A cloud-native SIEM solution that provides intelligent security analytics and threat detection across systems
Hello SUNOJ KUMAR YELURU,
In Sentinel, SecurityIncident doesn’t expose Entities anymore—it only stores the linked alert references in AlertIds. To get hostnames, you need to expand AlertIds and join with SecurityAlert, because SecurityAlert is the table that contains Entities (and the join key is SystemAlertId).
https://learn.microsoft.com/en-in/azure/sentinel/entities-reference?
https://learn.microsoft.com/en-us/azure/sentinel/security-alert-schema
Use the below query to return only hostnames for Closed incidents in your date range:
SecurityIncident
| where CreatedTime between (datetime(2026-03-17) .. datetime(2026-03-23))
| where Status has "Closed"
| summarize arg_max(TimeGenerated, *) by IncidentNumber
| mv-expand AlertIds to typeof(string)
| join kind=inner (
SecurityAlert
| project SystemAlertId, Entities
) on $left.AlertIds == $right.SystemAlertId
| extend E = todynamic(Entities)
| mv-expand E
| where tostring(E.Type) =~ "host"
| extend Hostname = coalesce(tostring(E.HostName), tostring(E.FQDN), tostring(E.Name))
| where isnotempty(Hostname)
| distinct Hostname
| order by Hostname asc
Note: If an incident’s underlying alerts don’t contain a Host entity, no hostname will be returned (connector/provider dependent).