[
  {
    "HasData": true,
    "Name": "AlertInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the alert",
        "Entity": "Alert",
        "Name": "AlertId",
        "Type": "String"
      },
      {
        "Description": "Title of the alert",
        "Entity": null,
        "Name": "Title",
        "Type": "String"
      },
      {
        "Description": "Type of threat indicator or breach activity identified by the alert",
        "Entity": null,
        "Name": "Category",
        "Type": "String"
      },
      {
        "Description": "Indicates the potential impact (high, medium, or low) of the threat indicator or breach activity identified by the alert",
        "Entity": null,
        "Name": "Severity",
        "Type": "String"
      },
      {
        "Description": "Product or service that provided the alert information",
        "Entity": null,
        "Name": "ServiceSource",
        "Type": "String"
      },
      {
        "Description": "Detection technology or sensor that identified the notable component or activity",
        "Entity": null,
        "Name": "DetectionSource",
        "Type": "String"
      },
      {
        "Description": "MITRE ATT&CK techniques associated with the activity that triggered the alert",
        "Entity": null,
        "Name": "AttackTechniques",
        "Type": "String"
      },
      {
        "Description": "The unique identifiers of the Microsoft Sentinel workspace this alert is associated with",
        "Entity": null,
        "Name": "SentinelWorkspaceIds",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "AlertsAndObservations",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "AlertEvidence",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the alert",
        "Entity": "Alert",
        "Name": "AlertId",
        "Type": "String"
      },
      {
        "Description": "Title of the alert",
        "Entity": null,
        "Name": "Title",
        "Type": "String"
      },
      {
        "Description": "List of categories that the information belongs to, in JSON array format",
        "Entity": null,
        "Name": "Categories",
        "Type": "String"
      },
      {
        "Description": "MITRE ATT&CK techniques associated with the activity that triggered the alert",
        "Entity": null,
        "Name": "AttackTechniques",
        "Type": "String"
      },
      {
        "Description": "Product or service that provided the alert information",
        "Entity": null,
        "Name": "ServiceSource",
        "Type": "String"
      },
      {
        "Description": "Detection technology or sensor that identified the notable component or activity",
        "Entity": null,
        "Name": "DetectionSource",
        "Type": "String"
      },
      {
        "Description": "Type of object, such as a file, a process, a device, or a user",
        "Entity": null,
        "Name": "EntityType",
        "Type": "String"
      },
      {
        "Description": "How the entity is involved in an alert, indicating whether it is impacted or is merely related",
        "Entity": null,
        "Name": "EvidenceRole",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the entity is the source or the destination of a network connection",
        "Entity": null,
        "Name": "EvidenceDirection",
        "Type": "String"
      },
      {
        "Description": "Name of the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FileName",
        "Type": "String"
      },
      {
        "Description": "Folder containing the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FolderPath",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA256",
        "Type": "String"
      },
      {
        "Description": "Size of the file in bytes",
        "Entity": null,
        "Name": "FileSize",
        "Type": "Int64"
      },
      {
        "Description": "Malware family that the suspicious or malicious file or process has been classified under",
        "Entity": null,
        "Name": "ThreatFamily",
        "Type": "String"
      },
      {
        "Description": "IP address that was being connected to",
        "Entity": "Ip",
        "Name": "RemoteIP",
        "Type": "String"
      },
      {
        "Description": "URL or fully qualified domain name (FQDN) that was being connected to",
        "Entity": "Url",
        "Name": "RemoteUrl",
        "Type": "String"
      },
      {
        "Description": "User name of the account",
        "Entity": null,
        "Name": "AccountName",
        "Type": "String"
      },
      {
        "Description": "Domain of the account",
        "Entity": null,
        "Name": "AccountDomain",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account",
        "Entity": "UserSid",
        "Name": "AccountSid",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address assigned to the local machine used during communication",
        "Entity": "Ip",
        "Name": "LocalIP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the email, generated by Microsoft 365",
        "Entity": null,
        "Name": "NetworkMessageId",
        "Type": "String"
      },
      {
        "Description": "Subject of the email",
        "Entity": null,
        "Name": "EmailSubject",
        "Type": "String"
      },
      {
        "Description": "Application that performed the recorded action",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the application",
        "Entity": null,
        "Name": "ApplicationId",
        "Type": "Int32"
      },
      {
        "Description": "Unique identifier of the third-party OAuth application",
        "Entity": null,
        "Name": "OAuthApplicationId",
        "Type": "String"
      },
      {
        "Description": "Command line used to create the new process",
        "Entity": null,
        "Name": "ProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Registry key that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryKey",
        "Type": "String"
      },
      {
        "Description": "Name of the registry value that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryValueName",
        "Type": "String"
      },
      {
        "Description": "Data of the registry value that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryValueData",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "String"
      },
      {
        "Description": "Indicates the potential impact (high, medium, or low) of the threat indicator or breach activity identified by the alert",
        "Entity": null,
        "Name": "Severity",
        "Type": "String"
      },
      {
        "Description": "Cloud resource name",
        "Entity": null,
        "Name": "CloudResource",
        "Type": "String"
      },
      {
        "Description": "The cloud platform that the resource belongs to, can be Azure, Amazon Web Services, or Google Cloud Platform",
        "Entity": null,
        "Name": "CloudPlatform",
        "Type": "String"
      },
      {
        "Description": "Type of cloud resource",
        "Entity": null,
        "Name": "ResourceType",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the cloud resource accessed",
        "Entity": null,
        "Name": "ResourceID",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the cloud service subscription",
        "Entity": null,
        "Name": "SubscriptionId",
        "Type": "String"
      },
      {
        "Description": "The unique identifiers of the Microsoft Sentinel workspace this alert is associated with",
        "Entity": null,
        "Name": "SentinelWorkspaceIds",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "AlertsAndObservations",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "IdentityInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the identity",
        "Entity": null,
        "Name": "IdentityId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "On-premises security identifier (SID) of the account",
        "Entity": "UserSid",
        "Name": "OnPremSid",
        "Type": "String"
      },
      {
        "Description": "The ad Object Id of the User",
        "Entity": null,
        "Name": "OnPremObjectId",
        "Type": "String"
      },
      {
        "Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
        "Entity": null,
        "Name": "AccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "User name of the account",
        "Entity": null,
        "Name": "AccountName",
        "Type": "String"
      },
      {
        "Description": "Domain of the account",
        "Entity": null,
        "Name": "AccountDomain",
        "Type": "String"
      },
      {
        "Description": "The criticality score of each account",
        "Entity": null,
        "Name": "CriticalityLevel",
        "Type": "Int32"
      },
      {
        "Description": "The certificate’s type. It is one of the following: Machine, Server, Intermediate, Root, TrustedPublisher or Other",
        "Entity": null,
        "Name": "Type",
        "Type": "String"
      },
      {
        "Description": "On premises distinguished name of the account user",
        "Entity": null,
        "Name": "DistinguishedName",
        "Type": "String"
      },
      {
        "Description": "Cloud security identifier of the account",
        "Entity": "UserSid",
        "Name": "CloudSid",
        "Type": "String"
      },
      {
        "Description": "Given name or first name of the account user",
        "Entity": null,
        "Name": "GivenName",
        "Type": "String"
      },
      {
        "Description": "Surname, family name, or last name of the account user",
        "Entity": null,
        "Name": "Surname",
        "Type": "String"
      },
      {
        "Description": "Name of the department that the account user belongs to",
        "Entity": null,
        "Name": "Department",
        "Type": "String"
      },
      {
        "Description": "Job title of the account user",
        "Entity": null,
        "Name": "JobTitle",
        "Type": "String"
      },
      {
        "Description": "SMTP address of the account",
        "Entity": null,
        "Name": "EmailAddress",
        "Type": "String"
      },
      {
        "Description": "Voice of over IP (VOIP) session initiation protocol (SIP) address of the account",
        "Entity": null,
        "Name": "SipProxyAddress",
        "Type": "String"
      },
      {
        "Description": "Address of the account user",
        "Entity": null,
        "Name": "Address",
        "Type": "String"
      },
      {
        "Description": "City where the client IP address is geolocated",
        "Entity": null,
        "Name": "City",
        "Type": "String"
      },
      {
        "Description": "Country/Region where the account user is located",
        "Entity": null,
        "Name": "Country",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the account is enabled or not",
        "Entity": null,
        "Name": "IsAccountEnabled",
        "Type": "Boolean"
      },
      {
        "Description": "Manager of the account user",
        "Entity": null,
        "Name": "Manager",
        "Type": "String"
      },
      {
        "Description": "Phone number of the account user",
        "Entity": null,
        "Name": "Phone",
        "Type": "String"
      },
      {
        "Description": "Date and time when the account user was created",
        "Entity": null,
        "Name": "CreatedDateTime",
        "Type": "DateTime"
      },
      {
        "Description": "The primary Identity provider of the account user",
        "Entity": null,
        "Name": "SourceProvider",
        "Type": "String"
      },
      {
        "Description": "The last source system to modify the account user",
        "Entity": null,
        "Name": "ChangeSource",
        "Type": "String"
      },
      {
        "Description": "A calculation based on the position of the user in the org tree and the user's Microsoft Entra roles and permissions. Possible values: Low, Medium, High",
        "Entity": null,
        "Name": "BlastRadius",
        "Type": "String"
      },
      {
        "Description": "The name for the company in which the user works",
        "Entity": null,
        "Name": "CompanyName",
        "Type": "String"
      },
      {
        "Description": "The date and time the user was deleted",
        "Entity": null,
        "Name": "DeletedDateTime",
        "Type": "DateTime"
      },
      {
        "Description": "The employee identifier assigned to the user by the organization",
        "Entity": null,
        "Name": "EmployeeId",
        "Type": "String"
      },
      {
        "Description": "Additional email addresses of the user",
        "Entity": null,
        "Name": "OtherMailAddresses",
        "Type": "Object"
      },
      {
        "Description": "The AAD risk level (Low/Medium/High) of the user account",
        "Entity": null,
        "Name": "RiskLevel",
        "Type": "String"
      },
      {
        "Description": "Details regarding the AAD risk level",
        "Entity": null,
        "Name": "RiskLevelDetails",
        "Type": "String"
      },
      {
        "Description": "State where the sign-in occurred, if available",
        "Entity": null,
        "Name": "State",
        "Type": "String"
      },
      {
        "Description": "Labels representing various attributes used to identify or categorize a security configuration",
        "Entity": null,
        "Name": "Tags",
        "Type": "Object"
      },
      {
        "Description": "Security attributes of the user account in the AD domain.",
        "Entity": null,
        "Name": "UserAccountControl",
        "Type": "Object"
      },
      {
        "Description": "Source providers of the accounts for the identity; possible values: ActiveDirectory, EntraID, Okta",
        "Entity": null,
        "Name": "SourceProviders",
        "Type": "Object"
      },
      {
        "Description": "Environment where the identity is used; possible values: CloudOnly, Hybrid, On-premises",
        "Entity": null,
        "Name": "IdentityEnvironment",
        "Type": "String"
      },
      {
        "Description": "A snapshot of privileged role assignment schedules and eligibility schedules for the account as maintained by Microsoft Entra Privileged Identity Management (excluding activated assignments)",
        "Entity": null,
        "Name": "PrivilegedEntraPimRoles",
        "Type": "Object"
      },
      {
        "Description": "Active roles assigned to the account",
        "Entity": null,
        "Name": "AssignedRoles",
        "Type": "Object"
      },
      {
        "Description": "Account's group membership description",
        "Entity": null,
        "Name": "GroupMembership",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "IdentityAccountInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the source provider of the account",
        "Entity": null,
        "Name": "SourceProviderAccountId",
        "Type": "String"
      },
      {
        "Description": "An identifier for the account as found by Microsoft Cloud App Security. Could be Microsoft Entra ID, user principal name, or other identifiers.",
        "Entity": null,
        "Name": "AccountId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the identity",
        "Entity": null,
        "Name": "IdentityId",
        "Type": "String"
      },
      {
        "Description": "Indicates if this account is considered as primary account for the linked identity",
        "Entity": null,
        "Name": "IsPrimary",
        "Type": "Boolean"
      },
      {
        "Description": "Type of linkage between the identity and account",
        "Entity": null,
        "Name": "IdentityLinkType",
        "Type": "String"
      },
      {
        "Description": "Reason for the linkage between the identity and account",
        "Entity": null,
        "Name": "IdentityLinkReason",
        "Type": "String"
      },
      {
        "Description": "Date and time when the identity was linked to the account",
        "Entity": null,
        "Name": "IdentityLinkTime",
        "Type": "DateTime"
      },
      {
        "Description": "Identifier of the entity that linked the identity to the account",
        "Entity": null,
        "Name": "IdentityLinkBy",
        "Type": "String"
      },
      {
        "Description": "Name of the account user displayed in the address book. Typically a combination of a given or first name, a middle initial, and a last name or surname.",
        "Entity": null,
        "Name": "DisplayName",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "SMTP address of the account",
        "Entity": null,
        "Name": "EmailAddress",
        "Type": "String"
      },
      {
        "Description": "The criticality score of each account",
        "Entity": null,
        "Name": "CriticalityLevel",
        "Type": "Int32"
      },
      {
        "Description": "The certificate’s type. It is one of the following: Machine, Server, Intermediate, Root, TrustedPublisher or Other",
        "Entity": null,
        "Name": "Type",
        "Type": "String"
      },
      {
        "Description": "Given name or first name of the account user",
        "Entity": null,
        "Name": "GivenName",
        "Type": "String"
      },
      {
        "Description": "Surname, family name, or last name of the account user",
        "Entity": null,
        "Name": "Surname",
        "Type": "String"
      },
      {
        "Description": "The employee identifier assigned to the user by the organization",
        "Entity": null,
        "Name": "EmployeeId",
        "Type": "String"
      },
      {
        "Description": "Name of the department that the account user belongs to",
        "Entity": null,
        "Name": "Department",
        "Type": "String"
      },
      {
        "Description": "Job title of the account user",
        "Entity": null,
        "Name": "JobTitle",
        "Type": "String"
      },
      {
        "Description": "Address of the account user",
        "Entity": null,
        "Name": "Address",
        "Type": "String"
      },
      {
        "Description": "City where the client IP address is geolocated",
        "Entity": null,
        "Name": "City",
        "Type": "String"
      },
      {
        "Description": "Country/Region where the account user is located",
        "Entity": null,
        "Name": "Country",
        "Type": "String"
      },
      {
        "Description": "Phone number of the account user",
        "Entity": null,
        "Name": "Phone",
        "Type": "String"
      },
      {
        "Description": "Manager of the account user",
        "Entity": null,
        "Name": "Manager",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account",
        "Entity": null,
        "Name": "Sid",
        "Type": "String"
      },
      {
        "Description": "Current status of the account",
        "Entity": null,
        "Name": "AccountStatus",
        "Type": "String"
      },
      {
        "Description": "The primary Identity provider of the account user",
        "Entity": null,
        "Name": "SourceProvider",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the instance of the source provider",
        "Entity": null,
        "Name": "SourceProviderInstanceId",
        "Type": "String"
      },
      {
        "Description": "Display name of the source provider instance",
        "Entity": null,
        "Name": "SourceProviderInstanceDisplayName",
        "Type": "String"
      },
      {
        "Description": "Authentication method used by the account",
        "Entity": null,
        "Name": "AuthenticationMethod",
        "Type": "String"
      },
      {
        "Description": "Account identifier in the authentication source system",
        "Entity": null,
        "Name": "AuthenticationSourceAccountId",
        "Type": "String"
      },
      {
        "Description": "Multi-factor authentication methods enrolled for the account",
        "Entity": null,
        "Name": "EnrolledMfas",
        "Type": "Object"
      },
      {
        "Description": "Date and time when the account password was last changed",
        "Entity": null,
        "Name": "LastPasswordChangeTime",
        "Type": "DateTime"
      },
      {
        "Description": "Account's group membership description",
        "Entity": null,
        "Name": "GroupMembership",
        "Type": "Object"
      },
      {
        "Description": "Active roles assigned to the account",
        "Entity": null,
        "Name": "AssignedRoles",
        "Type": "Object"
      },
      {
        "Description": "Roles that the account is eligible to activate",
        "Entity": null,
        "Name": "EligibleRoles",
        "Type": "Object"
      },
      {
        "Description": "The Entra Id user type. The possible values are: guest and member",
        "Entity": null,
        "Name": "TenantMembershipType",
        "Type": "String"
      },
      {
        "Description": "Date and time when the account user was created",
        "Entity": null,
        "Name": "CreatedDateTime",
        "Type": "DateTime"
      },
      {
        "Description": "The date and time the user was deleted",
        "Entity": null,
        "Name": "DeletedDateTime",
        "Type": "DateTime"
      },
      {
        "Description": "Labels representing various attributes used to identify or categorize a security configuration",
        "Entity": null,
        "Name": "Tags",
        "Type": "Object"
      },
      {
        "Description": "Risk level of the account as it appears in the source provider; possible values: Low, Medium, High",
        "Entity": null,
        "Name": "SourceProviderRiskLevel",
        "Type": "String"
      },
      {
        "Description": "Details regarding the risk level as they appear in the source provider",
        "Entity": null,
        "Name": "SourceProviderRiskLevelDetails",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "IdentityLogonEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Application that performed the recorded action",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "Type of logon session, specifically interactive, remote interactive (RDP), network, batch, and service",
        "Entity": null,
        "Name": "LogonType",
        "Type": "String"
      },
      {
        "Description": "Protocol used during the communication",
        "Entity": null,
        "Name": "Protocol",
        "Type": "String"
      },
      {
        "Description": "Information explaining why the recorded action failed",
        "Entity": null,
        "Name": "FailureReason",
        "Type": "String"
      },
      {
        "Description": "User name of the account",
        "Entity": null,
        "Name": "AccountName",
        "Type": "String"
      },
      {
        "Description": "Domain of the account",
        "Entity": null,
        "Name": "AccountDomain",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account",
        "Entity": "UserSid",
        "Name": "AccountSid",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
        "Entity": null,
        "Name": "AccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer",
        "Entity": null,
        "Name": "DeviceType",
        "Type": "String"
      },
      {
        "Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
        "Entity": null,
        "Name": "OSPlatform",
        "Type": "String"
      },
      {
        "Description": "IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts",
        "Entity": "Ip",
        "Name": "IPAddress",
        "Type": "String"
      },
      {
        "Description": "TCP port used during communication",
        "Entity": null,
        "Name": "Port",
        "Type": "Int32"
      },
      {
        "Description": "Name of the device running the server application that processed the recorded action",
        "Entity": "Machine",
        "Name": "DestinationDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the device running the server application that processed the recorded action",
        "Entity": null,
        "Name": "DestinationIPAddress",
        "Type": "String"
      },
      {
        "Description": "Destination port of the activity",
        "Entity": null,
        "Name": "DestinationPort",
        "Type": "Int32"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device that the recorded action was applied to",
        "Entity": "Machine",
        "Name": "TargetDeviceName",
        "Type": "String"
      },
      {
        "Description": "Display name of the account that the recorded action was applied to",
        "Entity": null,
        "Name": "TargetAccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "City, country, or other geographic location associated with the event",
        "Entity": null,
        "Name": "Location",
        "Type": "String"
      },
      {
        "Description": "Internet service provider associated with  the IP address",
        "Entity": null,
        "Name": "ISP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "Object"
      },
      {
        "Description": "List of features observed to be statistically uncommon for the user that performed the activity",
        "Entity": null,
        "Name": "UncommonForUser",
        "Type": "Object"
      },
      {
        "Description": "Number of days since each statistical feature for the user was last seen",
