Redaguoti

Bendrinti naudojant


Advanced Security Information Model (ASIM) schemas

An Advanced Security Information Model (ASIM) schema is a set of fields that represent an activity. Using the fields from a normalized schema in a query ensures that the query will work with every normalized source.

To understand how schemas fit within the ASIM architecture, refer to the ASIM architecture diagram.

Schema references outline the fields that comprise each schema. ASIM currently defines the following schemas:

Schema Version Status
Audit Event 0.1 Preview
Authentication Event 0.1.3 Preview
DNS Activity 0.1.7 Preview
DHCP Activity 0.1 Preview
File Activity 0.2.1 Preview
Network Session 0.2.6 Preview
Process Event 0.1.4 Preview
Registry Event 0.1.2 Preview
User Management 0.1 Preview
Web Session 0.2.6 Preview

Important

ASIM schemas and parsers are currently in preview. The Azure Preview Supplemental Terms include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Schema concepts

The following concepts help to understand the schema reference documents and extend the schema in a normalized manner in case your data includes information that the schema doesn't cover.

Concept Description
Field names At the core of each schema are its field names. Field names belong to the following groups:

- Fields common to all schemas.
- Fields specific to a schema.
- Fields that represent entities, such as users, which take part in the schema. Fields that represent entities are similar across schemas.

When sources have fields that aren't presented in the documented schema, they're normalized to maintain consistency. If the extra fields represent an entity, they'll be normalized based on the entity field guidelines. Otherwise, the schemas strive to keep consistency across all schemas.

For example, while DNS server activity logs don't provide user information, DNS activity logs from an endpoint might include user information, which can be normalized according to the user entity guidelines.
Field types Each schema field has a type. The Log Analytics workspace has a limited set of data types. For this reason, Microsoft Sentinel uses a logical type for many schema fields, which Log Analytics doesn't enforce but is required for schema compatibility. Logical field types ensure that both values and field names are consistent across sources.

For more information, see Logical types.
Field class Fields might have several classes, which define when the fields should be implemented by a parser:

- Mandatory fields must appear in every parser. If your source doesn't provide information for this value, or the data can't be otherwise added, it won't support most content items that reference the normalized schema.
- Recommended fields should be normalized if available. However, they might not be available in every source. Any content item that references that normalized schema should take availability into account.
- Optional fields, if available, can be normalized or left in their original form. Typically, a minimal parser wouldn't normalize them for performance reasons.
- Conditional fields are mandatory if the field they follow is populated. Conditional fields are typically used to describe the value in another field. For example, the common field DvcIdType describes the value int the common field DvcId and is therefore mandatory if the latter is populated.
- Alias is a special type of a conditional field, and is mandatory if the aliased field is populated.
Common fields Some fields are common to all ASIM schemas. Each schema might add guidelines for using some of the common fields in the context of the specific schema. For example, permitted values for the EventType field might vary per schema, as might the value of the EventSchemaVersion field.
Entities Events evolve around entities, such as users, hosts, processes, or files. Each entity might require several fields to describe it. For example, a host might have a name and an IP address.

A single record might include multiple entities of the same type, such as both a source and destination host.

ASIM defines how to describe entities consistently, and entities allow for extending the schemas.

For example, while the Network Session schema doesn't include process information, some event sources do provide process information that can be added. For more information, see Entities.
Aliases Aliases allow multiple names for a specified value. In some cases, different users expect a field to have different names. For example, in DNS terminology, you might expect a field named DnsQuery, while more generally, it holds a domain name. The alias Domain helps the user by allowing the use of both names.

In some cases, an alias can have the value of one of several fields, depending on which values are available in the event. For example, the Dvc alias, aliases either the DvcFQDN, DvcId, DvcHostname, or DvcIpAddr , or Event Product fields. When an alias can have several values, its type has to be a string to accommodate all possible aliased values. As a result, when assigning a value to such an alias, make sure to convert the type to string using the KQL function tostring.

Native normalized tables do not include aliases, as those would imply duplicate data storage. Instead the stub parsers add the aliases. To implement aliases in parsers, create a copy of the original value by using the extend operator.

Logical types

Each schema field has a type. Some have built-in, Log Analytics types, such as string, int, datetime, or dynamic. Other fields have a Logical type, which represents how the field values should be normalized.

Data type Physical type Format and value
Boolean Bool Use the built-in KQL bool data type rather than a numerical or string representation of Boolean values.
Enumerated String A list of values as explicitly defined for the field. The schema definition lists the accepted values.
Date/Time Depending on the ingestion method capability, use any of the following physical representations in descending priority:

- Log Analytics built-in datetime type
- An integer field using Log Analytics datetime numerical representation.
- A string field using Log Analytics datetime numerical representation
- A string field storing a supported Log Analytics date/time format.
Log Analytics date and time representation is similar but different than Unix time representation. For more information, see the conversion guidelines.

