Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This table shows information about messages by Microsoft Defender for Office 365.
Table attributes
| Attribute | Value |
|---|---|
| Resource types | - |
| Categories | Security |
| Solutions | SecurityInsights |
| Basic log | Yes |
| Ingestion-time DCR support | No |
| Lake-only ingestion | Yes |
| Sample Queries | - |
Columns
| Column | Type | Description |
|---|---|---|
| Action | string | Action taken on the message: Blocked, Moved to quarantine |
| ActionResult | string | Result of the action |
| ActionTrigger | string | Indicates whether an action was triggered by an administrator (manually or through approval of a pending automated action), or by some special mechanism, such as a ZAP or Dynamic Delivery |
| ActionType | string | Type of activity that triggered the event: Manual remediation, Phish ZAP, Malware ZAP |
| _BilledSize | real | The record size in bytes |
| ConfidenceLevel | dynamic | List of confidence levels for each threat type identified |
| DetectionMethods | string | Methods used to detect malware, phishing, or other threats found in the message |
| _IsBillable | string | Specifies whether ingesting the data is billable. When _IsBillable is false ingestion isn't billed to your Azure account |
| IsExternalThread | bool | Indicates if there are external recipients in the thread (1) or none (0) |
| LatestDeliveryLocation | string | Last known location of the message |
| RecipientDetails | dynamic | Array of recipient data (RecipientSmtpAddress, RecipientDisplayName, RecipientType, RecipientObjectId) |
| ReportId | string | Unique identifier for the event |
| SafetyTip | string | The safety tip that has been added on a message, if any |
| SenderEmailAddress | string | Email address of the sender |
| SourceSystem | string | The type of agent the event was collected by. For example, OpsManager for Windows agent, either direct connect or Operations Manager, Linux for all Linux agents, or Azure for Azure Diagnostics |
| TeamsMessageId | string | Unique identifier for the message, as generated by Microsoft 365 |
| TenantId | string | The Log Analytics workspace ID |
| ThreatTypes | string | Verdict from the filtering stack on whether the message contains malware, phishing, or other threats |
| TimeGenerated | datetime | Date and time (UTC) when the record was generated. |
| Type | string | The name of the table |