        "Entity": null,
        "Name": "LastSeenForUser",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "IdentityQueryEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Application that performed the recorded action",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "Type of the query",
        "Entity": null,
        "Name": "QueryType",
        "Type": "String"
      },
      {
        "Description": "User, group, domain, or any other entity being queried",
        "Entity": null,
        "Name": "QueryTarget",
        "Type": "String"
      },
      {
        "Description": "String used to run the query",
        "Entity": null,
        "Name": "Query",
        "Type": "String"
      },
      {
        "Description": "Protocol used during the communication",
        "Entity": null,
        "Name": "Protocol",
        "Type": "String"
      },
      {
        "Description": "User name of the account",
        "Entity": null,
        "Name": "AccountName",
        "Type": "String"
      },
      {
        "Description": "Domain of the account",
        "Entity": null,
        "Name": "AccountDomain",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account",
        "Entity": "UserSid",
        "Name": "AccountSid",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
        "Entity": null,
        "Name": "AccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts",
        "Entity": "Ip",
        "Name": "IPAddress",
        "Type": "String"
      },
      {
        "Description": "TCP port used during communication",
        "Entity": null,
        "Name": "Port",
        "Type": "Int32"
      },
      {
        "Description": "Name of the device running the server application that processed the recorded action",
        "Entity": "Machine",
        "Name": "DestinationDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the device running the server application that processed the recorded action",
        "Entity": null,
        "Name": "DestinationIPAddress",
        "Type": "String"
      },
      {
        "Description": "Destination port of the activity",
        "Entity": null,
        "Name": "DestinationPort",
        "Type": "Int32"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device that the recorded action was applied to",
        "Entity": "Machine",
        "Name": "TargetDeviceName",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account that the recorded action was applied to",
        "Entity": null,
        "Name": "TargetAccountUpn",
        "Type": "String"
      },
      {
        "Description": "Display name of the account that the recorded action was applied to",
        "Entity": null,
        "Name": "TargetAccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "City, country, or other geographic location associated with the event",
        "Entity": null,
        "Name": "Location",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "IdentityDirectoryEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Application that performed the recorded action",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account that the recorded action was applied to",
        "Entity": null,
        "Name": "TargetAccountUpn",
        "Type": "String"
      },
      {
        "Description": "Display name of the account that the recorded action was applied to",
        "Entity": null,
        "Name": "TargetAccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device that the recorded action was applied to",
        "Entity": "Machine",
        "Name": "TargetDeviceName",
        "Type": "String"
      },
      {
        "Description": "Name of the device running the server application that processed the recorded action",
        "Entity": "Machine",
        "Name": "DestinationDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the device running the server application that processed the recorded action",
        "Entity": null,
        "Name": "DestinationIPAddress",
        "Type": "String"
      },
      {
        "Description": "Destination port of the activity",
        "Entity": null,
        "Name": "DestinationPort",
        "Type": "Int32"
      },
      {
        "Description": "Protocol used during the communication",
        "Entity": null,
        "Name": "Protocol",
        "Type": "String"
      },
      {
        "Description": "User name of the account",
        "Entity": null,
        "Name": "AccountName",
        "Type": "String"
      },
      {
        "Description": "Domain of the account",
        "Entity": null,
        "Name": "AccountDomain",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account",
        "Entity": "UserSid",
        "Name": "AccountSid",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
        "Entity": null,
        "Name": "AccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts",
        "Entity": "Ip",
        "Name": "IPAddress",
        "Type": "String"
      },
      {
        "Description": "TCP port used during communication",
        "Entity": null,
        "Name": "Port",
        "Type": "Int32"
      },
      {
        "Description": "City, country, or other geographic location associated with the event",
        "Entity": null,
        "Name": "Location",
        "Type": "String"
      },
      {
        "Description": "Internet service provider associated with  the IP address",
        "Entity": null,
        "Name": "ISP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "IdentityEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in the source application",
        "Entity": null,
        "Name": "AccountId",
        "Type": "String"
      },
      {
        "Description": "Type of user account, indicating its general role like User, SystemPrincipal",
        "Entity": null,
        "Name": "AccountType",
        "Type": "String"
      },
      {
        "Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
        "Entity": null,
        "Name": "AccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "Alternate Id, email or name for the account in the source application",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event in the raw format received from the source application",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Result of the action",
        "Entity": null,
        "Name": "ActionResult",
        "Type": "String"
      },
      {
        "Description": "Information explaining why the recorded action failed",
        "Entity": null,
        "Name": "ActionFailureReason",
        "Type": "String"
      },
      {
        "Description": "IP address assigned to the device and used during related network communications",
        "Entity": "Ip",
        "Name": "IPAddress",
        "Type": "String"
      },
      {
        "Description": "User agent information from the web browser or other client application",
        "Entity": null,
        "Name": "UserAgent",
        "Type": "String"
      },
      {
        "Description": "List of the target objects of this activity. Target object can be user, group, role, domain, application and more.",
        "Entity": null,
        "Name": "TargetObjects",
        "Type": "Object"
      },
      {
        "Description": "The source application where this event was received from",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "Domain of the source application",
        "Entity": null,
        "Name": "ApplicationInstanceId",
        "Type": "String"
      },
      {
        "Description": "Raw event ID provided by the source application",
        "Entity": null,
        "Name": "ApplicationEventId",
        "Type": "String"
      },
      {
        "Description": "Raw session ID provided by the source application",
        "Entity": null,
        "Name": "ApplicationSessionId",
        "Type": "String"
      },
      {
        "Description": "Full raw event information from the source application or service in JSON format",
        "Entity": null,
        "Name": "RawEventData",
        "Type": "Object"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "CloudAppEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Application that performed the recorded action",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the application",
        "Entity": null,
        "Name": "ApplicationId",
        "Type": "Int32"
      },
      {
        "Description": "Unique identifier for the instance of an application",
        "Entity": null,
        "Name": "AppInstanceId",
        "Type": "Int32"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "An identifier for the account as found by Microsoft Cloud App Security. Could be Microsoft Entra ID, user principal name, or other identifiers.",
        "Entity": null,
        "Name": "AccountId",
        "Type": "String"
      },
      {
        "Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
        "Entity": null,
        "Name": "AccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the activity was performed by an administrator",
        "Entity": null,
        "Name": "IsAdminOperation",
        "Type": "Boolean"
      },
      {
        "Description": "Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer",
        "Entity": null,
        "Name": "DeviceType",
        "Type": "String"
      },
      {
        "Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
        "Entity": null,
        "Name": "OSPlatform",
        "Type": "String"
      },
      {
        "Description": "IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts",
        "Entity": "Ip",
        "Name": "IPAddress",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the IP address belongs to a known anonymous proxy",
        "Entity": null,
        "Name": "IsAnonymousProxy",
        "Type": "Boolean"
      },
      {
        "Description": "Two-letter code indicating the country where the client IP address is geolocated",
        "Entity": null,
        "Name": "CountryCode",
        "Type": "String"
      },
      {
        "Description": "City where the client IP address is geolocated",
        "Entity": null,
        "Name": "City",
        "Type": "String"
      },
      {
        "Description": "Internet service provider associated with  the IP address",
        "Entity": null,
        "Name": "ISP",
        "Type": "String"
      },
      {
        "Description": "User agent information from the web browser or other client application",
        "Entity": null,
        "Name": "UserAgent",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActivityType",
        "Type": "String"
      },
      {
        "Description": "List of objects, such as files or folders, that were involved in the recorded activity",
        "Entity": null,
        "Name": "ActivityObjects",
        "Type": "Object"
      },
      {
        "Description": "Name of the object that the recorded action was applied to",
        "Entity": null,
        "Name": "ObjectName",
        "Type": "String"
      },
      {
        "Description": "The type of object, such as a file or a folder, that the recorded action was applied to",
        "Entity": null,
        "Name": "ObjectType",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the object that the recorded action was applied to, in case of files it includes the extension",
        "Entity": null,
        "Name": "ObjectId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Type of user account, indicating its general role and access levels, such as Regular, System, Admin, Application",
        "Entity": null,
        "Name": "AccountType",
        "Type": "String"
      },
      {
        "Description": "Indicates whether a user inside the network does not belong to the organization’s domain",
        "Entity": null,
        "Name": "IsExternalUser",
        "Type": "Boolean"
      },
      {
        "Description": "Indicates whether the activity was performed by one user on behalf of another (impersonated) user",
        "Entity": null,
        "Name": "IsImpersonated",
        "Type": "Boolean"
      },
      {
        "Description": "Customer-defined information applied to specific IP addresses and IP address ranges",
        "Entity": null,
        "Name": "IPTags",
        "Type": "Object"
      },
      {
        "Description": "Additional information about the IP address",
        "Entity": null,
        "Name": "IPCategory",
        "Type": "String"
      },
      {
        "Description": "More information provided by Microsoft Cloud App Security in a tag in the user agent field. Can have any of the following values: Native client, Outdated browser, Outdated operating system, Robot",
        "Entity": null,
        "Name": "UserAgentTags",
        "Type": "Object"
      },
      {
        "Description": "Full raw event information from the source application or service in JSON format",
        "Entity": null,
        "Name": "RawEventData",
        "Type": "Object"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "Object"
      },
      {
        "Description": "Session identifiers (if provided by the audit source)",
        "Entity": null,
        "Name": "SessionData",
        "Type": "Object"
      },
      {
        "Description": "Cloud enviorment source of the cloud audit event. Cloud be Azure, AWS, GCP, AliCloud or other",
        "Entity": null,
        "Name": "AuditSource",
        "Type": "String"
      },
      {
        "Description": "A unique identifier that's assigned to an application when it’s registered to Entra with OAuth 2.0.",
        "Entity": null,
        "Name": "OAuthAppId",
        "Type": "String"
      },
      {
        "Description": "List of features observed to be statistically uncommon for the user that performed the activity",
        "Entity": null,
        "Name": "UncommonForUser",
        "Type": "Object"
      },
      {
        "Description": "Number of days since each statistical feature for the user was last seen",
        "Entity": null,
        "Name": "LastSeenForUser",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "AIAgentsInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the agent as assigned to it in Copilot Studio",
        "Entity": null,
        "Name": "AIAgentId",
        "Type": "String"
      },
      {
        "Description": "Display name of the agent",
        "Entity": null,
        "Name": "AIAgentName",
        "Type": "String"
      },
      {
        "Description": "Date and time when the agent was created",
        "Entity": null,
        "Name": "AgentCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "User principal name (UPN) of the account that created the agent",
        "Entity": null,
        "Name": "CreatorAccountUpn",
        "Type": "String"
      },
      {
        "Description": "User principal names (UPN) of all the owners of the agent",
        "Entity": null,
        "Name": "OwnerAccountUpns",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account that last modified that agent",
        "Entity": null,
        "Name": "LastModifiedByUpn",
        "Type": "String"
      },
      {
        "Description": "Date and time the item or related metadata was last modified",
        "Entity": null,
        "Name": "LastModifiedTime",
        "Type": "DateTime"
      },
      {
        "Description": "Date and time when the agent was last published",
        "Entity": null,
        "Name": "LastPublishedTime",
        "Type": "DateTime"
      },
      {
        "Description": "Description of the agent as displayed in the agent's source",
        "Entity": null,
        "Name": "AgentDescription",
        "Type": "String"
      },
      {
        "Description": "Status of the agent",
        "Entity": null,
        "Name": "AgentStatus",
        "Type": "String"
      },
      {
        "Description": "Details about the knowledge sources added to the agent",
        "Entity": null,
        "Name": "KnowledgeDetails",
        "Type": "Object"
      },
      {
        "Description": "List of triggers that makes an autonomous agent take action",
        "Entity": null,
        "Name": "AgentActionTriggers",
        "Type": "String"
      },
      {
        "Description": "Contents of the raw JSON that describes the agent and contains configuration details, as received from the provider",
        "Entity": null,
        "Name": "RawAgentInfo",
        "Type": "String"
      },
      {
        "Description": "The agent's configured authentication type for users interacting with the agent; possible values: None, Microsoft, Custom.",
        "Entity": null,
        "Name": "UserAuthenticationType",
        "Type": "String"
      },
      {
        "Description": "Indicates when authentication is triggered for the agent; possible values: Unspecified, None, Integrated, Custom Azure Active Directory, Generic OAuth2",
        "Entity": null,
        "Name": "AuthenticationTrigger",
        "Type": "String"
      },
      {
        "Description": "Users that can interact with the agent; possible values: Any, Copilot readers, Group membership, Any (multitenant)",
        "Entity": null,
        "Name": "AccessControlPolicy",
        "Type": "String"
      },
      {
        "Description": "List of Azure Active Directory Group IDs that are allowed to interact with the agent",
        "Entity": null,
        "Name": "AuthorizedSecurityGroupIds",
        "Type": "Object"
      },
      {
        "Description": "Specifications of the topics that the agent can perform",
        "Entity": null,
        "Name": "AgentTopicsDetails",
        "Type": "Object"
      },
      {
        "Description": "Specifications of the tools that the agent can access and perform actions on",
        "Entity": null,
        "Name": "AgentToolsDetails",
        "Type": "Object"
      },
      {
        "Description": "The identifier of the Microsoft Power Platform environment the agent resides in.",
        "Entity": null,
        "Name": "EnvironmentId",
        "Type": "String"
      },
      {
        "Description": "The platform that provided the information about the agents; possible values: Copilot Studio",
        "Entity": null,
        "Name": "Platform",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the agent uses generative orchestration (that is, dynamically chooses tools, knowledge, and actions based on context) to operate.",
        "Entity": null,
        "Name": "IsGenerativeOrchestrationEnabled",
        "Type": "Boolean"
      },
      {
        "Description": "The unique app identifier registered for the agent in Microsoft Entra.",
        "Entity": null,
        "Name": "AgentAppId",
        "Type": "String"
      },
      {
        "Description": "Lists the schema names of connected agents, which are independently managed agents that are linked to the main one for orchestration.",
        "Entity": null,
        "Name": "ConnectedAgentsSchemaNames",
        "Type": "Object"
      },
      {
        "Description": "Lists the schema names of the child agents that exist within the main agent.",
        "Entity": null,
        "Name": "ChildAgentsSchemaNames",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "EmailEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the email, generated by Microsoft 365",
        "Entity": null,
        "Name": "NetworkMessageId",
        "Type": "String"
      },
      {
        "Description": "Public-facing identifier for the email that is set by the sending email system",
        "Entity": null,
        "Name": "InternetMessageId",
        "Type": "String"
      },
      {
        "Description": "Sender email address in the MAIL FROM header, also known as the envelope sender or the Return-Path address",
        "Entity": null,
        "Name": "SenderMailFromAddress",
        "Type": "String"
      },
      {
        "Description": "Sender email address in the FROM header, which is visible to email recipients on their email clients",
        "Entity": null,
        "Name": "SenderFromAddress",
        "Type": "String"
      },
      {
        "Description": "Name of the sender displayed in the address book, typically a combination of a given or first name, a middle initial, and a last name or surname",
        "Entity": null,
        "Name": "SenderDisplayName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the sender’s account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "SenderObjectId",
        "Type": "String"
      },
      {
        "Description": "Sender domain in the MAIL FROM header, also known as the envelope sender or the Return-Path address",
        "Entity": null,
        "Name": "SenderMailFromDomain",
        "Type": "String"
      },
      {
        "Description": "Sender domain in the FROM header, which is visible to email recipients on their email clients",
        "Entity": null,
        "Name": "SenderFromDomain",
        "Type": "String"
      },
      {
        "Description": "IPv4 address of the last detected mail server that relayed the message",
        "Entity": null,
        "Name": "SenderIPv4",
        "Type": "String"
      },
      {
        "Description": "IPv6 address of the last detected mail server that relayed the message",
        "Entity": null,
        "Name": "SenderIPv6",
        "Type": "String"
      },
      {
        "Description": "Email address of the recipient, or email address of the recipient after distribution list expansion",
        "Entity": null,
        "Name": "RecipientEmailAddress",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the email recipient in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "RecipientObjectId",
        "Type": "String"
      },
      {
        "Description": "Subject of the email",
        "Entity": null,
        "Name": "Subject",
        "Type": "String"
      },
      {
        "Description": "Identifier for the group of similar emails clustered based on heuristic analysis of their contents",
        "Entity": null,
        "Name": "EmailClusterId",
        "Type": "Int64"
      },
      {
        "Description": "Direction of the email relative to your network:  Inbound, Outbound, Intra-org",
        "Entity": null,
        "Name": "EmailDirection",
        "Type": "String"
      },
      {
        "Description": "Delivery action of the email: Delivered, Junked, Blocked, or Replaced",
        "Entity": null,
        "Name": "DeliveryAction",
        "Type": "String"
      },
      {
        "Description": "Location where the email was delivered: Inbox/Folder, On-premises/External, Junk, Quarantine, Failed, Dropped, Deleted items",
        "Entity": null,
        "Name": "DeliveryLocation",
        "Type": "String"
      },
      {
        "Description": "Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats",
        "Entity": null,
        "Name": "ThreatTypes",
        "Type": "String"
      },
      {
        "Description": "Detection name for malware or other threats found",
        "Entity": null,
        "Name": "ThreatNames",
        "Type": "String"
      },
      {
        "Description": "Methods used to detect malware, phishing, or other threats found in the email",
        "Entity": null,
        "Name": "DetectionMethods",
        "Type": "String"
      },
      {
        "Description": "List of confidence levels of any spam or phishing verdicts. For spam, this column shows the spam confidence level (SCL), indicating if the email was skipped (-1), found to be not spam (0,1), found to be spam with moderate confidence (5,6), or found to be spam with high confidence (9). For phishing, this column displays whether the confidence level is \"High\" or \"Low\".",
        "Entity": null,
        "Name": "ConfidenceLevel",
        "Type": "String"
      },
      {
        "Description": "Threshold assigned to email from bulk mailers, a high bulk complain level (BCL) means the email is more likely to generate complaints, and thus more likely to be spam",
        "Entity": null,
        "Name": "BulkComplaintLevel",
        "Type": "Int32"
      },
      {
        "Description": "Final action taken on the email based on filter verdict, policies, and user actions:  Move message to junk mail folder, Add X-header, Modify subject, Redirect message, Delete message, send to quarantine, No action taken, Bcc message",
        "Entity": null,
        "Name": "EmailAction",
        "Type": "String"
      },
      {
        "Description": "Action policy that took effect: Antispam high-confidence, Antispam, Antispam bulk mail, Antispam phishing, Anti-phishing domain impersonation, Anti-phishing user impersonation, Anti-phishing spoof, Anti-phishing graph impersonation, Antimalware Safe Attachments, Enterprise Transport Rules (ETR)",
        "Entity": null,
        "Name": "EmailActionPolicy",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the policy that determined the final mail action",
        "Entity": null,
        "Name": "EmailActionPolicyGuid",
        "Type": "String"
      },
      {
        "Description": "List of pass or fail verdicts by email authentication protocols like DMARC, DKIM, SPF or a combination of multiple authentication types (CompAuth)",
        "Entity": null,
        "Name": "AuthenticationDetails",
        "Type": "String"
      },
      {
        "Description": "Number of attachments in the email",
        "Entity": null,
        "Name": "AttachmentCount",
        "Type": "Int32"
      },
      {
        "Description": "Number of embedded URLs in the email",
        "Entity": null,
