
|
|
Exposed Kubernetes service detected
|
SCAN_UNCATEGORIZED
|
|
Exposed Redis service in AKS detected
|
SCAN_UNCATEGORIZED
|
|
Indicators associated with DDOS toolkit detected
|
SCAN_UNCATEGORIZED
|
|
K8S API requests from proxy IP address detected
|
SCAN_UNCATEGORIZED
|
|
Kubernetes events deleted
|
STATUS_UPDATE
|
|
Kubernetes penetration testing tool detected
|
SCAN_UNCATEGORIZED
|
|
Microsoft Defender for Cloud test alert (not a threat).
|
STATUS_UPDATE
|
|
New container in the kube-system namespace detected
|
SCAN_UNCATEGORIZED
|
|
New high privileges role detected
|
SCAN_UNCATEGORIZED
|
|
Possible attack tool detected
|
SCAN_UNCATEGORIZED
|
|
Possible backdoor detected
|
SCAN_UNCATEGORIZED
|
|
Possible command line exploitation attempt
|
SCAN_UNCATEGORIZED
|
|
Possible credential access tool detected
|
SCAN_UNCATEGORIZED
|
|
Possible Log Tampering Activity Detected
|
SCAN_UNCATEGORIZED
|
|
Possible password change using crypt-method detected
|
SCAN_UNCATEGORIZED
|
|
Potential port forwarding to external IP address
|
SCAN_UNCATEGORIZED
|
|
Privileged container detected
|
SCAN_UNCATEGORIZED
|
|
Process seen accessing the SSH authorized keys file in an unusual way
|
FILE_READ
|
|
Role binding to the cluster-admin role detected
|
SCAN_UNCATEGORIZED
|
|
Security-related process termination detected
|
PROCESS_TERMINATION
|
|
SSH server is running inside a container
|
STATUS_UPDATE
|
|
Suspicious file timestamp modification
|
STATUS_UPDATE
|
|
Suspicious request to Kubernetes API
|
STATUS_UPDATE
|
|
Potential crypto coin miner started
|
STATUS_UPDATE
|
|
Possible malicious web shell detected.
|
SCAN_UNCATEGORIZED
|
|
Burst of multiple reconnaissance commands could indicate initial activity after compromise
|
STATUS_UPDATE
|
|
Suspicious Download Then Run Activity
|
STATUS_UPDATE
|
|
Access to kubelet kubeconfig file detected
|
SCAN_UNCATEGORIZED
|
|
Access to cloud metadata service detected
|
SCAN_UNCATEGORIZED
|
|
MITRE Caldera agent detected
|
SCAN_UNCATEGORIZED
|
|
A possible vulnerability to SQL Injection
|
USER_RESOURCE_ACCESS
|
EXPLOIT
|
Attempted logon by a potentially harmful application
|
USER_LOGIN
|
|
Log on from an unusual Azure Data Center
|
USER_LOGIN
|
|
Log on from an unusual location
|
USER_LOGIN
|
|
Login from a principal user not seen in 60 days
|
USER_LOGIN
|
|
Login from a domain not seen in 60 days
|
USER_LOGIN
|
|
Login from a suspicious IP
|
USER_LOGIN
|
|
Potential SQL injection
|
USER_RESOURCE_ACCESS
|
EXPLOIT
|
Suspected brute force attack using a valid user
|
USER_LOGIN
|
|
Suspected brute force attack
|
USER_LOGIN
|
|
Suspected successful brute force attack
|
USER_LOGIN
|
|
SQL Server potentially spawned a Windows command shell and accessed an abnormal external source
|
PROCESS_UNCATEGORIZED
|
|
Unusual payload with obfuscated parts has been initiated by SQL Server
|
STATUS_UPDATE
|
|
Logon from an unusual cloud provider
|
USER_LOGIN
|
|
Azure Resource Manager operation from suspicious IP address
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
Azure Resource Manager operation from suspicious proxy IP address
|
NETWORK_UNCATEGORIZED
|
NETWORK_SUSPICIOUS
|
MicroBurst exploitation toolkit used to enumerate resources in your subscriptions
|
PROCESS_UNCATEGORIZED
|
|
MicroBurst exploitation toolkit used to execute code on your virtual machine
|
PROCESS_UNCATEGORIZED
|
|
MicroBurst exploitation toolkit used to extract keys from your Azure key vaults
|
PROCESS_UNCATEGORIZED
|
|
MicroBurst exploitation toolkit used to extract keys to your storage accounts
|
PROCESS_UNCATEGORIZED
|
|
MicroBurst exploitation toolkit used to extract secrets from your Azure key vaults
|
PROCESS_UNCATEGORIZED
|
|
PowerZure exploitation toolkit used to elevate access from Azure AD to Azure
|
STATUS_UPDATE
|
|
PowerZure exploitation toolkit used to enumerate resources
|
RESOURCE_READ
|
|
PowerZure exploitation toolkit used to enumerate storage containers, shares, and tables
|
RESOURCE_READ
|
|
PowerZure exploitation toolkit used to execute a Runbook in your subscription
|
STATUS_UPDATE
|
|
PowerZure exploitation toolkit used to extract Runbooks content
|
STATUS_UPDATE
|
|
PREVIEW - Azurite toolkit run detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious creation of compute resources detected
|
RESOURCE_CREATION
|
|
PREVIEW - Suspicious key vault recovery detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious management session using an inactive account detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious invocation of a high-risk 'Credential Access' operation by a service principal detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious invocation of a high-risk 'Data Collection' operation by a service principal detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious invocation of a high-risk 'Defense Evasion' operation by a service principal detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious invocation of a high-risk 'Execution' operation by a service principal detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious invocation of a high-risk 'Impact' operation by a service principal detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious invocation of a high-risk 'Initial Access' operation by a service principal detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious invocation of a high-risk 'Lateral Movement Access' operation by a service principal detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious invocation of a high-risk 'persistence' operation by a service principal detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious invocation of a high-risk 'Privilege Escalation' operation by a service principal detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW - Suspicious management session using PowerShell detected
|
SCAN_UNCATEGORIZED
|
|
PREVIEW â€" Suspicious management session using Azure portal detected
|
SCAN_UNCATEGORIZED
|
|
Privileged custom role created for your subscription in a suspicious way (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious Azure role assignment detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious invocation of a high-risk 'Credential Access' operation detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious invocation of a high-risk 'Data Collection' operation detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious invocation of a high-risk 'Defense Evasion' operation detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious invocation of a high-risk 'Execution' operation detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious invocation of a high-risk 'Impact' operation detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious invocation of a high-risk 'Initial Access' operation detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious invocation of a high-risk 'Lateral Movement' operation detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious elevate access operation (Preview)(ARM_AnomalousElevateAccess)
|
SCAN_UNCATEGORIZED
|
|
Suspicious invocation of a high-risk 'Persistence' operation detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Suspicious invocation of a high-risk 'Privilege Escalation' operation detected (Preview)
|
SCAN_UNCATEGORIZED
|
|
Usage of MicroBurst exploitation toolkit to run an arbitrary code or exfiltrate Azure Automation account credentials
|
PROCESS_UNCATEGORIZED
|
|
Usage of NetSPI techniques to maintain persistence in your Azure environment
|
SCAN_UNCATEGORIZED
|
|
Usage of PowerZure exploitation toolkit to run an arbitrary code or exfiltrate Azure Automation account credentials
|
SCAN_UNCATEGORIZED
|
|
Usage of PowerZure function to maintain persistence in your Azure environment
|
SCAN_UNCATEGORIZED
|
|
Suspicious classic role assignment detected (Preview)
|
RESOURCE_PERMISSIONS_CHANGE
|
|
Access from a suspicious application
|
USER_RESOURCE_ACCESS
|
EXPLOIT
|
Access from a suspicious IP address
|
USER_RESOURCE_ACCESS
|
|
Phishing content hosted on a storage account
|
STATUS_UPDATE
|
|
Storage account identified as source for distribution of malware
|
STATUS_UPDATE
|
|
The access level of a potentially sensitive storage blob container was changed to allow unauthenticated public access
|
RESOURCE_PERMISSIONS_CHANGE
|
|
Authenticated access from a Tor exit node
|
USER_RESOURCE_ACCESS
|
|
Access from an unusual location to a storage account
|
USER_RESOURCE_ACCESS
|
|
Unusual unauthenticated access to a storage container
|
USER_RESOURCE_ACCESS
|
|
Potential malware uploaded to a storage account
|
STATUS_UPDATE
|
|
Publicly accessible storage containers successfully discovered
|
STATUS_UPDATE
|
|
Publicly accessible storage containers unsuccessfully scanned
|
STATUS_UPDATE
|
|
Unusual access inspection in a storage account
|
USER_RESOURCE_ACCESS
|
|
Unusual amount of data extracted from a storage account
|
STATUS_UPDATE
|
|
Unusual application accessed a storage account
|
USER_RESOURCE_ACCESS
|
|
Unusual data exploration in a storage account
|
STATUS_UPDATE
|
|
Unusual deletion in a storage account
|
STATUS_UPDATE
|
|
Unusual unauthenticated public access to a sensitive blob container (Preview)
|
USER_RESOURCE_ACCESS
|
|
Unusual amount of data extracted from a sensitive blob container (Preview)
|
STATUS_UPDATE
|
|
Unusual number of blobs extracted from a sensitive blob container (Preview)
|
STATUS_UPDATE
|
|
Access from a known suspicious application to a sensitive blob container (Preview)
|
USER_RESOURCE_ACCESS
|
|
Access from a known suspicious IP address to a sensitive blob container (Preview)
|
USER_RESOURCE_ACCESS
|
|
Access from a Tor exit node to a sensitive blob container (Preview)
|
USER_RESOURCE_ACCESS
|
|
Access from an unusual location to a sensitive blob container (Preview)
|
USER_RESOURCE_ACCESS
|
|
The access level of a sensitive storage blob container was changed to allow unauthenticated public access (Preview)
|
RESOURCE_PERMISSIONS_CHANGE
|
|
Suspicious external access to an Azure storage account with overly permissive SAS token (Preview)
|
USER_RESOURCE_ACCESS
|
|
Suspicious external operation to an Azure storage account with overly permissive SAS token (Preview)
|
USER_RESOURCE_ACCESS
|
|
Unusual SAS token was used to access an Azure storage account from a public IP address (Preview)
|
USER_RESOURCE_ACCESS
|
|
Malicious file uploaded to storage account
|
STATUS_UPDATE
|
|
Malicious blob was downloaded from a storage account (Preview)
|
STATUS_UPDATE
|
|
Access from a Tor exit node
|
USER_RESOURCE_ACCESS
|
|
Access from a suspicious IP
|
USER_RESOURCE_ACCESS
|
|
Access from an unusual location
|
USER_RESOURCE_ACCESS
|
|
Unusual volume of data extracted
|
STATUS_UPDATE
|
|
Extraction of Azure Cosmos DB accounts keys via a potentially malicious script
|
STATUS_UPDATE
|
|
Suspicious extraction of Azure Cosmos DB account keys (AzureCosmosDB_SuspiciousListKeys.SuspiciousPrincipal)
|
STATUS_UPDATE
|
|
SQL injection: potential data exfiltration
|
STATUS_UPDATE
|
EXPLOIT
|
SQL injection: fuzzing attempt
|
STATUS_UPDATE
|
EXPLOIT
|
Network communication with a malicious machine detected
|
NETWORK_UNCATEGORIZED
|
|
Possible compromised machine detected
|
NETWORK_UNCATEGORIZED
|
|
Possible incoming %{Service Name} brute force attempts detected
|
NETWORK_UNCATEGORIZED
|
|
Possible incoming SQL brute force attempts detected
|
NETWORK_UNCATEGORIZED
|
|
Possible outgoing denial-of-service attack detected
|
NETWORK_UNCATEGORIZED
|
NETWORK_DENIAL_OF_SERVICE
|
Suspicious incoming RDP network activity from multiple sources
|
NETWORK_UNCATEGORIZED
|
|
Suspicious incoming RDP network activity
|
NETWORK_UNCATEGORIZED
|
|
Suspicious incoming SSH network activity from multiple sources
|
NETWORK_UNCATEGORIZED
|
|
Suspicious incoming SSH network activity
|
NETWORK_UNCATEGORIZED
|
|
Suspicious outgoing %{Attacked Protocol} traffic detected
|
NETWORK_UNCATEGORIZED
|
|
Suspicious outgoing RDP network activity to multiple destinations
|
NETWORK_UNCATEGORIZED
|
|
Suspicious outgoing RDP network activity
|
NETWORK_UNCATEGORIZED
|
|
Suspicious outgoing SSH network activity to multiple destinations
|
NETWORK_UNCATEGORIZED
