Skip to content

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

README.md

Microsoft Defender for Endpoint integration

This integration is for Microsoft Defender for Endpoint logs.

Microsoft Defender for Endpoint integration collects data for Alert, Machine, Machine Action, and Vulnerability logs using REST API.

For a demo, refer to the following video (click to view).

Microsoft Defender for Endpoint integration video

Data streams

This integration collects the following logs:

  • Alert - Retrieves alerts generated by Microsoft Defender for Endpoint.
  • Machine - Retrieves machines that have communicated with Microsoft Defender for Endpoint.
  • Machine Action - Retrieves logs of actions carried out on machines.
  • Vulnerability - Retrieves logs of Vulnerability.

Requirements

Agentless enabled integration

Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to Agentless integrations and the Agentless integrations FAQ.

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

Agent-based installation

Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions. You can install only one Elastic Agent per host.

Setup

Collect logs through REST API

To allow the integration to ingest data from the Microsoft Defender API, you need to create a new application on your Azure domain. The procedure to create an application is found on the Create a new Azure Application documentation page.

When the application is granted the API permissions listed in the table below, it will receive only the necessary access to collect logs nothing more within the Azure domain.

Data stream API Permissions
Alert Alert.Read.All
Machine Machine.Read.All
Machine Action Machine.Read.All
Vulnerability Vulnerability.Read.All, Vulnerability.Read

After the application has been created, it should contain 3 values that you need to apply to the module configuration.

These values are:

  • Client ID
  • Client Secret
  • Tenant ID

Enable the integration in Elastic

  1. In Kibana navigate to Management > Integrations.
  2. In the search bar, type Microsoft Defender for Endpoint.
  3. Select the Microsoft Defender for Endpoint integration and add it.
  4. Add all the required integration configuration parameters, including the Client ID, Client Secret, Tenant ID to enable data collection.
  5. Select "Save and continue" to save the integration.

Data Retention and ILM Configuration

For vulnerability data stream, a full sync pulls in a large volume of data, which can lead to storage issues or index overflow over time. To avoid this, we have set up an Index Lifecycle Management (ILM) policy that automatically deletes vulnerability data older than 7 days. This helps keep storage usage under control.

Note: The user or service account associated with the integration must have the following index privileges on the relevant index: delete, delete_index

ECS mappings

Defender for Endpoint fields ECS Fields
alertCreationTime @timestamp
aadTenantId cloud.account.id
category threat.technique.name
computerDnsName host.hostname
description rule.description
detectionSource observer.name
evidence.fileName file.name
evidence.filePath file.path
evidence.processId process.pid
evidence.processCommandLine process.command_line
evidence.processCreationTime process.start
evidence.parentProcessId process.parent.pid
evidence.parentProcessCreationTime process.parent.start
evidence.sha1 file.hash.sha1
evidence.sha256 file.hash.sha256
evidence.url url.full
firstEventTime event.start
id event.id
lastEventTime event.end
machineId cloud.instance.id
title message
severity event.severity

Alert severity mapping

The values used in event.severity are consistent with Elastic Detection Rules.

Severity Name event.severity
Low (or Informational) 21
Medium 47
High 73
Critical 99

Troubleshooting

  • Expiring SAS URLs: The option SAS Valid Hours in vulnerability data stream controls the duration that the Shared Access Signature (SAS) download URLs are valid for. The default value of this option is 1h i.e., 1 hour, and the maximum allowed value is 6h i.e., 6 hours. Increase the value of the option SAS Valid Hours when you see error.message indicates signatures are invalid, or when you notice invalid signature errors inside CEL trace logs.

Logs Reference

Log

This is the log dataset.

