Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
Reference for BehaviorAnalytics table in Azure Monitor Logs.
| Attribute | Value |
|---|---|
| Category | Internal |
| Basic Logs Eligible | ✗ No (source) |
| Supports Transformations | ✓ Yes (source) |
| Ingestion API Supported | ✗ No |
| Azure Monitor Tables Reference | View Documentation |
Source: Azure Monitor documentation
| Column Name | Type | Description |
|---|---|---|
| _BilledSize | real | The record size in bytes |
| _IsBillable | string | Specifies whether ingesting the data is billable. When _IsBillable isfalseingestion isn't billed to your Azure account |
| _ResourceId | string | A unique identifier for the resource that the record is associated with |
| _SubscriptionId | string | A unique identifier for the subscription that the record is associated with |
| ActionType | string | The specific type of action that triggered the event. |
| ActivityInsights | dynamic | Activity and behavioral insights. |
| ActivityType | string | The activity type that triggered the event. |
| ActorName | string | The name of the user initiating the action that generated the event. |
| ActorPrincipalName | string | The principal name of the user initiating the action that generated the event. |
| DestinationDevice | string | The hostname of the destination device. |
| DestinationIPAddress | string | The destination IP address. |
| DestinationIPLocation | string | The destination Geo location based on the IP address. |
| Device | string | The name of the device on which the event occurred or which reported the event, depending on the schema. |
| DevicesInsights | dynamic | Devices metadata and insights. |
| EventProductVersion | string | The version of the product generating the event. |
| EventSource | string | Data source for this event. |
| EventVendor | string | The vendor of the product generating the event. |
| InvestigationPriority | int | Investigation priority score. |
| NativeTableName | string | The original table from which the record was fetched. |
| SourceDevice | string | The hostname of the source device. |
| SourceIPAddress | string | The source IP address. |
| SourceIPLocation | string | The source Geo location based on the IP address. |
| SourceRecordId | string | The unique Id of the source raw event. |
| SourceSystem | string | The type of agent the event was collected by. For example,OpsManagerfor Windows agent, either direct connect or Operations Manager,Linuxfor all Linux agents, orAzurefor Azure Diagnostics |
| TargetName | string | The name of the target user in the action that generated the event. |
| TargetPrincipalName | string | The name of the target user in the action that generated the event. |
| TenantId | string | The Log Analytics workspace ID |
| TimeGenerated | datetime | Time when the raw event was generated (UTC). |
| TimeProcessed | datetime | Time when enrichment processing occurred (UTC). |
| Type | string | The name of the table |
| UserName | string | User name of the account. |
| UserPrincipalName | string | User principal name of the account. |
| UsersInsights | dynamic | Users metadata and insights. |
This table is used by the following solutions:
In solution Microsoft Entra ID:
Standalone Content:
| Analytic Rule | Selection Criteria |
|---|---|
| Azure VM Run Command operation executed during suspicious login window | |
| Suspicious Sign In by Entra ID Connect Sync Account |
In solution Business Email Compromise - Financial Fraud:
In solution Cloud Identity Threat Protection Essentials:
| Hunting Query | Selection Criteria |
|---|---|
| Sign-ins From VPS Providers | |
| Sign-ins from Nord VPN Providers | |
| Suspicious Sign-ins to Privileged Account |
In solution MicrosoftPurviewInsiderRiskManagement:
| Hunting Query | Selection Criteria |
|---|---|
| Insider Risk_ISP Anomaly to Exfil | |
| Insider Risk_Multiple Entity-Based Anomalies |
In solution UEBA Essentials:
Standalone Content:
| Hunting Query | Selection Criteria |
|---|---|
| Inactive or new account signins | |
| Login attempt by Blocked MFA user |
GitHub Only:
| Hunting Query | Selection Criteria |
|---|---|
| Dormant User Update MFA and Logs In - UEBA | |
| Privileged Account Password Changes |
In solution AzureSecurityBenchmark:
| Workbook | Selection Criteria |
|---|---|
| AzureSecurityBenchmark |
In solution CybersecurityMaturityModelCertification(CMMC)2.0:
| Workbook | Selection Criteria |
|---|---|
| CybersecurityMaturityModelCertification_CMMCV2 |
In solution DPDP Compliance:
| Workbook | Selection Criteria |
|---|---|
| DPDPCompliance |
In solution GDPR Compliance & Data Security:
| Workbook | Selection Criteria |
|---|---|
| GDPRComplianceAndDataSecurity |
In solution MaturityModelForEventLogManagementM2131:
| Workbook | Selection Criteria |
|---|---|
| MaturityModelForEventLogManagement_M2131 |
In solution MicrosoftPurviewInsiderRiskManagement:
| Workbook | Selection Criteria |
|---|---|
| InsiderRiskManagement |
In solution SOC Handbook:
| Workbook | Selection Criteria |
|---|---|
| InvestigationInsights |
In solution ZeroTrust(TIC3.0):
| Workbook | Selection Criteria |
|---|---|
| ZeroTrustTIC3 |
GitHub Only:
| Workbook | Selection Criteria |
|---|---|
| DoDZeroTrustWorkbook | |
| InvestigationInsights | |
| MicrosoftSentinelDeploymentandMigrationTracker | |
| SolarWindsPostCompromiseHunting | |
| User_Analytics_Workbook | |
| ZeroTrustStrategyWorkbook |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