|
|
Suspicious outgoing SSH network activity
|
NETWORK_UNCATEGORIZED
|
|
Traffic detected from IP addresses recommended for blocking
|
SCAN_NETWORK
|
|
Access from a suspicious IP address to a key vault
|
USER_RESOURCE_ACCESS
|
|
Access from a TOR exit node to a key vault
|
USER_RESOURCE_ACCESS
|
|
High volume of operations in a key vault
|
USER_UNCATEGORIZED
|
|
Suspicious policy change and secret query in a key vault
|
USER_UNCATEGORIZED
|
|
Suspicious secret listing and query in a key vault
|
USER_UNCATEGORIZED
|
|
Unusual access denied - User accessing high volume of key vaults denied
|
USER_RESOURCE_ACCESS
|
|
Unusual access denied - Unusual user accessing key vault denied
|
USER_RESOURCE_ACCESS
|
|
Unusual application accessed a key vault
|
USER_RESOURCE_ACCESS
|
|
Unusual operation pattern in a key vault
|
USER_UNCATEGORIZED
|
|
Unusual user accessed a key vault
|
USER_RESOURCE_ACCESS
|
|
Unusual user-application pair accessed a key vault
|
USER_RESOURCE_ACCESS
|
|
User accessed high volume of key vaults
|
USER_RESOURCE_ACCESS
|
|
Denied access from a suspicious IP to a key vault
|
USER_RESOURCE_ACCESS
|
|
Unusual access to the key vault from a suspicious IP (Non-Microsoft or External)
|
USER_RESOURCE_ACCESS
|
|
DDoS Attack detected for Public IP
|
SCAN_UNCATEGORIZED
|
NETWORK_DENIAL_OF_SERVICE
|
DDoS Attack mitigated for Public IP
|
STATUS_UPDATE
|
NETWORK_DENIAL_OF_SERVICE
|
Suspicious population-level spike in API traffic to an API endpoint
|
SCAN_UNCATEGORIZED
|
|
Suspicious spike in API traffic from a single IP address to an API endpoint
|
SCAN_UNCATEGORIZED
|
|
Unusually large response payload transmitted between a single IP address and an API endpoint
|
SCAN_UNCATEGORIZED
|
|
Unusually large request body transmitted between a single IP address and an API endpoint
|
SCAN_UNCATEGORIZED
|
|
(Preview) Suspicious spike in latency for traffic between a single IP address and an API endpoint
|
SCAN_UNCATEGORIZED
|
|
API requests spray from a single IP address to an unusually large number of distinct API endpoints
|
NETWORK_UNCATEGORIZED
|
|
Parameter enumeration on an API endpoint
|
NETWORK_UNCATEGORIZED
|
|
Distributed parameter enumeration on an API endpoint
|
NETWORK_UNCATEGORIZED
|
|
Parameter value(s) with anomalous data types in an API call
|
NETWORK_UNCATEGORIZED
|
|
Previously unseen parameter used in an API call
|
NETWORK_UNCATEGORIZED
|
|
Access from a Tor exit node to an API endpoint
|
NETWORK_UNCATEGORIZED
|
|
API Endpoint access from suspicious IP
|
NETWORK_UNCATEGORIZED
|
|
Access from an unusual location to a storage blob container
|
USER_RESOURCE_ACCESS
|
|
Potentially Unsafe Action
|
USER_RESOURCE_ACCESS
|
|
Logon by an unfamiliar principal
|
USER_LOGIN
|
|
NT - Download requested by Powershell
|
USER_UNCATEGORIZED
|
|
Logon from an unusual location
|
USER_UNCATEGORIZED
|
|
NT - Anomalous Registry Persistence Value
|
USER_UNCATEGORIZED
|
|
NT - Suspicious powershell command with windowstyle hidden
|
USER_UNCATEGORIZED
|
|
NT - Unauthorized nmap usage
|
USER_UNCATEGORIZED
|
|
NT - Unusual process spawned from Chrome
|
USER_UNCATEGORIZED
|
|
NT - Encoded powershell command executed
|
USER_UNCATEGORIZED
|
|
NT - Powershell command with suspicious reference to AppData subfolder
|
USER_UNCATEGORIZED
|
|
NT - Powershell executing standard input (possible obfuscation)
|
USER_UNCATEGORIZED
|
|
NT - Anomalous bitsadmin transfer request
|
STATUS_UPDATE
|
|
NT - Anomalous reg import command - Rule
|
STATUS_UPDATE
|
|
NT - Anomalous usage of sdbinst.exe - possible shim database persistence
|
STATUS_UPDATE
|
|
NT - Folder name of nonbreaking space detected in commandline. possible Andromeda.
|
STATUS_UPDATE
|
|
NT - Rundll32.exe communicating with proxy
|
STATUS_UPDATE
|
|
NT - LogSource Increasing or Decreasing over Last 4 Hours
|
STATUS_UPDATE
|
|
Azure VWAN Tunnel Down - Run the RRAS Script
|
STATUS_UPDATE
|
|
Security incident with shared process detected
|
STATUS_UPDATE
|
|
Security incident detected on multiple resources
|
STATUS_UPDATE
|
|
Security incident detected
|
STATUS_UPDATE
|
|
PsExec execution detected
|
USER_UNCATEGORIZED
|
Field mapping reference: MICROSOFT_GRAPH_ALERT
The following table lists the log fields of theMICROSOFT_GRAPH_ALERT
log type and their corresponding UDM fields. actorDisplayName
security_result.about.user.user_display_name
actorDisplayName
log field value is not
equal to null
, then the actorDisplayName
log field is mapped to the security_result.about.user.user_display_name
UDM field.additionalData
additional.fields [additionalData %{key}]
alertPolicyId
security_result.rule_id
alertPolicyId
log field value is not
equal to null
, then the alertPolicyId
log field is mapped to the security_result.rule_id
UDM field.alertWebUrl
metadata.url_back_to_product
assignedTo
security_result.about.user.userid
assignedTo
log field value is not
equal to null
, then the assignedTo
log field is mapped to the security_result.about.user.userid
UDM field.category
metadata.product_event_type
category
security_result.summary
classification
security_result.detection_fields[classification]
classification
log field value is not
equal to null
, then the classification
log field is mapped to the security_result.detection_fields
UDM field.comments.comment
security_result.about.investigation.comments
comments.createdByDisplayName
security_result.detection_fields[comments_created_by_display_name]
comments.createdDateTime
security_result.detection_fields[comments_created_date_time]
createdDateTime
metadata.event_timestamp
description
metadata.description
description
security_result.description
detectionSource
security_result.detection_fields[detection_source]
evidence.createdDateTime
principal.user.attribute.creation_time
evidence.createdDateTime
is mapped to principal.user.attribute.creation_time
when all of the following conditions are met: - The
evidence.@odata.type
log field value matches the regular expression pattern(.*)(userEvidence or mailboxEvidence)
- If the
title
field value doesn't contains any of the following values:-
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
-
evidence.createdDateTime
target.user.attribute.creation_time
evidence.createdDateTime
is mapped to target.user.attribute.creation_time
when all of the following conditions are met: - The
evidence.@odata.type
log field value matches the regular expression pattern(.*)(userEvidence or mailboxEvidence)
- If the
title
field value contains one of the following values:-
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
-
evidence.createdDateTime
principal.asset.attribute.creation_time
evidence.@odata.type
log field value matches the regular expression pattern (.*)deviceEvidence
, then the evidence.createdDateTime
log field is mapped to the principal.asset.attribute.creation_time
UDM field.evidence.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.@odata.type
log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence)
, then the evidence.createdDateTime
log field is mapped to the target.resource_ancestors.attribute.creation_time
UDM field.evidence.createdDateTime
target.group.attribute.creation_time
evidence.@odata.type
log field value matches the regular expression pattern (.*)securityGroupEvidence
, then the evidence.createdDateTime
log field is mapped to the target.group.attribute.creation_time
UDM field.evidence.createdDateTime
security_result.detection_fields [created_date_time]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(cloudApplicationEvidence or amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence or kubernetesPodEvidence or deviceEvidence or mailClusterEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or analyzedMessageEvidence or securityGroupEvidence or userEvidence or mailboxEvidence or ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence)
, then the evidence.createdDateTime
extracted field is mapped to the security_result.detection_fields
UDM field.evidence.remediationStatusDetails
principal.user.attribute.labels [remediation_status_details]
evidence.remediationStatusDetails
is mapped to principal.user.attribute.labels
when all
of the following conditions are met: - The
evidence.@odata.type
log field value matches the regular expression pattern(.*)(userEvidence or mailboxEvidence)
- If the
title
field value doesn't contains any of the following values:-
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
-
evidence.remediationStatusDetails
target.user.attribute.labels [remediation_status_details]
evidence.remediationStatusDetails
is mapped to target.user.attribute.labels
when all
of the following conditions are met: - The
evidence.@odata.type
log field value matches the regular expression pattern(.*)(userEvidence or mailboxEvidence)
- If the
title
field value contains one of the following values:-
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
-
evidence.remediationStatusDetails
principal.asset.attribute.labels [remediation_status_details]
evidence.@odata.type
log field value matches the regular expression pattern (.*)deviceEvidence
, then the evidence.remediationStatusDetails
log field is mapped to the principal.asset.attribute.labels
UDM field.evidence.remediationStatusDetails
target.resource_ancestors.attribute.labels [remediation_status_details]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence)
, then the evidence.remediationStatusDetails
log field is mapped to the target.resource_ancestors.attribute.labels
UDM field.evidence.remediationStatusDetails
target.group.attribute.labels [remediation_status_details]
evidence.@odata.type
log field value matches the regular expression pattern (.*)securityGroupEvidence
, then the evidence.remediationStatusDetails
log field is mapped to the target.group.attribute.labels
UDM field.evidence.remediationStatusDetails
security_result.detection_fields [remediation_status_details]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence)
, then the evidence.remediationStatusDetails
log field is mapped to the security_result.detection_fields
UDM field.evidence.remediationStatus
principal.user.attribute.labels [remediation_status]
evidence.remediationStatus
is mapped to principal.user.attribute.labels
when all
of the following conditions are met: - The
evidence.@odata.type
log field value matches the regular expression pattern(.*)(userEvidence or mailboxEvidence)
- If the
title
field value doesn't contains any of the following values:-
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
-
evidence.remediationStatus
target.user.attribute.labels [remediation_status]
evidence.remediationStatus
is mapped to target.user.attribute.labels
when all
of the following conditions are met: - The
evidence.@odata.type
log field value matches the regular expression pattern(.*)(userEvidence or mailboxEvidence)
- If the
title
field value contains one of the following values:-
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
-
evidence.remediationStatus
principal.asset.attribute.labels [remediation_status]
evidence.@odata.type
log field value matches the regular expression pattern (.*)deviceEvidence
, then the evidence.remediationStatus
log field is mapped to the principal.asset.attribute.labels
UDM field.evidence.remediationStatus
target.resource_ancestors.attribute.labels [remediation_status]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence)
, then the evidence.remediationStatus
log field is mapped to the target.resource_ancestors.attribute.labels
UDM field.evidence.remediationStatus
target.group.attribute.labels [remediation_status]
evidence.@odata.type
log field value matches the regular expression pattern (.*)securityGroupEvidence
, then the evidence.remediationStatus
log field is mapped to the target.group.attribute.labels
UDM field.evidence.remediationStatus
security_result.detection_fields [remediation_status]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence)
, then the evidence.remediationStatus
log field is mapped to the security_result.detection_fields
UDM field.evidence.tags
principal.user.attribute.labels [tags]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, then the evidence.tags