        "Name": "UrlCount",
        "Type": "Int32"
      },
      {
        "Description": "Detected language of the email content",
        "Entity": null,
        "Name": "EmailLanguage",
        "Type": "String"
      },
      {
        "Description": "Custom instructions that define organizational mail flow and how the email was routed",
        "Entity": null,
        "Name": "Connectors",
        "Type": "String"
      },
      {
        "Description": "Action taken on the email in response to matches to a policy defined at the organizational level",
        "Entity": null,
        "Name": "OrgLevelAction",
        "Type": "String"
      },
      {
        "Description": "Organizational policy that triggered the action taken on the email",
        "Entity": null,
        "Name": "OrgLevelPolicy",
        "Type": "String"
      },
      {
        "Description": "Action taken on the email in response to matches to a mailbox policy defined by the recipient",
        "Entity": null,
        "Name": "UserLevelAction",
        "Type": "String"
      },
      {
        "Description": "End user mailbox policy that triggered the action taken on the email",
        "Entity": null,
        "Name": "UserLevelPolicy",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "String"
      },
      {
        "Description": "Mail flow rules (also known as transport rules) are similar to Inbox rules that are available in Outlook and Outlook on the web. The main difference is mail flow rules take action on messages while they're in transit.",
        "Entity": null,
        "Name": "ExchangeTransportRule",
        "Type": "String"
      },
      {
        "Description": "Name of distribution list that the recipient was a member of and to which the email was sent, if applicable; shows top-level distribution list if nested lists are involved",
        "Entity": null,
        "Name": "DistributionList",
        "Type": "String"
      },
      {
        "Description": "A JSON array of forwarding details including the forwarding user and the forwarding type",
        "Entity": null,
        "Name": "ForwardingInformation",
        "Type": "String"
      },
      {
        "Description": "Configuration context data of the machine",
        "Entity": null,
        "Name": "Context",
        "Type": "String"
      },
      {
        "Description": "Indicates the addresses which are listed in To fields of an email",
        "Entity": null,
        "Name": "To",
        "Type": "Object"
      },
      {
        "Description": "Indicates the addresses which are listed in Cc fields of an email",
        "Entity": null,
        "Name": "Cc",
        "Type": "Object"
      },
      {
        "Description": "Indicates the threat classification of the mail",
        "Entity": null,
        "Name": "ThreatClassification",
        "Type": "String"
      },
      {
        "Description": "Domain of the recipient of the email.",
        "Entity": null,
        "Name": "RecipientDomain",
        "Type": "String"
      },
      {
        "Description": "Size of the email message.",
        "Entity": null,
        "Name": "EmailSize",
        "Type": "Int64"
      },
      {
        "Description": "Is this the first contact between sender and reciever.",
        "Entity": null,
        "Name": "IsFirstContact",
        "Type": "Boolean"
      },
      {
        "Description": "Last known location of the email.",
        "Entity": null,
        "Name": "LatestDeliveryLocation",
        "Type": "String"
      },
      {
        "Description": "Last known action attempted on an email by the service or by an admin through manual remediation. ",
        "Entity": null,
        "Name": "LatestDeliveryAction",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Emails",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "EmailAttachmentInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the email, generated by Microsoft 365",
        "Entity": null,
        "Name": "NetworkMessageId",
        "Type": "String"
      },
      {
        "Description": "Sender email address in the FROM header, which is visible to email recipients on their email clients",
        "Entity": null,
        "Name": "SenderFromAddress",
        "Type": "String"
      },
      {
        "Description": "Name of the sender displayed in the address book, typically a combination of a given or first name, a middle initial, and a last name or surname",
        "Entity": null,
        "Name": "SenderDisplayName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the sender’s account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "SenderObjectId",
        "Type": "String"
      },
      {
        "Description": "Email address of the recipient, or email address of the recipient after distribution list expansion",
        "Entity": null,
        "Name": "RecipientEmailAddress",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the email recipient in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "RecipientObjectId",
        "Type": "String"
      },
      {
        "Description": "Name of the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FileName",
        "Type": "String"
      },
      {
        "Description": "File extension type",
        "Entity": null,
        "Name": "FileType",
        "Type": "String"
      },
      {
        "Description": "SHA-256 of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA256",
        "Type": "String"
      },
      {
        "Description": "Size of the file in bytes",
        "Entity": null,
        "Name": "FileSize",
        "Type": "Int64"
      },
      {
        "Description": "Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats",
        "Entity": null,
        "Name": "ThreatTypes",
        "Type": "String"
      },
      {
        "Description": "Detection name for malware or other threats found",
        "Entity": null,
        "Name": "ThreatNames",
        "Type": "String"
      },
      {
        "Description": "Methods used to detect malware, phishing, or other threats found in the email",
        "Entity": null,
        "Name": "DetectionMethods",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "File extension of the attachment.",
        "Entity": null,
        "Name": "FileExtension",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Emails",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "EmailUrlInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the email, generated by Microsoft 365",
        "Entity": null,
        "Name": "NetworkMessageId",
        "Type": "String"
      },
      {
        "Description": "Full Url from email",
        "Entity": "Url",
        "Name": "Url",
        "Type": "String"
      },
      {
        "Description": "Domain name or host name of the URL",
        "Entity": null,
        "Name": "UrlDomain",
        "Type": "String"
      },
      {
        "Description": "Indicates which part of the email the URL is located",
        "Entity": null,
        "Name": "UrlLocation",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the root url",
        "Entity": null,
        "Name": "UrlChainId",
        "Type": "String"
      },
      {
        "Description": "Position of a url in a nested url list",
        "Entity": null,
        "Name": "UrlChainPosition",
        "Type": "Int32"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Emails",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "EmailPostDeliveryEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the email, generated by Microsoft 365",
        "Entity": null,
        "Name": "NetworkMessageId",
        "Type": "String"
      },
      {
        "Description": "Public-facing identifier for the email that is set by the sending email system",
        "Entity": null,
        "Name": "InternetMessageId",
        "Type": "String"
      },
      {
        "Description": "Action taken on the entity",
        "Entity": null,
        "Name": "Action",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Indicates whether an action was triggered by an administrator (manually or through approval of a pending automated action), or by some special mechanism, such as a ZAP or Dynamic Delivery",
        "Entity": null,
        "Name": "ActionTrigger",
        "Type": "String"
      },
      {
        "Description": "Result of the action",
        "Entity": null,
        "Name": "ActionResult",
        "Type": "String"
      },
      {
        "Description": "Email address of the recipient, or email address of the recipient after distribution list expansion",
        "Entity": null,
        "Name": "RecipientEmailAddress",
        "Type": "String"
      },
      {
        "Description": "Location where the email was delivered: Inbox/Folder, On-premises/External, Junk, Quarantine, Failed, Dropped, Deleted items",
        "Entity": null,
        "Name": "DeliveryLocation",
        "Type": "String"
      },
      {
        "Description": "Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats",
        "Entity": null,
        "Name": "ThreatTypes",
        "Type": "String"
      },
      {
        "Description": "Methods used to detect malware, phishing, or other threats found in the email",
        "Entity": null,
        "Name": "DetectionMethods",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Sender email address in the FROM header, which is visible to email recipients on their email clients",
        "Entity": null,
        "Name": "SenderFromAddress",
        "Type": "String"
      },
      {
        "Description": "Direction of the email relative to your network:  Inbound, Outbound, Intra-org",
        "Entity": null,
        "Name": "EmailDirection",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Emails",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "MessageEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Date and time when the message was last edited",
        "Entity": null,
        "Name": "LastEditedTime",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the message generated by Office 365",
        "Entity": null,
        "Name": "TeamsMessageId",
        "Type": "String"
      },
      {
        "Description": "Email address of the sender",
        "Entity": null,
        "Name": "SenderEmailAddress",
        "Type": "String"
      },
      {
        "Description": "Name of the sender displayed in the address book, typically a combination of a first name, a middle initial, and a last name or surname",
        "Entity": null,
        "Name": "SenderDisplayName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the sender’s account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "SenderObjectId",
        "Type": "String"
      },
      {
        "Description": "Type of user that sent the message, for example, User, Group, Anonymous",
        "Entity": null,
        "Name": "SenderType",
        "Type": "String"
      },
      {
        "Description": "Array of recipient data (RecipientSmtpAddress, RecipientDisplayName, RecipientType, RecipientObjectId)",
        "Entity": null,
        "Name": "RecipientDetails",
        "Type": "Object"
      },
      {
        "Description": "Boolean value indicating whether the message is owned by your organization or not (only the messages owned by your organization are remediable)",
        "Entity": null,
        "Name": "IsOwnedThread",
        "Type": "Boolean"
      },
      {
        "Description": "Identifier for the message",
        "Entity": null,
        "Name": "MessageId",
        "Type": "String"
      },
      {
        "Description": "Identifier for the message that the current message was a reply to, otherwise this is the same as the MessageId",
        "Entity": null,
        "Name": "ParentMessageId",
        "Type": "String"
      },
      {
        "Description": "Identifier for the team or group that the message was sent to",
        "Entity": null,
        "Name": "GroupId",
        "Type": "String"
      },
      {
        "Description": "Name of the team or group that the message was sent to",
        "Entity": null,
        "Name": "GroupName",
        "Type": "String"
      },
      {
        "Description": "Identifier of the channel or chat thread that the message is part of ",
        "Entity": null,
        "Name": "ThreadId",
        "Type": "String"
      },
      {
        "Description": "Name of the channel or chat thread that the message is part of ",
        "Entity": null,
        "Name": "ThreadName",
        "Type": "String"
      },
      {
        "Description": "Type of the channel or chat thread that the message is part of ",
        "Entity": null,
        "Name": "ThreadType",
        "Type": "String"
      },
      {
        "Description": "Indicates the channel type, possible values: None, PrivateChannel",
        "Entity": null,
        "Name": "ThreadSubType",
        "Type": "String"
      },
      {
        "Description": "Indicates if there are external recipients in the thread",
        "Entity": null,
        "Name": "IsExternalThread",
        "Type": "Boolean"
      },
      {
        "Description": "Type of message format possible values: RichText, Text ",
        "Entity": null,
        "Name": "MessageType",
        "Type": "String"
      },
      {
        "Description": "Subtype of message format, for exmaple, HTML",
        "Entity": null,
        "Name": "MessageSubtype",
        "Type": "String"
      },
      {
        "Description": "Version number of the message",
        "Entity": null,
        "Name": "MessageVersion",
        "Type": "String"
      },
      {
        "Description": "Subject of the message, if it exists",
        "Entity": null,
        "Name": "Subject",
        "Type": "String"
      },
      {
        "Description": "Verdict from the filtering stack on whether the message contains malware, phishing, or other threats",
        "Entity": null,
        "Name": "ThreatTypes",
        "Type": "String"
      },
      {
        "Description": "Methods used to detect malware, phishing, or other threats found in the message",
        "Entity": null,
        "Name": "DetectionMethods",
        "Type": "Object"
      },
      {
        "Description": "List of confidence levels for each threat type identified",
        "Entity": null,
        "Name": "ConfidenceLevel",
        "Type": "Object"
      },
      {
        "Description": "Delivery action of the message: Delivered, Blocked",
        "Entity": null,
        "Name": "DeliveryAction",
        "Type": "String"
      },
      {
        "Description": "Location of the message at the time of delivery",
        "Entity": null,
        "Name": "DeliveryLocation",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Indicates if a safe tip has been added on the message",
        "Entity": null,
        "Name": "SafetyTip",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Emails",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "MessageUrlInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the message generated by Office 365",
        "Entity": null,
        "Name": "TeamsMessageId",
        "Type": "String"
      },
      {
        "Description": "URL from message",
        "Entity": "Url",
        "Name": "Url",
        "Type": "String"
      },
      {
        "Description": "Domain name or host name of the URL",
        "Entity": null,
        "Name": "UrlDomain",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Emails",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "MessagePostDeliveryEvents",
    "Schema": [
      {
        "Description": "Date and time when the event was recorded",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the message generated by Office 365",
        "Entity": null,
        "Name": "TeamsMessageId",
        "Type": "String"
      },
      {
        "Description": "Action taken on the message",
        "Entity": null,
        "Name": "Action",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Indicates whether an action was triggered by an administrator (manually or through approval of a pending automated action), or by some special mechanism, such as a ZAP or Dynamic Delivery",
        "Entity": null,
        "Name": "ActionTrigger",
        "Type": "String"
      },
      {
        "Description": "Result of the action",
        "Entity": null,
        "Name": "ActionResult",
        "Type": "String"
      },
      {
        "Description": "Email address of the sender",
        "Entity": null,
        "Name": "SenderEmailAddress",
        "Type": "String"
      },
      {
        "Description": "Array of recipient data (RecipientSmtpAddress, RecipientDisplayName, RecipientType, RecipientObjectId)",
        "Entity": null,
        "Name": "RecipientDetails",
        "Type": "Object"
      },
      {
        "Description": "Indicates if there are external recipients in the thread",
        "Entity": null,
        "Name": "IsExternalThread",
        "Type": "Boolean"
      },
      {
        "Description": "Verdict from the filtering stack on whether the message contains malware, phishing, or other threats",
        "Entity": null,
        "Name": "ThreatTypes",
        "Type": "String"
      },
      {
        "Description": "List of confidence levels of any spam or phishing verdicts. For spam, this column shows the spam confidence level (SCL), indicating if the email was skipped (-1), found to be not spam (0,1), found to be spam with moderate confidence (5,6), or found to be spam with high confidence (9). For phishing, this column displays whether the confidence level is \"High\" or \"Low\".",
        "Entity": null,
        "Name": "ConfidenceLevel",
        "Type": "Object"
      },
      {
        "Description": "Methods used to detect malware, phishing, or other threats found in the email",
        "Entity": null,
        "Name": "DetectionMethods",
        "Type": "Object"
      },
      {
        "Description": "Last known location of the message",
        "Entity": null,
        "Name": "LatestDeliveryLocation",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Indicates if a safe tip has been added on the message",
        "Entity": null,
        "Name": "SafetyTip",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Emails",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "UrlClickEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "URL that was clicked",
        "Entity": "Url",
        "Name": "Url",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "The Microsoft 365 service where the event occurred",
        "Entity": null,
        "Name": "Workload",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the email from which the URL was clicked",
        "Entity": null,
        "Name": "NetworkMessageId",
        "Type": "String"
      },
      {
        "Description": "Verdict on whether the URL leads to malware, phishing, or other threats",
        "Entity": null,
        "Name": "ThreatTypes",
        "Type": "String"
      },
      {
        "Description": "Methods used to detect whether the URL contains or leads to malware, phishing, or other threats",
        "Entity": null,
        "Name": "DetectionMethods",
        "Type": "String"
      },
      {
        "Description": "IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts",
        "Entity": "Ip",
        "Name": "IPAddress",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the user was able to click through to the original URL or not",
        "Entity": null,
        "Name": "IsClickedThrough",
        "Type": "Boolean"
      },
      {
        "Description": "List of URLs in the redirection chain",
        "Entity": null,
        "Name": "UrlChain",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "The application's display name as exposed by the associated service principal",
        "Entity": null,
        "Name": "AppName",
        "Type": "String"
      },
      {
        "Description": "Version of the client application where click occurred",
        "Entity": null,
        "Name": "AppVersion",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the source of the click",
        "Entity": null,
        "Name": "SourceId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Emails",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "FileMaliciousContentInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "The Microsoft 365 service where the event occurred",
        "Entity": null,
        "Name": "Workload",
        "Type": "String"
      },
      {
        "Description": "Name of the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FileName",
        "Type": "String"
      },
      {
        "Description": "Folder containing the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FolderPath",
        "Type": "String"
      },
      {
        "Description": "Size of the file in bytes",
        "Entity": null,
        "Name": "FileSize",
        "Type": "Int64"
      },
      {
        "Description": "SHA-256 of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA256",
        "Type": "String"
      },
      {
        "Description": "Account recorded as owner of the file",
        "Entity": null,
        "Name": "FileOwnerDisplayName",
        "Type": "String"
      },
      {
        "Description": "Account recorded as owner of the file",
        "Entity": null,
        "Name": "FileOwnerUpn",
        "Type": "String"
      },
      {
        "Description": "Account that last modified this file",
        "Entity": null,
        "Name": "LastModifyingAccountUpn",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the file",
        "Entity": null,
        "Name": "DocumentID",
        "Type": "String"
      },
      {
        "Description": "Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats",
        "Entity": null,
        "Name": "ThreatTypes",
        "Type": "String"
      },
      {
        "Description": "Detection name for malware or other threats found",
        "Entity": null,
        "Name": "ThreatNames",
        "Type": "String"
      },
      {
        "Description": "Methods used to detect malware, phishing, or other threats found in the email",
        "Entity": null,
        "Name": "DetectionMethods",
        "Type": "Object"
      },
      {
        "Description": "Date and time the item or related metadata was last modified",
        "Entity": null,
        "Name": "LastModifiedTime",
        "Type": "DateTime"
      },
      {
        "Description": "Timestamp of the file creation",
        "Entity": null,
        "Name": "FileCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Emails",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "CampaignInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Name of the email campaign",
        "Entity": null,
        "Name": "CampaignName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the campaign, generated by Office 365",
        "Entity": null,
        "Name": "CampaignId",
        "Type": "String"
      },
      {
        "Description": "Category of the campaign",
        "Entity": null,
        "Name": "CampaignType",
        "Type": "String"
      },
      {
        "Description": "Contains more details about the campaign, like the brand being phished or related malware campaigns, if available",
        "Entity": null,
        "Name": "CampaignSubType",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the email, generated by Microsoft 365",
        "Entity": null,
        "Name": "NetworkMessageId",
        "Type": "String"
      },
      {
        "Description": "Email address of the recipient, or email address of the recipient after distribution list expansion",
        "Entity": null,
        "Name": "RecipientEmailAddress",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Emails",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Version of the endpoint agent or sensor running on the machine",
        "Entity": null,
        "Name": "ClientVersion",
        "Type": "String"
      },
      {
        "Description": "Public IP address used by the onboarded machine to connect to the Windows Defender ATP service. This could be the IP address of the machine itself, a NAT device, or a proxy",
        "Entity": "Ip",
        "Name": "PublicIP",
        "Type": "String"
      },
      {
        "Description": "Architecture of the operating system running on the machine",
        "Entity": null,
        "Name": "OSArchitecture",
        "Type": "String"
      },
      {
        "Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
        "Entity": null,
        "Name": "OSPlatform",
        "Type": "String"
      },
      {
        "Description": "Build version of the operating system running on the machine",
        "Entity": null,
        "Name": "OSBuild",
        "Type": "Int64"
      },
      {
        "Description": "Boolean indicator of whether machine is joined to the Microsoft Entra ID",
        "Entity": null,
        "Name": "IsAzureADJoined",
        "Type": "Boolean"
      },
      {
        "Description": "The device's Microsoft Entra ID join type",
        "Entity": null,
        "Name": "JoinType",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Entra ID",
        "Entity": null,
        "Name": "AadDeviceId",
        "Type": "String"
      },
      {
        "Description": "List of all users that are logged on the machine at the time of the event in JSON array format",
        "Entity": null,
        "Name": "LoggedOnUsers",