Note: When applicable, the time should be time zone adjusted.
MAC address String Colon-Hexadecimal notation.
IP address String Microsoft Sentinel schemas don't have separate IPv4 and IPv6 addresses. Any IP address field might include either an IPv4 address or an IPv6 address, as follows:

- IPv4 in a dot-decimal notation.
- IPv6 in 8-hextets notation, allowing for the short form.

For example:
- IPv4: 192.168.10.10
- IPv6: FEDC:BA98:7654:3210:FEDC:BA98:7654:3210
- IPv6 short form: 1080::8:800:200C:417A
FQDN String A fully qualified domain name using a dot notation, for example, learn.microsoft.com. For more information, see The Device entity.
Hostname String A hostname which is not an FQDN, includes up to 63 characters including letters, numbers and hyphens. For more information, see The Device entity.
DomainType Enumerated The type of domain stored in domain and FQDN fields. For a list of values and more information, see The Device entity.
DvcIdType Enumerated The type of the device ID stored in DvcId fields. For a list of allowed values and further information refer to DvcIdType.
DeviceType Enumerated The type of the device stored in DeviceType fields. Possible values include:
- Computer
- Mobile Device
- IOT Device
- Other. For more information, see The Device entity.
Username String A valid username in one of the supported types. For more information, see The User entity.
UsernameType Enumerated The type of username stored in username fields. For more information and list of supported values, see The User entity.
UserIdType Enumerated The type of the ID stored in user ID fields.

Supported values are SID, UIS, AADID, OktaId, AWSId, and PUID. For more information, see The User entity.
UserType Enumerated The type of a user. For more information and list of allowed values, see The User entity.
AppType Enumerated The type of an application. Supported values include: Process
, Service, Resource, URL, SaaS application, CSP, and Other.
Country String A string using ISO 3166-1, according to the following priority:

- Alpha-2 codes, such as US for the United States.
- Alpha-3 codes, such as USA for the United States.
- Short name.

The list of codes can be found on the International Standards Organization (ISO) website.
Region String The country subdivision name, using ISO 3166-2.

The list of codes can be found on the International Standards Organization (ISO) website.
City String
Longitude Double ISO 6709 coordinate representation (signed decimal).
Latitude Double ISO 6709 coordinate representation (signed decimal).
MD5 String 32-hex characters.
SHA1 String 40-hex characters.
SHA256 String 64-hex characters.
SHA512 String 128-hex characters.

Entities

Events evolve around entities, such as users, hosts, processes, or files. Entity representation allows several entities of the same type to be part of a single record, and support multiple attributes for the same entities.

To enable entity functionality, entity representation has the following guidelines:

Guideline Description
Descriptors and aliasing Since a single event often includes more than one entity of the same type, such as source and destination hosts, descriptors are used as a prefix to identify all of the fields that are associated with a specific entity.

To maintain normalization, ASIM uses a small set of standard descriptors, picking the most appropriate ones for the specific role of the entities.

If a single entity of a type is relevant for an event, there's no need to use a descriptor. Also, a set of fields without a descriptor aliases the most used entity for each type.
Identifiers and types A normalized schema allows for several identifiers for each entity, which we expect to coexist in events. If the source event has other entity identifiers that can't be mapped to the normalized schema, keep them in the source form or use the AdditionalFields dynamic field.

To maintain the type information for the identifiers, store the type, when applicable, in a field with the same name and a suffix of Type. For example, UserIdType.
Attributes Entities often have other attributes that don't serve as an identifier and can also be qualified with a descriptor. For example, if the source user has domain information, the normalized field is SrcUserDomain.

Each schema explicitly defines the central entities and entity fields. The following guidelines enable you to understand the central schema fields, and how to extend schemas in a normalized manner by using other entities or entity fields that aren't explicitly defined in the schema.

The User entity

Users are central to activities reported by events. The fields listed in this section are used to describe the users involved in the action. Prefixes are used to designate the role of the user in the activity. The prefixes Src and Dst are used to designate the user role in network related events, in which a source system and a destination system communicate. The prefixes 'Actor' and 'Target' are used for system oriented events such as process events.