log field is mapped to the principal.user.attribute.labels
UDM field.evidence.tags
target.user.attribute.labels [tags]
evidence.tags
is mapped to target.user.attribute.labels
when all
of the following conditions are met: - The
evidence.@odata.type
log field value matches the regular expression pattern(.*)(userEvidence or mailboxEvidence)
- If the
title
field value contains one of the following values:-
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
-
evidence.tags
principal.asset.attribute.labels [tags]
evidence.@odata.type
log field value matches the regular expression pattern (.*)deviceEvidence
, then the evidence.tags
log field is mapped to the principal.asset.attribute.labels
UDM field.evidence.tags
target.resource_ancestors.attribute.labels [tags]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence)
, then the evidence.tags
log field is mapped to the target.resource_ancestors.attribute.labels
UDM field.evidence.tags
target.group.attribute.labels [tags]
evidence.@odata.type
log field value matches the regular expression pattern (.*)securityGroupEvidence
, then the evidence.tags
log field is mapped to the target.group.attribute.labels
UDM field.evidence.tags
security_result.detection_fields [tags]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence)
, then the evidence.tags
log field is mapped to the security_result.detection_fields
UDM field.evidence.detailedRoles
principal.user.attribute.labels [evidence_detailed_roles]
evidence.detailedRoles
is mapped to principal.user.attribute.labels
when all
of the following conditions are met: - The
evidence.@odata.type
log field value matches the regular expression pattern(.*)(userEvidence or mailboxEvidence)
- If the
title
field value doesn't contains any of the following values:-
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
-
evidence.detailedRoles
target.user.attribute.labels [evidence_detailed_roles]
evidence.detailedRoles
is mapped to target.user.attribute.labels
when all
of the following conditions are met: - The
evidence.@odata.type
log field value matches the regular expression pattern(.*)(userEvidence or mailboxEvidence)
- If the
title
field value contains one of the following values:-
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
-
evidence.detailedRoles
principal.asset.attribute.labels [evidence_detailed_roles]
evidence.@odata.type
log field value matches the regular expression pattern (.*)deviceEvidence
, then the evidence.detailedRoles
log field is mapped to the principal.asset.attribute.labels
UDM field.evidence.detailedRoles
target.resource_ancestors.attribute.labels [evidence_detailed_roles]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence)
, then the evidence.detailedRoles
log field is mapped to the target.resource_ancestors.attribute.labels
UDM field.evidence.detailedRoles
target.group.attribute.labels [evidence_detailed_roles]
evidence.@odata.type
log field value matches the regular expression pattern (.*)securityGroupEvidence
, then the evidence.detailedRoles
log field is mapped to the target.group.attribute.labels
UDM field.evidence.detailedRoles
security_result.detection_fields [detailed_roles]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence)
, then the evidence.detailedRoles
log field is mapped to the security_result.detection_fields
UDM field.evidence.verdict
principal.user.attribute.labels [verdict]
evidence.verdict
is mapped to principal.user.attribute.labels
when all
of the following conditions are met: - The
evidence.@odata.type
log field value matches the regular expression pattern(.*)(userEvidence or mailboxEvidence)
- If the
title
field value contains one of the following values:-
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
-
evidence.verdict
target.user.attribute.labels[verdict]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value contain one of the following values, and if the target.user.attribute.labels
log field value is empty, then the evidence.verdict
log field is mapped to the target.user.attribute.labels
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.verdict
target.group.attribute.labels [verdict]
evidence.@odata.type
log field value matches the regular expression pattern (.*)securityGroupEvidence
, then the evidence.verdict
log field is mapped to the target.group.attribute.labels
UDM field.evidence.verdict
security_result.detection_fields [verdict]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence)
, then the evidence.verdict
log field is mapped to the security_result.detection_fields
UDM field.evidence.roles
principal.user.attribute.roles.name
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value does not contain one of the following values, then the evidence.roles
log field is mapped to the principal.user.attribute.roles.name
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.roles
target.user.attribute.roles.name
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value contain one of the following values, then the evidence.roles
log field is mapped to the target.user.attribute.roles.name
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.roles
principal.asset.attribute.roles.name
evidence.@odata.type
log field value matches the regular expression pattern (.*)deviceEvidence
, then the evidence.roles
log field is mapped to the principal.asset.attribute.roles.name
UDM field.evidence.roles
security_result.detection_fields [roles]
evidence.@odata.type
log field value matches the regular expression pattern (.*)(ipEvidence or mailClusterEvidence or analyzedMessageEvidence or registryKeyEvidence or registryValueEvidence or urlEvidence or fileEvidence or processEvidence)
, then the evidence.roles
log field is mapped to the security_result.detection_fields
UDM field.evidence.roles
target.resource_ancestors.attribute.roles.name
evidence.@odata.type
log field value matches the regular expression pattern (.*)(amazonResourceEvidence or azureResourceEvidence or blobContainerEvidence or blobEvidence or googleCloudResourceEvidence or containerEvidence or containerImageEvidence or containerRegistryEvidence or kubernetesClusterEvidence or kubernetesControllerEvidence or kubernetesNamespaceEvidence or kubernetesPodEvidence or kubernetesSecretEvidence or kubernetesServiceAccountEvidence or kubernetesServiceEvidence or oauthApplicationEvidence)
, then The evidence.roles
log field is mapped to the target.resource_ancestors.attribute.roles.name
UDM field.evidence.roles
target.group.attribute.roles.name
evidence.@odata.type
log field value matches the regular expression pattern (.*)securityGroupEvidence
, then the evidence.roles
log field is mapped to the target.group.attribute.roles.name
UDM field.evidence.createdDateTime
target.resource.attribute.creation_time
evidence.@odata.type
log field value matches the regular expression pattern (.*)cloudApplicationEvidence
, then the evidence.createdDateTime
log field is mapped to the target.resource.attribute.creation_time
UDM field.evidence.remediationStatusDetails
target.resource.attribute.labels [remediation_status_details]
evidence.@odata.type
log field value matches the regular expression pattern (.*)cloudApplicationEvidence
, then the evidence.remediationStatusDetails
log field is mapped to the target.resource.attribute.labels
UDM field.evidence.remediationStatus
target.resource.attribute.labels [remediation_status]
evidence.@odata.type
log field value matches the regular expression pattern (.*)cloudApplicationEvidence
, then the evidence.remediationStatus
log field is mapped to the target.resource.attribute.labels
UDM field.evidence.tags
target.resource.attribute.labels [tags]
evidence.@odata.type
log field value matches the regular expression pattern (.*)cloudApplicationEvidence
, then the evidence.tags
log field is mapped to the target.resource.attribute.labels
UDM field.evidence.verdict
target.resource.attribute.labels [verdict]
evidence.@odata.type
log field value matches the regular expression pattern (.*)cloudApplicationEvidence
, then the evidence.verdict
log field is mapped to the target.resource.attribute.labels
UDM field.evidence.roles
target.resource.attribute.roles.name
evidence.@odata.type
log field value matches the regular expression pattern (.*)cloudApplicationEvidence
, then the evidence.roles
log field is mapped to the target.resource.attribute.roles.name
UDM field.detectorId
security_result.detection_fields[detector_id]
detectorId
log field value is not
equal to null
, then the detectorId
log field is mapped to the security_result.detection_fields
UDM field.determination
security_result.detection_fields[determination]
determination
log field value is not
equal to null
, then the determination
log field is mapped to the security_result.detection_fields
UDM field.evidence.@odata.type
evidence.azureAdDeviceId
security_result.detection_fields[azure_ad_device_id]
evidence.deviceDnsName
principal.asset.hostname
evidence.@odata.type
log field value matches the regular expression pattern .*deviceEvidence
, and if the evidence.deviceDnsName
log field value is not
empty, then the principal.asset.hostname
UDM field is mapped to evidence.deviceDnsName
.evidence.hostName
principal.asset.hostname
evidence.@odata.type
log field value matches the regular expression pattern .*deviceEvidence
, and if the evidence.deviceDnsName
log field value is empty, then the principal.asset.hostname
UDM field is mapped to evidence.hostName
.evidence.deviceDnsName
principal.hostname
evidence.@odata.type
log field value matches the regular expression pattern .*deviceEvidence
, and if the evidence.deviceDnsName
log field value is not
empty, then the principal.hostname
UDM field is mapped to evidence.deviceDnsName
.evidence.hostName
principal.hostname
evidence.@odata.type
log field value matches the regular expression pattern .*deviceEvidence
, and if the evidence.deviceDnsName
log field value is empty, then the principal.hostname
UDM field is mapped to evidence.hostName
.evidence.firstSeenDateTime
principal.asset.first_seen_time
principal.asset.deployment_status
principal.asset.deployment_status
UDM field is set to one of the following values: -
ACTIVE
when the following conditions are met:- The value in the
evidence.healthStatus
field isactive
. - The value in the
evidence.@odata.type
field value matches the regular expression pattern.*deviceEvidence
- The value in the
-
DECOMMISSIONED
when the following conditions are met:- The value in the
evidence.healthStatus
field isinactive
. - The value in the
evidence.@odata.type
field value matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.healthStatus
principal.asset.attribute.labels[health_status]
evidence.amazonAccountId
target.resource_ancestors.attribute.labels[amazon_account_id]
evidence.amazonResourceId
target.resource_ancestors.product_object_id
evidence.resourceName
target.resource_ancestors.name
evidence.resourceType
target.resource_ancestors.resource_subtype
evidence.cloudResource.amazonAccountId
target.resource_ancestors.attribute.labels[cloud_resource_amazon_account_id]
evidence.cloudResource.amazonResourceId
target.resource_ancestors.attribute.labels[cloud_resource_amazon_resource_id]
evidence.cloudResource.remediationStatus
target.resource_ancestors.attribute.labels[cloud_resource_remediation_status]
evidence.cloudResource.remediationStatusDetails
target.resource_ancestors.attribute.labels[cloud_resource_remediation_status_details]
evidence.cloudResource.roles
target.resource_ancestors.attribute.labels[cloud_resource_roles]
evidence.cloudResource.tags
target.resource_ancestors.attribute.labels[cloud_resource_tags]
evidence.cloudResource.verdict
target.resource_ancestors.attribute.labels[cloud_resource_verdict]
evidence.cluster.cloudResource.amazonAccountId
target.resource_ancestors.attribute.labels[cluster_cloud_resource_amazon_account_id]
evidence.cluster.cloudResource.amazonResourceId
target.resource_ancestors.attribute.labels[cluster_cloud_resource_amazon_resource_id]
evidence.cluster.cloudResource.remediationStatus
target.resource_ancestors.attribute.labels[cluster_cloud_resource_remediation_status]
