DeviceNetworkEvents

Applies to:

Want to experience Microsoft Defender ATP? Sign up for a free trial.

The DeviceNetworkEvents table in the advanced hunting schema contains information about network connections and related events. Use this reference to construct queries that return information from the table.

For information on other tables in the advanced hunting schema, see the advanced hunting schema reference.

Column name Data type Description
Timestamp datetime Date and time when the event was recorded
DeviceId string Unique identifier for the device in the service
DeviceName string Fully qualified domain name (FQDN) of the device
ActionType string Type of activity that triggered the event
RemoteIP string IP address that was being connected to
RemotePort int TCP port on the remote device that was being connected to
RemoteUrl string URL or fully qualified domain name (FQDN) that was being connected to
LocalIP string IP address assigned to the local device used during communication
LocalPort int TCP port on the local device used during communication
Protocol string IP protocol used, whether TCP or UDP
LocalIPType string Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast
RemoteIPType string Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast
InitiatingProcessSHA1 string SHA-1 of the process (image file) that initiated the event
InitiatingProcessMD5 string MD5 hash of the process (image file) that initiated the event
InitiatingProcessFileName string Name of the process that initiated the event
InitiatingProcessId int Process ID (PID) of the process that initiated the event
InitiatingProcessCommandLine string Command line used to run the process that initiated the event
InitiatingProcessCreationTime datetime Date and time when the process that initiated the event was started
InitiatingProcessFolderPath string Folder containing the process (image file) that initiated the event
InitiatingProcessParentFileName string Name of the parent process that spawned the process responsible for the event
InitiatingProcessParentId int Process ID (PID) of the parent process that spawned the process responsible for the event
InitiatingProcessParentCreationTime datetime Date and time when the parent of the process responsible for the event was started
InitiatingProcessAccountDomain string Domain of the account that ran the process responsible for the event
InitiatingProcessAccountName string User name of the account that ran the process responsible for the event
InitiatingProcessAccountSid string Security Identifier (SID) of the account that ran the process responsible for the event
InitiatingProcessIntegrityLevel string Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources
InitiatingProcessTokenElevation string Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event
ReportId long Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns
AppGuardContainerId string Identifier for the virtualized container used by Application Guard to isolate browser activity