Example

An example event for log looks as following:

{
    "@timestamp": "2025-10-16T10:42:06.592Z",
    "agent": {
        "ephemeral_id": "b43b835d-ba25-4ad7-aa9f-200c15733e48",
        "id": "353e6432-27a9-40a4-98a2-557dbb69496b",
        "name": "elastic-agent-48674",
        "type": "filebeat",
        "version": "8.19.3"
    },
    "cloud": {
        "account": {
            "id": "a839b112-1253-6432-9bf6-94542403f21c"
        },
        "instance": {
            "id": "111e6dd8c833c8a052ea231ec1b19adaf497b625"
        },
        "provider": "azure"
    },
    "data_stream": {
        "dataset": "microsoft_defender_endpoint.log",
        "namespace": "90146",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "353e6432-27a9-40a4-98a2-557dbb69496b",
        "snapshot": false,
        "version": "8.19.3"
    },
    "event": {
        "action": "Execution",
        "agent_id_status": "verified",
        "category": [
            "host"
        ],
        "created": "2021-01-26T20:33:57.7220239Z",
        "dataset": "microsoft_defender_endpoint.log",
        "duration": 101466100,
        "end": "2021-01-26T20:31:33.0577322Z",
        "id": "da637472900382838869_1364969609",
        "ingested": "2025-10-16T10:42:09Z",
        "kind": "alert",
        "provider": "defender_endpoint",
        "severity": 21,
        "start": "2021-01-26T20:31:32.9562661Z",
        "timezone": "UTC",
        "type": [
            "access",
            "start"
        ]
    },
    "host": {
        "hostname": "temp123.middleeast.corp.microsoft.com",
        "id": "111e6dd8c833c8a052ea231ec1b19adaf497b625",
        "name": "temp123.middleeast.corp.microsoft.com"
    },
    "input": {
        "type": "httpjson"
    },
    "message": "Low-reputation arbitrary code executed by signed executable",
    "microsoft": {
        "defender_endpoint": {
            "assignedTo": "elastic@elasticuser.com",
            "evidence": {
                "aadUserId": "11118379-2a59-1111-ac3c-a51eb4a3c627",
                "accountName": "name",
                "domainName": "DOMAIN",
                "entityType": "User",
                "userPrincipalName": "temp123@microsoft.com"
            },
            "incidentId": "1126093",
            "investigationState": "Queued",
            "lastUpdateTime": "2021-01-26T20:33:59.2Z",
            "rbacGroupName": "A",
            "status": "New"
        }
    },
    "observer": {
        "name": "WindowsDefenderAtp",
        "product": "Defender for Endpoint",
        "vendor": "Microsoft"
    },
    "related": {
        "hosts": [
            "temp123.middleeast.corp.microsoft.com"
        ],
        "user": [
            "temp123"
        ]
    },
    "rule": {
        "description": "Binaries signed by Microsoft can be used to run low-reputation arbitrary code. This technique hides the execution of malicious code within a trusted process. As a result, the trusted process might exhibit suspicious behaviors, such as opening a listening port or connecting to a command-and-control (C&C) server."
    },
    "tags": [
        "microsoft-defender-endpoint",
        "forwarded"
    ],
    "threat": {
        "framework": "MITRE ATT&CK",
        "technique": {
            "name": [
                "Execution"
            ]
        }
    },
    "user": {
        "domain": "DOMAIN",
        "id": "S-1-5-21-11111607-1111760036-109187956-75141",
        "name": "temp123"
    }
}

