DataSecurityBehaviors (Preview)

Applies to:

  • Microsoft Defender XDR
  • Microsoft Purview

Important

Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

The DataSecurityBehaviors table in the advanced hunting schema contains insights about potentially suspicious user behaviors that violate the user-defined or default policies configured in the Microsoft Purview suite of solutions.

Insights cover a range of data security related behaviors like behaviors involving exfiltration, obfuscation, risky interactions with AI applications, and others. Insights are generated by aggregating user behaviors over a calendar day and comparing them with previous activity, peer group activity, or other activities done by the user. Insights also capture summaries of various risk pivots like sensitive data, risky destinations, and the like.

Use this reference to construct queries that return information from this table.

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

Column name Data type Description
Timestamp datetime Date and time when the record was generated or updated
BehaviorId string Unique identifier for the behavior
ActionType string Type of behavior. Refer to the catalog of behaviors detected by Microsoft Purview Insider Risk Management.
StartTime datetime Date and time of the first activity related to the behavior
EndTime datetime Date and time of the last activity related to the behavior
AttackTechniques string MITRE ATT&CK techniques associated with the activity that triggered the behavior. Refer to subtechniques in the insider risk management behavior catalog.
Categories string Type of threat indicator or breach activity identified by the behavior
ActionCategory enum Category of action that triggered the event
Description string Description of the behavior
ServiceSource string Product or service that identified the behavior
DetectionSource string Detection technology or sensor that identified the notable component or activity
ActivityCount int Total user activity events recorded under this behavior
IsAnomalous bool Indicates if this user behavior is anomalous by itself or based on insider risk management global settings
IsContentHidden bool Indicates if the behavior involves hidden content on a device
AccountUpn string User principal name (UPN) of the account
AccountEmail string Email address of the account
Application string Application that performed the recorded action
DeviceInfo dynamic List of device information for the device involved in this behavior, including device ID, device name, and the number of events in which the device is involved; in JSON array format
SensitivityLabelInfo dynamic List of sensitivity labels assigned to content involved in this behavior, including the unique identifier for the Microsoft Information Protection sensitivity label assigned to the related content, the name of the sensitivity label, and the number of events in the behavior involving this label; in JSON array format
SensitiveInfoTypesInfo dynamic List of sensitive info types detected in the content involved in this behavior, including the unique identifier for the sensitive info type, the name of the sensitive info type, and the number of events in the behavior involving this sensitive info type; in JSON array format
UrlDomainInfo dynamic List of websites or service URLs involved in the behavior, including the name of the URL domain, the direction of data (sent or received from domain), type of URL domain (customer-configured or based on watchlists), and the number of events in the behavior involving the specific domain; in JSON array format
SharepointSiteInfo dynamic List of SharePoint sites involved in this behavior, including the unique identifier for the SharePoint site, the name of the SharePoint site, and the number of events in the behavior involving the SharePoint site; in JSON array format
RecipientEmailInfo dynamic List of information about the recipient involved in the behavior, including the email address of the recipient and the number of events in the behavior involving the recipient; in JSON array format
RemovableMediaInfo dynamic List of any removable media involved in the behavior, including the serial number of the removable media device, the manufacturer of the removable media device, and the model of the removable device; in JSON array format
PrinterName dynamic List of printers involved in the behavior; in array format
PriorityContentMatchInfo dynamic List of priority content matches identified within this behavior and their associated details. Priority content definitions are done by the admins for each Insider risk management policy. Displayed in JSON array format.

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.