The user ID and scope

Field Class Type Description
UserId Optional String A machine-readable, alphanumeric, unique representation of the user.
UserScope Optional string The scope in which UserId and Username are defined. For example, a Microsoft Entra tenant domain name. The UserIdType field represents also the type of the associated with this field.
UserScopeId Optional string The ID of the scope in which UserId and Username are defined. For example, a Microsoft Entra tenant directory ID. The UserIdType field represents also the type of the associated with this field.
UserIdType Optional UserIdType The type of the ID stored in the UserId field.
UserSid, UserUid, UserAadId, UserOktaId, UserAWSId, UserPuid Optional String Fields used to store specific user IDs. Select the ID most associated with the event as the primary ID stored in UserId. Populate the relevant specific ID field, in addition to UserId, even if the event has only one ID.
UserAADTenant, UserAWSAccount Optional String Fields used to store specific scopes. Use the UserScope field for the scope associated with the ID stored in the UserId field. Populate the relevant specific scope field, in addition to UserScope, even if the event has only one ID.

The allowed values for a user ID type are:

Type Description Example
SID A Windows user ID. S-1-5-21-1377283216-344919071-3415362939-500
UID A Linux user ID. 4578
AADID A Microsoft Entra user ID. 9267d02c-5f76-40a9-a9eb-b686f3ca47aa
OktaId An Okta user ID. 00urjk4znu3BcncfY0h7
AWSId An AWS user ID. 72643944673
PUID A Microsoft 365 user ID. 10032001582F435C
SalesforceId A Salesforce user ID. 00530000009M943

The user name

Field Class Type Description
Username Optional String The source username, including domain information when available. Use the simple form only if domain information isn't available. Store the Username type in the UsernameType field.
UsernameType Optional UsernameType Specifies the type of the username stored in the Username field.
UserUPN, WindowsUsername, DNUsername, SimpleUsername Optional String Fields used to store additional usernames, if the original event includes multiple usernames. Select the username most associated with the event as the primary username stored in Username.

The allowed values for a username type are:

Type Description Example
UPN A UPN or Email address username designator. johndow@contoso.com
Windows A Windows username including a domain. Contoso\johndow
DN An LDAP distinguished name designator. CN=Jeff Smith,OU=Sales,DC=Fabrikam,DC=COM
Simple A simple user name without a domain designator. johndow
AWSId An AWS user ID. 72643944673

Additional user fields

Field Class Type Description
UserType Optional UserType The type of source user. Supported values include:
- Regular
- Machine
- Admin
- System
- Application
- Service Principal
- Service
- Anonymous
- Other.

The value might be provided in the source record by using different terms, which should be normalized to these values. Store the original value in the OriginalUserType field.
OriginalUserType Optional String The original destination user type, if provided by the reporting device.

The device entity

Devices, or hosts, are the common terms used for the systems that take part in the event. The Dvc prefix is used to designate the primary device on which the event occurs. Some events, such as network sessions, have source and destination devices, designated by the prefix Src and Dst. In such a case, the Dvc prefix is used for the device reporting the event, which might be the source, destination, or a monitoring device.

The device aliases

Field Class Type Description
Dvc, Src, Dst Mandatory String The Dvc, 'Src', or 'Dst' fields are used as a unique identifier of the device. It is set to the best available identified for the device. These fields can alias the FQDN, DvcId, Hostname, or IpAddr fields. For cloud sources, for which there is no apparent device, use the same value as the Event Product field.

The device name

Reported device names may include a hostname only, or a fully qualified domain name (FQDN), which includes a hostname and a domain name. The FQDN might be expressed using several formats. The following fields enable supporting the different variants in which the device name might be provided.

Field Class Type Description
Hostname Recommended Hostname The short hostname of the device.
Domain Recommended String The domain of the device on which the event occurred, without the hostname.
DomainType Recommended Enumerated The type of Domain. Supported values include FQDN and Windows. This field is required if the Domain field is used.
FQDN Optional String The FQDN of the device including both Hostname and Domain . This field supports both traditional FQDN format and Windows domain\hostname format. The DomainType field reflects the format used.

For example:

Field Value for input appserver.contoso.com value for input appserver
Hostname appserver appserver
Domain contoso.con <empty>
DomainType FQDN <empty>
FQDN appserver.contoso.com <empty>

When the value provided by the source is an FQDN, or when the value may be either and FQDN or a short hostname, the parser should calculate the 4 values. Use the ASIM helper functions _ASIM_ResolveFQDN, _ASIM_ResolveSrcFQDN, _ASIM_ResolveDstFQDN, and _ASIM_ResolveDvcFQDN to easily set all four fields based on a single input value. For more information, see ASIM helper functions.

