Edit

Share via


BehaviorInfo (Preview)

The BehaviorInfo table in the advanced hunting schema contains information about alerts from Microsoft Defender for Cloud Apps. Use this reference to construct queries that return information from this table.

Important

The BehaviorInfo table is in preview and is not available for GCC. The information here may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. Have feedback to share? Fill out our feedback form.

Behaviors are a type of data in Microsoft Defender XDR based on one or more raw events. Behaviors provide contextual insight into events and can, but not necessarily, indicate malicious activity. Read more about behaviors

This advanced hunting table is populated by records from Microsoft Defender for Cloud Apps. If your organization hasn’t deployed the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy services in Defender XDR, read Deploy supported services.

To make sure the BehaviorInfo table is populated by Microsoft Defender for Cloud Apps data:

  1. Go to the Defender portal and select Settings > Cloud apps > App connectors.
  2. In the Select Microsoft 365 components page, select the Microsoft 365 activities checkbox. For detailed instructions, see: Connect Microsoft 365 to Microsoft Defender for Cloud Apps

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

Column name Data type Description
Timestamp datetime Date and time when the record was generated
BehaviorId string Unique identifier for the behavior
ActionType string Type of behavior
Description string Description of the behavior
Categories string Type of threat indicator or breach activity identified by the behavior
AttackTechniques string MITRE ATT&CK techniques associated with the activity that triggered the behavior
ServiceSource string Product or service that identified the behavior
DetectionSource string Detection technology or sensor that identified the notable component or activity
DataSources string Products or services that provided information for the behavior
DeviceId string Unique identifier for the device in the service
AccountUpn string User principal name (UPN) of the account
AccountObjectId string Unique identifier for the account in Microsoft Entra ID
StartTime datetime Date and time of the first activity related to the behavior
EndTime datetime Date and time of the last activity related to the behavior
AdditionalFields string Additional information about the behavior

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.