DeviceRegistryEvents

Important

The improved Microsoft 365 security center is now available. This new experience brings Defender for Endpoint, Defender for Office 365, Microsoft 365 Defender, and more into the Microsoft 365 security center. Learn what's new.

Applies to:

  • Microsoft 365 Defender
  • Microsoft Defender for Endpoint

The DeviceRegistryEvents table in the advanced hunting schema contains information about the creation and modification of registry entries. Use this reference to construct queries that return information from this table.

Tip

For detailed information about the events types (ActionType values) supported by a table, use the built-in schema reference available in the security center.

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

Column name Data type Description
Timestamp datetime Date and time when the event was recorded
DeviceId string Unique identifier for the machine in the service
DeviceName string Fully qualified domain name (FQDN) of the machine
ActionType string Type of activity that triggered the event. See the in-portal schema reference for details
RegistryKey string Registry key that the recorded action was applied to
RegistryValueType string Data type, such as binary or string, of the registry value that the recorded action was applied to
RegistryValueName string Name of the registry value that the recorded action was applied to
RegistryValueData string Data of the registry value that the recorded action was applied to
PreviousRegistryKey string Original registry key of the registry value before it was modified
PreviousRegistryValueName string Original name of the registry value before it was modified
PreviousRegistryValueData string Original data of the registry value before it was modified
InitiatingProcessAccountDomain string Domain of the account that ran the process responsible for the event
InitiatingProcessAccountName string User name of the account that ran the process responsible for the event
InitiatingProcessAccountSid string Security Identifier (SID) of the account that ran the process responsible for the event
InitiatingProcessAccountUpn string User principal name (UPN) of the account that ran the process responsible for the event
InitiatingProcessAccountObjectId string Azure AD object ID of the user account that ran the process responsible for the event
InitiatingProcessSHA1 string SHA-1 of the process (image file) that initiated the event
InitiatingProcessSHA256 string SHA-256 of the process (image file) that initiated the event. This field is usually not populated — use the SHA1 column when available.
InitiatingProcessMD5 string MD5 hash of the process (image file) that initiated the event
InitiatingProcessFileName string Name of the process that initiated the event
InitiatingProcessFileSize long Size of the file that ran the process responsible for the event
InitiatingProcessVersionInfoCompanyName string Company name from the version information of the process (image file) responsible for the event
InitiatingProcessVersionInfoProductName string Product name from the version information of the process (image file) responsible for the event
InitiatingProcessVersionInfoProductVersion string Product version from the version information of the process (image file) responsible for the event
InitiatingProcessVersionInfoInternalFileName string Internal file name from the version information of the process (image file) responsible for the event
InitiatingProcessVersionInfoOriginalFileName string Original file name from the version information of the process (image file) responsible for the event
InitiatingProcessVersionInfoFileDescription string Description from the version information of the process (image file) responsible for the event
InitiatingProcessId int Process ID (PID) of the process that initiated the event
InitiatingProcessCommandLine string Command line used to run the process that initiated the event
InitiatingProcessCreationTime datetime Date and time when the process that initiated the event was started
InitiatingProcessFolderPath string Folder containing the process (image file) that initiated the event
InitiatingProcessParentId int Process ID (PID) of the parent process that spawned the process responsible for the event
InitiatingProcessParentFileName string Name of the parent process that spawned the process responsible for the event
InitiatingProcessParentCreationTime datetime Date and time when the parent of the process responsible for the event was started
InitiatingProcessIntegrityLevel string Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources
InitiatingProcessTokenElevation string Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event
ReportId long Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns
AppGuardContainerId string Identifier for the virtualized container used by Application Guard to isolate browser activity