evidence.cluster.cloudResource.remediationStatusDetails
target.resource_ancestors.attribute.labels[cluster_cloud_resource_remediation_status_details]
evidence.cluster.cloudResource.roles
target.resource_ancestors.attribute.labels[cluster_cloud_resource_roles]
evidence.cluster.cloudResource.tags
target.resource_ancestors.attribute.labels[cluster_cloud_resource_tags]
evidence.cluster.cloudResource.verdict
target.resource_ancestors.attribute.labels[cluster_cloud_resource_verdict]
evidence.namespace.cluster.cloudResource.amazonAccountId
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_amazon_account_id]
evidence.namespace.cluster.cloudResource.amazonResourceId
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_amazon_resource_id]
evidence.namespace.cluster.cloudResource.remediationStatus
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_remediation_status]
evidence.namespace.cluster.cloudResource.remediationStatusDetails
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_remediation_status_details]
evidence.namespace.cluster.cloudResource.resourceName
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_resource_name]
evidence.namespace.cluster.cloudResource.resourceType
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_resource_type]
evidence.namespace.cluster.cloudResource.roles
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_roles]
evidence.namespace.cluster.cloudResource.tags
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_tags]
evidence.namespace.cluster.cloudResource.verdict
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_verdict]
evidence.pod.namespace.cluster.cloudResource.amazonAccountId
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_amazon_account_id]
evidence.pod.namespace.cluster.cloudResource.amazonResourceId
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_amazon_resource_id]
evidence.pod.namespace.cluster.cloudResource.remediationStatus
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_remediation_status]
evidence.pod.namespace.cluster.cloudResource.remediationStatusDetails
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_remediation_status_details]
evidence.pod.namespace.cluster.cloudResource.resourceName
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_resource_name]
evidence.pod.namespace.cluster.cloudResource.resourceType
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_resource_type]
evidence.pod.namespace.cluster.cloudResource.roles
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_roles]
evidence.pod.namespace.cluster.cloudResource.tags
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_tags]
evidence.pod.namespace.cluster.cloudResource.verdict
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_verdict]
evidence.location
target.location.country_or_region
evidence.@odata.type
log field value matches the regular expression pattern .*googleCloudResourceEvidence
, then the evidence.location
log field is mapped to the target.location.country_or_region
UDM field.evidence.locationType
target.resource_ancestors.attribute.labels[location_type]
evidence.projectId
target.resource_ancestors.attribute.labels[project_id]
evidence.projectNumber
target.resource_ancestors.attribute.labels[project_number]
evidence.resourceId
target.resource_ancestors.product_object_id
evidence.cloudResource.createdDateTime
target.resource_ancestors.attribute.labels[cloud_resource_created_date_time]
evidence.cloudResource.location
target.resource_ancestors.attribute.labels[cloud_resource_location]
evidence.cloudResource.locationType
target.resource_ancestors.attribute.labels[cloud_resource_location_type]
evidence.cloudResource.projectId
target.resource_ancestors.attribute.labels[cloud_resource_project_id]
evidence.cloudResource.projectNumber
target.resource_ancestors.attribute.labels[cloud_resource_project_number]
evidence.cloudResource.resourceId
target.resource_ancestors.attribute.labels[cloud_resource_resource_id]
evidence.cloudResource.resourceName
target.resource_ancestors.attribute.labels[cloud_resource_resource_name]
evidence.cloudResource.resourceType
target.resource_ancestors.attribute.labels[cloud_resource_resource_type]
evidence.cluster.cloudResource.createdDateTime
target.resource_ancestors.attribute.labels[cluster_cloud_resource_created_date_time]
evidence.cluster.cloudResource.location
target.resource_ancestors.attribute.labels[cluster_cloud_resource_location]
evidence.cluster.cloudResource.locationType
target.resource_ancestors.attribute.labels[cluster_cloud_resource_location_type]
evidence.cluster.cloudResource.projectId
target.resource_ancestors.attribute.labels[cluster_cloud_resource_project_id]
evidence.cluster.cloudResource.projectNumber
target.resource_ancestors.attribute.labels[cluster_cloud_resource_project_number]
evidence.cluster.cloudResource.resourceId
target.resource_ancestors.attribute.labels[cluster_cloud_resource_resource_id]
evidence.cluster.cloudResource.resourceName
target.resource_ancestors.attribute.labels[cluster_cloud_resource_resource_name]
evidence.cluster.cloudResource.resourceType
target.resource_ancestors.attribute.labels[cluster_cloud_resource_resource_type]
evidence.namespace.cluster.cloudResource.createdDateTime
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_created_date_time]
evidence.namespace.cluster.cloudResource.location
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_location]
evidence.namespace.cluster.cloudResource.locationType
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_location_type]
evidence.namespace.cluster.cloudResource.projectId
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_project_id]
evidence.namespace.cluster.cloudResource.projectNumber
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_project_number]
evidence.namespace.cluster.cloudResource.resourceId
target.resource_ancestors.attribute.labels[namespace_cluster_cloud_resource_resource_id]
evidence.pod.namespace.cluster.cloudResource.createdDateTime
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_created_date_time]
evidence.pod.namespace.cluster.cloudResource.location
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_location]
evidence.pod.namespace.cluster.cloudResource.locationType
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_location_type]
evidence.pod.namespace.cluster.cloudResource.projectId
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_project_id]
evidence.pod.namespace.cluster.cloudResource.projectNumber
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_project_number]
evidence.pod.namespace.cluster.cloudResource.resourceId
target.resource_ancestors.attribute.labels[pod_namespace_cluster_cloud_resource_resource_id]
evidence.blobContainer.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.fileHashes
target.resource_ancestors.attribute.labels [file_hashes]
evidence.blobContainer.name
target.resource_ancestors.name
evidence.blobContainer.remediationStatus
target.resource_ancestors.attribute.labels [blob_container_remediation_status]
evidence.blobContainer.remediationStatusDetails
target.resource_ancestors.attribute.labels [blob_container_remediation_status_details]
evidence.blobContainer.roles
target.resource_ancestors.attribute.labels [blob_container_roles]
evidence.blobContainer.tags
target.resource_ancestors.attribute.labels [blob_container_tags]
evidence.blobContainer.url
target.resource_ancestors.attribute.labels [blob_container_url]
evidence.blobContainer.verdict
target.resource_ancestors.attribute.labels [blob_container_verdict]
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*kubernetesNamespaceEvidence
, then the target.resource_ancestors.resource_type
UDM field is set to CONTAINER
.evidence.cluster.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.cluster.distribution
target.resource_ancestors.attribute.labels[cluster_distribution]
evidence.cluster.name
target.resource_ancestors.name
evidence.cluster.platform
target.resource_ancestors.attribute.labels[cluster_platform]
evidence.cluster.remediationStatus
target.resource_ancestors.attribute.labels[cluster_remediation_status]
evidence.cluster.remediationStatusDetails
target.resource_ancestors.attribute.labels[cluster_remediation_status_details]
evidence.cluster.roles
target.resource_ancestors.attribute.roles.name
evidence.cluster.tags
target.resource_ancestors.attribute.labels[cluster_tags]
evidence.cluster.verdict
target.resource_ancestors.attribute.labels[cluster_verdict]
evidence.cluster.version
target.resource_ancestors.attribute.labels[cluster_version]
target.resource_ancestors.resource_type
evidence.cluster.name
log field value is not
empty, then the target.resource_ancestors.resource_type
UDM field is set to CLUSTER
.evidence.image.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.image.digestImage
target.resource_ancestors.attribute.labels [image_digest_image]
evidence.image.imageId
target.resource_ancestors.product_object_id
evidence.image.registry.createdDateTime
target.resource_ancestors.attribute.labels [image_registry_created_date_time]
evidence.image.registry.registry
target.resource_ancestors.attribute.labels [image_registry_registry]
evidence.image.registry.remediationStatus
target.resource_ancestors.attribute.labels [image_registry_remediation_status]
evidence.image.registry.remediationStatusDetails
target.resource_ancestors.attribute.labels [image_registry_remediation_status_details]
evidence.image.registry.roles
target.resource_ancestors.attribute.labels [image_registry_roles]
evidence.image.registry.tags
target.resource_ancestors.attribute.labels [image_registry_tags]
evidence.image.registry.verdict
target.resource_ancestors.attribute.labels [image_registry_verdict]
evidence.image.remediationStatus
target.resource_ancestors.attribute.labels [image_remediation_status]
evidence.image.remediationStatusDetails
target.resource_ancestors.attribute.labels [image_remediation_status_details]
evidence.image.roles
target.resource_ancestors.attribute.labels [image_roles]
evidence.image.tags
target.resource_ancestors.attribute.labels [image_tags]
evidence.image.verdict
target.resource_ancestors.attribute.labels [image_verdict]
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*containerEvidence
, then the target.resource_ancestors.resource_type
UDM field is set to IMAGE
.evidence.pod.containers.args
target.resource_ancestors.attribute.labels [pod_containers_args]
evidence.pod.containers.command
target.resource_ancestors.attribute.labels [pod_containers_command]
evidence.pod.containers.containerId
target.resource_ancestors.product_object_id
evidence.pod.containers.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.pod.containers.isPrivileged
target.resource_ancestors.attribute.labels [pod_containers_is_privileged]
evidence.pod.containers.name
target.resource_ancestors.name
evidence.pod.containers.remediationStatus
target.resource_ancestors.attribute.labels [pod_containers_remediation_status]
evidence.pod.containers.remediationStatusDetails
target.resource_ancestors.attribute.labels [pod_containers_remediation_status_details]
evidence.pod.containers.roles
target.resource_ancestors.attribute.labels [pod_containers_roles]
evidence.pod.containers.tags
target.resource_ancestors.attribute.labels [pod_containers_tags]
evidence.pod.containers.verdict
target.resource_ancestors.attribute.labels [pod_containers_verdict]
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*containerEvidence
, then the target.resource_ancestors.resource_type
UDM field is set to CONTAINER
.evidence.pod.controller.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.pod.controller.labels
target.resource_ancestors.attribute.labels [pod_controller_labels]
evidence.pod.controller.name
target.resource_ancestors.name
evidence.pod.controller.remediationStatus
target.resource_ancestors.attribute.labels [pod_controller_remediation_status]
evidence.pod.controller.remediationStatusDetails
target.resource_ancestors.attribute.labels [pod_controller_remediation_status_details]
evidence.pod.controller.roles
target.resource_ancestors.attribute.labels [pod_controller_roles]
evidence.pod.controller.tags
