|
| 1 | +--- |
| 2 | +title: Microsoft Sentinel alert schema differences between standalone and XDR connectors |
| 3 | +description: Learn how alert schema, field mappings, and ingestion behavior differ between standalone connectors and the XDR connector in Microsoft Sentinel. |
| 4 | +author: guywi-ms |
| 5 | +ms.author: guywild |
| 6 | +ms.topic: reference |
| 7 | +ms.date: 01/27/2026 |
| 8 | + |
| 9 | +# customer intent: As a security analyst, I want to understand how alerts differ when ingested through the XDR connector so that I can update my queries, analytic rules, and workbooks accordingly. |
| 10 | +--- |
| 11 | + |
| 12 | +# Alert schema differences: Standalone vs. XDR connector |
| 13 | + |
| 14 | +This article explains the differences between alerts ingested through standalone connectors and alerts ingested through the Extended Detection and Response (XDR) connector in Microsoft Sentinel. |
| 15 | + |
| 16 | +Standalone connectors ingest alerts directly from the original security products, whereas the XDR connector ingests alerts through the Microsoft Defender XDR pipeline. This includes connectors such as Microsoft Defender for Office 365, Microsoft Defender for Endpoint, Microsoft Defender for Identity, Information Rights Management (IRM), Data Loss Prevention (DLP), Microsoft Defender for Cloud (MDC), and Microsoft Defender for Cloud Apps (MDA). |
| 17 | + |
| 18 | +These differences can affect field mappings, derived field behavior, schema structure, and alert ingestion, which might impact your existing queries, analytic rules, and workbooks. Review these differences before migrating to the XDR connector. |
| 19 | + |
| 20 | +For the full alert schema, see the [Security alert schema reference](security-alert-schema.md). |
| 21 | + |
| 22 | +## CompromisedEntity behavior |
| 23 | + |
| 24 | +The CompromisedEntity field is handled differently across products when alerts are ingested through the XDR connector. |
| 25 | + |
| 26 | +| Product | CompromisedEntity equivalent value in XDR alerts | |
| 27 | +|---------|----------------------------------------| |
| 28 | +| Microsoft Defender for Endpoint (MDE) | The device where `"LeadingHost": true` in the alert entities JSON | |
| 29 | +| Microsoft Entra ID (Identity Protection) | Always set to the user’s UPN | |
| 30 | +| Microsoft Defender for Identity (MDI) | Fixed string `"CompromisedEntity"` | |
| 31 | + |
| 32 | +> [!NOTE] |
| 33 | +> In MDE alerts, CompromisedEntity is derived from the device where `"LeadingHost": true`. In some alerts, this field might not be populated. |
| 34 | +
|
| 35 | +In MDI alerts, CompromisedEntity doesn't represent a host or user and is always the literal string `"CompromisedEntity"`. |
| 36 | + |
| 37 | +## Field mapping changes |
| 38 | + |
| 39 | +Some fields are renamed or use different value sets in alerts from the XDR connector. |
| 40 | + |
| 41 | +| Product | Legacy field/property | XDR behavior | |
| 42 | +|---------|-----------------------|--------------| |
| 43 | +| MDE | ExtendedProperties.MicrosoftDefenderAtp.Category | Mapped to `ExtendedProperties.Category` | |
| 44 | +| Microsoft Defender for Office (MDO) | ExtendedProperties.Status | Uses a different value set from legacy | |
| 45 | +| Microsoft Defender for Office (MDO) | ExtendedProperties.InvestigationName | Not available | |
| 46 | + |
| 47 | +## Structural schema transformations (MDI) |
| 48 | + |
| 49 | +The standalone Microsoft Defender for Identity (MDI) connector sometimes used placeholder entities to store additional information. In the XDR connector, this information is folded into properties under the `resourceAccessEvents` collection. |
| 50 | + |
| 51 | +| Legacy entity/property | XDR representation | |
| 52 | +|------------------------|-------------------| |
| 53 | +| ResourceAccessInfo.Time | `resourceAccessEvents[].AccessDateTime` | |
| 54 | +| ResourceAccessInfo.IpAddress | `resourceAccessEvents[].IpAddress` | |
| 55 | +| ResourceAccessInfo.ResourceIdentifier.AccountId | `resourceAccessEvents[].AccountId` | |
| 56 | +| ResourceAccessInfo.ResourceIdentifier.ResourceName | `resourceAccessEvents[].ResourceIdentifier` | |
| 57 | +| DomainResourceIdentifier | `resourceAccessEvents[].ResourceIdentifier` | |
| 58 | + |
| 59 | +ResourceAccessInfo.ComputerId is no longer required because it's 'identical to the Host entity that ResourceAccessInfo is defined in. |
| 60 | + |
| 61 | +## Alert ingestion filtering |
| 62 | + |
| 63 | +Some alerts available through standalone connectors aren't ingested through the XDR connector. |
| 64 | + |
| 65 | +| Product | Filtering behavior | |
| 66 | +|---------|--------------------| |
| 67 | +| Microsoft Defender for Cloud (MDC) | Informational severity alerts aren't ingested | |
| 68 | +| Microsoft Entra ID | By default, alerts below High severity aren't ingested; customers can configure ingestion to include all severities | |
| 69 | + |
| 70 | +## Scoping behavior (Microsoft Defender for Cloud) |
| 71 | + |
| 72 | +Microsoft Defender for Cloud alerts use different scoping when ingested through the XDR connector. |
| 73 | + |
| 74 | +| Standalone connector scope | XDR connector scope | |
| 75 | +|------------------------|---------------------| |
| 76 | +| Subscription level | Tenant level | |
| 77 | + |
| 78 | +> [!NOTE] |
| 79 | +> All MDC alerts are available in the primary workspace for the tenant. Alerts are scoped according to MDC subscription scopes within Defender XDR. |
| 80 | +
|
| 81 | +## Next steps |
| 82 | + |
| 83 | +- [Create and manage analytic rules](create-analytics-rules.md) |
| 84 | +- [Use workbooks in Microsoft Sentinel](monitor-your-data.md) |
0 commit comments