The device ID and Scope

Field Class Type Description
DvcId Optional String The unique ID of the device . For example: 41502da5-21b7-48ec-81c9-baeea8d7d669
ScopeId Optional String The cloud platform scope ID the device belongs to. Scope map to a subscription ID on Azure and to an account ID on AWS.
Scope Optional String The cloud platform scope the device belongs to. Scope map to a subscription on Azure and to an account on AWS.
DvcIdType Optional Enumerated The type of DvcId. Typically this field will also identify the type of Scope and ScopeId. This field is required if the DvcId field is used.
DvcAzureResourceId, DvcMDEid, DvcMD4IoTid, DvcVMConnectionId, DvcVectraId, DvcAwsVpcId Optional String Fields used to store additional device IDs, if the original event includes multiple device IDs. Select the device ID most associated with the event as the primary ID stored in DvcId.

Note that fields named should prepend a role prefix such as Src or Dst, but should not prepend a second Dvc prefix if used in that role.

The allowed values for a device ID type are:

Type Description
MDEid The system ID assigned by Microsoft Defender for Endpoint.
AzureResourceId The Azure resource ID.
MD4IoTid The Microsoft Defender for IoT resource ID.
VMConnectionId The Azure Monitor VM Insights solution resource ID.
AwsVpcId An AWS VPC ID.
VectraId A Vectra AI assigned resource ID.
Other An ID type not listed above.

For example, the Azure Monitor VM Insights solution provides network sessions information in the VMConnection. The table provides an Azure Resource ID in the _ResourceId field and a VM insights specific device ID in the Machine field. Use the following mapping to represent those IDs:

Field Map to
DvcId The Machine field in the VMConnection table.
DvcIdType The value VMConnectionId
DvcAzureResourceId The _ResourceId field in the VMConnection table.

Additional device fields

Field Class Type Description
IpAddr Recommended IP address The IP address of the device.

Example: 45.21.42.12
DvcDescription Optional String A descriptive text associated with the device. For example: Primary Domain Controller.
MacAddr Optional MAC The MAC address of the device on which the event occurred or which reported the event.

Example: 00:1B:44:11:3A:B7
Zone Optional String The network on which the event occurred or which reported the event, depending on the schema. The zone is defined by the reporting device.

Example: Dmz
DvcOs Optional String The operating system running on the device on which the event occurred or which reported the event.

Example: Windows
DvcOsVersion Optional String The version of the operating system on the device on which the event occurred or which reported the event.

Example: 10
DvcAction Optional String For reporting security systems, the action taken by the system, if applicable.

Example: Blocked
DvcOriginalAction Optional String The original DvcAction as provided by the reporting device.
Interface Optional String The network interface on which data was captured. This field is typically relevant to network related activity which is captured by an intermediate or tap device.

Note that fields named in the list with the Dvc prefix should prepend a role prefix such as Src or Dst, but should not prepend a second Dvc prefix if used in that role.

Sample entity mapping

This section uses Windows event 4624 as an example to describe how the event data is normalized for Microsoft Sentinel.

This event has the following entities:

Microsoft terminology Original event field prefix ASIM field prefix Description
Subject Subject Actor The user that reported information about a successful sign-in.
New Logon Target TargetUser The user for which the sign-in was performed.
Process - ActingProcess The process that attempted the sign-in.
Network information - Src The machine from which a sign-in attempt was performed.

Based on these entities, Windows event 4624 is normalized as follows (some fields are optional):

Normalized field Original field Value in example Notes
ActorUserId SubjectUserSid S-1-5-18
ActorUserIdType - SID
ActorUserName SubjectDomainName\ SubjectUserName WORKGROUP\WIN-GG82ULGC9GO$ Built by concatenating the two fields
ActorUserNameType - Windows
ActorSessionId SubjectLogonId 0x3e7
TargetUserId TargetUserSid S-1-5-21-1377283216-344919071-3415362939-500
UserId TargetUserSid Alias
TargetUserIdType - SID
TargetUserName TargetDomainName\ TargetUserName Administrator\WIN-GG82ULGC9GO$ Built by concatenating the two fields
Username TargetDomainName\ TargetUserName Alias
TargetUserNameType - Windows
TargetSessionId TargetLogonId 0x8dcdc
ActingProcessName ProcessName C:\Windows\System32\svchost.exe
ActingProcessId ProcessId 0x44c
SrcHostname WorkstationName Windows
SrcIpAddr IpAddress 127.0.0.1
SrcPortNumber IpPort 0
TargetHostname Computer WIN-GG82ULGC9GO
Hostname Computer Alias

Next steps

This article provides an overview of normalization in Microsoft Sentinel and ASIM.

For more information, see: