NetworkAccessAlerts

This table is part of Identity and Network Access, which contains Network Access Alerts. These Alerts can be leveraged for knowing the state of your network access.

Table attributes

Attribute Value
Resource types -
Categories Security, Network, IT & Management Tools
Solutions LogManagement
Basic log No
Ingestion-time transformation No
Sample Queries -

Columns

Column Type Description
AlertType string The type name of the alert. Alerts of the same type should have the same name. This field is a keyed string representing the type of alert and not of an alert instance. All alert instances from the same detection logic/analytic should have the same value for alert type.
_BilledSize real The record size in bytes
ComponentName string The name of a component inside the product which generated the alert. This is an optional field, which might be populated only for product in which external end user are aware of specific components within a product. For products that offer different types of SKU/Bundles, this field can hold the SKU or bundle name.
CreationDateTime datetime The date and time (UTC) that the event was generated.
Description string The number of bytes sent from the source to the destination for the connection or session.
DetectionTechnology string Optional field to hold the alert threat detection technology.
DisplayName string The display name of the alert, this value is displayed to users either as-is or with additional parameters.
ExtendedProperties dynamic A bag of fields which will be presented to the user. Providers can send here any custom fields that should be part of the alert.
FirstActivityDateTime datetime The impact start time of the alert (the time of the first event or activity included in the alert). The field is serialized a string according to ISO8601, including UTC timezone information.
Id string A unique identifier for each Network Access Alert.
_IsBillable string Specifies whether ingesting the data is billable. When _IsBillable is false ingestion isn't billed to your Azure account
IsPreview bool IsPreview will be defined as true where the alert is in public preview state and not eligible for GA yet. By default the value is false.
LastActivityDateTime datetime The impact end time of the alert (the time of the last event or activity included in the alert). The field is serialized a string according to ISO8601, including UTC timezone information.
PolicyId string The Policy Id associated with the network access traffic that generated the Alert.
ProductName string The name of the product which published this alert, i.e. Azure Security Center, Azure ATP, Microsoft Defender ATP, O365 ATP, MCAS, etc.
RelatedResources dynamic A list of entities related to the alert. This list can hold a mixture of entities of diverse types. The entities type can be any of the types defined in the Entities section. Entities which are not in the list below can also be sent, however it is not guaranteed that they will be processed (the alert will not fail validation with new types of entities).
Severity string The severity of the alert as it is reported by the provider. Possible Values: Informational, Low, Medium, High.
SourceSystem string The type of agent the event was collected by. For example, OpsManager for Windows agent, either direct connect or Operations Manager, Linux for all Linux agents, or Azure for Azure Diagnostics
SubTechniques string Optional field that specify the kill chain related sub-techniques behind the alert. Each sub-technique should be added in this list using its ID and it should have at least one matching intent in the Intent field.
Techniques string Optional field that specify the kill chain related techniques behind the alert. Each technique should be added in this list using its ID and it should have at least one matching intent in the Intent field. The validation of this field (the expected format of the technique ID and the matching against the Intent values) follow MITRE att@ck enterprise matrix model (Opens in new window or tab), and further guidance on the different techniques that make up each intent can be found in MITRE's documentation.
TenantId string The Log Analytics workspace ID
TimeGenerated datetime The date and time (UTC) that the event was generated.
Type string The name of the table
VendorName string The name of the vendor that raised the alert, this value is displayed to users as is. For most internal security products alerts it should be set as 'Microsoft'.