Ócáid
Tóg Feidhmchláir agus Gníomhairí AI
Mar 17, 9 PM - Mar 21, 10 AM
Bí ar an tsraith meetup chun réitigh AI inscálaithe a thógáil bunaithe ar chásanna úsáide fíor-dhomhanda le forbróirí agus saineolaithe eile.
Cláraigh anoisNí thacaítear leis an mbrabhsálaí seo a thuilleadh.
Uasghrádú go Microsoft Edge chun leas a bhaint as na gnéithe is déanaí, nuashonruithe slándála, agus tacaíocht theicniúil.
Microsoft Defender for Endpoints (MDE) behaviors table. Contains information about behaviors, which in the context of Microsoft 365 Defender refers to a conclusion or insight based on one or more raw events, which can provide analysts more context in investigations.
Attribute | Value |
---|---|
Resource types | - |
Categories | Security |
Solutions | LogManagement |
Basic log | Yes |
Ingestion-time transformation | No |
Sample Queries | - |
Column | Type | Description |
---|---|---|
AccountObjectId | string | Unique identifier for the account in Azure AD. |
AccountUpn | string | User principal name (UPN) of the account. |
ActionType | string | Type of activity that triggered the event. Associated with specific MITRE ATT&CK techniques. |
AdditionalFields | string | Additional information about the entity or event. |
AttackTechniques | string | MITRE ATT&CK techniques associated with the activity that triggered the alert. Defined by the MITRE ATT&CK Matrix for Enterprise. |
BehaviorId | string | Unique identifier for the behavior. |
_BilledSize | real | The record size in bytes |
Categories | string | Types of threat indicator or breach activity identified by the alert. Defined by the MITRE ATT&CK Matrix for Enterprise. |
DataSources | string | Products or services that provided information for the behavior. |
Description | string | Description of the behavior. |
DetectionSource | string | Detection technology or sensor that identified the notable component or activity. |
DeviceId | string | Unique identifier for the device in the service. |
EndTime | datetime | Date and time of the last activity related to the behavior. |
_IsBillable | string | Specifies whether ingesting the data is billable. When _IsBillable is false ingestion isn't billed to your Azure account |
ServiceSource | string | Product or service that provided the alert information. |
SourceSystem | string | The type of agent the event was collected by. For example, OpsManager for Windows agent, either direct connect or Operations Manager, Linux for all Linux agents, or Azure for Azure Diagnostics |
StartTime | datetime | Date and time of the first activity related to the behavior. |
TenantId | string | The Log Analytics workspace ID |
TimeGenerated | datetime | Date and time when the record was generated. |
Type | string | The name of the table |
Ócáid
Tóg Feidhmchláir agus Gníomhairí AI
Mar 17, 9 PM - Mar 21, 10 AM
Bí ar an tsraith meetup chun réitigh AI inscálaithe a thógáil bunaithe ar chásanna úsáide fíor-dhomhanda le forbróirí agus saineolaithe eile.
Cláraigh anoisOiliúint
Modúl
Identify threats with Behavioral Analytics - Training
Identify threats with Behavioral Analytics
Deimhniú
Microsoft Certified: Security Operations Analyst Associate - Certifications
Investigate, search for, and mitigate threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender.