CloudAuditEvents

Applies to:

  • Microsoft Defender XDR

The CloudAuditEvents table in the advanced hunting schema contains information about cloud audit events for various cloud platforms protected by the organization's Microsoft Defender for Cloud. Use this reference to construct queries that return information from this table.

Important

Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

Column name Data type Description
Timestamp datetime Date and time when the event was recorded
ReportId string Unique identifier for the event
DataSource string Data source for the cloud audit events, can be GCP (for Google Cloud Platform), AWS (for Amazon Web Services), Azure (for Azure Resource Manager), Kubernetes Audit (for Kubernetes), or other cloud platforms
ActionType string Type of activity that triggered the event, can be: Unknown, Create, Read, Update, Delete, Other
OperationName string Audit event operation name as it appears in the record, usually includes both resource type and operation
ResourceId string Unique identifier of the cloud resource accessed
IPAddress string The client IP address used to access the cloud resource or control plane
IsAnonymousProxy boolean Indicates whether the IP address belongs to a known anonymous proxy (1) or no (0)
CountryCode string Two-letter code indicating the country where the client IP address is geolocated
City string City where the client IP address is geolocated
Isp string Internet service provider (ISP) associated with the IP address
UserAgent string User agent information from the web browser or other client application
RawEventData dynamic Full raw event information from the data source in JSON format
AdditionalFields dynamic Additional information about the audit event

Sample query

To get a sample list of VM creation commands performed in the last seven days:

CloudAuditEvents
| where Timestamp > ago(7d)
| where OperationName startswith "Microsoft.Compute/virtualMachines/write"
| extend Status = RawEventData["status"], SubStatus = RawEventData["subStatus"]
| sample 10