target.resource_ancestors.attribute.labels [pod_controller_tags]
evidence.pod.controller.type
target.resource_ancestors.resource_subtype
evidence.pod.controller.verdict
target.resource_ancestors.attribute.labels [pod_controller_verdict]
evidence.pod.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.pod.name
target.resource_ancestors.name
evidence.pod.remediationStatus
target.resource_ancestors.attribute.labels [pod_remediation_status]
evidence.pod.remediationStatusDetails
target.resource_ancestors.attribute.labels [pod_remediation_status_details]
evidence.pod.roles
target.resource_ancestors.attribute.labels [pod_roles]
evidence.pod.tags
target.resource_ancestors.attribute.labels [pod_tags]
evidence.pod.verdict
target.resource_ancestors.attribute.labels [pod_verdict]
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*containerEvidence
, then the target.resource_ancestors.resource_type
UDM field is set to POD
.evidence.pod.ephemeralContainers.args
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_args]
evidence.pod.ephemeralContainers.command
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_command]
evidence.pod.ephemeralContainers.containerId
target.resource_ancestors.product_object_id
evidence.pod.ephemeralContainers.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.pod.ephemeralContainers.isPrivileged
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_is_privileged]
evidence.pod.ephemeralContainers.name
target.resource_ancestors.name
evidence.pod.ephemeralContainers.remediationStatus
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_remediation_status]
evidence.pod.ephemeralContainers.remediationStatusDetails
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_remediation_status_details]
evidence.pod.ephemeralContainers.roles
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_roles]
evidence.pod.ephemeralContainers.tags
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_tags]
evidence.pod.ephemeralContainers.verdict
target.resource_ancestors.attribute.labels [pod_ephemeral_containers_verdict]
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*containerEvidence
, then the target.resource_ancestors.resource_type
UDM field is set to CONTAINER
.evidence.pod.serviceAccount.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.pod.serviceAccount.name
target.resource_ancestors.name
evidence.pod.serviceAccount.remediationStatus
target.resource_ancestors.attribute.labels [pod_service_account_remediation_status]
evidence.pod.serviceAccount.remediationStatusDetails
target.resource_ancestors.attribute.labels [pod_service_account_remediation_status_details]
evidence.pod.serviceAccount.roles
target.resource_ancestors.attribute.labels [pod_service_account_roles]
evidence.pod.serviceAccount.tags
target.resource_ancestors.attribute.labels [pod_service_account_tags]
evidence.pod.serviceAccount.verdict
target.resource_ancestors.attribute.labels [pod_service_account_verdict]
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*containerEvidence
, and if the evidence.pod.serviceAccount.name
log field value is not
empty, then the target.resource_ancestors.resource_type
UDM field is set to SERVICE_ACCOUNT
.evidence.pod.initContainers.args
target.resource_ancestors.attribute.labels [pod_init_containers_args]
evidence.pod.initContainers.command
target.resource_ancestors.attribute.labels [pod_init_containers_command]
evidence.pod.initContainers.containerId
target.resource_ancestors.product_object_id
evidence.pod.initContainers.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.pod.initContainers.isPrivileged
target.resource_ancestors.attribute.labels [pod_init_containers_is_privileged]
evidence.pod.initContainers.name
target.resource_ancestors.name
evidence.pod.initContainers.remediationStatus
target.resource_ancestors.attribute.labels [pod_init_containers_remediation_status]
evidence.pod.initContainers.remediationStatusDetails
target.resource_ancestors.attribute.labels [pod_init_containers_remediation_status_details]
evidence.pod.initContainers.roles
target.resource_ancestors.attribute.labels [pod_init_containers_roles]
evidence.pod.initContainers.tags
target.resource_ancestors.attribute.labels [pod_init_containers_tags]
evidence.pod.initContainers.verdict
target.resource_ancestors.attribute.labels [pod_init_containers_verdict]
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*containerEvidence
, then the target.resource_ancestors.resource_type
UDM field is set to CONTAINER
.evidence.containers.args
target.resource_ancestors.attribute.labels [containers_args]
evidence.containers.command
target.resource_ancestors.attribute.labels [containers_command]
evidence.containers.containerId
target.resource_ancestors.product_object_id
evidence.containers.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.containers.isPrivileged
target.resource_ancestors.attribute.labels [containers_is_privileged]
evidence.containers.name
target.resource_ancestors.name
evidence.containers.remediationStatus
target.resource_ancestors.attribute.labels [containers_remediation_status]
evidence.containers.remediationStatusDetails
target.resource_ancestors.attribute.labels [containers_remediation_status_details]
evidence.containers.roles
target.resource_ancestors.attribute.labels [containers_roles]
evidence.containers.tags
target.resource_ancestors.attribute.labels [containers_tags]
evidence.containers.verdict
target.resource_ancestors.attribute.labels [containers_verdict]
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*kubernetesNamespaceEvidence
, then the target.resource_ancestors.resource_type
UDM field is set to CONTAINER
.evidence.controller.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.controller.name
target.resource_ancestors.name
evidence.controller.remediationStatus
target.resource_ancestors.attribute.labels [controller_remediation_status]
evidence.controller.remediationStatusDetails
target.resource_ancestors.attribute.labels [controller_remediation_status_details]
evidence.controller.roles
target.resource_ancestors.attribute.labels [controller_roles]
evidence.controller.tags
target.resource_ancestors.attribute.labels [controller_tags]
evidence.controller.type
target.resource_ancestors.resource_subtype
evidence.controller.verdict
target.resource_ancestors.attribute.labels [controller_verdict]
evidence.initContainers.args
target.resource_ancestors.attribute.labels [init_containers_args]
evidence.initContainers.command
target.resource_ancestors.attribute.labels [init_containers_command]
evidence.initContainers.containerId
target.resource_ancestors.product_object_id
evidence.initContainers.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.initContainers.isPrivileged
target.resource_ancestors.attribute.labels [init_containers_is_privileged]
evidence.initContainers.name
target.resource_ancestors.name
evidence.initContainers.remediationStatus
target.resource_ancestors.attribute.labels [init_containers_remediation_status]
evidence.initContainers.remediationStatusDetails
target.resource_ancestors.attribute.labels [init_containers_remediation_status_details]
evidence.initContainers.roles
target.resource_ancestors.attribute.labels [init_containers_roles]
evidence.initContainers.tags
target.resource_ancestors.attribute.labels [init_containers_tags]
evidence.initContainers.verdict
target.resource_ancestors.attribute.labels [init_containers_verdict]
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*kubernetesNamespaceEvidence
, then the target.resource_ancestors.resource_type
UDM field is set to CONTAINER
.evidence.ephemeralContainers.args
target.resource_ancestors.attribute.labels [ephemeral_containers_args]
evidence.ephemeralContainers.command
target.resource_ancestors.attribute.labels [ephemeral_containers_command]
evidence.ephemeralContainers.containerId
target.resource_ancestors.product_object_id
evidence.ephemeralContainers.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.ephemeralContainers.isPrivileged
target.resource_ancestors.attribute.labels [ephemeral_containers_is_privileged]
evidence.ephemeralContainers.name
target.resource_ancestors.name
evidence.ephemeralContainers.remediationStatus
target.resource_ancestors.attribute.labels [ephemeral_containers_remediation_status]
evidence.ephemeralContainers.remediationStatusDetails
target.resource_ancestors.attribute.labels [ephemeral_containers_remediation_status_details]
evidence.ephemeralContainers.roles
target.resource_ancestors.attribute.labels [ephemeral_containers_roles]
evidence.ephemeralContainers.tags
target.resource_ancestors.attribute.labels [ephemeral_containers_tags]
evidence.ephemeralContainers.verdict
target.resource_ancestors.attribute.labels [ephemeral_containers_verdict]
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*kubernetesNamespaceEvidence
, then the target.resource_ancestors.resource_type
UDM field is set to CONTAINER
.evidence.podIp.countryLetterCode
target.resource_ancestors.attribute.labels [podip_country_letter_code]
evidence.podIp.ipAddress
target.resource_ancestors.attribute.labels [podip_ip_address]
evidence.serviceAccount.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.serviceAccount.name
target.resource_ancestors.name
evidence.serviceAccount.remediationStatus
target.resource_ancestors.attribute.labels [service_account_remediation_status]
evidence.serviceAccount.remediationStatusDetails
target.resource_ancestors.attribute.labels [service_account_remediation_status_details]
evidence.serviceAccount.roles
target.resource_ancestors.attribute.labels [service_account_roles]
evidence.serviceAccount.tags
target.resource_ancestors.attribute.labels [service_account_tags]
evidence.serviceAccount.verdict
target.resource_ancestors.attribute.labels [service_account_verdict]
target.resource_ancestors.resource_type
evi.@odata.type
log field value matches the regular expression pattern (.*)(kubernetesNamespaceEvidence or kubernetesPodEvidence)
, then the target.resource_ancestors.resource_type
UDM field is set to SERVICE_ACCOUNT
.network.direction
evidence.antiSpamDirection
log field value matches the regular expression pattern (?i)(inbound)
, then the network.direction
UDM field is set to INBOUND
.Else, If the
evidence.antiSpamDirection
log field value matches the regular expression pattern (?i)(outbound)
, then the network.direction
UDM field is set to OUTBOUND
.evidence.appId
target.application
index
log field value is equal to 1
, then the evidence.appId
log field is mapped to the target.application
UDM field.evidence.appId
target.resource_ancestors.attribute.labels[app_id]
evidence.@odata.type
log field value matches the regular expression pattern (.*oauthApplicationEvidence or .*cloudApplicationEvidence)
, then the evidence.appId
log field is mapped to the target.resource_ancestors.attribute.labels
UDM field.evidence.args
target.resource_ancestors.attribute.labels[args]
evidence.attachmentsCount
security_result.detection_fields[attachments_count]
evidence.clusterBy
security_result.detection_fields[cluster_by]
evidence.clusterByValue
security_result.detection_fields[cluster_by_value]
evidence.clusterIP.countryLetterCode
about.location.country_or_region
evidence.@odata.type
log field value matches the regular expression pattern .*kubernetesServiceEvidence
, then the evidence.clusterIP.countryLetterCode
log field is mapped to the about.location.country_or_region
UDM field.evidence.clusterIP.ipAddress
about.ip
evidence.command
target.resource_ancestors.attribute.labels[command]
evidence.containerId
target.resource_ancestors.attribute.labels[container_id]
evidence.countryLetterCode
principal.location.country_or_region
- The
protoPayload.metadata.event.eventName.parameter.value
is mapped toprincipal.location.country_or_region
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*ipEvidence
- The value in the
principal.location.country_or_region
field isempty
.
- The value in the
- The
protoPayload.metadata.event.eventName.parameter.value
is mapped toabout.location.country_or_region
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*ipEvidence
- The value in the
principal.location.country_or_region
field isnot empty
.
