CloudAppEvents

Applies to:

  • Microsoft 365 Defender

Important

Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

Currently available in preview, the CloudAppEvents table in the advanced hunting schema contains information about activities in various cloud apps and services, specifically Microsoft Teams and Exchange Online. Use this reference to construct queries that return information from this table.

This table will expand to include more activities monitored by Microsoft Cloud App Security. Eventually, this table will include file activity currently stored in the AppFileEvents table. Microsoft will provide additional guidance as more data moves to this table.

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

Column name Data type Description
Timestamp datetime Date and time when the event was recorded
ActionType string Type of activity that triggered the event
Application string Application that performed the recorded action
ApplicationId string Unique identifier for the application
AccountObjectId string Unique identifier for the account in Azure Active Directory
AccountDisplayName string Name of the account user displayed in the address book. Typically a combination of a given or first name, a middle initiation, and a last name or surname.
IsAdminOperation string Indicates whether the activity was performed by an administrator
DeviceType string Type of device based on purpose and functionality, such as "Network device", "Workstation", "Server", "Mobile", "Gaming console", or "Printer"
OSPlatform string Platform of the operating system running on the device. This column indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7.
IPAddress string IP address assigned to the endpoint and used during related network communications
IsAnonymousProxy string Indicates whether the IP address belongs to a known anonymous proxy
CountryCode string Two-letter code indicating the country where the client IP address is geolocated
City string City where the client IP address is geolocated
Isp string Internet service provider (ISP) associated with the IP address
UserAgent string User agent information from the web browser or other client application
ActivityType string Type of activity that triggered the event
ActivityObjects string List of objects, such as files or folders, that were involved in the recorded activity
ObjectName string Name of the object that the recorded action was applied to
ObjectType string Type of object, such as a file or a folder, that the recorded action was applied to
ObjectId string Unique identifier of the object that the recorded action was applied to
ReportId string Unique identifier for the event
RawEventData string Raw event information from the source application or service in JSON format
AdditionalFields string Additional information about the entity or event