Understand the advanced hunting schema

Applies to:

Want to experience Microsoft Defender ATP? Sign up for a free trial.


Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

The advanced hunting schema is made up of multiple tables that provide either event information or information about devices and other entities. To effectively build queries that span multiple tables, you need to understand the tables and the columns in the advanced hunting schema.

Schema tables

The following reference lists all the tables in the advanced hunting schema. Each table name links to a page describing the column names for that table.

Table and column names are also listed within the Microsoft Defender Security Center, in the schema representation on the advanced hunting screen.

Table name Description
DeviceAlertEvents Alerts on Microsoft Defender Security Center
DeviceInfo Device information, including OS information
DeviceNetworkInfo Network properties of devices, including adapters, IP and MAC addresses, as well as connected networks and domains
DeviceProcessEvents Process creation and related events
DeviceNetworkEvents Network connection and related events
DeviceFileEvents File creation, modification, and other file system events
DeviceRegistryEvents Creation and modification of registry entries
DeviceLogonEvents Sign-ins and other authentication events
DeviceImageLoadEvents DLL loading events
DeviceEvents Multiple event types, including events triggered by security controls such as Microsoft Defender Antivirus and exploit protection
DeviceFileCertificateInfo Certificate information of signed files obtained from certificate verification events on endpoints
DeviceTvmSoftwareInventoryVulnerabilities Inventory of software on devices as well as any known vulnerabilities in these software products
DeviceTvmSoftwareVulnerabilitiesKB Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available
DeviceTvmSecureConfigurationAssessment Threat & Vulnerability Management assessment events, indicating the status of various security configurations on devices
DeviceTvmSecureConfigurationAssessmentKB Knowledge base of various security configurations used by Threat & Vulnerability Management to assess devices; includes mappings to various standards and benchmarks