Stay organized with collections Save and categorize content based on your preferences.

Change log for MICROSOFT_DEFENDER_ENDPOINT

Date Changes
2022-10-14 Enhancement -
- Mapped "properties.UrlDomain" to "target.hostname".
- Mapped "properties.Url" to "target.url".
- Mapped "properties.UrlLocation", "OperationName" to "additional.fields".
2022-10-07 Enhancement - Added mapping for unparsed log
- Mapped "metadata.event_type" to "event_type1".
Added condition check for event_type.
2022-09-02 Enhancement -
- Mapped "metadata.event_type" to "REGISTRY_CREATION" where "properties.ActionType" is "RegistryKeyCreated".
2022-08-11 Enhancement-
- Mapped properties.Title to security_result.threat_name.
- Mapped properties.AlertId to metadata.product_log_id.
- Mapped properties.Category to security_result.category_details.
- Mapped properties.Severity to security_result.severity_details.
- Mapped properties.ServiceSource to security_result.about.labels.
- Mapped properties.DetectionSource to security_result.about.labels.
- Mapped properties.AttackTechniques to security_result.about.labels.
- Added a new grok pattern to parse incorrect json format logs with type AlertInfo.
2022-06-02 Enhancement- Following mappings were added and modified.
Mapped DeliveryAction to security_result.action.
Mapped LogonType to extensions.auth.mechanism as INTERACTIVE additionally.
For AdditionalFields.IsLocalLogon, extensions.auth.mechanism has been updated as LOCAL or REMOTE,based on boolean value.
Mapped ReportId to metadata.product_log_id.
Mapped DetectionMethods to security_result.rule_name.
Mapped Severity to security_result.severity and security_result.severity_details.
Mapped category to metadata.product_event_type.
Mapped RemoteUrl to target.url.
Mapped DeviceId to principal.asset_id.
PreviousRegistryValueData, PreviousRegistryKey and PreviousRegistryValueName mapping modified from target to src.
FileType, FileName, SHA256 and FileSize mapping modified to about from target for EmailAttachmentInfo event.
InitiatingProcessFileName appended to InitiatingProcessFolderPath if file name is not present.
SenderFromAddress additionally mapped to principal.user.product_object_id.
InitiatingProcessAccountSid mapped to principal.user.windows_sid.
InitiatingProcessAccountName mapped to principal.user.userid.
AccountDomain, AccountName, AccountSid mapped to target.user.userid, target.administrative_domain and target.user.windows_sid respectively.
RecipientEmailAddress additionally mapped to target.user.email_addresses.
RecipientObjectId mapped to target.user.product_object_id.
Modified the value stored in metadata.vendor_name to 'Microsoft'.
2022-05-05 Enhancement-
1) Updated parsing logic for AccountName and InitiatingProcessAccountName to map both values to UDM. InitiatingProcessAccountName when populated is mapped to principal.user.userid, and AccountName to target.user.userid.
2022-03-30 Enhancement-
1) For events AdvancedHunting-DeviceNetworkInfo and AdvancedHunting-DeviceInfo :
- Changed mapping for deviceId from 'entity.asset.asset_id' to 'entity.asset.product_object_id'.
- Changed mapping for ReportId from 'entity.asset.product_object_id' to 'entity.asset.attribute.labels'.
2) For all other events:
- Mapped deviceId to 'metadata.product_log_id'.
- Changed mapping for ReportId from 'metadata.product_log_id' to 'about.labels'.