Important
The improved Microsoft 365 Defender portal is now available. This new experience brings Defender for Endpoint, Defender for Office 365, Microsoft 365 Defender, and more into the Microsoft 365 Defender portal. Learn what’s new.
Applies to:
- Microsoft 365 Defender
Important
Some information relates to prereleased product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
The advanced hunting schema is updated regularly to add new tables and columns. In some cases, existing columns names are renamed or replaced to improve the user experience. Refer to this article to review naming changes that could impact your queries.
Naming changes are automatically applied to queries that are saved in the Defender for Cloud, including queries used by custom detection rules. You don’t need to update these queries manually. However, you will need to update the following queries:
- Queries that are run using the API
- Queries that are saved elsewhere outside the Defender for Cloud
December 2020
| Table name | Original column name | New column name | Reason for change |
|---|---|---|---|
| EmailEvents | FinalEmailAction |
EmailAction |
Customer feedback |
| EmailEvents | FinalEmailActionPolicy |
EmailActionPolicy |
Customer feedback |
| EmailEvents | FinalEmailActionPolicyGuid |
EmailActionPolicyGuid |
Customer feedback |
January 2021
| Column name | Original value name | New value name | Reason for change |
|---|---|---|---|
DetectionSource |
Defender for Cloud Apps | Microsoft Defender for Cloud Apps | Rebranding |
DetectionSource |
WindowsDefenderAtp | EDR | Rebranding |
DetectionSource |
WindowsDefenderAv | Antivirus | Rebranding |
DetectionSource |
WindowsDefenderSmartScreen | SmartScreen | Rebranding |
DetectionSource |
CustomerTI | Custom TI | Rebranding |
DetectionSource |
OfficeATP | Microsoft Defender for Office 365 | Rebranding |
DetectionSource |
MTP | Microsoft 365 Defender | Rebranding |
DetectionSource |
AzureATP | Microsoft Defender for Identity | Rebranding |
DetectionSource |
CustomDetection | Custom detection | Rebranding |
DetectionSource |
AutomatedInvestigation | Automated investigation | Rebranding |
DetectionSource |
ThreatExperts | Microsoft Threat Experts | Rebranding |
DetectionSource |
3rd party TI | 3rd Party sensors | Rebranding |
ServiceSource |
Microsoft Defender ATP | Microsoft Defender for Endpoint | Rebranding |
ServiceSource |
Microsoft Threat Protection | Microsoft 365 Defender | Rebranding |
ServiceSource |
Office 365 ATP | Microsoft Defender for Office 365 | Rebranding |
ServiceSource |
Azure ATP | Microsoft Defender for Identity | Rebranding |
DetectionSource is available in the AlertInfo table. ServiceSource is available in the AlertEvidence and AlertInfo tables.
February 2021
- In the EmailAttachmentInfo and EmailEvents tables, the
MalwareFilterVerdictandPhishFilterVerdictcolumns have been replaced by theThreatTypescolumn. TheMalwareDetectionMethodandPhishDetectionMethodcolumns were also replaced by theDetectionMethodscolumn. This streamlining allows us to provide more information under the new columns. The mapping is provided below.TABLE 3 Table name Original column name New column name Reason for change EmailAttachmentInfoMalwareDetectionMethod
PhishDetectionMethodDetectionMethodsInclude more detection methods EmailAttachmentInfoMalwareFilterVerdict
PhishFilterVerdictThreatTypesInclude more threat types EmailEventsMalwareDetectionMethod
PhishDetectionMethodDetectionMethodsInclude more detection methods EmailEventsMalwareFilterVerdict
PhishFilterVerdictThreatTypesInclude more threat types - In the
EmailAttachmentInfoandEmailEventstables, theThreatNamescolumn was added to give more information about the email threat. This column contains values like Spam or Phish. - In the DeviceInfo table, the
DeviceObjectIdcolumn was replaced by theAadDeviceIdcolumn based on customer feedback. - In the DeviceEvents table, several ActionType names were modified to better reflect the description of the action. Details of the changes can be found below.
TABLE 4 Table name Original ActionType name New ActionType name Reason for change DeviceEventsDlpPocPrintJobFilePrintedCustomer feedback DeviceEventsUsbDriveMountUsbDriveMountedCustomer feedback DeviceEventsUsbDriveUnmountUsbDriveUnmountedCustomer feedback DeviceEventsWriteProcessMemoryApiCallWriteToLsassProcessMemoryCustomer feedback
March 2021
The DeviceTvmSoftwareInventoryVulnerabilities table has been deprecated. Replacing it are the DeviceTvmSoftwareInventory and DeviceTvmSoftwareVulnerabilities tables.
May 2021
The AppFileEvents table has been deprecated. The CloudAppEvents table includes information that used to be in the AppFileEvents table, along with other activities in cloud services.