        "Type": "String"
      },
      {
        "Description": "Device tag added through the registry",
        "Entity": null,
        "Name": "RegistryDeviceTag",
        "Type": "String"
      },
      {
        "Description": "Version of the operating system running on the machine",
        "Entity": null,
        "Name": "OSVersion",
        "Type": "String"
      },
      {
        "Description": "Machine group of the machine. This group is used by role-based access control to determine access to the machine",
        "Entity": null,
        "Name": "MachineGroup",
        "Type": "String"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      },
      {
        "Description": "Indicates whether the device is currently onboarded or not to Microsoft Defender For Endpoint or if the device is not supported",
        "Entity": null,
        "Name": "OnboardingStatus",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "String"
      },
      {
        "Description": "Broader classification that groups certain device types under the following categories: Endpoint, Network device, IoT, Unknown",
        "Entity": null,
        "Name": "DeviceCategory",
        "Type": "String"
      },
      {
        "Description": "Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer",
        "Entity": null,
        "Name": "DeviceType",
        "Type": "String"
      },
      {
        "Description": "Additional modifier for certain types of devices; for example, a mobile device can be a tablet or a smartphone; only available if device discovery finds enough information about this attribute",
        "Entity": null,
        "Name": "DeviceSubtype",
        "Type": "String"
      },
      {
        "Description": "Model name or number of the product from the vendor or manufacturer; only available if device discovery finds enough information about this attribute",
        "Entity": null,
        "Name": "Model",
        "Type": "String"
      },
      {
        "Description": "Name of the product vendor or manufacturer; only available if device discovery finds enough information about this attribute",
        "Entity": null,
        "Name": "Vendor",
        "Type": "String"
      },
      {
        "Description": "Distribution of the OS platform, such as Ubuntu or RedHat for Linux platforms",
        "Entity": null,
        "Name": "OSDistribution",
        "Type": "String"
      },
      {
        "Description": "Additional information about the OS version, such as the popular name, code name, or version number",
        "Entity": null,
        "Name": "OSVersionInfo",
        "Type": "String"
      },
      {
        "Description": "Previous device IDs that have been assigned to the same device.",
        "Entity": null,
        "Name": "MergedDeviceIds",
        "Type": "String"
      },
      {
        "Description": "The most recent device ID assigned to a device ",
        "Entity": null,
        "Name": "MergedToDeviceId",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the device is internet-facing",
        "Entity": null,
        "Name": "IsInternetFacing",
        "Type": "Boolean"
      },
      {
        "Description": "Indicates health of the device’s EDR sensor, if onboarded to Microsoft Defender For Endpoint",
        "Entity": null,
        "Name": "SensorHealthState",
        "Type": "String"
      },
      {
        "Description": "Determines if the device is excluded from different views and reports in the portal",
        "Entity": null,
        "Name": "IsExcluded",
        "Type": "Boolean"
      },
      {
        "Description": "The reason for the device being excluded",
        "Entity": null,
        "Name": "ExclusionReason",
        "Type": "String"
      },
      {
        "Description": "The device's level of vulnerability to exploitation based on its exposure score; can be: Low, Medium, High",
        "Entity": null,
        "Name": "ExposureLevel",
        "Type": "String"
      },
      {
        "Description": "Priority or value assigned to the device in relation to its importance in computing the organization's exposure score; can be: Low, Normal (Default), High",
        "Entity": null,
        "Name": "AssetValue",
        "Type": "String"
      },
      {
        "Description": "Device tags created manually using the portal UI or public API",
        "Entity": null,
        "Name": "DeviceManualTags",
        "Type": "String"
      },
      {
        "Description": "Device tags added and removed dynamically based on dynamic rules",
        "Entity": null,
        "Name": "DeviceDynamicTags",
        "Type": "String"
      },
      {
        "Description": "Universally Unique Identifier (UUID) of the device’s hardware",
        "Entity": null,
        "Name": "HardwareUuid",
        "Type": "String"
      },
      {
        "Description": "The cloud platforms that the device belongs to—can be Azure, Amazon Web Services, Google Cloud Platform and Azure Arc",
        "Entity": null,
        "Name": "CloudPlatforms",
        "Type": "String"
      },
      {
        "Description": "Unique identifier assigned to the device in Azure",
        "Entity": null,
        "Name": "AzureVmId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the Azure resource associated with the device.",
        "Entity": null,
        "Name": "AzureResourceId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the Azure subscription associated with the device",
        "Entity": null,
        "Name": "AzureVmSubscriptionId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier specific to Google Cloud Platform devices, containing a combination of zone and ID",
        "Entity": null,
        "Name": "GcpFullResourceName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier specific to Amazon Web Services devices, containing the Amazon Resource Name",
        "Entity": null,
        "Name": "AwsResourceName",
        "Type": "String"
      },
      {
        "Description": "Indicates whether this device is classified as short-lived or transient based on the frequency of appearance of the device on the network",
        "Entity": null,
        "Name": "IsTransient",
        "Type": "Boolean"
      },
      {
        "Description": "Build revision number of the operating system running on the machine",
        "Entity": null,
        "Name": "OsBuildRevision",
        "Type": "String"
      },
      {
        "Description": "Device ID of the device running Windows Subsystem for Linux",
        "Entity": null,
        "Name": "HostDeviceId",
        "Type": "String"
      },
      {
        "Description": "Indicates the mitigation action applied to a device",
        "Entity": null,
        "Name": "MitigationStatus",
        "Type": "String"
      },
      {
        "Description": "Type of connectivity from the device to the cloud",
        "Entity": null,
        "Name": "ConnectivityType",
        "Type": "String"
      },
      {
        "Description": "Products or services that have seen or reported the device, including when they last reported it",
        "Entity": null,
        "Name": "DiscoverySources",
        "Type": "String"
      },
      {
        "Description": "The firmware versions of the device",
        "Entity": null,
        "Name": "FirmwareVersions",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceNetworkInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Name of the network adapter",
        "Entity": null,
        "Name": "NetworkAdapterName",
        "Type": "String"
      },
      {
        "Description": "MAC address of the network adapter",
        "Entity": null,
        "Name": "MacAddress",
        "Type": "String"
      },
      {
        "Description": "Network adapter type",
        "Entity": null,
        "Name": "NetworkAdapterType",
        "Type": "String"
      },
      {
        "Description": "Operational status of the network adapter",
        "Entity": null,
        "Name": "NetworkAdapterStatus",
        "Type": "String"
      },
      {
        "Description": "Tunneling protocol, if the interface is used for this purpose, for example 6to4, Teredo, ISATAP, PPTP, SSTP, and SSH",
        "Entity": null,
        "Name": "TunnelType",
        "Type": "String"
      },
      {
        "Description": "Networks that the adapter is connected to. Each JSON element in the array contains the network name, category (public, private or domain), a description, and a flag indicating if it’s connected publicly to the internet",
        "Entity": null,
        "Name": "ConnectedNetworks",
        "Type": "String"
      },
      {
        "Description": "DNS server addresses in JSON array format",
        "Entity": null,
        "Name": "DnsAddresses",
        "Type": "String"
      },
      {
        "Description": "IPv4 address of DHCP server",
        "Entity": "Ip",
        "Name": "IPv4Dhcp",
        "Type": "String"
      },
      {
        "Description": "IPv6 address of DHCP server",
        "Entity": "Ip",
        "Name": "IPv6Dhcp",
        "Type": "String"
      },
      {
        "Description": "Default gateway addresses in JSON array format",
        "Entity": null,
        "Name": "DefaultGateways",
        "Type": "String"
      },
      {
        "Description": "JSON array containing all the IP addresses assigned to the adapter, along with their respective subnet prefix and the IP class (RFC 1918 & RFC 4291)",
        "Entity": null,
        "Name": "IPAddresses",
        "Type": "String"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      },
      {
        "Description": "Name of the manufacturer or vendor of the network adapter",
        "Entity": null,
        "Name": "NetworkAdapterVendor",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceProcessEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Name of the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FileName",
        "Type": "String"
      },
      {
        "Description": "Folder containing the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FolderPath",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA256",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "MD5",
        "Type": "String"
      },
      {
        "Description": "Size of the file in bytes",
        "Entity": null,
        "Name": "FileSize",
        "Type": "Int64"
      },
      {
        "Description": "Company name from the version information of the newly created process",
        "Entity": null,
        "Name": "ProcessVersionInfoCompanyName",
        "Type": "String"
      },
      {
        "Description": "Product name from the version information of the newly created process",
        "Entity": null,
        "Name": "ProcessVersionInfoProductName",
        "Type": "String"
      },
      {
        "Description": "Product version from the version information of the newly created process",
        "Entity": null,
        "Name": "ProcessVersionInfoProductVersion",
        "Type": "String"
      },
      {
        "Description": "Internal file name from the version information of the newly created process",
        "Entity": null,
        "Name": "ProcessVersionInfoInternalFileName",
        "Type": "String"
      },
      {
        "Description": "Original file name from the version information of the newly created process",
        "Entity": null,
        "Name": "ProcessVersionInfoOriginalFileName",
        "Type": "String"
      },
      {
        "Description": "Description from the version information of the newly created process",
        "Entity": null,
        "Name": "ProcessVersionInfoFileDescription",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the newly created process",
        "Entity": null,
        "Name": "ProcessId",
        "Type": "Int64"
      },
      {
        "Description": "Command line used to create the new process",
        "Entity": null,
        "Name": "ProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Integrity level of the newly created process. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet downloaded. These integrity levels influence permissions to resources.",
        "Entity": null,
        "Name": "ProcessIntegrityLevel",
        "Type": "String"
      },
      {
        "Description": "Indicates the type of token elevation applied to the newly created process. Possible values: TokenElevationTypeLimited (restricted), TokenElevationTypeDefault (standard), and TokenElevationTypeFull (elevated)",
        "Entity": null,
        "Name": "ProcessTokenElevation",
        "Type": "String"
      },
      {
        "Description": "Date and time the process was created",
        "Entity": null,
        "Name": "ProcessCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Domain of the account",
        "Entity": null,
        "Name": "AccountDomain",
        "Type": "String"
      },
      {
        "Description": "User name of the account",
        "Entity": null,
        "Name": "AccountName",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account",
        "Entity": "UserSid",
        "Name": "AccountSid",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "Identifier for a logon session. This identifier is unique on the same machine only between restarts",
        "Entity": null,
        "Name": "LogonId",
        "Type": "Int64"
      },
      {
        "Description": "Domain of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountDomain",
        "Type": "String"
      },
      {
        "Description": "User name of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountName",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
        "Entity": "UserSid",
        "Name": "InitiatingProcessAccountSid",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountUpn",
        "Type": "String"
      },
      {
        "Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
        "Entity": "UserObjectId",
        "Name": "InitiatingProcessAccountObjectId",
        "Type": "String"
      },
      {
        "Description": "Identifier for a logon session of the process that initiated the event. This identifier is unique on the same machine only between restarts.",
        "Entity": null,
        "Name": "InitiatingProcessLogonId",
        "Type": "Int64"
      },
      {
        "Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
        "Entity": null,
        "Name": "InitiatingProcessIntegrityLevel",
        "Type": "String"
      },
      {
        "Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessTokenElevation",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessSHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
        "Entity": "File",
        "Name": "InitiatingProcessSHA256",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessMD5",
        "Type": "String"
      },
      {
        "Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
        "Entity": null,
        "Name": "InitiatingProcessFileName",
        "Type": "String"
      },
      {
        "Description": "Size of the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFileSize",
        "Type": "Int64"
      },
      {
        "Description": "Company name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoCompanyName",
        "Type": "String"
      },
      {
        "Description": "Product name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductName",
        "Type": "String"
      },
      {
        "Description": "Product version from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductVersion",
        "Type": "String"
      },
      {
        "Description": "Internal file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoInternalFileName",
        "Type": "String"
      },
      {
        "Description": "Original file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoOriginalFileName",
        "Type": "String"
      },
      {
        "Description": "Description from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoFileDescription",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessId",
        "Type": "Int64"
      },
      {
        "Description": "Command line used to run the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Date and time when the process that initiated the event was started",
        "Entity": null,
        "Name": "InitiatingProcessCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Folder containing the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFolderPath",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentId",
        "Type": "Int64"
      },
      {
        "Description": "Name of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentFileName",
        "Type": "String"
      },
      {
        "Description": "Date and time when the parent of the process responsible for the event was started",
        "Entity": null,
        "Name": "InitiatingProcessParentCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Type of file signer of the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessSignerType",
        "Type": "String"
      },
      {
        "Description": "Information about the signature status of the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessSignatureStatus",
        "Type": "String"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      },
      {
        "Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
        "Entity": null,
        "Name": "AppGuardContainerId",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "String"
      },
      {
        "Description": "Windows session ID of the initiating process",
        "Entity": null,
        "Name": "InitiatingProcessSessionId",
        "Type": "Int64"
      },
      {
        "Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
        "Entity": null,
        "Name": "IsInitiatingProcessRemoteSession",
        "Type": "Boolean"
      },
      {
        "Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Machine",
        "Name": "InitiatingProcessRemoteSessionDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Ip",
        "Name": "InitiatingProcessRemoteSessionIP",
        "Type": "String"
      },
      {
        "Description": "Windows session ID of the created process",
        "Entity": null,
        "Name": "CreatedProcessSessionId",
        "Type": "Int64"
      },
      {
        "Description": "Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
        "Entity": null,
        "Name": "IsProcessRemoteSession",
        "Type": "Boolean"
      },
      {
        "Description": "Device name of the remote device from which the created process’s RDP session was initiated",
        "Entity": "Machine",
        "Name": "ProcessRemoteSessionDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the remote device from which the created process’s RDP session was initiated",
        "Entity": "Ip",
        "Name": "ProcessRemoteSessionIP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the process; this is equal to the Process Start Key in Windows devices",
        "Entity": null,
        "Name": "ProcessUniqueId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
        "Entity": null,
        "Name": "InitiatingProcessUniqueId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceNetworkEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "IP address that was being connected to",
        "Entity": "Ip",
        "Name": "RemoteIP",
        "Type": "String"
      },
      {
        "Description": "TCP port on the remote device that was being connected to",
        "Entity": null,
        "Name": "RemotePort",
        "Type": "Int32"
      },
      {
        "Description": "URL or fully qualified domain name (FQDN) that was being connected to",
        "Entity": "Url",
        "Name": "RemoteUrl",
        "Type": "String"
      },
      {
        "Description": "IP address assigned to the local machine used during communication",
        "Entity": "Ip",
        "Name": "LocalIP",
        "Type": "String"
      },
      {
        "Description": "TCP port on the local machine used during communication",
        "Entity": null,
        "Name": "LocalPort",
        "Type": "Int32"
      },
      {
        "Description": "Protocol used during the communication",
        "Entity": null,
        "Name": "Protocol",
        "Type": "String"
      },
      {
        "Description": "Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast",
        "Entity": null,
        "Name": "LocalIPType",
        "Type": "String"
      },
      {
        "Description": "Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast",
        "Entity": null,
        "Name": "RemoteIPType",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessSHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
        "Entity": "File",
        "Name": "InitiatingProcessSHA256",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessMD5",
        "Type": "String"
      },
      {
        "Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
        "Entity": null,
        "Name": "InitiatingProcessFileName",
        "Type": "String"
      },
      {
        "Description": "Size of the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFileSize",
        "Type": "Int64"
      },
      {
        "Description": "Company name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoCompanyName",
        "Type": "String"
      },
      {
        "Description": "Product name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductName",
        "Type": "String"
      },
      {
        "Description": "Product version from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductVersion",
        "Type": "String"
      },
      {
        "Description": "Internal file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoInternalFileName",
        "Type": "String"
      },
      {
        "Description": "Original file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoOriginalFileName",
        "Type": "String"
      },
      {
        "Description": "Description from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoFileDescription",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessId",
        "Type": "Int64"
      },
      {
        "Description": "Command line used to run the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Date and time when the process that initiated the event was started",
        "Entity": null,
        "Name": "InitiatingProcessCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Folder containing the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFolderPath",
        "Type": "String"
      },
      {
        "Description": "Name of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentFileName",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentId",
        "Type": "Int64"
      },
      {
        "Description": "Date and time when the parent of the process responsible for the event was started",
        "Entity": null,
        "Name": "InitiatingProcessParentCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Domain of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountDomain",
        "Type": "String"
      },
      {
        "Description": "User name of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountName",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
        "Entity": "UserSid",
        "Name": "InitiatingProcessAccountSid",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountUpn",
        "Type": "String"
      },
      {
        "Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
        "Entity": "UserObjectId",
        "Name": "InitiatingProcessAccountObjectId",
        "Type": "String"
      },
      {
        "Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
        "Entity": null,
        "Name": "InitiatingProcessIntegrityLevel",
        "Type": "String"
      },
      {
        "Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessTokenElevation",
        "Type": "String"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      },
      {
        "Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
        "Entity": null,
        "Name": "AppGuardContainerId",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "String"
      },
      {
        "Description": "Windows session ID of the initiating process",
        "Entity": null,
        "Name": "InitiatingProcessSessionId",
        "Type": "Int64"
      },
      {
        "Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
        "Entity": null,
        "Name": "IsInitiatingProcessRemoteSession",
        "Type": "Boolean"
      },
      {
        "Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Machine",
        "Name": "InitiatingProcessRemoteSessionDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Ip",
        "Name": "InitiatingProcessRemoteSessionIP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
        "Entity": null,
        "Name": "InitiatingProcessUniqueId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceFileEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Name of the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FileName",
        "Type": "String"
      },
      {
        "Description": "Folder containing the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FolderPath",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA256",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "MD5",
        "Type": "String"
      },
      {
        "Description": "URL where the file was downloaded from",