Exported fields

Field Description Type
@timestamp Event timestamp. date
cloud.image.id Image ID for the cloud instance. keyword
data_stream.dataset Data stream dataset. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
event.dataset Event dataset constant_keyword
event.module Event module constant_keyword
host.containerized If the host is a container. boolean
host.os.build OS build information. keyword
host.os.codename OS codename, if any. keyword
input.type Input type keyword
log.offset Log offset long
microsoft.defender_endpoint.assignedTo Owner of the alert. keyword
microsoft.defender_endpoint.classification Specification of the alert. Possible values are: 'Unknown', 'FalsePositive', 'TruePositive'. keyword
microsoft.defender_endpoint.determination Specifies the determination of the alert. Possible values are: 'NotAvailable', 'Apt', 'Malware', 'SecurityPersonnel', 'SecurityTesting', 'UnwantedSoftware', 'Other'. keyword
microsoft.defender_endpoint.evidence.aadUserId ID of the user involved in the alert keyword
microsoft.defender_endpoint.evidence.accountName Username of the user involved in the alert keyword
microsoft.defender_endpoint.evidence.domainName Domain name related to the alert keyword
microsoft.defender_endpoint.evidence.entityType The type of evidence keyword
microsoft.defender_endpoint.evidence.ipAddress IP address involved in the alert ip
microsoft.defender_endpoint.evidence.userPrincipalName Principal name of the user involved in the alert keyword
microsoft.defender_endpoint.incidentId The Incident ID of the Alert. keyword
microsoft.defender_endpoint.investigationId The Investigation ID related to the Alert. keyword
microsoft.defender_endpoint.investigationState The current state of the Investigation. keyword
microsoft.defender_endpoint.lastUpdateTime The date and time (in UTC) the alert was last updated. date
microsoft.defender_endpoint.rbacGroupName User group related to the alert keyword
microsoft.defender_endpoint.resolvedTime The date and time in which the status of the alert was changed to 'Resolved'. date
microsoft.defender_endpoint.status Specifies the current status of the alert. Possible values are: 'Unknown', 'New', 'InProgress' and 'Resolved'. keyword
microsoft.defender_endpoint.threatFamilyName Threat family. keyword

Machine

This is the machine dataset.

Example

An example event for machine looks as following:

{
    "@timestamp": "2025-10-16T10:43:46.052Z",
    "agent": {
        "ephemeral_id": "c45e3532-8231-4823-b919-99eedb3d39d8",
        "id": "d09beef9-81e5-4ec1-b71e-6e744709b60f",
        "name": "elastic-agent-38879",
        "type": "filebeat",
        "version": "8.19.3"
    },
    "data_stream": {
        "dataset": "microsoft_defender_endpoint.machine",
        "namespace": "77808",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "d09beef9-81e5-4ec1-b71e-6e744709b60f",
        "snapshot": false,
        "version": "8.19.3"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "host"
        ],
        "dataset": "microsoft_defender_endpoint.machine",
        "ingested": "2025-10-16T10:43:49Z",
        "kind": "event",
        "original": "{\"aadDeviceId\":null,\"agentVersion\":\"10.8760.17763.6414\",\"computerDnsName\":\"dlp-win2k19\",\"deviceValue\":\"Normal\",\"exclusionReason\":null,\"exposureLevel\":\"High\",\"firstSeen\":\"2024-10-17T13:56:23.9412922Z\",\"healthStatus\":\"Inactive\",\"id\":\"c114cb1c0b827fabcdefabcdef2b9cfd469c091b\",\"ipAddresses\":[{\"ipAddress\":\"10.50.11.140\",\"macAddress\":\"00005E005301\",\"operationalStatus\":\"Up\",\"type\":\"Ethernet\"},{\"ipAddress\":\"1.128.0.0\",\"macAddress\":\"00005E00530A\",\"operationalStatus\":\"Up\",\"type\":\"Ethernet\"},{\"ipAddress\":\"2a02:cf40::\",\"macAddress\":\"00005E005302\",