- The value in the
evidence.defenderAvStatus
security_result.detection_fields [defender_av_status]
evidence.deliveryAction
security_result.detection_fields [delivery_action]
evidence.deliveryLocation
security_result.detection_fields [delivery_location]
evidence.detectionStatus
security_result.detection_fields[detection_status]
evidence.displayName
target.application
evidence.@odata.type
log field value matches the regular expression pattern (.*oauthApplicationEvidence or .*cloudApplicationEvidence)
, then the evidence.displayName
log field is mapped to the target.application
UDM field.evidence.displayName
target.group.group_display_name
evidence.@odata.type
log field value matches the regular expression pattern .*securityGroupEvidence
, then the evidence.displayName
log field is mapped to the target.group.group_display_name
UDM field.evidence.displayName
principal.user.attribute.labels[display_name]
evidence.@odata.type
log field value matches the regular expression pattern .*mailboxEvidence
, and if the title
log field value does not contain one of the following values, then the evidence.displayName
log field is mapped to the principal.user.attribute.labels
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.displayName
target.user.attribute.labels[display_name]
evidence.@odata.type
log field value matches the regular expression pattern .*mailboxEvidence
, and if the title
log field value contain one of the following values, then the evidence.displayName
log field is mapped to the target.user.attribute.labels
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.distribution
target.resource_ancestors.attribute.labels[distribution]
evidence.emailCount
security_result.detection_fields [email_count]
evidence.externalIPs.countryLetterCode
about.location.country_or_region
evidence.externalIPs.ipAddress
about.ip
evidence.fileDetails.fileName
target.file.names
evidence.fileDetails.filePath
target.file.full_path
evidence.fileDetails.filePublisher
security_result.detection_fields [file_details_file_publisher]
evidence.@odata.type
log field value matches the regular expression pattern .*fileEvidence
, then the evidence.fileDetails.filePublisher
log field is mapped to the security_result.detection_fields
UDM field.evidence.fileDetails.fileSize
target.file.size
evidence.fileDetails.issuer
security_result.detection_fields [file_details_issuer]
evidence.fileDetails.sha1
target.file.sha1
evidence.fileDetails.sha256
target.file.sha256
evidence.fileDetails.signer
security_result.detection_fields [file_details_signer]
evidence.imageFile.fileName
target.process.file.names
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.imageFile.fileName
log field is mapped to the target.process.file.names
UDM field.evidence.imageFile.filePath
target.process.file.full_path
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.imageFile.filePath
log field is mapped to the target.process.file.full_path
UDM field.evidence.imageFile.filePublisher
security_result.detection_fields [image_file_file_publisher]
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.imageFile.filePublisher
log field is mapped to the security_result.detection_fields
UDM field.evidence.imageFile.fileSize
target.process.file.size
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.imageFile.fileSize
log field is mapped to the target.process.file.size
UDM field.evidence.imageFile.issuer
security_result.detection_fields[image_file_issuer]
evidence.imageFile.sha1
target.process.file.sha1
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.imageFile.sha1
log field is mapped to the target.process.file.sha1
UDM field.evidence.imageFile.sha256
target.process.file.sha256
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.imageFile.sha256
log field is mapped to the target.process.file.sha256
UDM field.evidence.imageFile.signer
security_result.detection_fields [image_file_signer]
evidence.instanceId
target.resource.product_object_id
evidence.instanceName
target.resource.name
evidence.internetMessageId
principal.network.email.mail_id
evidence.ipAddress
principal.ip
evidence.@odata.type
log field value matches the regular expression pattern (.*ipEvidence)
, then the evidence.ipAddress
log field is mapped to the principal.ip
UDM field.evidence.ipInterfaces
principal.asset.attribute.labels[ip_interfaces]
evidence.isPrivileged
target.resource_ancestors.attribute.labels[is_privileged]
evidence.language
security_result.detection_fields[language]
evidence.location.city
principal.location.city
evidence.location.countryName
principal.location.name
evidence.location.latitude
principal.location.region_coordinates.latitude
evidence.location.longitude
principal.location.region_coordinates.longitude
evidence.location.state
principal.location.state
evidence.loggedOnUsers.accountName
target.user.userid
evidence.loggedOnUsers.domainName
principal.domain.name
evidence.mdeDeviceId
principal.asset.asset_id
evidence.mdeDeviceId
principal.asset_id
security_result.associations.type
evidence.@odata.type
log field value matches the regular expression pattern (.*malwareEvidence)
, then the security_result.associations.type
UDM field is set to MALWARE
.evidence.name
security_result.associations.name
evidence.@odata.type
log field value matches the regular expression pattern (.*malwareEvidence)
, then the evidence.name
log field is mapped to the security_result.associations.name
UDM field.evidence.name
target.resource_ancestors.name
evidence.namespace.cluster.createdDateTime
target.resource_ancestors.attribute.labels[namespace_cluster_created_date_time]
evidence.namespace.cluster.distribution
target.resource_ancestors.attribute.labels[namespace_cluster_distribution]
evidence.namespace.cluster.name
target.resource_ancestors.attribute.labels[namespace_cluster_name]
evidence.namespace.cluster.platform
target.resource_ancestors.attribute.labels[namespace_cluster_platform]
evidence.namespace.cluster.remediationStatus
target.resource_ancestors.attribute.labels[namespace_cluster_remediation_status]
evidence.namespace.cluster.remediationStatusDetails
target.resource_ancestors.attribute.labels[namespace_cluster_remediation_status_details]
evidence.namespace.cluster.roles
target.resource_ancestors.attribute.labels[namespace_cluster_roles]
evidence.namespace.cluster.tags
target.resource_ancestors.attribute.labels[namespace_cluster_tags]
evidence.namespace.cluster.verdict
target.resource_ancestors.attribute.labels[namespace_cluster_verdict]
evidence.namespace.cluster.version
target.resource_ancestors.attribute.labels[namespace_cluster_version]
evidence.namespace.createdDateTime
target.resource_ancestors.attribute.labels[namespace_created_date_time]
evidence.namespace.name
target.resource_ancestors.attribute.labels[namespace_name]
evidence.namespace.remediationStatus
target.resource_ancestors.attribute.labels[namespace_remediation_status]
evidence.namespace.remediationStatusDetails
target.resource_ancestors.attribute.labels[namespace_remediation_status_details]
evidence.namespace.roles
target.resource_ancestors.attribute.labels[namespace_roles]
evidence.namespace.tags
target.resource_ancestors.attribute.labels[namespace_tags]
evidence.namespace.verdict
target.resource_ancestors.attribute.labels[namespace_verdict]
evidence.networkMessageId
security_result.detection_fields[network_message_id]
evidence.networkMessageIds
security_result.detection_fields[network_message_ids]
evidence.objectId
target.resource.product_object_id
evidence.@odata.type
log field value matches the regular expression pattern (.*oauthApplicationEvidence or .*cloudApplicationEvidence)
, then the evidence.objectId
log field is mapped to the target.resource.product_object_id
UDM field.evidence.onboardingStatus
principal.asset.attribute.labels [onboarding_status]
evidence.@odata.type
log field value matches the regular expression pattern .*deviceEvidence
, then the evidence.onboardingStatus
log field is mapped to the principal.asset.attribute.labels
UDM field.evidence.osBuild
principal.asset.platform_software.platform_patch_level
evidence.@odata.type
log field value matches the regular expression pattern .*deviceEvidence
, then the evidence.osBuild
log field is mapped to the principal.asset.platform_software.platform_patch_level
UDM field.evidence.osBuild
principal.platform_patch_level
evidence.@odata.type
log field value matches the regular expression pattern .*deviceEvidence
, then the evidence.osBuild
log field is mapped to the principal.platform_patch_level
UDM field.principal.platform
principal.platform
UDM field is set to one of the following values: -
WINDOWS
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.osPlatform
field matches the regular expression pattern(?i)win
- The value in the
-
MAC
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.osPlatform
field matches the regular expression pattern(?i)mac
- The value in the
-
LINUX
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.osPlatform
field matches the regular expression pattern(?i)lin
- The value in the
-
ANDROID
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.osPlatform
field matches the regular expression pattern(?i)android
- The value in the
-
IOS
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.osPlatform
field matches the regular expression pattern(?i)ios
- The value in the
principal.asset.platform_software.platform
principal.asset.platform_software.platform
UDM field is set to one of the following values: -
WINDOWS
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.osPlatform
field matches the regular expression pattern(?i)win
- The value in the
-
MAC
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.osPlatform
field matches the regular expression pattern(?i)mac
- The value in the
-
LINUX
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.osPlatform
field matches the regular expression pattern(?i)lin
- The value in the
-
ANDROID
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.osPlatform
field matches the regular expression pattern(?i)android
- The value in the
-
IOS
when the following conditions are met:- The value in the
evidence.@odata.type
field matches the regular expression pattern.*deviceEvidence
- The value in the
evidence.osPlatform
field matches the regular expression pattern(?i)ios
- The value in the
evidence.osPlatform
principal.asset.attribute.labels[os_platform]
evidence.p1Sender.displayName
security_result.about.user.user_display_name
evidence.p2Sender.displayName
log field value does not match the regular expression pattern ^.+@.+$
, then the evidence.p1Sender.displayName
log field is mapped to the security_result.about.user.user_display_name
UDM field.evidence.p1Sender.displayName
security_result.about.user.email_addresses
evidence.p1Sender.domainName
security_result.about.domain.name
evidence.p1Sender.emailAddress
security_result.about.network.email.from
evidence.p2Sender.displayName
security_result.about.user.user_display_name
evidence.p2Sender.displayName
log field value does not match the regular expression pattern ^.+@.+$
, then the evidence.p2Sender.displayName
log field is mapped to the security_result.about.user.user_display_name
UDM field.evidence.p2Sender.displayName
security_result.about.user.email_addresses
evidence.p2Sender.domainName
security_result.about.domain.name
evidence.p2Sender.emailAddress
security_result.about.network.email.from
evidence.parentProcessCreationDateTime
security_result.detection_fields[parent_process_creation_date_time]
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.parentProcessCreationDateTime
log field is mapped to the security_result.detection_fields
UDM field.evidence.parentProcessId
target.process.parent_process.pid
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.parentProcessId
log field is mapped to the target.process.parent_process.pid
UDM field.evidence.parentProcessImageFile.fileName
target.process.parent_process.file.names
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.parentProcessImageFile.fileName
log field is mapped to the target.process.parent_process.file.names
UDM field.evidence.parentProcessImageFile.filePath
target.process.parent_process.file.full_path
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.parentProcessImageFile.filePath
log field is mapped to the target.process.parent_process.file.full_path
UDM field.evidence.parentProcessImageFile.filePublisher
security_result.detection_fields [parent_process_image_file_file_publisher]
evidence.parentProcessImageFile.fileSize
target.process.parent_process.file.size
evidence.@odata.type
log field value matches the regular expression pattern .*processEvidence
, then the evidence.parentProcessImageFile.fileSize
log field is mapped to the target.process.parent_process.file.size
UDM field.evidence.parentProcessImageFile.issuer
security_result.detection_fields [parent_process_image_file_issuer]
evidence.parentProcessImageFile.sha1
target.process.parent_process.file.sha1
evidence.parentProcessImageFile.sha256
target.process.parent_process.file.sha256
evidence.parentProcessImageFile.signer
security_result.detection_fields [parent_process_image_file_signer]
evidence.platform
target.resource_ancestors.attribute.labels [platform]
evidence.pod.namespace.cluster.createdDateTime
target.resource_ancestors.attribute.labels[pod_namespace_cluster_created_date_time]
evidence.pod.namespace.cluster.distribution
target.resource_ancestors.attribute.labels[pod_namespace_cluster_distribution]
evidence.pod.namespace.cluster.name
target.resource_ancestors.attribute.labels[pod_namespace_cluster_name]
evidence.pod.namespace.cluster.platform
target.resource_ancestors.attribute.labels[pod_namespace_cluster_platform]
evidence.pod.namespace.cluster.remediationStatus
target.resource_ancestors.attribute.labels[pod_namespace_cluster_remediation_status]
evidence.pod.namespace.cluster.remediationStatusDetails
target.resource_ancestors.attribute.labels[pod_namespace_cluster_remediation_status_details]
evidence.pod.namespace.cluster.roles
target.resource_ancestors.attribute.labels[pod_namespace_cluster_roles]
evidence.pod.namespace.cluster.tags
target.resource_ancestors.attribute.labels[pod_namespace_cluster_tags]
evidence.pod.namespace.cluster.verdict
target.resource_ancestors.attribute.labels[pod_namespace_cluster_verdict]
evidence.pod.namespace.cluster.version
target.resource_ancestors.attribute.labels[pod_namespace_cluster_version]
evidence.pod.namespace.createdDateTime
target.resource_ancestors.attribute.labels[pod_namespace_created_date_time]
evidence.pod.namespace.name
target.resource_ancestors.attribute.labels[pod_namespace_name]
evidence.pod.namespace.remediationStatus
target.resource_ancestors.attribute.labels[pod_namespace_remediation_status]
evidence.pod.namespace.remediationStatusDetails
target.resource_ancestors.attribute.labels[pod_namespace_remediation_status_details]
evidence.pod.namespace.roles
target.resource_ancestors.attribute.labels[pod_namespace_roles]
evidence.pod.namespace.tags
target.resource_ancestors.attribute.labels[pod_namespace_tags]
evidence.pod.namespace.verdict
target.resource_ancestors.attribute.labels[pod_namespace_verdict]
evidence.pod.podIp.countryLetterCode
target.resource_ancestors.attribute.labels [pod_pod_ip_country_letter_code]
evidence.pod.podIp.ipAddress
target.resource_ancestors.attribute.labels [pod_pod_ip_ip_address]
evidence.primaryAddress
principal.user.email_addresses
evidence.primaryAddress
log field value matches the regular expression pattern ^.+@.+$
, and if the title
log field value does not contain one of the following values, then the evidence.primaryAddress
log field is mapped to the principal.user.email_addresses
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.primaryAddress
target.user.email_addresses
evidence.primaryAddress
log field value matches the regular expression pattern ^.+@.+$
, and if the title
log field value contain one of the following values, then the evidence.primaryAddress
log field is mapped to the target.user.email_addresses
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.primaryAddress
principal.user.attribute.labels[primary_address]
evidence.primaryAddress
log field value does not match the regular expression pattern ^.+@.+$
, and if the title
log field value does not contain one of the following values, then the evidence.primaryAddress
log field is mapped to the principal.user.attribute.labels
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.primaryAddress
target.user.attribute.labels[primary_address]
evidence.primaryAddress
log field value does not match the regular expression pattern ^.+@.+$
, and if the title
log field value contain one of the following values, then the evidence.primaryAddress
log field is mapped to the target.user.attribute.labels
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.processCommandLine
target.process.command_line
evidence.processCreationDateTime
security_result.detection_fields [process_creation_date_time]
evidence.processId
target.process.pid
- The
evidence.processId
is mapped totarget.process.pid
when the following conditions are met:- The value in the
evidence.@odata.type
field value matches the regular expression pattern.*processEvidence
- The value in the
target.process.pid
field value isempty
.
