Skip to content

Latest commit

 

History

History
79 lines (64 loc) · 4.12 KB

File metadata and controls

79 lines (64 loc) · 4.12 KB
title CloudAuditEvents table in the advanced hunting schema
description Learn about events from Microsoft Defender for Cloud in the CloudAuditEvents table of the advanced hunting schema
search.appverid met150
ms.service defender-xdr
ms.subservice adv-hunting
f1.keywords
NOCSH
ms.author pauloliveria
author poliveria
ms.localizationpriority medium
manager dansimp
audience ITPro
ms.collection
m365-security
tier3
ms.custom
cx-ti
cx-ah
appliesto
Microsoft Defender XDR
Microsoft Sentinel in the Microsoft Defender portal
ms.topic reference
ms.date 05/20/2025

CloudAuditEvents (Preview)

[!INCLUDE Microsoft Defender XDR rebranding]

The CloudAuditEvents table in the advanced hunting schema contains information about cloud audit events for various cloud platforms protected by the organization's Microsoft Defender for Cloud. Use this reference to construct queries that return information from this table.

Important

Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

This advanced hunting table is populated by records from Microsoft Defender for Cloud. If your organization doesn't have Microsoft Defender for Cloud, queries that use the table aren’t going to work or return any results. For more information about prerequisites in integrating Defender for Cloud with Defender XDR, read Microsoft Defender XDR integration.

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

Column name Data type Description
Timestamp datetime Date and time when the event was recorded
ReportId string Unique identifier for the event
DataSource string Data source for the cloud audit events, can be GCP (for Google Cloud Platform), AWS (for Amazon Web Services), Azure (for Azure Resource Manager), Kubernetes Audit (for Kubernetes), or other cloud platforms
ActionType string Type of activity that triggered the event, can be: Unknown, Create, Read, Update, Delete, Other
OperationName string Audit event operation name as it appears in the record, usually includes both resource type and operation
ResourceId string Unique identifier of the cloud resource accessed
IPAddress string The client IP address used to access the cloud resource or control plane
IsAnonymousProxy boolean Indicates whether the IP address belongs to a known anonymous proxy (1) or no (0)
CountryCode string Two-letter code indicating the country where the client IP address is geolocated
City string City where the client IP address is geolocated
Isp string Internet service provider (ISP) associated with the IP address
UserAgent string User agent information from the web browser or other client application
RawEventData dynamic Full raw event information from the data source in JSON format
AdditionalFields dynamic Additional information about the audit event

Sample query

To get a sample list of VM creation commands performed in the last seven days:

CloudAuditEvents
| where Timestamp > ago(7d)
| where OperationName startswith "Microsoft.Compute/virtualMachines/write"
| extend Status = RawEventData["status"], SubStatus = RawEventData["subStatus"]
| sample 10

Related topics