Mappings: Windows Defender ATP Alert
Input | Value |
---|---|
Vendor | Microsoft |
Product | Windows |
Log Format | JSON |
Event ID Regex Pattern | WindowsDefenderAtp.*|CustomDetection |
Output | Value |
---|---|
Vendor | Microsoft |
Product | Windows |
Record Type | Endpoint |
Cloud SIEM Schema Field | Original Record Key | Notes |
---|---|---|
action | investigationState | |
baseImage | evidence.1.fileName | |
commandLine | evidence.1.processCommandLine | |
description | description | |
device_hostname | computerDnsName | |
dstDevice_ip | evidence.1.ipAddress | |
file_hash_sha1 | evidence.1.sha1 | |
file_hash_sha256 | evidence.1.sha256 | |
http_url | evidence.1.url | |
normalizedSeverity | severity | This is a lookup field. More info to come in the catalog later... |
severity | severity | |
threat_category | category | |
threat_identifier | incidentId | |
threat_name | title | |
threat_referenceUrl | @odata.context | |
threat_ruleType | None | The static text direct is populated in this schema field. |
threat_signalName | title | |
timestamp | alertCreationTime | We expect the orginal record value of alertCreationTime is in the format yyyy-MM-dd'T'HH:mm:ss.SSSSSSSX |
user_username | evidence.1.userPrincipalName |