- The value in the
- The
evidence.processId
is mapped toabout.process.pid
when the following conditions are met:- The value in the
evidence.@odata.type
field value matches the regular expression pattern.*processEvidence
- The value in the
target.process.pid
field value isnot empty
.
- The value in the
evidence.publisher
target.resource_ancestors.attribute.labels[publisher]
evidence.query
security_result.detection_fields[query]
evidence.rbacGroupId
security_result.detection_fields[rbac_group_id]
evidence.rbacGroupName
security_result.detection_fields[rbac_group_name]
evidence.receivedDateTime
security_result.detection_fields[received_date_time]
evidence.recipientEmailAddress
principal.network.email.to
evidence.registry.createdDateTime
target.resource_ancestors.attribute.labels[registry_created_date_time]
evidence.registry.registry
target.resource_ancestors.attribute.labels[registry_registry]
evidence.registry.remediationStatus
target.resource_ancestors.attribute.labels[registry_remediation_status]
evidence.registry.remediationStatusDetails
target.resource_ancestors.attribute.labels[registry_remediation_status_details]
evidence.registry.roles
target.resource_ancestors.attribute.labels[registry_roles]
evidence.registry.tags
target.resource_ancestors.attribute.labels[registry_tags]
evidence.registry.verdict
target.resource_ancestors.attribute.labels[registry_verdict]
evidence.registry
target.resource_ancestors.attribute.labels[registry]
evidence.registryHive
security_result.detection_fields[registry_hive]
evidence.registryKey
target.registry.registry_key
evidence.registryValue
target.registry.registry_value_data
evidence.registryValueName
target.registry.registry_value_name
evidence.registryValueType
security_result.detection_fields [registry_value_type]
evidence.remediationStatus
target.group.attribute.labels[remediation_status]
evidence.@odata.type
log field value matches the regular expression pattern .*securityGroupEvidence
, then the evidence.remediationStatus
log field is mapped to the target.group.attribute.labels
UDM field.evidence.remediationStatus
target.resource_ancestors.attribute.labels[remediation_status]
evidence.remediationStatusDetails
target.group.attribute.labels[remediation_status_details]
evidence.@odata.type
log field value matches the regular expression pattern .*securityGroupEvidence
, then the evidence.remediationStatusDetails
log field is mapped to the target.group.attribute.labels
UDM field.evidence.remediationStatusDetails
target.resource_ancestors.attribute.labels[remediation_status_details]
evidence.riskScore
security_result.detection_fields[risk_score]
evidence.saasAppId
target.resource.attribute.labels[saas_app_id]
evidence.secretType
target.resource_ancestors.attribute.labels[secret_type]
evidence.securityGroupId
target.group.product_object_id
evidence.@odata.type
log field value matches the regular expression pattern .*securityGroupEvidence
, then the evidence.securityGroupId
log field is mapped to the target.group.product_object_id
UDM field.evidence.senderIp
principal.ip
evidence.servicePorts.appProtocol
about.security_result.detection_fields [service_ports_app_protocol]
evidence.servicePorts.name
about.security_result.detection_fields [service_ports_name]
evidence.servicePorts.nodePort
about.security_result.detection_fields [service_ports_node_port]
evidence.servicePorts.port
about.port
evidence.servicePorts.protocol
about.network.ip_protocol
evidence.servicePorts.targetPort
about.security_result.detection_fields [service_ports_target_port]
evidence.serviceType
target.resource_ancestors.attribute.labels[service_type]
evidence.storageResource.createdDateTime
target.resource_ancestors.attribute.labels[storage_resource_created_date_time]
evidence.storageResource.detailedRoles
target.resource_ancestors.attribute.labels[storage_resource_detailed_roles]
evidence.storageResource.remediationStatus
target.resource_ancestors.attribute.labels[storage_resource_remediation_status]
evidence.storageResource.remediationStatusDetails
target.resource_ancestors.attribute.labels[storage_resource_remediation_status_details]
evidence.storageResource.resourceId
target.resource_ancestors.attribute.labels[storage_resource_resource_id]
evidence.storageResource.resourceName
target.resource_ancestors.attribute.labels[storage_resource_resource_name]
evidence.storageResource.resourceType
target.resource_ancestors.attribute.labels[storage_resource_resource_type]
evidence.storageResource.roles
target.resource_ancestors.attribute.labels[storage_resource_roles]
evidence.storageResource.tags
target.resource_ancestors.attribute.labels[storage_resource_tags]
evidence.storageResource.verdict
target.resource_ancestors.attribute.labels[storage_resource_verdict]
evidence.subject
principal.network.email.subject
evidence.threatDetectionMethods
security_result.detection_fields[threat_detection_methods]
evidence.threats
security_result.detection_fields[threats]
evidence.type
security_result.detection_fields[type]
evidence.url
target.url
evidence.@odata.type
log field value matches the regular expression pattern .*urlEvidence
, then the evidence.url
log field is mapped to the target.url
UDM field.evidence.url
target.resource_ancestors.attribute.labels[url]
evidence.@odata.type
log field value matches the regular expression pattern .*blobContainerEvidence
, then the evidence.url
log field is mapped to the target.resource_ancestors.attribute.labels
UDM field.evidence.urlCount
security_result.detection_fields[url_count]
evidence.urls
security_result.detection_fields[urls]
evidence.urn
security_result.detection_fields[urn]
evidence.userAccount.accountName
principal.user.userid
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value does not contain one of the following values, then the evidence.userAccount.accountName
log field is mapped to the principal.user.userid
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.accountName
target.user.userid
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value contain one of the following values, then the evidence.userAccount.accountName
log field is mapped to the target.user.userid
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.azureAdUserId
principal.user.product_object_id
title
log field value does not contain one of the following values, then the evidence.userAccount.azureAdUserId
log field is mapped to the principal.user.product_object_id
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.azureAdUserId
target.user.product_object_id
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value contain one of the following values, then the evidence.userAccount.azureAdUserId
log field is mapped to the target.user.product_object_id
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.displayName
principal.user.user_display_name
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value does not contain one of the following values, then the evidence.userAccount.displayName
log field is mapped to the principal.user.user_display_name
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.displayName
target.user.user_display_name
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value contain one of the following values, then the evidence.userAccount.displayName
log field is mapped to the target.user.user_display_name
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.domainName
principal.administrative_domain
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value does not contain one of the following values, then the evidence.userAccount.domainName
log field is mapped to the principal.administrative_domain
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.domainName
target.administrative_domain
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value contain one of the following values, then the evidence.userAccount.domainName
log field is mapped to the target.administrative_domain
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.userPrincipalName
principal.user.email_addresses
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value does not contain one of the following values, then the evidence.userAccount.userPrincipalName
log field is mapped to the principal.user.email_addresses
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.userPrincipalName
target.user.email_addresses
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value contain one of the following values, then the evidence.userAccount.userPrincipalName
log field is mapped to the target.user.email_addresses
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.userSid
principal.user.windows_sid
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value does not contain one of the following values, then the evidence.userAccount.userSid
log field is mapped to the principal.user.windows_sid
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.userAccount.userSid
target.user.windows_sid
evidence.@odata.type
log field value matches the regular expression pattern (.*)(userEvidence or mailboxEvidence)
, and if the title
log field value contain one of the following values, then the evidence.userAccount.userSid
log field is mapped to the target.user.windows_sid
UDM field. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
evidence.version
principal.asset.platform_software.platform_version
evidence.@odata.type
log field value matches the regular expression pattern .*deviceEvidence
, then the evidence.osPlatform
, evidence.version
, evidence.osBuild
log field is mapped to the principal.asset.platform_software.platform_version
UDM field.evidence.version
principal.platform_version
evidence.@odata.type
log field value matches the regular expression pattern .*deviceEvidence
, then the evidence.osPlatform
, evidence.version
, evidence.osBuild
log field is mapped to the principal.platform_version
UDM field.evidence.version
target.resource_ancestors.attribute.labels[version]
evidence.vmMetadata.cloudProvider
principal.asset.attribute.labels[vm_metadata_cloud_provider]
evidence.vmMetadata.resourceId
principal.asset.product_object_id
evidence.vmMetadata.subscriptionId
principal.asset.attribute.labels[vm_metadata_subscription_id]
evidence.vmMetadata.vmId
principal.asset.attribute.labels[vm_metadata_vm_id]
firstActivityDateTime
security_result.first_discovered_time
id
metadata.product_log_id
incidentId
security_result.detection_fields[incident_id]
incidentWebUrl
security_result.url_back_to_product
lastActivityDateTime
security_result.last_discovered_time
lastUpdateDateTime
security_result.last_updated_time
mitreTechniques
security_result.attack_details.techniques.id
mitreTechniques
security_result.attack_details.techniques.name
productName
metadata.product_name
providerAlertId
additional.fields[provider_alert_id]
recommendedActions
security_result.action_details
resolvedDateTime
security_result.detection_fields[resolved_date_time]
resolvedDateTime
log field value is not
equal to null
, then the resolvedDateTime
log field is mapped to the security_result.detection_fields
UDM field.serviceSource
additional.fields[service_source]
severity
security_result.severity
status
security_result.detection_fields[status]
systemTags
security_result.detection_fields[system_tags]
systemTags
log field is mapped to the security_result.detection_fields
UDM field.tenantId
metadata.product_deployment_id
threatDisplayName
security_result.threat_name
threatDisplayName
log field value is not
equal to null
, then the threatDisplayName
log field is mapped to the security_result.threat_name
UDM field.threatFamilyName
security_result.threat_feed_name
threatFamilyName
log field value is not
equal to null
, then the threatFamilyName
log field is mapped to the security_result.threat_feed_name
UDM field.title
security_result.rule_name
target.resource_ancestors.resource_type
