CloudAppEvents

Note

Want to experience Microsoft Defender XDR? Learn more about how you can evaluate and pilot Microsoft Defender XDR.

Applies to:

  • Microsoft Defender XDR

The CloudAppEvents table in the advanced hunting schema contains information about events involving accounts and objects in Office 365 and other cloud apps and services. Use this reference to construct queries that return information from this table.

For information on other tables in the advanced hunting schema, see the advanced hunting reference.

Column name Data type Description
Timestamp datetime Date and time when the event was recorded
ActionType string Type of activity that triggered the event
Application string Application that performed the recorded action
ApplicationId int Unique identifier for the application
AppInstanceId int Unique identifier for the instance of an application. To convert this to Microsoft Defender for Cloud Apps App-connector-ID use CloudAppEvents|distinct ApplicationId,AppInstanceId,binary_or(binary_shift_left(AppInstanceId,20),ApplicationId)|order by ApplicationId,AppInstanceId
AccountObjectId string Unique identifier for the account in Microsoft Entra ID
AccountId string An identifier for the account as found by Microsoft Defender for Cloud Apps. Could be Microsoft Entra ID, user principal name, or other identifiers.
AccountDisplayName string Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.
IsAdminOperation bool Indicates whether the activity was performed by an administrator
DeviceType string Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer
OSPlatform string Platform of the operating system running on the device. This column indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10 and Windows 7.
IPAddress string IP address assigned to the device during communication
IsAnonymousProxy boolean Indicates whether the IP address belongs to a known anonymous proxy
CountryCode string Two-letter code indicating the country where the client IP address is geolocated
City string City where the client IP address is geolocated
Isp string Internet service provider associated with the IP address
UserAgent string User agent information from the web browser or other client application
ActivityType string Type of activity that triggered the event
ActivityObjects dynamic List of objects, such as files or folders, that were involved in the recorded activity
ObjectName string Name of the object that the recorded action was applied to
ObjectType string Type of object, such as a file or a folder, that the recorded action was applied to
ObjectId string Unique identifier of the object that the recorded action was applied to
ReportId string Unique identifier for the event
AccountType string Type of user account, indicating its general role and access levels, such as Regular, System, Admin, Application
IsExternalUser boolean Indicates whether a user inside the network doesn't belong to the organization's domain
IsImpersonated boolean Indicates whether the activity was performed by one user for another (impersonated) user
IPTags dynamic Customer-defined information applied to specific IP addresses and IP address ranges
IPCategory string Additional information about the IP address
UserAgentTags dynamic More information provided by Microsoft Defender for Cloud Apps in a tag in the user agent field. Can have any of the following values: Native client, Outdated browser, Outdated operating system, Robot
RawEventData dynamic Raw event information from the source application or service in JSON format
AdditionalFields dynamic Additional information about the entity or event
LastSeenForUser string Shows how many days back the attribute was recently in use by the user in days (i.e. ISP, ActionType etc.)
UncommonForUser string Lists the attributes in the event that are uncommon for the user, using this data to help rule out false positives and find out anomalies

Apps and services covered

The CloudAppEvents table contains enriched logs from all SaaS applications connected to Microsoft Defender for Cloud Apps, such as:

  • Office 365 and Microsoft Applications, including:
    • Exchange Online
    • SharePoint Online
    • Microsoft Teams
    • Dynamics 365
    • Skype for Business
    • Viva Engage
    • Power Automate
    • Power BI
    • Dropbox
    • Salesforce
    • GitHub
    • Atlassian

Connect supported cloud apps for instant, out-of-the-box protection, deep visibility into the app's user and device activities, and more. For more information, see Protect connected apps using cloud service provider APIs.