        "Entity": "Url",
        "Name": "FileOriginUrl",
        "Type": "String"
      },
      {
        "Description": "URL of the web page that links to the downloaded file",
        "Entity": "Url",
        "Name": "FileOriginReferrerUrl",
        "Type": "String"
      },
      {
        "Description": "IP address where the file was downloaded from",
        "Entity": "Ip",
        "Name": "FileOriginIP",
        "Type": "String"
      },
      {
        "Description": "Original folder containing the file before the recorded action was applied",
        "Entity": null,
        "Name": "PreviousFolderPath",
        "Type": "String"
      },
      {
        "Description": "Original name of the file that was renamed as a result of the action",
        "Entity": null,
        "Name": "PreviousFileName",
        "Type": "String"
      },
      {
        "Description": "Size of the file in bytes",
        "Entity": null,
        "Name": "FileSize",
        "Type": "Int64"
      },
      {
        "Description": "Domain of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountDomain",
        "Type": "String"
      },
      {
        "Description": "User name of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountName",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
        "Entity": "UserSid",
        "Name": "InitiatingProcessAccountSid",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountUpn",
        "Type": "String"
      },
      {
        "Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
        "Entity": "UserObjectId",
        "Name": "InitiatingProcessAccountObjectId",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessMD5",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessSHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
        "Entity": "File",
        "Name": "InitiatingProcessSHA256",
        "Type": "String"
      },
      {
        "Description": "Folder containing the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFolderPath",
        "Type": "String"
      },
      {
        "Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
        "Entity": null,
        "Name": "InitiatingProcessFileName",
        "Type": "String"
      },
      {
        "Description": "Size of the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFileSize",
        "Type": "Int64"
      },
      {
        "Description": "Company name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoCompanyName",
        "Type": "String"
      },
      {
        "Description": "Product name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductName",
        "Type": "String"
      },
      {
        "Description": "Product version from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductVersion",
        "Type": "String"
      },
      {
        "Description": "Internal file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoInternalFileName",
        "Type": "String"
      },
      {
        "Description": "Original file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoOriginalFileName",
        "Type": "String"
      },
      {
        "Description": "Description from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoFileDescription",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessId",
        "Type": "Int64"
      },
      {
        "Description": "Command line used to run the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Date and time when the process that initiated the event was started",
        "Entity": null,
        "Name": "InitiatingProcessCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
        "Entity": null,
        "Name": "InitiatingProcessIntegrityLevel",
        "Type": "String"
      },
      {
        "Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessTokenElevation",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentId",
        "Type": "Int64"
      },
      {
        "Description": "Name of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentFileName",
        "Type": "String"
      },
      {
        "Description": "Date and time when the parent of the process responsible for the event was started",
        "Entity": null,
        "Name": "InitiatingProcessParentCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Network protocol, if applicable, used to initiate the activity: Unknown, Local, SMB, or NFS",
        "Entity": null,
        "Name": "RequestProtocol",
        "Type": "String"
      },
      {
        "Description": "IPv4 or IPv6 address of the remote device that initiated the activity",
        "Entity": null,
        "Name": "RequestSourceIP",
        "Type": "String"
      },
      {
        "Description": "Source port on the remote device that initiated the activity",
        "Entity": null,
        "Name": "RequestSourcePort",
        "Type": "Int32"
      },
      {
        "Description": "User name of account used to remotely initiate the activity",
        "Entity": null,
        "Name": "RequestAccountName",
        "Type": "String"
      },
      {
        "Description": "Domain of the account used to remotely initiate the activity",
        "Entity": null,
        "Name": "RequestAccountDomain",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account used to remotely initiate the activity",
        "Entity": "UserSid",
        "Name": "RequestAccountSid",
        "Type": "String"
      },
      {
        "Description": "Name of shared folder containing the file",
        "Entity": null,
        "Name": "ShareName",
        "Type": "String"
      },
      {
        "Description": "Label applied to an email, file, or other content to classify it for information protection",
        "Entity": null,
        "Name": "SensitivityLabel",
        "Type": "String"
      },
      {
        "Description": "Sublabel applied to an email, file, or other content to classify it for information protection; sensitivity sublabels are grouped under sensitivity labels but are treated independently",
        "Entity": null,
        "Name": "SensitivitySubLabel",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the file is encrypted by Azure Information Protection",
        "Entity": null,
        "Name": "IsAzureInfoProtectionApplied",
        "Type": "Boolean"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      },
      {
        "Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
        "Entity": null,
        "Name": "AppGuardContainerId",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "String"
      },
      {
        "Description": "Windows session ID of the initiating process",
        "Entity": null,
        "Name": "InitiatingProcessSessionId",
        "Type": "Int64"
      },
      {
        "Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
        "Entity": null,
        "Name": "IsInitiatingProcessRemoteSession",
        "Type": "Boolean"
      },
      {
        "Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Machine",
        "Name": "InitiatingProcessRemoteSessionDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Ip",
        "Name": "InitiatingProcessRemoteSessionIP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
        "Entity": null,
        "Name": "InitiatingProcessUniqueId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceRegistryEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Registry key that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryKey",
        "Type": "String"
      },
      {
        "Description": "Data type, such as binary or string, of the registry value that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryValueType",
        "Type": "String"
      },
      {
        "Description": "Name of the registry value that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryValueName",
        "Type": "String"
      },
      {
        "Description": "Data of the registry value that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryValueData",
        "Type": "String"
      },
      {
        "Description": "Original registry key before it was modified",
        "Entity": null,
        "Name": "PreviousRegistryKey",
        "Type": "String"
      },
      {
        "Description": "Original name of the registry value before it was modified",
        "Entity": null,
        "Name": "PreviousRegistryValueName",
        "Type": "String"
      },
      {
        "Description": "Original data of the registry value before it was modified",
        "Entity": null,
        "Name": "PreviousRegistryValueData",
        "Type": "String"
      },
      {
        "Description": "Domain of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountDomain",
        "Type": "String"
      },
      {
        "Description": "User name of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountName",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
        "Entity": "UserSid",
        "Name": "InitiatingProcessAccountSid",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountUpn",
        "Type": "String"
      },
      {
        "Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
        "Entity": "UserObjectId",
        "Name": "InitiatingProcessAccountObjectId",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessSHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
        "Entity": "File",
        "Name": "InitiatingProcessSHA256",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessMD5",
        "Type": "String"
      },
      {
        "Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
        "Entity": null,
        "Name": "InitiatingProcessFileName",
        "Type": "String"
      },
      {
        "Description": "Size of the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFileSize",
        "Type": "Int64"
      },
      {
        "Description": "Company name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoCompanyName",
        "Type": "String"
      },
      {
        "Description": "Product name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductName",
        "Type": "String"
      },
      {
        "Description": "Product version from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductVersion",
        "Type": "String"
      },
      {
        "Description": "Internal file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoInternalFileName",
        "Type": "String"
      },
      {
        "Description": "Original file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoOriginalFileName",
        "Type": "String"
      },
      {
        "Description": "Description from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoFileDescription",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessId",
        "Type": "Int64"
      },
      {
        "Description": "Command line used to run the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Date and time when the process that initiated the event was started",
        "Entity": null,
        "Name": "InitiatingProcessCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Folder containing the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFolderPath",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentId",
        "Type": "Int64"
      },
      {
        "Description": "Name of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentFileName",
        "Type": "String"
      },
      {
        "Description": "Date and time when the parent of the process responsible for the event was started",
        "Entity": null,
        "Name": "InitiatingProcessParentCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
        "Entity": null,
        "Name": "InitiatingProcessIntegrityLevel",
        "Type": "String"
      },
      {
        "Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessTokenElevation",
        "Type": "String"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      },
      {
        "Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
        "Entity": null,
        "Name": "AppGuardContainerId",
        "Type": "String"
      },
      {
        "Description": "Windows session ID of the initiating process",
        "Entity": null,
        "Name": "InitiatingProcessSessionId",
        "Type": "Int64"
      },
      {
        "Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
        "Entity": null,
        "Name": "IsInitiatingProcessRemoteSession",
        "Type": "Boolean"
      },
      {
        "Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Machine",
        "Name": "InitiatingProcessRemoteSessionDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Ip",
        "Name": "InitiatingProcessRemoteSessionIP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
        "Entity": null,
        "Name": "InitiatingProcessUniqueId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceLogonEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Type of logon session, specifically interactive, remote interactive (RDP), network, batch, and service",
        "Entity": null,
        "Name": "LogonType",
        "Type": "String"
      },
      {
        "Description": "Domain of the account",
        "Entity": null,
        "Name": "AccountDomain",
        "Type": "String"
      },
      {
        "Description": "User name of the account",
        "Entity": null,
        "Name": "AccountName",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account",
        "Entity": "UserSid",
        "Name": "AccountSid",
        "Type": "String"
      },
      {
        "Description": "Protocol used during the communication",
        "Entity": null,
        "Name": "Protocol",
        "Type": "String"
      },
      {
        "Description": "Information explaining why the recorded action failed",
        "Entity": null,
        "Name": "FailureReason",
        "Type": "String"
      },
      {
        "Description": "Boolean indicator of whether the user is a local administrator on the machine",
        "Entity": null,
        "Name": "IsLocalAdmin",
        "Type": "Boolean"
      },
      {
        "Description": "Identifier for a logon session. This identifier is unique on the same machine only between restarts",
        "Entity": null,
        "Name": "LogonId",
        "Type": "Int64"
      },
      {
        "Description": "Name of the device that performed a remote operation on the affected machine. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name, or a host name without domain information.",
        "Entity": "Machine",
        "Name": "RemoteDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address that was being connected to",
        "Entity": "Ip",
        "Name": "RemoteIP",
        "Type": "String"
      },
      {
        "Description": "Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast",
        "Entity": null,
        "Name": "RemoteIPType",
        "Type": "String"
      },
      {
        "Description": "TCP port on the remote device that was being connected to",
        "Entity": null,
        "Name": "RemotePort",
        "Type": "Int32"
      },
      {
        "Description": "Domain of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountDomain",
        "Type": "String"
      },
      {
        "Description": "User name of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountName",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
        "Entity": "UserSid",
        "Name": "InitiatingProcessAccountSid",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountUpn",
        "Type": "String"
      },
      {
        "Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
        "Entity": "UserObjectId",
        "Name": "InitiatingProcessAccountObjectId",
        "Type": "String"
      },
      {
        "Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
        "Entity": null,
        "Name": "InitiatingProcessIntegrityLevel",
        "Type": "String"
      },
      {
        "Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessTokenElevation",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessSHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
        "Entity": "File",
        "Name": "InitiatingProcessSHA256",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessMD5",
        "Type": "String"
      },
      {
        "Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
        "Entity": null,
        "Name": "InitiatingProcessFileName",
        "Type": "String"
      },
      {
        "Description": "Size of the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFileSize",
        "Type": "Int64"
      },
      {
        "Description": "Company name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoCompanyName",
        "Type": "String"
      },
      {
        "Description": "Product name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductName",
        "Type": "String"
      },
      {
        "Description": "Product version from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductVersion",
        "Type": "String"
      },
      {
        "Description": "Internal file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoInternalFileName",
        "Type": "String"
      },
      {
        "Description": "Original file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoOriginalFileName",
        "Type": "String"
      },
      {
        "Description": "Description from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoFileDescription",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessId",
        "Type": "Int64"
      },
      {
        "Description": "Command line used to run the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Date and time when the process that initiated the event was started",
        "Entity": null,
        "Name": "InitiatingProcessCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Folder containing the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFolderPath",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentId",
        "Type": "Int64"
      },
      {
        "Description": "Name of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentFileName",
        "Type": "String"
      },
      {
        "Description": "Date and time when the parent of the process responsible for the event was started",
        "Entity": null,
        "Name": "InitiatingProcessParentCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      },
      {
        "Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
        "Entity": null,
        "Name": "AppGuardContainerId",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "String"
      },
      {
        "Description": "Windows session ID of the initiating process",
        "Entity": null,
        "Name": "InitiatingProcessSessionId",
        "Type": "Int64"
      },
      {
        "Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
        "Entity": null,
        "Name": "IsInitiatingProcessRemoteSession",
        "Type": "Boolean"
      },
      {
        "Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Machine",
        "Name": "InitiatingProcessRemoteSessionDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Ip",
        "Name": "InitiatingProcessRemoteSessionIP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
        "Entity": null,
        "Name": "InitiatingProcessUniqueId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceImageLoadEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Name of the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FileName",
        "Type": "String"
      },
      {
        "Description": "Folder containing the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FolderPath",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA256",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "MD5",
        "Type": "String"
      },
      {
        "Description": "Size of the file in bytes",
        "Entity": null,
        "Name": "FileSize",
        "Type": "Int64"
      },
      {
        "Description": "Domain of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountDomain",
        "Type": "String"
      },
      {
        "Description": "User name of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountName",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
        "Entity": "UserSid",
        "Name": "InitiatingProcessAccountSid",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountUpn",
        "Type": "String"
      },
      {
        "Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
        "Entity": "UserObjectId",
        "Name": "InitiatingProcessAccountObjectId",
        "Type": "String"
      },
      {
        "Description": "Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources.",
        "Entity": null,
        "Name": "InitiatingProcessIntegrityLevel",
        "Type": "String"
      },
      {
        "Description": "Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessTokenElevation",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessSHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
        "Entity": "File",
        "Name": "InitiatingProcessSHA256",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessMD5",
        "Type": "String"
      },
      {
        "Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
        "Entity": null,
        "Name": "InitiatingProcessFileName",
        "Type": "String"
      },
      {
        "Description": "Size of the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFileSize",
        "Type": "Int64"
      },
      {
        "Description": "Company name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoCompanyName",
        "Type": "String"
      },
      {
        "Description": "Product name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductName",
        "Type": "String"
      },
      {
        "Description": "Product version from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductVersion",
        "Type": "String"
      },
      {
        "Description": "Internal file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoInternalFileName",
        "Type": "String"
      },
      {
        "Description": "Original file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoOriginalFileName",
        "Type": "String"
      },
      {
        "Description": "Description from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoFileDescription",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessId",
        "Type": "Int64"
      },
      {
        "Description": "Command line used to run the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Date and time when the process that initiated the event was started",
        "Entity": null,
        "Name": "InitiatingProcessCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Folder containing the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFolderPath",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentId",
        "Type": "Int64"
      },
      {
        "Description": "Name of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentFileName",
        "Type": "String"
      },
      {
        "Description": "Date and time when the parent of the process responsible for the event was started",
        "Entity": null,
        "Name": "InitiatingProcessParentCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      },
      {
        "Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
        "Entity": null,
        "Name": "AppGuardContainerId",
        "Type": "String"
      },
      {
        "Description": "Windows session ID of the initiating process",
        "Entity": null,
        "Name": "InitiatingProcessSessionId",
        "Type": "Int64"
      },
      {
        "Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
        "Entity": null,
        "Name": "IsInitiatingProcessRemoteSession",
        "Type": "Boolean"
      },
      {
        "Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Machine",
        "Name": "InitiatingProcessRemoteSessionDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Ip",
        "Name": "InitiatingProcessRemoteSessionIP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
        "Entity": null,
        "Name": "InitiatingProcessUniqueId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Name of the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FileName",
        "Type": "String"
      },
      {
        "Description": "Folder containing the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FolderPath",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA256",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "MD5",
        "Type": "String"
      },
      {
        "Description": "Size of the file in bytes",
        "Entity": null,
        "Name": "FileSize",
        "Type": "Int64"
      },
      {
        "Description": "Domain of the account",
        "Entity": null,
        "Name": "AccountDomain",
        "Type": "String"
      },
      {
        "Description": "User name of the account",
        "Entity": null,
        "Name": "AccountName",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account",
        "Entity": "UserSid",
        "Name": "AccountSid",
        "Type": "String"
      },
      {
        "Description": "URL or fully qualified domain name (FQDN) that was being connected to",
        "Entity": "Url",
        "Name": "RemoteUrl",
        "Type": "String"
      },
      {
        "Description": "Name of the device that performed a remote operation on the affected machine. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name, or a host name without domain information.",