\"operationalStatus\":\"Up\",\"type\":\"Ethernet\"},{\"ipAddress\":\"127.0.0.1\",\"macAddress\":null,\"operationalStatus\":\"Up\",\"type\":\"SoftwareLoopback\"},{\"ipAddress\":\"::1\",\"macAddress\":null,\"operationalStatus\":\"Up\",\"type\":\"SoftwareLoopback\"}],\"isAadJoined\":false,\"isExcluded\":false,\"isPotentialDuplication\":false,\"lastExternalIpAddress\":\"1.128.0.0\",\"lastIpAddress\":\"10.50.11.140\",\"lastSeen\":\"2024-10-24T06:12:35.4409708Z\",\"machineTags\":[],\"managedBy\":\"MicrosoftDefenderForEndpoint\",\"managedByStatus\":\"Success\",\"mergedIntoMachineId\":null,\"onboardingStatus\":\"Onboarded\",\"osArchitecture\":\"64-bit\",\"osBuild\":17763,\"osPlatform\":\"WindowsServer2019\",\"osProcessor\":\"x64\",\"osVersion\":null,\"rbacGroupId\":0,\"rbacGroupName\":null,\"riskScore\":\"None\",\"version\":\"1809\",\"vmMetadata\":null}",
        "type": [
            "info"
        ]
    },
    "group": {
        "id": "0"
    },
    "host": {
        "architecture": "x64",
        "hostname": "dlp-win2k19",
        "id": "c114cb1c0b827fabcdefabcdef2b9cfd469c091b",
        "ip": [
            "1.128.0.0"
        ],
        "name": "dlp-win2k19",
        "os": {
            "name": "WindowsServer2019 1809",
            "platform": "WindowsServer2019",
            "type": "windows",
            "version": "1809"
        },
        "risk": {
            "calculated_level": "None"
        }
    },
    "input": {
        "type": "cel"
    },
    "microsoft_defender_endpoint": {
        "machine": {
            "agent_version": "10.8760.17763.6414",
            "device_value": "Normal",
            "exposure_level": "High",
            "first_seen": "2024-10-17T13:56:23.941Z",
            "health_status": "Inactive",
            "ip_addresses": [
                {
                    "ip_address": "10.50.11.140",
                    "mac_address": "00-00-5E-00-53-01",
                    "operational_status": "Up",
                    "type": "Ethernet"
                },
                {
                    "ip_address": "1.128.0.0",
                    "mac_address": "00-00-5E-00-53-0A",
                    "operational_status": "Up",
                    "type": "Ethernet"
                },
                {
                    "ip_address": "2a02:cf40::",
                    "mac_address": "00-00-5E-00-53-02",
                    "operational_status": "Up",
                    "type": "Ethernet"
                },
                {
                    "ip_address": "127.0.0.1",
                    "operational_status": "Up",
                    "type": "SoftwareLoopback"
                },
                {
                    "ip_address": "::1",
                    "operational_status": "Up",
                    "type": "SoftwareLoopback"
                }
            ],
            "is_aad_joined": false,
            "is_excluded": false,
            "is_potential_duplication": false,
            "last_ip_address": "10.50.11.140",
            "last_seen": "2024-10-24T06:12:35.440Z",
            "managed_by": "MicrosoftDefenderForEndpoint",
            "managed_by_status": "Success",
            "onboarding_status": "Onboarded",
            "os_architecture": "64-bit",
            "os_build": 17763
        }
    },
    "observer": {
        "product": "Defender for Endpoint",
        "vendor": "Microsoft"
    },
    "related": {
        "hosts": [
            "dlp-win2k19",
            "c114cb1c0b827fabcdefabcdef2b9cfd469c091b"
        ],
        "ip": [
            "10.50.11.140",
            "1.128.0.0",
            "2a02:cf40::",
            "127.0.0.1",
            "::1"
        ]
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "microsoft_defender_endpoint-machine"
    ]
}

