DeviceLogonEvents
Note
Want to experience Microsoft 365 Defender? Learn more about how you can evaluate and pilot Microsoft 365 Defender.
Applies to:
- Microsoft 365 Defender
- Microsoft Defender for Endpoint
The DeviceLogonEvents
table in the advanced hunting schema contains information about user logons and other authentication events on devices. Use this reference to construct queries that return information from this table.
Tip
For detailed information about the events types (ActionType
values) supported by a table, use the built-in schema reference available in Microsoft 365 Defender.
For information on other tables in the advanced hunting schema, see the advanced hunting reference.
Column name | Data type | Description |
---|---|---|
Timestamp |
datetime |
Date and time when the event was recorded |
DeviceId |
string |
Unique identifier for the machine in the service |
DeviceName |
string |
Fully qualified domain name (FQDN) of the machine |
ActionType |
string |
Type of activity that triggered the event |
LogonType |
string |
Type of logon session, specifically: - Interactive - User physically interacts with the machine using the local keyboard and screen - Remote interactive (RDP) logons - User interacts with the machine remotely using Remote Desktop, Terminal Services, Remote Assistance, or other RDP clients - Network - Session initiated when the machine is accessed using PsExec or when shared resources on the machine, such as printers and shared folders, are accessed - Batch - Session initiated by scheduled tasks - Service - Session initiated by services as they start |
AccountDomain |
string |
Domain of the account |
AccountName |
string |
User name of the account |
AccountSid |
string |
Security Identifier (SID) of the account |
Protocol |
string |
Protocol used during the communication |
FailureReason |
string |
Information explaining why the recorded action failed |
IsLocalAdmin |
boolean |
Boolean indicator of whether the user is a local administrator on the machine |
LogonId |
string |
Identifier for a logon session. This identifier is unique on the same machine only between restarts |
RemoteDeviceName |
string |
Name of the machine that performed a remote operation on the affected machine. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name or a host name without domain information |
RemoteIP |
string |
IP address of the device from which the logon attempt was performed |
RemoteIPType |
string |
Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast |
RemotePort |
int |
TCP port on the remote device that was being connected to |
InitiatingProcessAccountDomain |
string |
Domain of the account that ran the process responsible for the event |
InitiatingProcessAccountName |
string |
User name of the account that ran the process responsible for the event |
InitiatingProcessAccountSid |
string |
Security Identifier (SID) of the account that ran the process responsible for the event |
InitiatingProcessAccountUpn |
string |
User principal name (UPN) of the account that ran the process responsible for the event |
InitiatingProcessAccountObjectId |
string |
Azure AD object ID of the user account that ran the process responsible for the event |
InitiatingProcessIntegrityLevel |
string |
Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources |
InitiatingProcessTokenElevation |
string |
Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event |
InitiatingProcessSHA1 |
string |
SHA-1 of the process (image file) that initiated the event |
InitiatingProcessSHA256 |
string |
SHA-256 of the process (image file) that initiated the event. This field is usually not populated—use the SHA1 column when available |
InitiatingProcessMD5 |
string |
MD5 hash of the process (image file) that initiated the event |
InitiatingProcessFileName |
string |
Name of the process that initiated the event |
InitiatingProcessFileSize |
long |
Size of the file that ran the process responsible for the event |
InitiatingProcessVersionInfoCompanyName |
string |
Company name from the version information of the process (image file) responsible for the event |
InitiatingProcessVersionInfoProductName |
string |
Product name from the version information of the process (image file) responsible for the event |
InitiatingProcessVersionInfoProductVersion |
string |
Product version from the version information of the process (image file) responsible for the event |
InitiatingProcessVersionInfoInternalFileName |
string |
Internal file name from the version information of the process (image file) responsible for the event |
InitiatingProcessVersionInfoOriginalFileName |
string |
Original file name from the version information of the process (image file) responsible for the event |
InitiatingProcessVersionInfoFileDescription |
string |
Description from the version information of the process (image file) responsible for the event |
InitiatingProcessId |
int |
Process ID (PID) of the process that initiated the event |
InitiatingProcessCommandLine |
string |
Command line used to run the process that initiated the event |
InitiatingProcessCreationTime |
datetime |
Date and time when the process that initiated the event was started |
InitiatingProcessFolderPath |
string |
Folder containing the process (image file) that initiated the event |
InitiatingProcessParentId |
int |
Process ID (PID) of the parent process that spawned the process responsible for the event |
InitiatingProcessParentFileName |
string |
Name of the parent process that spawned the process responsible for the event |
InitiatingProcessParentCreationTime |
datetime |
Date and time when the parent of the process responsible for the event was started |
ReportId |
long |
Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns |
AppGuardContainerId |
string |
Identifier for the virtualized container used by Application Guard to isolate browser activity |
AdditionalFields |
string |
Additional information about the event in JSON array format |
Note
The collection of DeviceLogonEvents is not supported on Windows 7 or Windows Server 2008R2 devices onboarded to Defender for Endpoint. We recommend upgrading to a more recent operating system for optimal visibility into user logon activity.
Related topics
Feedback
Submit and view feedback for