Skip to content

Latest commit

 

History

History
65 lines (52 loc) · 3.28 KB

File metadata and controls

65 lines (52 loc) · 3.28 KB
title AlertInfo table in the advanced hunting schema
description Learn about alert generation events in the AlertInfo table of the advanced hunting schema
search.appverid met150
ms.service defender-xdr
ms.subservice adv-hunting
f1.keywords
NOCSH
ms.author pauloliveria
author poliveria
ms.localizationpriority medium
manager dansimp
audience ITPro
ms.collection
m365-security
tier3
ms.custom
cx-ti
cx-ah
appliesto
Microsoft Defender XDR
Microsoft Sentinel in the Microsoft Defender portal
ms.topic reference
ms.date 03/28/2025

AlertInfo

[!INCLUDE Microsoft Defender XDR rebranding]

Get access

To use advanced hunting or other Microsoft Defender XDR capabilities, you need an appropriate role in Microsoft Entra ID. Read about required roles and permissions for advanced hunting.

This advanced hunting table is populated by records from various Microsoft Defender services. If your organization hasn’t deployed the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy services in Defender XDR, read Deploy supported services.

Also, your access to endpoint data is determined by role-based access control (RBAC) settings in Microsoft Defender for Endpoint. Read about managing access to Microsoft Defender XDR.

AlertInfo

The AlertInfo table in the advanced hunting schema contains information about alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity. Use this reference to construct queries that return information from this table.

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

Column name Data type Description
Timestamp datetime Date and time when the record was generated
AlertId string Unique identifier for the alert
Title string Title of the alert
Category string Type of threat indicator or breach activity identified by the alert
Severity string Indicates the potential impact (high, medium, or low) of the threat indicator or breach activity identified by the alert
ServiceSource string Product or service that provided the alert information
DetectionSource string Detection technology or sensor that identified the notable component or activity
AttackTechniques string MITRE ATT&CK techniques associated with the activity that triggered the alert

Related topics