Skip to content

Latest commit

 

History

History
43 lines (36 loc) · 1.26 KB

53d9bca1-44a8-4be5-905c-1c4d19ffddf6.md

File metadata and controls

43 lines (36 loc) · 1.26 KB

Mappings: Windows Defender ATP Alert

Input Requirements

Input Value
Vendor Microsoft
Product Windows
Log Format JSON
Event ID Regex Pattern WindowsDefenderAtp.*|CustomDetection

Record Output

Output Value
Vendor Microsoft
Product Windows
Record Type Endpoint

Fields Mapped

Cloud SIEM Schema Field Original Record Key Notes
action investigationState
baseImage evidence.1.fileName
commandLine evidence.1.processCommandLine
description description
device_hostname computerDnsName
dstDevice_ip evidence.1.ipAddress
file_hash_sha1 evidence.1.sha1
file_hash_sha256 evidence.1.sha256
http_url evidence.1.url
normalizedSeverity severity This is a lookup field. More info to come in the catalog later...
severity severity
threat_category category
threat_identifier incidentId
threat_name title
threat_referenceUrl @odata.context
threat_ruleType None The static text direct is populated in this schema field.
threat_signalName title
timestamp alertCreationTime We expect the orginal record value of alertCreationTime is in the format yyyy-MM-dd'T'HH:mm:ss.SSSSSSSX
user_username evidence.1.userPrincipalName