0
(0)

 Important

The improved Microsoft 365 Defender portal is now available. This new experience brings Defender for Endpoint, Defender for Office 365, Microsoft 365 Defender, and more into the Microsoft 365 Defender portal. Learn what’s new.

Applies to:

  • Microsoft 365 Defender

The EmailAttachmentInfo table in the advanced hunting schema contains information about attachments on emails processed by Microsoft Defender for Office 365. Use this reference to construct queries that return information from this table.

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

 Important

Some information relates to prereleased product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

TABLE 1
Column name Data type Description
Timestamp datetime Date and time when the event was recorded
NetworkMessageId string Unique identifier for the email, generated by Microsoft 365
SenderFromAddress string Sender email address in the FROM header, which is visible to email recipients on their email clients
SenderDisplayName string Name of the sender displayed in the address book, typically a combination of a given or first name, a middle initial, and a last name or surname
SenderObjectId string Unique identifier for the sender’s account in Azure AD
RecipientEmailAddress string Email address of the recipient, or email address of the recipient after distribution list expansion
RecipientObjectId string Unique identifier for the email recipient in Azure AD
FileName string Name of the file that the recorded action was applied to
FileType string File extension type
SHA256 string SHA-256 of the file that the recorded action was applied to. This field is usually not populated — use the SHA1 column when available.
ThreatTypes string Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats
ThreatNames string Detection name for malware or other threats found
DetectionMethods string Methods used to detect malware, phishing, or other threats found in the email
ReportId long Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.
FileSize string Size of the file in bytes

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 5 times, 1 visits today)