        "Entity": "Machine",
        "Name": "RemoteDeviceName",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the newly created process",
        "Entity": null,
        "Name": "ProcessId",
        "Type": "Int64"
      },
      {
        "Description": "Command line used to create the new process",
        "Entity": null,
        "Name": "ProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Date and time the process was created",
        "Entity": null,
        "Name": "ProcessCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Indicates the type of token elevation applied to the newly created process. Possible values: TokenElevationTypeLimited (restricted), TokenElevationTypeDefault (standard), and TokenElevationTypeFull (elevated)",
        "Entity": null,
        "Name": "ProcessTokenElevation",
        "Type": "String"
      },
      {
        "Description": "Identifier for a logon session. This identifier is unique on the same machine only between restarts",
        "Entity": null,
        "Name": "LogonId",
        "Type": "Int64"
      },
      {
        "Description": "Registry key that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryKey",
        "Type": "String"
      },
      {
        "Description": "Name of the registry value that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryValueName",
        "Type": "String"
      },
      {
        "Description": "Data of the registry value that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryValueData",
        "Type": "String"
      },
      {
        "Description": "IP address that was being connected to",
        "Entity": "Ip",
        "Name": "RemoteIP",
        "Type": "String"
      },
      {
        "Description": "TCP port on the remote device that was being connected to",
        "Entity": null,
        "Name": "RemotePort",
        "Type": "Int32"
      },
      {
        "Description": "IP address assigned to the local machine used during communication",
        "Entity": "Ip",
        "Name": "LocalIP",
        "Type": "String"
      },
      {
        "Description": "TCP port on the local machine used during communication",
        "Entity": null,
        "Name": "LocalPort",
        "Type": "Int32"
      },
      {
        "Description": "URL where the file was downloaded from",
        "Entity": "Url",
        "Name": "FileOriginUrl",
        "Type": "String"
      },
      {
        "Description": "IP address where the file was downloaded from",
        "Entity": "Ip",
        "Name": "FileOriginIP",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessSHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available.",
        "Entity": "File",
        "Name": "InitiatingProcessSHA256",
        "Type": "String"
      },
      {
        "Description": "MD5 hash of the process (image file) that initiated the event",
        "Entity": "File",
        "Name": "InitiatingProcessMD5",
        "Type": "String"
      },
      {
        "Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
        "Entity": null,
        "Name": "InitiatingProcessFileName",
        "Type": "String"
      },
      {
        "Description": "Size of the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFileSize",
        "Type": "Int64"
      },
      {
        "Description": "Folder containing the process (image file) that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessFolderPath",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessId",
        "Type": "Int64"
      },
      {
        "Description": "Command line used to run the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Date and time when the process that initiated the event was started",
        "Entity": null,
        "Name": "InitiatingProcessCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Domain of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountDomain",
        "Type": "String"
      },
      {
        "Description": "User name of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountName",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account that ran the process responsible for the event",
        "Entity": "UserSid",
        "Name": "InitiatingProcessAccountSid",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account that ran the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessAccountUpn",
        "Type": "String"
      },
      {
        "Description": "Microsoft Entra object ID of the user account that ran the process responsible for the event",
        "Entity": "UserObjectId",
        "Name": "InitiatingProcessAccountObjectId",
        "Type": "String"
      },
      {
        "Description": "Company name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoCompanyName",
        "Type": "String"
      },
      {
        "Description": "Product name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductName",
        "Type": "String"
      },
      {
        "Description": "Product version from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoProductVersion",
        "Type": "String"
      },
      {
        "Description": "Internal file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoInternalFileName",
        "Type": "String"
      },
      {
        "Description": "Original file name from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoOriginalFileName",
        "Type": "String"
      },
      {
        "Description": "Description from the version information of the process (image file) responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessVersionInfoFileDescription",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentId",
        "Type": "Int64"
      },
      {
        "Description": "Name of the parent process that spawned the process responsible for the event",
        "Entity": null,
        "Name": "InitiatingProcessParentFileName",
        "Type": "String"
      },
      {
        "Description": "Date and time when the parent of the process responsible for the event was started",
        "Entity": null,
        "Name": "InitiatingProcessParentCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Identifier for a logon session of the process that initiated the event. This identifier is unique on the same machine only between restarts.",
        "Entity": null,
        "Name": "InitiatingProcessLogonId",
        "Type": "Int64"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      },
      {
        "Description": "Identifier for the virtualized container used by Application Guard to isolate browser activity",
        "Entity": null,
        "Name": "AppGuardContainerId",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "String"
      },
      {
        "Description": "Windows session ID of the initiating process",
        "Entity": null,
        "Name": "InitiatingProcessSessionId",
        "Type": "Int64"
      },
      {
        "Description": "Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
        "Entity": null,
        "Name": "IsInitiatingProcessRemoteSession",
        "Type": "Boolean"
      },
      {
        "Description": "Device name of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Machine",
        "Name": "InitiatingProcessRemoteSessionDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the remote device from which the initiating process’s RDP session was initiated",
        "Entity": "Ip",
        "Name": "InitiatingProcessRemoteSessionIP",
        "Type": "String"
      },
      {
        "Description": "Windows session ID of the created process",
        "Entity": null,
        "Name": "CreatedProcessSessionId",
        "Type": "Int64"
      },
      {
        "Description": "Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false)",
        "Entity": null,
        "Name": "IsProcessRemoteSession",
        "Type": "Boolean"
      },
      {
        "Description": "Device name of the remote device from which the created process’s RDP session was initiated",
        "Entity": "Machine",
        "Name": "ProcessRemoteSessionDeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address of the remote device from which the created process’s RDP session was initiated",
        "Entity": "Ip",
        "Name": "ProcessRemoteSessionIP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices",
        "Entity": null,
        "Name": "InitiatingProcessUniqueId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceFileCertificateInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA1",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the file is signed",
        "Entity": null,
        "Name": "IsSigned",
        "Type": "Boolean"
      },
      {
        "Description": "Indicates whether signature information was read as embedded content in the file itself or read from an external catalog file",
        "Entity": null,
        "Name": "SignatureType",
        "Type": "String"
      },
      {
        "Description": "Information about the signer of the file",
        "Entity": null,
        "Name": "Signer",
        "Type": "String"
      },
      {
        "Description": "Unique hash value identifying the signer",
        "Entity": null,
        "Name": "SignerHash",
        "Type": "String"
      },
      {
        "Description": "Information about the issuing certificate authority (CA)",
        "Entity": null,
        "Name": "Issuer",
        "Type": "String"
      },
      {
        "Description": "Unique hash value identifying issuing certificate authority (CA)",
        "Entity": null,
        "Name": "IssuerHash",
        "Type": "String"
      },
      {
        "Description": "Identifier for the certificate that is unique to the issuing certificate authority (CA)",
        "Entity": null,
        "Name": "CertificateSerialNumber",
        "Type": "String"
      },
      {
        "Description": "JSON array listing the URLs of network shares that contain certificates and certificate revocation lists (CRLs)",
        "Entity": null,
        "Name": "CrlDistributionPointUrls",
        "Type": "String"
      },
      {
        "Description": "Date and time the certificate was created",
        "Entity": null,
        "Name": "CertificateCreationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Date and time the certificate is set to expire",
        "Entity": null,
        "Name": "CertificateExpirationTime",
        "Type": "DateTime"
      },
      {
        "Description": "Date and time the certificate was countersigned",
        "Entity": null,
        "Name": "CertificateCountersignatureTime",
        "Type": "DateTime"
      },
      {
        "Description": "Indicates whether the file is trusted based on the results of the WinVerifyTrust function, which checks for unknown root certificate information, invalid signatures, revoked certificates, and other questionable attributes",
        "Entity": null,
        "Name": "IsTrusted",
        "Type": "Boolean"
      },
      {
        "Description": "Indicates whether the signer of the root certificate is Microsoft",
        "Entity": null,
        "Name": "IsRootSignerMicrosoft",
        "Type": "Boolean"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DisruptionAndResponseEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Type of activity that triggered the event",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device that the attack originated from",
        "Entity": "Machine",
        "Name": "SourceDeviceId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device that was targeted or attacked",
        "Entity": "Machine",
        "Name": "TargetDeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Domain name that the device that reported the event is joined to; the reporting device can be the one that blocked the access, the compromised device itself, or even a different device that is aware of the attack",
        "Entity": null,
        "Name": "DomainName",
        "Type": "String"
      },
      {
        "Description": "Host name of the device where the attack originated from",
        "Entity": null,
        "Name": "SourceDeviceName",
        "Type": "String"
      },
      {
        "Description": "Domain name of the device where the attack originated from",
        "Entity": null,
        "Name": "SourceDomainName",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device that the recorded action was applied to",
        "Entity": "Machine",
        "Name": "TargetDeviceName",
        "Type": "String"
      },
      {
        "Description": "Domain name of the device that was targeted or attacked",
        "Entity": null,
        "Name": "TargetDomainName",
        "Type": "String"
      },
      {
        "Description": "Process ID (PID) of the process that initiated the event",
        "Entity": null,
        "Name": "InitiatingProcessId",
        "Type": "Int64"
      },
      {
        "Description": "Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead",
        "Entity": null,
        "Name": "InitiatingProcessFileName",
        "Type": "String"
      },
      {
        "Description": "The security identifier of the account conducting the malicious activity",
        "Entity": "UserObjectId",
        "Name": "SourceUserSid",
        "Type": "String"
      },
      {
        "Description": "The user name of the account conducting the malicious activity",
        "Entity": "User",
        "Name": "SourceUserName",
        "Type": "String"
      },
      {
        "Description": "The domain name of the account conducting the malicious activity",
        "Entity": null,
        "Name": "SourceUserDomainName",
        "Type": "String"
      },
      {
        "Description": "IP address where the attacker communication originated from and was blocked by automatic attack disruption",
        "Entity": null,
        "Name": "SourceIpAddress",
        "Type": "String"
      },
      {
        "Description": "Port where the attacker communication originated from",
        "Entity": null,
        "Name": "SourcePort",
        "Type": "Int32"
      },
      {
        "Description": "IP address that the attacker attempted to access",
        "Entity": "Ip",
        "Name": "IpAddress",
        "Type": "String"
      },
      {
        "Description": "TCP port used during communication",
        "Entity": null,
        "Name": "Port",
        "Type": "Int32"
      },
      {
        "Description": "Authentication protocol that the compromised user used to sign in; possible values: Undefined, NTLM, Kerberos",
        "Entity": null,
        "Name": "AuthenticationProtocol",
        "Type": "String"
      },
      {
        "Description": "Name of the service the attacker attempted to use, if the attacker signed in using Kerberos or NTLM; for example: SMB, HTTP, cifs, SMB, host, ldap, SMB, krbtgt",
        "Entity": null,
        "Name": "Service",
        "Type": "String"
      },
      {
        "Description": "Unique identifier (UUID) for the Remote Procedure Call (RPC) interface that the attacker attempted to access",
        "Entity": null,
        "Name": "InterfaceUuid",
        "Type": "String"
      },
      {
        "Description": "Friendly name of the interface represented by the interface UUID",
        "Entity": null,
        "Name": "InterfaceFriendlyName",
        "Type": "String"
      },
      {
        "Description": "Name of the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FileName",
        "Type": "String"
      },
      {
        "Description": "Name of shared folder containing the file",
        "Entity": null,
        "Name": "ShareName",
        "Type": "String"
      },
      {
        "Description": "Type of logon session, specifically interactive, remote interactive (RDP), network, batch, and service",
        "Entity": null,
        "Name": "LogonType",
        "Type": "String"
      },
      {
        "Description": "Identifier for a logon session. This identifier is unique on the same machine only between restarts",
        "Entity": null,
        "Name": "LogonId",
        "Type": "Int64"
      },
      {
        "Description": "Unique number assigned to a user by a website's server for the duration of the visit or session",
        "Entity": null,
        "Name": "SessionId",
        "Type": "String"
      },
      {
        "Description": "Number of compromised accounts that are part of the policy",
        "Entity": null,
        "Name": "CompromisedAccountCount",
        "Type": "Int32"
      },
      {
        "Description": "Unique identifier for the policy",
        "Entity": null,
        "Name": "PolicyId",
        "Type": "String"
      },
      {
        "Description": "Name of the policy",
        "Entity": null,
        "Name": "PolicyName",
        "Type": "String"
      },
      {
        "Description": "Version of the policy",
        "Entity": null,
        "Name": "PolicyVersion",
        "Type": "String"
      },
      {
        "Description": "Unique hash of the policy",
        "Entity": null,
        "Name": "PolicyHash",
        "Type": "String"
      },
      {
        "Description": "Data source of the cloud audit event. Could be Azure ARM Logs, AWS CloudTrail, GCP Logging or other",
        "Entity": null,
        "Name": "DataSource",
        "Type": "String"
      },
      {
        "Description": "Type of reported event; Prevented/Blocked/PolicyUpdated",
        "Entity": null,
        "Name": "ReportType",
        "Type": "String"
      },
      {
        "Description": "Indicates the current state of the policy on the device at the time of the disruption event; possible values: true (the policy is on, therefore it was applied or enforced), false (the policy was turned off or revoked from the device)",
        "Entity": null,
        "Name": "IsPolicyOn",
        "Type": "Boolean"
      },
      {
        "Description": "Event identifier based on a repeating counter.To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns.",
        "Entity": null,
        "Name": "ReportId",
        "Type": "Int64"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Devices",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceTvmSoftwareVulnerabilities",
    "Schema": [
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
        "Entity": null,
        "Name": "OSPlatform",
        "Type": "String"
      },
      {
        "Description": "Version of the operating system running on the machine",
        "Entity": null,
        "Name": "OSVersion",
        "Type": "String"
      },
      {
        "Description": "Architecture of the operating system running on the machine",
        "Entity": null,
        "Name": "OSArchitecture",
        "Type": "String"
      },
      {
        "Description": "Name of the software vendor",
        "Entity": null,
        "Name": "SoftwareVendor",
        "Type": "String"
      },
      {
        "Description": "Name of the software product",
        "Entity": null,
        "Name": "SoftwareName",
        "Type": "String"
      },
      {
        "Description": "Version number of the software product",
        "Entity": null,
        "Name": "SoftwareVersion",
        "Type": "String"
      },
      {
        "Description": "Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system",
        "Entity": null,
        "Name": "CveId",
        "Type": "String"
      },
      {
        "Description": "Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape",
        "Entity": null,
        "Name": "VulnerabilitySeverityLevel",
        "Type": "String"
      },
      {
        "Description": "Name or description of the security update provided by the software vendor to address the vulnerability",
        "Entity": null,
        "Name": "RecommendedSecurityUpdate",
        "Type": "String"
      },
      {
        "Description": "Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles",
        "Entity": null,
        "Name": "RecommendedSecurityUpdateId",
        "Type": "String"
      },
      {
        "Description": "Array of tags relevant to the CVE; example: ZeroDay, NoSecurityUpdate",
        "Entity": null,
        "Name": "CveTags",
        "Type": "Object"
      },
      {
        "Description": "Indicates the status of the workaround mitigation for the CVE on this device (possible values: applied, not applied, partially applied, pending reboot)",
        "Entity": null,
        "Name": "CveMitigationStatus",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Entra ID",
        "Entity": null,
        "Name": "AadDeviceId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Tvm",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceTvmSoftwareVulnerabilitiesKB",
    "Schema": [
      {
        "Description": "Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system",
        "Entity": null,
        "Name": "CveId",
        "Type": "String"
      },
      {
        "Description": "Severity score assigned to the security vulnerability under the Common Vulnerability Scoring System (CVSS)",
        "Entity": null,
        "Name": "CvssScore",
        "Type": "Double"
      },
      {
        "Description": "Cvss Vector is a compressed textual representation that reflects the values used to derive the score",
        "Entity": null,
        "Name": "CvssVector",
        "Type": "String"
      },
      {
        "Description": "Cve Supportability is an indicator to indicate whether Microsoft supports the Cve or supports it in a Premium plan",
        "Entity": null,
        "Name": "CveSupportability",
        "Type": "String"
      },
      {
        "Description": "Indicates whether exploit code for the vulnerability is publicly available",
        "Entity": null,
        "Name": "IsExploitAvailable",
        "Type": "Boolean"
      },
      {
        "Description": "Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape",
        "Entity": null,
        "Name": "VulnerabilitySeverityLevel",
        "Type": "String"
      },
      {
        "Description": "Date and time the item or related metadata was last modified",
        "Entity": null,
        "Name": "LastModifiedTime",
        "Type": "DateTime"
      },
      {
        "Description": "Date vulnerability was disclosed to the public",
        "Entity": null,
        "Name": "PublishedDate",
        "Type": "DateTime"
      },
      {
        "Description": "Description of the vulnerability and associated risks",
        "Entity": null,
        "Name": "VulnerabilityDescription",
        "Type": "String"
      },
      {
        "Description": "List of all software products affected by the vulnerability",
        "Entity": null,
        "Name": "AffectedSoftware",
        "Type": "String"
      },
      {
        "Description": "Represents the probability that a vulnerability will be exploited. This probability is expressed as a number between 0 and 1 (0%-100%) according to the EPSS model.",
        "Entity": null,
        "Name": "EpssScore",
        "Type": "Double"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Tvm",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceTvmSecureConfigurationAssessment",
    "Schema": [
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
        "Entity": null,
        "Name": "OSPlatform",
        "Type": "String"
      },
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for a specific configuration",
        "Entity": null,
        "Name": "ConfigurationId",
        "Type": "String"
      },
      {
        "Description": "Category or grouping to which the configuration belongs",
        "Entity": null,
        "Name": "ConfigurationCategory",
        "Type": "String"
      },
      {
        "Description": "Subcategory or subgrouping to which the configuration belongs. In many cases, this describes specific capabilities or features.",
        "Entity": null,
        "Name": "ConfigurationSubcategory",
        "Type": "String"
      },
      {
        "Description": "Rated impact of the configuration to the overall configuration score (1-10)",
        "Entity": null,
        "Name": "ConfigurationImpact",
        "Type": "Double"
      },
      {
        "Description": "Indicates whether the configuration or policy is properly configured",
        "Entity": null,
        "Name": "IsCompliant",
        "Type": "Boolean"
      },
      {
        "Description": "Indicates whether the configuration or policy is applicable",
        "Entity": null,
        "Name": "IsApplicable",
        "Type": "Boolean"
      },
      {
        "Description": "Configuration context data of the machine",
        "Entity": null,
        "Name": "Context",
        "Type": "Object"
      },
      {
        "Description": "Indicates whether there will be user impact if the configuration will be applied",
        "Entity": null,
        "Name": "IsExpectedUserImpact",
        "Type": "Boolean"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Tvm",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceTvmSecureConfigurationAssessmentKB",
    "Schema": [
      {
        "Description": "Unique identifier for a specific configuration",
        "Entity": null,
        "Name": "ConfigurationId",
        "Type": "String"
      },
      {
        "Description": "Rated impact of the configuration to the overall configuration score (1-10)",
        "Entity": null,
        "Name": "ConfigurationImpact",
        "Type": "Double"
      },
      {
        "Description": "Display name of the configuration",
