Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
Queries for Active Directory objects, such as users, groups, devices, and domains
| Attribute | Value |
|---|---|
| Category | Security, XDR |
| Basic Logs Eligible | ✓ Yes (source) |
| Supports Transformations | ✓ Yes (source) |
| Ingestion API Supported | ✗ No |
| Azure Monitor Tables Reference | View Documentation |
| Defender XDR Advanced Hunting Schema | View Documentation |
Source: Azure Monitor documentation
| Column Name | Type | Description |
|---|---|---|
| _BilledSize | real | The record size in bytes |
| _IsBillable | string | Specifies whether ingesting the data is billable. When _IsBillable isfalseingestion isn't billed to your Azure account |
| AccountDisplayName | string | Name of the account user displayed in the address book |
| AccountDomain | string | Domain of the account |
| AccountName | string | User name of the account |
| AccountObjectId | string | Unique identifier for the account in Azure AD |
| AccountSid | string | Security Identifier (SID) of the account |
| AccountUpn | string | User principal name (UPN) of the account |
| ActionType | string | Type of activity that triggered the event |
| AdditionalFields | dynamic | Additional information about the entity or event |
| Application | string | Application that performed the recorded action |
| DestinationDeviceName | string | Name of the device running the server application that processed the recorded action |
| DestinationIPAddress | string | IP address of the device running the server application that processed the recorded action |
| DestinationPort | string | Destination port of related network communications |
| DeviceName | string | Fully qualified domain name (FQDN) of the device |
| IPAddress | string | IP address assigned to the endpoint and used during related network communications |
| Location | string | City, country, or other geographic location associated with the event |
| Port | string | TCP port used during communication |
| Protocol | string | Protocol used during the communication |
| Query | string | String used to run the query |
| QueryTarget | string | Name of user, group, device, domain, or any other entity type being queried |
| QueryType | string | Type of query, such as QueryGroup, QueryUser, or EnumerateUsers |
| ReportId | string | Unique identifier for the event |
| SourceSystem | string | The type of agent the event was collected by. For example,OpsManagerfor Windows agent, either direct connect or Operations Manager,Linuxfor all Linux agents, orAzurefor Azure Diagnostics |
| TargetAccountDisplayName | string | Display name of the account that the recorded action was applied to |
| TargetAccountUpn | string | User principal name (UPN) of the account that the recorded action was applied to |
| TargetDeviceName | string | Fully qualified domain name (FQDN) of the device that the recorded action was applied to |
| TenantId | string | The Log Analytics workspace ID |
| TimeGenerated | datetime | Date and time (UTC) when the record was generated |
| Type | string | The name of the table |
This table is used by the following solutions:
This table is ingested by the following connectors:
| Connector | Selection Criteria |
|---|---|
| Microsoft Defender XDR |
GitHub Only:
| Hunting Query | Selection Criteria |
|---|---|
| DNSPattern [Nobelium] | ActionType in "DNS query,DnsQueryResponse" |
| EncodedDomainURL [Nobelium] | ActionType in "DNS query,DnsQueryResponse" |
| MultipleLdaps | ActionType == "LDAP query" |
| MultipleSensitiveLdaps | ActionType == "LDAP query" |
| PasswordSearch | ActionType == "LDAP query" |
| Roasting | ActionType == "LDAP query" |
| SensitiveLdaps | ActionType == "LDAP query" |
| VulnComputers | ActionType == "LDAP query" |
| c2-lookup-from-nonbrowser[Nobelium] (1) | ActionType == "DNS query" |
| c2-lookup-response[Nobelium] (1) | ActionType == "DNS query" |
In solution Microsoft Defender XDR: ActionType in "LogonFailed,LogonSuccess"
| Workbook |
|---|
| MicrosoftDefenderForIdentity |
GitHub Only:
| Workbook | Selection Criteria |
|---|---|
| MicrosoftSentinelDeploymentandMigrationTracker | |
| microsoftdefenderforidentity | ActionType in "LogonFailed,LogonSuccess" |
References by type: 0 connectors, 11 content items, 0 ASIM parsers, 0 other parsers.
| Selection Criteria | Connectors | Content Items | ASIM Parsers | Other Parsers | Total |
|---|---|---|---|---|---|
ActionType == "LDAP query" |
- | 6 | - | - | 6 |
ActionType == "DNS query" |
- | 2 | - | - | 2 |
ActionType in "DNS query,DnsQueryResponse" |
- | 2 | - | - | 2 |
ActionType in "LogonFailed,LogonSuccess" |
- | 1 | - | - | 1 |
| Total | 0 | 11 | 0 | 0 | 11 |
| Value | Connectors | Content Items | ASIM Parsers | Other Parsers | Total |
|---|---|---|---|---|---|
LDAP query |
- | 6 | - | - | 6 |
DNS query |
- | 4 | - | - | 4 |
DnsQueryResponse |
- | 2 | - | - | 2 |
LogonFailed |
- | 1 | - | - | 1 |
LogonSuccess |
- | 1 | - | - | 1 |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