evidence.@odata.type
log field value matches the regular expression pattern .*blobEvidence
, then the target.resource_ancestors.resource_type
UDM field is set to STORAGE_OBJECT
.evidence.blobContainer.storageResource.createdDateTime
target.resource_ancestors.attribute.creation_time
evidence.blobContainer.storageResource.remediationStatus
target.resource_ancestors.attribute.labels [pod_storage_resource_remediation_status]
evidence.blobContainer.storageResource.remediationStatusDetails
target.resource_ancestors.attribute.labels [pod_storage_resource_remediation_status_details]
evidence.blobContainer.storageResource.resourceId
target.resource_ancestors.product_object_id
evidence.blobContainer.storageResource.resourceName
target.resource_ancestors.name
evidence.blobContainer.storageResource.resourceType
target.resource_ancestors.resource_subtype
evidence.blobContainer.storageResource.verdict
target.resource_ancestors.attribute.labels [pod_storage_resource_verdict]
evidence.category
security_result.detection_fields[category]
evidence.destinationPort
target.port
evidence.etag
target.resource_ancestors.attribute.labels[etag]
evidence.files.createdDateTime
security_result.detection_fields [files_created_date_time]
evidence.files.detectionStatus
security_result.detection_fields [files_detection_status]
evidence.files.fileDetails.fileName
target.file.names
evidence.files.fileDetails.filePath
target.file.full_path
evidence.files.fileDetails.filePublisher
security_result.detection_fields [files_file_details_file_publisher]
evidence.files.fileDetails.fileSize
target.file.size
evidence.files.fileDetails.issuer
security_result.detection_fields [files_file_details_issuer]
evidence.files.fileDetails.sha1
target.file.sha1
evidence.files.fileDetails.sha256
target.file.sha256
evidence.files.fileDetails.signer
security_result.detection_fields [files_file_details_signer]
evidence.files.mdeDeviceId
security_result.detection_fields [files_mde_device_id]
evidence.files.remediationStatus
security_result.detection_fields [files_remediation_status]
evidence.files.remediationStatusDetails
security_result.detection_fields [files_remediation_status_details]
evidence.files.verdict
security_result.detection_fields [files_verdict]
evidence.fullResourceName
target.resource_ancestors.attribute.labels[full_resource_name]
evidence.imageId
target.resource_ancestors.attribute.labels[image_id]
evidence.protocol
network.ip_protocol
evidence.sourceAddress.countryLetterCode
security_result.detection_fields[source_address_country_letter_code]
evidence.sourceAddress.createdDateTime
security_result.detection_fields[source_address_created_date_time]
evidence.sourceAddress.ipAddress
security_result.about.ip
evidence.sourceAddress.location.city
security_result.about.location.city
evidence.sourceAddress.location.countryName
security_result.about.location.name
evidence.sourceAddress.location.latitude
security_result.about.location.region_coordinates.latitude
evidence.sourceAddress.location.longitude
security_result.about.location.region_coordinates.longitude
evidence.sourceAddress.location.state
security_result.about.location.state
evidence.sourceAddress.remediationStatus
security_result.detection_fields[source_address_remediation_status]
evidence.sourceAddress.remediationStatusDetails
security_result.detection_fields[source_address_remediation_status_details]
evidence.sourceAddress.stream
security_result.detection_fields[source_address_stream]
evidence.sourceAddress.verdict
security_result.detection_fields[source_address_verdict]
evidence.sourcePort
principal.port
evidence.stream.name
target.resource.attribute.labels[stream_name]
evidence.algorithm
security_result.detection_fields[algorithm]
evidence.value
security_result.detection_fields[value]
evidence.lastExternalIpAddress
principal.asset.attribute.labels[last_external_ip_address]
security_result.action
title
log field value matches the regular expression pattern (malware was blocked or Unsanctioned cloud app access was blocked or Activity from an anonymous proxy or Network - NT - Possible Ursnif/Gozi Phish or Network - SSH Potential Brute Force or Multiple failed login attempts or Brute force attack against Azure Portal or Block download based on real-time content inspection)
, then the security_result.action
UDM field is set to BLOCK
.Else, If the
title
log field value matches the regular expression pattern (Failed SSH brute force attack)
, then the security_result.action
UDM field is set to FAIL
.Else, If the
title
log field value contain one of the following values, then the security_result.action
UDM field is set to ALLOW
. -
Mass delete
-
Multiple delete VM activities
metadata.vendor_name
metadata.vendor_name
UDM field is set to Microsoft
.principal.hostname
src_host
field is extracted from description
log field using the Grok pattern and the src_host
extracted field is mapped to the principal.hostname
UDM field.principal.asset.hostname
src_host
field is extracted from description
log field using the Grok pattern and the src_host
extracted field is mapped to the principal.asset.hostname
UDM field.extensions.auth.type
title
log field value contain one of the following values, then the extensions.auth.type
UDM field is set to AUTHTYPE_UNSPECIFIED
. -
Malware linked IP address
-
Unfamiliar sign-in properties
-
Malicious IP address
-
Anonymous IP address
-
Verified threat actor IP
-
Suspected Brute Force attack (LDAP)
-
Suspected Brute Force attack (Kerberos, NTLM)
-
Abnormal Active Directory Federation Services (AD FS) authentication using a suspicious certificate
-
Suspected DFSCoerce attack using Distributed File System Protocol
-
Multiple failed login attempts
-
Activity from a TOR IP address
-
Anomalous SSH login detected
-
Azure High Risk User account - Signin
-
Brute force attack against Azure Portal
-
Identity - Attempts to sign in to disabled accounts
-
Network - SSH Potential Brute Force
-
A logon from a malicious IP has been detected. [seen multiple times]
-
Successful brute force attack
-
Failed SSH brute force attack
-
Successful SSH brute force attack
-
Attempted logon by a potentially harmful application
-
Log on from an unusual Azure Data Center
-
Log on from an unusual location
-
Login from a principal user not seen in 60 days
-
Login from a domain not seen in 60 days
-
Login from a suspicious IP
-
Suspected brute force attack using a valid user
-
Suspected brute force attack
-
Suspected successful brute force attack
-
Logon from an unusual cloud provider
-
Logon by an unfamiliar principal
network.application_protocol
title
log field value is equal to Network - Rare RDP Connections
, then the network.application_protocol
UDM field is set to RDP
.security_result.alert_state
security_result.alert_state
UDM field is set to ALERTING
.security_result.attack_details.tactics.name
title
log field value contain one of the following values, then the security_result.attack_details.techniques.id
UDM field is set to T1530 and T1567
values and the security_result.attack_details.tactics.name
UDM field is set to Exfiltration
. -
Mass download by a single user
-
Mass delete
-
Mass share
-
Data exfiltration to an app that is not sanctioned
title
log field value contain one of the following values, then the security_result.attack_details.techniques.id
UDM field is set to T1078
. -
Activity by terminated user
-
Suspicious administrative activity
-
UserAccessAdministrator-Flag
title
log field value contain one of the following values, then the security_result.attack_details.techniques.id
UDM field is set to T1090
. -
Activity from a Tor IP address
-
Activity from infrequent country
-
Impossible travel activity
-
Login from unfriendly country
title
log field value contain one of the following values, then the security_result.attack_details.techniques.id
UDM field is set to T1098
. -
Add user to GitHub repo
-
OAuth Application granted Sharepoint Sites.ReadWrite.All exessive permission
-
Role added or removed from a User
-
Unusual addition of credentials to an OAuth app
title
log field value contain one of the following values, then the security_result.attack_details.techniques.id
UDM field is set to T1589
. -
IR - Multiple failed user log on attempts to an app within 2 minutes
-
Multiple failed login attempts
-
Multiple failed user logon attempts to a service
title
log field value is equal to Failed login for admin account
, then the security_result.attack_details.techniques.id
UDM field is set to T1589
and the security_result.attack_details.techniques.id
UDM field is set to T1110
and the security_result.attack_details.tactics.name
UDM field is set to CredentialAccess
.Else, If the
title
log field value is equal to New risky app
, then the security_result.attack_details.techniques.id
UDM field is set to T1199
.Else, If the
title
log field value is equal to Creation of forwarding/redirect rule
, then the security_result.attack_details.techniques.id
UDM field is set to T1137
.If the
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to Reconnaissance
. -
T1595
-
T1592
-
T1589
-
T1590
-
T1591
-
T1598
-
T1597
-
T1596
-
T1593
-
T1594
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to ResourceDevelopment
. -
T1583
-
T1586
-
T1584
-
T1587
-
T1585
-
T1588
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to InitialAccess
. -
T1189
-
T1190
-
T1133
-
T1200
-
T1566
-
T1091
-
T1195
-
T1199
-
T1078
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to Execution
. -
T1059
-
T1203
-
T1559
-
T1106
-
T1053
-
T1129
-
T1072
-
T1569
-
T1204
-
T1047
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to Persistence
. -
T1098
-
T1197
-
T1547
-
T1037
-
T1176
-
T1554
-
T1136
-
T1543
-
T1546
-
T1133
-
T1574
-
T1525
-
T1137
-
T1542
-
T1053
-
T1505
-
T1205
-
T1078
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to PrivilegeEscalation
. -
T1548
-
T1134
-
T1547
-
T1037
-
T1543
-
T1484
-
T1546
-
T1068
-
T1574
-
T1055
-
T1053
-
T1078
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to DefenseEvasion
. -
T1548
-
T1134
-
T1197
-
T1140
-
T1006
-
T1484
-
T1480
-
T1211
-
T1222
-
T1564
-
T1574
-
T1562
-
T1070
-
T1202
-
T1036
-
T1556
-
T1578
-
T1112
-
T1601
-
T1599
-
T1027
-
T1542
-
T1055
-
T1207
-
T1014
-
T1218
-
T1216
-
T1553
-
T1221
-
T1205
-
T1127
-
T1535
-
T1550
-
T1078
-
T1497
-
T1600
-
T1220
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to CredentialAccess
. -
T1110
-
T1555
-
T1212
-
T1187
-
T1606
-
T1056
-
T1557
-
T1556
-
T1040
-
T1003
-
T1528
-
T1558
-
T1539
-
T1111
-
T1552
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to Discovery
. -
T1087
-
T1010
-
T1217
-
T1580
-
T1538
-
T1526
-
T1482
-
T1083
-
T1046
-
T1135
-
T1040
-
T1201
-
T1120
-
T1069
-
T1057
-
T1012
-
T1018
-
T1518
-
T1082
-
T1016
-
T1049
-
T1033
-
T1007
-
T1124
-
T1497
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to LateralMovement
. -
T1210
-
T1534
-
T1570
-
T1563
-
T1021
-
T1091
-
T1072
-
T1080
-
T1550
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to Collection
. -
T1560
-
T1123
-
T1119
-
T1115
-
T1530
-
T1602
-
T1213
-
T1005
-
T1039
-
T1025
-
T1074
-
T1114
-
T1056
-
T1185
-
T1557
-
T1113
-
T1125
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to CommandAndControl
. -
T1071
-
T1092
-
T1132
-
T1001
-
T1568
-
T1573
-
T1008
-
T1105
-
T1104
-
T1095
-
T1571
-
T1572
-
T1090
-
T1219
-
T1205
-
T1102
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to Exfiltration
. -
T1020
-
T1030
-
T1048
-
T1041
-
T1011
-
T1052
-
T1567
-
T1029
-
T1537
mitre_technique_data.id
log field value contain one of the following values, then the security_result.attack_details.tactics.name
UDM field is set to Impact
. -
T1531
-
T1485
-
T1486
-
T1565
-
T1491
-
T1561
-
T1499
-
T1495
-
T1490
-
T1498
-
T1496
-
T1489
-
T1529
What's next
Need more help? Get answers from Community members and Google SecOps professionals.