        "Entity": null,
        "Name": "ConfigurationName",
        "Type": "String"
      },
      {
        "Description": "Description of the configuration",
        "Entity": null,
        "Name": "ConfigurationDescription",
        "Type": "String"
      },
      {
        "Description": "Description of any associated risks",
        "Entity": null,
        "Name": "RiskDescription",
        "Type": "String"
      },
      {
        "Description": "Category or grouping to which the configuration belongs",
        "Entity": null,
        "Name": "ConfigurationCategory",
        "Type": "String"
      },
      {
        "Description": "Subcategory or subgrouping to which the configuration belongs. In many cases, this describes specific capabilities or features.",
        "Entity": null,
        "Name": "ConfigurationSubcategory",
        "Type": "String"
      },
      {
        "Description": "List of industry benchmarks recommending the same or similar configuration",
        "Entity": null,
        "Name": "ConfigurationBenchmarks",
        "Type": "Object"
      },
      {
        "Description": "Labels representing various attributes used to identify or categorize a security configuration",
        "Entity": null,
        "Name": "Tags",
        "Type": "Object"
      },
      {
        "Description": "Recommended actions to reduce or address any associated risks",
        "Entity": null,
        "Name": "RemediationOptions",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Tvm",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceTvmSoftwareInventory",
    "Schema": [
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
        "Entity": null,
        "Name": "OSPlatform",
        "Type": "String"
      },
      {
        "Description": "Version of the operating system running on the machine",
        "Entity": null,
        "Name": "OSVersion",
        "Type": "String"
      },
      {
        "Description": "Architecture of the operating system running on the machine",
        "Entity": null,
        "Name": "OSArchitecture",
        "Type": "String"
      },
      {
        "Description": "Name of the software vendor",
        "Entity": null,
        "Name": "SoftwareVendor",
        "Type": "String"
      },
      {
        "Description": "Name of the software product",
        "Entity": null,
        "Name": "SoftwareName",
        "Type": "String"
      },
      {
        "Description": "Version number of the software product",
        "Entity": null,
        "Name": "SoftwareVersion",
        "Type": "String"
      },
      {
        "Description": "Indicates the lifecycle stage of the software product relative to its specified end-of-support (EOS) or end-of-life (EOL) date",
        "Entity": null,
        "Name": "EndOfSupportStatus",
        "Type": "String"
      },
      {
        "Description": "End-of-support (EOS) or end-of-life (EOL) date of the software product",
        "Entity": null,
        "Name": "EndOfSupportDate",
        "Type": "DateTime"
      },
      {
        "Description": "The standard Common Platform Enumeration (CPE) name of the software product version",
        "Entity": null,
        "Name": "ProductCodeCpe",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Tvm",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceTvmInfoGathering",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Date and time when the service last saw the device",
        "Entity": null,
        "Name": "LastSeenTime",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
        "Entity": null,
        "Name": "OSPlatform",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Tvm",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceTvmInfoGatheringKB",
    "Schema": [
      {
        "Description": "Unique identifier for the piece of information gathered",
        "Entity": null,
        "Name": "IgId",
        "Type": "DateTime"
      },
      {
        "Description": "Name of the field where this information appears in the AdditionalFields column of the DeviceTvmInfoGathering table",
        "Entity": null,
        "Name": "FieldName",
        "Type": "DateTime"
      },
      {
        "Description": "Description of the information gathered",
        "Entity": null,
        "Name": "Description",
        "Type": "String"
      },
      {
        "Description": "List of categories that the information belongs to, in JSON array format",
        "Entity": null,
        "Name": "Categories",
        "Type": "String"
      },
      {
        "Description": "The data structure of the information gathered",
        "Entity": null,
        "Name": "DataStructure",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Tvm",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "DeviceTvmSoftwareEvidenceBeta",
    "Schema": [
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Name of the software vendor",
        "Entity": null,
        "Name": "SoftwareVendor",
        "Type": "String"
      },
      {
        "Description": "Name of the software product",
        "Entity": null,
        "Name": "SoftwareName",
        "Type": "String"
      },
      {
        "Description": "Version number of the software product",
        "Entity": null,
        "Name": "SoftwareVersion",
        "Type": "String"
      },
      {
        "Description": "Registry paths on which evidence indicating the existence of a software on a device was detected",
        "Entity": null,
        "Name": "RegistryPaths",
        "Type": "Object"
      },
      {
        "Description": "Disk paths on which file level evidence indicating the existence of a software on a device was detected",
        "Entity": null,
        "Name": "DiskPaths",
        "Type": "Object"
      },
      {
        "Description": "Date and time when the service last saw the device",
        "Entity": null,
        "Name": "LastSeenTime",
        "Type": "DateTime"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Tvm",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "ExposureGraphNodes",
    "Schema": [
      {
        "Description": "Unique node identifier",
        "Entity": null,
        "Name": "NodeId",
        "Type": "String"
      },
      {
        "Description": "Label of node",
        "Entity": null,
        "Name": "NodeLabel",
        "Type": "String"
      },
      {
        "Description": "Node display name",
        "Entity": null,
        "Name": "NodeName",
        "Type": "String"
      },
      {
        "Description": "Categories of the node",
        "Entity": null,
        "Name": "Categories",
        "Type": "Object"
      },
      {
        "Description": "Properties of the node, including insights related to the resource, such as whether the resource is exposed to the internet, or vulnerable to remote code execution",
        "Entity": null,
        "Name": "NodeProperties",
        "Type": "Object"
      },
      {
        "Description": "All known node identifiers",
        "Entity": null,
        "Name": "EntityIds",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Xspm",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "ExposureGraphEdges",
    "Schema": [
      {
        "Description": "Unique edge id Unique identifier for the relationship/edge",
        "Entity": null,
        "Name": "EdgeId",
        "Type": "String"
      },
      {
        "Description": "Label of edge",
        "Entity": null,
        "Name": "EdgeLabel",
        "Type": "String"
      },
      {
        "Description": "Node ID of the edge's source",
        "Entity": null,
        "Name": "SourceNodeId",
        "Type": "String"
      },
      {
        "Description": "Display name of source node",
        "Entity": null,
        "Name": "SourceNodeName",
        "Type": "String"
      },
      {
        "Description": "Label of the edge source node",
        "Entity": null,
        "Name": "SourceNodeLabel",
        "Type": "String"
      },
      {
        "Description": "Categories of the source node",
        "Entity": null,
        "Name": "SourceNodeCategories",
        "Type": "Object"
      },
      {
        "Description": "Node ID of the edge's target",
        "Entity": null,
        "Name": "TargetNodeId",
        "Type": "String"
      },
      {
        "Description": "Display name of target node",
        "Entity": null,
        "Name": "TargetNodeName",
        "Type": "String"
      },
      {
        "Description": "Label of the edge target node",
        "Entity": null,
        "Name": "TargetNodeLabel",
        "Type": "String"
      },
      {
        "Description": "Categories of the target node",
        "Entity": null,
        "Name": "TargetNodeCategories",
        "Type": "Object"
      },
      {
        "Description": "Optional data relevant for the relationship between the nodes",
        "Entity": null,
        "Name": "EdgeProperties",
        "Type": "Object"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Xspm",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "ConnectorStatusInfo",
    "Schema": [
      {
        "Description": "The time (in UTC) at which the connection health status event occurred.",
        "Entity": null,
        "Name": "TimeGenerated",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier of the tenant into which the data connector ingests data.",
        "Entity": null,
        "Name": "TenantId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the Microsoft Sentinel workspace into which the data connector ingests data, if applicable.",
        "Entity": null,
        "Name": "SentinelWorkspaceId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the Microsoft Sentinel data connector.",
        "Entity": null,
        "Name": "ConnectorId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for an instance of the data connector.",
        "Entity": null,
        "Name": "InstanceId",
        "Type": "String"
      },
      {
        "Description": "Type of message; possible values are: Status change message, Periodic failure report message, or Current status message",
        "Entity": null,
        "Name": "MessageType",
        "Type": "String"
      },
      {
        "Description": "Current connection status of the data connector; possible values: OK, Error, Warning, or Validating.",
        "Entity": null,
        "Name": "CurrentConnectionStatus",
        "Type": "String"
      },
      {
        "Description": "Previous connection status of the data connector if the message indicates a status change; possible values: OK, Error, Warning, or Validating.",
        "Entity": null,
        "Name": "PreviousConnectionStatus",
        "Type": "String"
      },
      {
        "Description": "More information about the message.",
        "Entity": null,
        "Name": "Description",
        "Type": "String"
      },
      {
        "Description": "The internal message code (for internal use only).",
        "Entity": null,
        "Name": "InternalMessageCode",
        "Type": "String"
      },
      {
        "Description": "Display name of the data connector.",
        "Entity": null,
        "Name": "ConnectorName",
        "Type": "String"
      },
      {
        "Description": "Display name of the data connector instance.",
        "Entity": null,
        "Name": "InstanceName",
        "Type": "String"
      },
      {
        "Description": "Display name of the connection.",
        "Entity": null,
        "Name": "ConnectionName",
        "Type": "String"
      },
      {
        "Description": "The types of protection provided by the product or service being ingested by the data connector.",
        "Entity": null,
        "Name": "ProtectionTypes",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Additional information about the entity or event",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "Object"
      },
      {
        "Description": "The time (in UTC) at which the connection health status event occurred.",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Health",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "AADSpnSignInEventsBeta",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Application that performed the recorded action",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the application",
        "Entity": null,
        "Name": "ApplicationId",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the sign-in was initiated by a managed identity",
        "Entity": null,
        "Name": "IsManagedIdentity",
        "Type": "Boolean"
      },
      {
        "Description": "Contains the error code if a sign-in error occurs. To find a description of a specific error code, visit https://aka.ms/AADsigninsErrorCodes",
        "Entity": null,
        "Name": "ErrorCode",
        "Type": "Int32"
      },
      {
        "Description": "Unique identifier of the sign-in event",
        "Entity": null,
        "Name": "CorrelationId",
        "Type": "String"
      },
      {
        "Description": "Name of the service principal that initiated the sign-in",
        "Entity": null,
        "Name": "ServicePrincipalName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the service principal that performed the action",
        "Entity": null,
        "Name": "ServicePrincipalId",
        "Type": "String"
      },
      {
        "Description": "Display name of the resource accessed. The display name can contain any character.",
        "Entity": null,
        "Name": "ResourceDisplayName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the resource accessed",
        "Entity": null,
        "Name": "ResourceId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the tenant of the resource accessed",
        "Entity": null,
        "Name": "ResourceTenantId",
        "Type": "String"
      },
      {
        "Description": "IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts",
        "Entity": "Ip",
        "Name": "IPAddress",
        "Type": "String"
      },
      {
        "Description": "Country/Region where the account user is located",
        "Entity": null,
        "Name": "Country",
        "Type": "String"
      },
      {
        "Description": "State where the sign-in occurred, if available",
        "Entity": null,
        "Name": "State",
        "Type": "String"
      },
      {
        "Description": "City where the client IP address is geolocated",
        "Entity": null,
        "Name": "City",
        "Type": "String"
      },
      {
        "Description": "The north to south coordinates of the sign-in location",
        "Entity": null,
        "Name": "Latitude",
        "Type": "String"
      },
      {
        "Description": "The east to west coordinates of the sign-in location",
        "Entity": null,
        "Name": "Longitude",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the request",
        "Entity": null,
        "Name": "RequestId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Indicates if the sign in was done via confidential client applications",
        "Entity": null,
        "Name": "IsConfidentialClient",
        "Type": "Boolean"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "AADSignInEventsBeta",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Application that performed the recorded action",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the application",
        "Entity": null,
        "Name": "ApplicationId",
        "Type": "String"
      },
      {
        "Description": "Type of logon session, specifically interactive, remote interactive (RDP), network, batch, and service",
        "Entity": null,
        "Name": "LogonType",
        "Type": "String"
      },
      {
        "Description": "Information about the Microsoft Entra ID endpoint that the request was sent to and the type of request sent during sign in",
        "Entity": null,
        "Name": "EndpointCall",
        "Type": "String"
      },
      {
        "Description": "Contains the error code if a sign-in error occurs. To find a description of a specific error code, visit https://aka.ms/AADsigninsErrorCodes",
        "Entity": null,
        "Name": "ErrorCode",
        "Type": "Int32"
      },
      {
        "Description": "Unique identifier of the sign-in event",
        "Entity": null,
        "Name": "CorrelationId",
        "Type": "String"
      },
      {
        "Description": "Unique number assigned to a user by a website's server for the duration of the visit or session",
        "Entity": null,
        "Name": "SessionId",
        "Type": "String"
      },
      {
        "Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
        "Entity": null,
        "Name": "AccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "Indicates whether a user inside the network does not belong to the organization’s domain",
        "Entity": null,
        "Name": "IsExternalUser",
        "Type": "Int32"
      },
      {
        "Description": "Indicates whether the user that signed in is a guest in the tenant",
        "Entity": null,
        "Name": "IsGuestUser",
        "Type": "Boolean"
      },
      {
        "Description": "On-premises user principal name (UPN) of the user signing in to Microsoft Entra ID",
        "Entity": null,
        "Name": "AlternateSignInName",
        "Type": "String"
      },
      {
        "Description": "Date and time when the user that signed in last changed their password",
        "Entity": null,
        "Name": "LastPasswordChangeTimestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Display name of the resource accessed. The display name can contain any character.",
        "Entity": null,
        "Name": "ResourceDisplayName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the resource accessed",
        "Entity": null,
        "Name": "ResourceId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the tenant of the resource accessed",
        "Entity": null,
        "Name": "ResourceTenantId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Entra ID",
        "Entity": null,
        "Name": "AadDeviceId",
        "Type": "String"
      },
      {
        "Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
        "Entity": null,
        "Name": "OSPlatform",
        "Type": "String"
      },
      {
        "Description": "Indicates the trust type of the device that signed in. For managed device scenarios only. Possible values are Workplace, AzureAd, and ServerAd.",
        "Entity": null,
        "Name": "DeviceTrustType",
        "Type": "String"
      },
      {
        "Description": "Indicates if the device is managed by the organization (True) or not (False)",
        "Entity": null,
        "Name": "IsManaged",
        "Type": "Int32"
      },
      {
        "Description": "Indicates whether the device that initiated the event is compliant or not",
        "Entity": null,
        "Name": "IsCompliant",
        "Type": "Int32"
      },
      {
        "Description": "Details about the authentication processor",
        "Entity": null,
        "Name": "AuthenticationProcessingDetails",
        "Type": "String"
      },
      {
        "Description": "Type of authentication required for the sign-in. Possible values: multiFactorAuthentication (MFA was required) and singleFactorAuthentication (no MFA was required).",
        "Entity": null,
        "Name": "AuthenticationRequirement",
        "Type": "String"
      },
      {
        "Description": "Indicates if the token issuer is Microsoft Entra ID (0) or Active Directory Federation Services (1)",
        "Entity": null,
        "Name": "TokenIssuerType",
        "Type": "String"
      },
      {
        "Description": "Aggregated risk level during sign-in. Possible values: 0 (aggregated risk level not set), 1 (none), 10 (low), 50 (medium), or 100 (high).",
        "Entity": null,
        "Name": "RiskLevelAggregated",
        "Type": "Int32"
      },
      {
        "Description": "User risk level at sign-in",
        "Entity": null,
        "Name": "RiskLevelDuringSignIn",
        "Type": "Int32"
      },
      {
        "Description": "Array of risk event types applicable to the event",
        "Entity": null,
        "Name": "RiskEventTypes",
        "Type": "String"
      },
      {
        "Description": "Indicates risky user state. Possible values: 0 (none), 1 (confirmed safe), 2 (remediated), 3 (dismissed), 4 (at risk), or 5 (confirmed compromised).",
        "Entity": null,
        "Name": "RiskState",
        "Type": "Int32"
      },
      {
        "Description": "User agent information from the web browser or other client application",
        "Entity": null,
        "Name": "UserAgent",
        "Type": "String"
      },
      {
        "Description": "Indicates the client app used",
        "Entity": null,
        "Name": "ClientAppUsed",
        "Type": "String"
      },
      {
        "Description": "Details about the version of the browser used to sign in",
        "Entity": null,
        "Name": "Browser",
        "Type": "String"
      },
      {
        "Description": "Details of the conditional access policies applied to the sign-in event",
        "Entity": null,
        "Name": "ConditionalAccessPolicies",
        "Type": "String"
      },
      {
        "Description": "Status of the conditional access policies applied to the sign-in. Possible values are 0 (policies applied), 1 (attempt to apply policies failed), or 2 (policies not applied).",
        "Entity": null,
        "Name": "ConditionalAccessStatus",
        "Type": "Int32"
      },
      {
        "Description": "IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts",
        "Entity": "Ip",
        "Name": "IPAddress",
        "Type": "String"
      },
      {
        "Description": "Country/Region where the account user is located",
        "Entity": null,
        "Name": "Country",
        "Type": "String"
      },
      {
        "Description": "State where the sign-in occurred, if available",
        "Entity": null,
        "Name": "State",
        "Type": "String"
      },
      {
        "Description": "City where the client IP address is geolocated",
        "Entity": null,
        "Name": "City",
        "Type": "String"
      },
      {
        "Description": "The north to south coordinates of the sign-in location",
        "Entity": null,
        "Name": "Latitude",
        "Type": "String"
      },
      {
        "Description": "The east to west coordinates of the sign-in location",
        "Entity": null,
        "Name": "Longitude",
        "Type": "String"
      },
      {
        "Description": "Network location details of the authentication processor of the sign-in event",
        "Entity": null,
        "Name": "NetworkLocationDetails",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the request",
        "Entity": null,
        "Name": "RequestId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Entra ID",
        "Entity": null,
        "Name": "EntraIdDeviceId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "EntraIdSignInEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Application that performed the recorded action",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the application",
        "Entity": null,
        "Name": "ApplicationId",
        "Type": "String"
      },
      {
        "Description": "Type of logon session, specifically interactive, remote interactive (RDP), network, batch, and service",
        "Entity": null,
        "Name": "LogonType",
        "Type": "String"
      },
      {
        "Description": "Information about the Microsoft Entra ID endpoint that the request was sent to and the type of request sent during sign in",
        "Entity": null,
        "Name": "EndpointCall",
        "Type": "String"
      },
      {
        "Description": "Contains the error code if a sign-in error occurs. To find a description of a specific error code, visit https://aka.ms/AADsigninsErrorCodes",
        "Entity": null,
        "Name": "ErrorCode",
        "Type": "Int32"
      },
      {
        "Description": "Unique identifier of the sign-in event",
        "Entity": null,
        "Name": "CorrelationId",
        "Type": "String"
      },
      {
        "Description": "Unique number assigned to a user by a website's server for the duration of the visit or session",
        "Entity": null,
        "Name": "SessionId",
        "Type": "String"
      },
      {
        "Description": "Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.",
        "Entity": null,
        "Name": "AccountDisplayName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "Indicates whether a user inside the network does not belong to the organization’s domain",
        "Entity": null,
        "Name": "IsExternalUser",
        "Type": "Int32"
      },
      {
        "Description": "Indicates whether the user that signed in is a guest in the tenant",
        "Entity": null,
        "Name": "IsGuestUser",
        "Type": "Boolean"
      },
      {
        "Description": "On-premises user principal name (UPN) of the user signing in to Microsoft Entra ID",
        "Entity": null,
        "Name": "AlternateSignInName",
        "Type": "String"
      },
      {
        "Description": "Date and time when the user that signed in last changed their password",
        "Entity": null,
        "Name": "LastPasswordChangeTimestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Display name of the resource accessed. The display name can contain any character.",
        "Entity": null,
        "Name": "ResourceDisplayName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the resource accessed",
        "Entity": null,
        "Name": "ResourceId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the tenant of the resource accessed",
        "Entity": null,
        "Name": "ResourceTenantId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7",
        "Entity": null,
        "Name": "OSPlatform",
        "Type": "String"
      },
      {
        "Description": "Indicates the trust type of the device that signed in. For managed device scenarios only. Possible values are Workplace, AzureAd, and ServerAd.",
        "Entity": null,
        "Name": "DeviceTrustType",
        "Type": "String"
      },
      {
        "Description": "Indicates if the device is managed by the organization (True) or not (False)",
        "Entity": null,
        "Name": "IsManaged",
        "Type": "Int32"
      },
      {
        "Description": "Indicates whether the device that initiated the event is compliant or not",
        "Entity": null,
        "Name": "IsCompliant",
        "Type": "Int32"
      },
      {
        "Description": "Details about the authentication processor",
        "Entity": null,
        "Name": "AuthenticationProcessingDetails",
        "Type": "String"
      },
      {
        "Description": "Type of authentication required for the sign-in. Possible values: multiFactorAuthentication (MFA was required) and singleFactorAuthentication (no MFA was required).",
        "Entity": null,
        "Name": "AuthenticationRequirement",
        "Type": "String"
      },
      {
        "Description": "Indicates if the token issuer is Microsoft Entra ID (0) or Active Directory Federation Services (1)",
        "Entity": null,
        "Name": "TokenIssuerType",
        "Type": "String"
      },
      {
        "Description": "Aggregated risk level during sign-in. Possible values: 0 (aggregated risk level not set), 1 (none), 10 (low), 50 (medium), or 100 (high).",
        "Entity": null,
        "Name": "RiskLevelAggregated",
        "Type": "Int32"
      },
      {
        "Description": "User risk level at sign-in",
        "Entity": null,
        "Name": "RiskLevelDuringSignIn",
        "Type": "Int32"
      },
      {
        "Description": "Array of risk event types applicable to the event",
        "Entity": null,
        "Name": "RiskEventTypes",
        "Type": "String"
      },
      {
        "Description": "Indicates risky user state. Possible values: 0 (none), 1 (confirmed safe), 2 (remediated), 3 (dismissed), 4 (at risk), or 5 (confirmed compromised).",
        "Entity": null,
        "Name": "RiskState",
        "Type": "Int32"
      },
      {
        "Description": "User agent information from the web browser or other client application",
        "Entity": null,
        "Name": "UserAgent",
        "Type": "String"
      },
      {
        "Description": "Indicates the client app used",
        "Entity": null,
        "Name": "ClientAppUsed",
        "Type": "String"
      },
      {
        "Description": "Details about the version of the browser used to sign in",
        "Entity": null,
        "Name": "Browser",
        "Type": "String"
      },
      {
        "Description": "Details of the conditional access policies applied to the sign-in event",
        "Entity": null,
        "Name": "ConditionalAccessPolicies",
        "Type": "String"
      },
      {
        "Description": "Status of the conditional access policies applied to the sign-in. Possible values are 0 (policies applied), 1 (attempt to apply policies failed), or 2 (policies not applied).",
        "Entity": null,
        "Name": "ConditionalAccessStatus",
        "Type": "Int32"
      },
      {
        "Description": "IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts",
        "Entity": "Ip",
        "Name": "IPAddress",
        "Type": "String"
      },
      {
        "Description": "Country/Region where the account user is located",
        "Entity": null,
        "Name": "Country",
        "Type": "String"
      },
      {
        "Description": "State where the sign-in occurred, if available",
        "Entity": null,
        "Name": "State",
        "Type": "String"
      },
      {
        "Description": "City where the client IP address is geolocated",
        "Entity": null,
        "Name": "City",
        "Type": "String"
      },
      {
        "Description": "The north to south coordinates of the sign-in location",
        "Entity": null,
        "Name": "Latitude",
        "Type": "String"
      },
      {
        "Description": "The east to west coordinates of the sign-in location",
        "Entity": null,
        "Name": "Longitude",
        "Type": "String"
      },
      {
        "Description": "Network location details of the authentication processor of the sign-in event",
        "Entity": null,
        "Name": "NetworkLocationDetails",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the request",
        "Entity": null,
        "Name": "RequestId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Entra ID",
        "Entity": null,
        "Name": "EntraIdDeviceId",
        "Type": "String"
      },
      {
        "Description": "The JA4 fingerprint is a hash derived from the TLS Client Hello request. This JA4 fingerprint serves as a unique identifier for the client's TLS configuration.",
        "Entity": null,
        "Name": "GatewayJA4",
        "Type": "String"
      },
      {
        "Description": "A unique identifier for the token passed during sign-in. This identifier is used to correlate the sign-in with the token request.",
        "Entity": null,
        "Name": "UniqueTokenId",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the sign-in event came through Global Secure Access.",
        "Entity": null,
        "Name": "IsSignInThroughGlobalSecureAccess",
        "Type": "Boolean"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "EntraIdSpnSignInEvents",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Application that performed the recorded action",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the application",
        "Entity": null,
        "Name": "ApplicationId",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the sign-in was initiated by a managed identity",
        "Entity": null,
        "Name": "IsManagedIdentity",
        "Type": "Boolean"
      },
      {
        "Description": "Contains the error code if a sign-in error occurs. To find a description of a specific error code, visit https://aka.ms/AADsigninsErrorCodes",
        "Entity": null,
        "Name": "ErrorCode",
        "Type": "Int32"
      },
      {
        "Description": "Unique identifier of the sign-in event",
        "Entity": null,
        "Name": "CorrelationId",
        "Type": "String"
      },
      {
        "Description": "Name of the service principal that initiated the sign-in",
        "Entity": null,
        "Name": "ServicePrincipalName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the service principal that performed the action",
        "Entity": null,
        "Name": "ServicePrincipalId",
        "Type": "String"
      },
      {
        "Description": "Display name of the resource accessed. The display name can contain any character.",
        "Entity": null,
        "Name": "ResourceDisplayName",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the resource accessed",
        "Entity": null,
        "Name": "ResourceId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the tenant of the resource accessed",
        "Entity": null,
        "Name": "ResourceTenantId",
        "Type": "String"
      },
      {
        "Description": "IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts",
        "Entity": "Ip",
        "Name": "IPAddress",
        "Type": "String"
      },
      {
        "Description": "Country/Region where the account user is located",
        "Entity": null,
        "Name": "Country",
        "Type": "String"
      },
      {
        "Description": "State where the sign-in occurred, if available",
        "Entity": null,
        "Name": "State",
        "Type": "String"
      },
      {
        "Description": "City where the client IP address is geolocated",
        "Entity": null,
        "Name": "City",
        "Type": "String"
      },
      {
        "Description": "The north to south coordinates of the sign-in location",
        "Entity": null,
        "Name": "Latitude",
        "Type": "String"
      },
      {
        "Description": "The east to west coordinates of the sign-in location",
        "Entity": null,
        "Name": "Longitude",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the request",
        "Entity": null,
        "Name": "RequestId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Indicates if the sign in was done via confidential client applications",
        "Entity": null,
        "Name": "IsConfidentialClient",
        "Type": "Boolean"
      },
      {
        "Description": "The JA4 fingerprint is a hash derived from the TLS Client Hello request. This JA4 fingerprint serves as a unique identifier for the client's TLS configuration.",
        "Entity": null,
        "Name": "GatewayJA4",
        "Type": "String"
      },
      {
        "Description": "Unique number assigned to a user by a website's server for the duration of the visit or session",
        "Entity": null,
        "Name": "SessionId",
        "Type": "String"
      },
      {
        "Description": "User agent information from the web browser or other client application",
        "Entity": null,
        "Name": "UserAgent",
        "Type": "String"
      },
      {
        "Description": "A unique identifier for the token passed during sign-in. This identifier is used to correlate the sign-in with the token request.",
        "Entity": null,
        "Name": "UniqueTokenId",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "GraphAPIAuditEvents",
    "Schema": [
      {
        "Description": "Identity provider that authenticated the subject of the token",
        "Entity": null,
        "Name": "IdentityProvider",
        "Type": "String"
      },
      {
        "Description": "The API version of the event",
        "Entity": null,
        "Name": "ApiVersion",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the application",
        "Entity": null,
        "Name": "ApplicationId",
        "Type": "String"
      },
      {
        "Description": "Identifier for the client request sent; if none is available, the operation identifier is used instead",
        "Entity": null,
        "Name": "ClientRequestId",
        "Type": "String"
      },
      {
        "Description": "Identifier for a batch of requests; the same identifier is used for all requests in a batch but if requests are non-batched, the identifier is unique per request",
        "Entity": null,
        "Name": "OperationId",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "City, country, or other geographic location associated with the event",
        "Entity": null,
        "Name": "Location",
        "Type": "String"
      },
      {
        "Description": "Duration of the request in milliseconds",
        "Entity": null,
        "Name": "RequestDuration",
        "Type": "String"
      },
      {
        "Description": "HTTP method of the request",
        "Entity": null,
        "Name": "RequestMethod",
        "Type": "String"
      },
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "HTTP response status code for the request",
        "Entity": null,
        "Name": "ResponseStatusCode",
        "Type": "String"
      },
      {
        "Description": "Scopes in token claims",
        "Entity": null,
        "Name": "Scopes",
        "Type": "String"
      },
      {
        "Description": "Type of object, such as a file, a process, a device, or a user",
        "Entity": null,
        "Name": "EntityType",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the event",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Uniform resource identifier (URI) of the request",
        "Entity": null,
        "Name": "RequestUri",
        "Type": "String"
      },
      {
        "Description": "Unique identifier embedded in every access token and ID token that were issued",
        "Entity": null,
        "Name": "UniqueTokenIdentifier",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the request",
        "Entity": null,
        "Name": "RequestId",
        "Type": "String"
      },
      {
        "Description": "IP address that the attacker attempted to access",
        "Entity": "Ip",
        "Name": "IpAddress",
        "Type": "String"
      },
      {
        "Description": "Unique identifier of the service principal that performed the action",
        "Entity": null,
        "Name": "ServicePrincipalId",
        "Type": "String"
      },
      {
        "Description": "The target workload (for example, Microsoft.Exchange, Microsoft.SharePoint) the API call was made to.",
        "Entity": null,
        "Name": "TargetWorkload",
        "Type": "String"
      },
      {
        "Description": "The size of the response in bytes.",
        "Entity": null,
        "Name": "ResponseSize",
        "Type": "Int64"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "BehaviorInfo",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the behavior",
        "Entity": null,
        "Name": "BehaviorId",
        "Type": "String"
      },
      {
        "Description": "Type of behavior",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Description of behavior",
        "Entity": null,
        "Name": "Description",
        "Type": "String"
      },
      {
        "Description": "Type of threat indicator or breach activity identified by the behavior",
        "Entity": null,
        "Name": "Categories",
        "Type": "String"
      },
      {
        "Description": "MITRE ATT&CK techniques associated with the activity that triggered the behavior",
        "Entity": null,
        "Name": "AttackTechniques",
        "Type": "String"
      },
      {
        "Description": "Product or service that identified the behavior",
        "Entity": null,
        "Name": "ServiceSource",
        "Type": "String"
      },
      {
        "Description": "Detection technology or sensor that identified the notable component or activity",
        "Entity": null,
        "Name": "DetectionSource",
        "Type": "String"
      },
      {
        "Description": "Products or services that provided information for the behavior",
        "Entity": null,
        "Name": "DataSources",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "Date and time of the first activity related to the behavior",
        "Entity": null,
        "Name": "StartTime",
        "Type": "DateTime"
      },
      {
        "Description": "Date and time of the last activity related to the behavior",
        "Entity": null,
        "Name": "EndTime",
        "Type": "DateTime"
      },
      {
        "Description": "Additional information about the behavior",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "AlertsAndObservations",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "BehaviorEntities",
    "Schema": [
      {
        "Description": "Date and time when the record was generated",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "Unique identifier for the behavior",
        "Entity": null,
        "Name": "BehaviorId",
        "Type": "String"
      },
      {
        "Description": "Type of behavior",
        "Entity": null,
        "Name": "ActionType",
        "Type": "String"
      },
      {
        "Description": "Type of threat indicator or breach activity identified by the behavior",
        "Entity": null,
        "Name": "Categories",
        "Type": "String"
      },
      {
        "Description": "Product or service that identified the behavior",
        "Entity": null,
        "Name": "ServiceSource",
        "Type": "String"
      },
      {
        "Description": "Detection technology or sensor that identified the notable component or activity",
        "Entity": null,
        "Name": "DetectionSource",
        "Type": "String"
      },
      {
        "Description": "Products or services that provided information for the behavior",
        "Entity": null,
        "Name": "DataSources",
        "Type": "String"
      },
      {
        "Description": "Type of object, such as a file, a process, a device, or a user",
        "Entity": null,
        "Name": "EntityType",
        "Type": "String"
      },
      {
        "Description": "Indicates whether the entity is impacted or merely related",
        "Entity": null,
        "Name": "EntityRole",
        "Type": "String"
      },
      {
        "Description": "The role of the entity in the behavior",
        "Entity": null,
        "Name": "DetailedEntityRole",
        "Type": "String"
      },
      {
        "Description": "Name of the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FileName",
        "Type": "String"
      },
      {
        "Description": "Folder containing the file that the recorded action was applied to",
        "Entity": null,
        "Name": "FolderPath",
        "Type": "String"
      },
      {
        "Description": "SHA-1 hash of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA1",
        "Type": "String"
      },
      {
        "Description": "SHA-256 of the file that the recorded action was applied to",
        "Entity": "File",
        "Name": "SHA256",
        "Type": "String"
      },
      {
        "Description": "Size of the file in bytes",
        "Entity": null,
        "Name": "FileSize",
        "Type": "Int64"
      },
      {
        "Description": "Malware family that the suspicious or malicious file or process has been classified under",
        "Entity": null,
        "Name": "ThreatFamily",
        "Type": "String"
      },
      {
        "Description": "IP address that was being connected to",
        "Entity": "Ip",
        "Name": "RemoteIP",
        "Type": "String"
      },
      {
        "Description": "URL or fully qualified domain name (FQDN) that was being connected to",
        "Entity": "Url",
        "Name": "RemoteUrl",
        "Type": "String"
      },
      {
        "Description": "User name of the account",
        "Entity": null,
        "Name": "AccountName",
        "Type": "String"
      },
      {
        "Description": "Domain of the account",
        "Entity": null,
        "Name": "AccountDomain",
        "Type": "String"
      },
      {
        "Description": "Security Identifier (SID) of the account",
        "Entity": "UserSid",
        "Name": "AccountSid",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the account in Microsoft Entra ID",
        "Entity": "UserObjectId",
        "Name": "AccountObjectId",
        "Type": "String"
      },
      {
        "Description": "User principal name (UPN) of the account",
        "Entity": null,
        "Name": "AccountUpn",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the device in Microsoft Defender for Endpoint",
        "Entity": "Machine",
        "Name": "DeviceId",
        "Type": "String"
      },
      {
        "Description": "Fully qualified domain name (FQDN) of the device",
        "Entity": "Machine",
        "Name": "DeviceName",
        "Type": "String"
      },
      {
        "Description": "IP address assigned to the local machine used during communication",
        "Entity": "Ip",
        "Name": "LocalIP",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the email, generated by Microsoft 365",
        "Entity": null,
        "Name": "NetworkMessageId",
        "Type": "String"
      },
      {
        "Description": "Subject of the email",
        "Entity": null,
        "Name": "EmailSubject",
        "Type": "String"
      },
      {
        "Description": "Identifier for the group of similar emails clustered based on heuristic analysis of their contents",
        "Entity": null,
        "Name": "EmailClusterId",
        "Type": "String"
      },
      {
        "Description": "Application that performed the recorded action",
        "Entity": null,
        "Name": "Application",
        "Type": "String"
      },
      {
        "Description": "Unique identifier for the application",
        "Entity": null,
        "Name": "ApplicationId",
        "Type": "Int32"
      },
      {
        "Description": "Unique identifier of the third-party OAuth application",
        "Entity": null,
        "Name": "OAuthApplicationId",
        "Type": "String"
      },
      {
        "Description": "Command line used to create the new process",
        "Entity": null,
        "Name": "ProcessCommandLine",
        "Type": "String"
      },
      {
        "Description": "Registry key that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryKey",
        "Type": "String"
      },
      {
        "Description": "Name of the registry value that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryValueName",
        "Type": "String"
      },
      {
        "Description": "Data of the registry value that the recorded action was applied to",
        "Entity": null,
        "Name": "RegistryValueData",
        "Type": "String"
      },
      {
        "Description": "Additional information about the behavior",
        "Entity": null,
        "Name": "AdditionalFields",
        "Type": "String"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "AlertsAndObservations",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  },
  {
    "HasData": true,
    "Name": "OAuthAppInfo",
    "Schema": [
      {
        "Description": "Unique identifier for the record",
        "Entity": null,
        "Name": "ReportId",
        "Type": "String"
      },
      {
        "Description": "Date and time when the record was created",
        "Entity": null,
        "Name": "Timestamp",
        "Type": "DateTime"
      },
      {
        "Description": "The unique  identifier for the app as assigned by Microsoft Entra ID",
        "Entity": null,
        "Name": "OAuthAppId",
        "Type": "String"
      },
      {
        "Description": "The unique identifier for the service principal instance of the application in the tenant",
        "Entity": null,
        "Name": "ServicePrincipalId",
        "Type": "String"
      },
      {
        "Description": "The application's display name as exposed by the associated service principal",
        "Entity": null,
        "Name": "AppName",
        "Type": "String"
      },
      {
        "Description": "Date and time when the application was registered",
        "Entity": null,
        "Name": "AddedOnTime",
        "Type": "DateTime"
      },
      {
        "Description": "Timestamp when the app was last modified",
        "Entity": null,
        "Name": "LastModifiedTime",
        "Type": "DateTime"
      },
      {
        "Description": "Status of the app; can be: Enabled, DisabledByMicrosoft, DisabledByAppGovernancePolicy, DisabledByUser, Deleted (information for apps with Deleted status is only available for 30 days since the app was deleted)",
        "Entity": null,
        "Name": "AppStatus",
        "Type": "String"
      },
      {
        "Description": "Specifies details about the verified publisher of the application which this service principal represents. It includes information such as: DisplayName, VerifiedPublisherId, AddedDateTime",
        "Entity": null,
        "Name": "VerifiedPublisher",
        "Type": "Object"
      },
      {
        "Description": "The privilege level of the app based on the highest classified permission granted to the app",
        "Entity": null,
        "Name": "PrivilegeLevel",
        "Type": "String"
      },
      {
        "Description": "Contains an array of permission objects; each permission object includes PermissionName, TargetAppId, TargetAppDisplayName, PermissionType, PrivilegeLevel, UsageStatus",
        "Entity": null,
        "Name": "Permissions",
        "Type": "Object"
      },
      {
        "Description": "Value is True if a user has provided admin consent to the app on behalf of all the users in the org, otherwise the value is False",
        "Entity": null,
        "Name": "IsAdminConsented",
        "Type": "Boolean"
      },
      {
        "Description": "Count of users who have consented to the app; this information is only available when the app is not admin consented",
        "Entity": null,
        "Name": "ConsentedUsersCount",
        "Type": "Int32"
      },
      {
        "Description": "Specifies whether was the app is internal to the organization or registered in an external tenant",
        "Entity": null,
        "Name": "AppOrigin",
        "Type": "String"
      },
      {
        "Description": "Specifies the ID of the tenant where the app was registered",
        "Entity": null,
        "Name": "AppOwnerTenantId",
        "Type": "String"
      },
      {
        "Description": "Date and time when the app was last used",
        "Entity": null,
        "Name": "LastUsedTime",
        "Type": "DateTime"
      }
    ],
    "TableRetention": {
      "ColdDays": 0,
      "HotDays": 30,
      "TotalInteractiveDays": 30
    },
    "TableSection": "Itp",
    "TableType": "Regular",
    "Tags": null,
    "UsxResourceType": "Defender"
  }
]