Exported fields

Field Description Type
@timestamp Event timestamp. date
data_stream.dataset Data stream dataset. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
event.dataset Event dataset constant_keyword
event.module Event module constant_keyword
input.type Type of Filebeat input. keyword
log.offset Log offset. long
microsoft_defender_endpoint.machine.aad_device_id Microsoft Entra Device ID (when machine is Microsoft Entra joined). keyword
microsoft_defender_endpoint.machine.agent_version keyword
microsoft_defender_endpoint.machine.computer_dns_name Machine fully qualified name. keyword
microsoft_defender_endpoint.machine.device_value The value of the device. Possible values are: Normal, Low, and High. keyword
microsoft_defender_endpoint.machine.exposure_level Exposure level as evaluated by Microsoft Defender for Endpoint. Possible values are: None, Low, Medium, and High. keyword
microsoft_defender_endpoint.machine.first_seen First date and time where the machine was observed by Microsoft Defender for Endpoint. date
microsoft_defender_endpoint.machine.health_status machine health status. Possible values are: Active, Inactive, ImpairedCommunication, NoSensorData, NoSensorDataImpairedCommunication, and Unknown. keyword
microsoft_defender_endpoint.machine.id Machine identity. keyword
microsoft_defender_endpoint.machine.ip_addresses.ip_address ip
microsoft_defender_endpoint.machine.ip_addresses.mac_address keyword
microsoft_defender_endpoint.machine.ip_addresses.operational_status keyword
microsoft_defender_endpoint.machine.ip_addresses.type keyword
microsoft_defender_endpoint.machine.is_aad_joined boolean
microsoft_defender_endpoint.machine.is_excluded boolean
microsoft_defender_endpoint.machine.is_potential_duplication boolean
microsoft_defender_endpoint.machine.last_external_ip_address Last IP through which the machine accessed the internet. ip
microsoft_defender_endpoint.machine.last_ip_address Last IP on local NIC on the machine. ip
microsoft_defender_endpoint.machine.last_seen Time and date of the last received full device report. A device typically sends a full report every 24 hours. NOTE: This property doesn't correspond to the last seen value in the UI. It pertains to the last device update. date
microsoft_defender_endpoint.machine.machine_tags Set of machine tags. keyword
microsoft_defender_endpoint.machine.managed_by keyword
microsoft_defender_endpoint.machine.managed_by_status keyword
microsoft_defender_endpoint.machine.onboarding_status Status of machine onboarding. Possible values are: onboarded, CanBeOnboarded, Unsupported, and InsufficientInfo. keyword
microsoft_defender_endpoint.machine.os_architecture Operating system architecture. Possible values are: 32-bit, 64-bit. keyword
microsoft_defender_endpoint.machine.os_build Operating system build number. long
microsoft_defender_endpoint.machine.os_platform Operating system platform. keyword
microsoft_defender_endpoint.machine.os_processor Operating system processor. keyword
microsoft_defender_endpoint.machine.rbac_group_id Machine group ID. keyword
microsoft_defender_endpoint.machine.rbac_group_name Machine group Name. keyword
microsoft_defender_endpoint.machine.risk_score Risk score as evaluated by Microsoft Defender for Endpoint. Possible values are: None, Informational, Low, Medium, and High. keyword
microsoft_defender_endpoint.machine.version Operating system version. keyword
microsoft_defender_endpoint.machine.vm_metadata.cloud_provider keyword
microsoft_defender_endpoint.machine.vm_metadata.resource_id keyword
microsoft_defender_endpoint.machine.vm_metadata.vm_id keyword

Machine Action

This is the machine action dataset.

Example

An example event for machine_action looks as following:

{
    "@timestamp": "2024-11-22T12:48:56.768Z",
    "agent": {
        "ephemeral_id": "2f48d0ac-be9d-40b4-90c7-221a29dbd6f5",
        "id": "7a528879-f9cb-4500-8ca9-61cdde8b4c76",
        "name": "elastic-agent-92539",
        "type": "filebeat",
        "version": "8.19.3"
    },
    "data_stream": {
        "dataset": "microsoft_defender_endpoint.machine_action",
        "namespace": "37546",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "7a528879-f9cb-4500-8ca9-61cdde8b4c76",
        "snapshot": false,
        "version": "8.19.3"
    },
    "event": {
        "action": "RunAntiVirusScan",
        "agent_id_status": "verified",
        "created": "2024-11-22T12:48:33.993Z",
        "dataset": "microsoft_defender_endpoint.machine_action",
        "id": "d72456af-1234-5678-abcd-abcdef87fdee",
        "ingested": "2025-10-16T10:45:30Z",
        "kind": "event",
        "original": "{\"cancellationComment\":null,\"cancellationDateTimeUtc\":null,\"cancellationRequestor\":null,\"commands\":[],\"computerDnsName\":\"c-lab-24\",\"creationDateTimeUtc\":\"2024-11-22T12:48:33.9936591Z\",\"errorHResult\":0,\"externalId\":null,\"id\":\"d72456af-1234-5678-abcd-abcdef87fdee\",\"lastUpdateDateTimeUtc\":\"2024-11-22T12:48:56.7684808Z\",\"machineId\":\"de693d7fbdabcdefabcdefcfc9cf40b5bf2da1d8\",\"relatedFileInfo\":null,\"requestSource\":\"Portal\",\"requestor\":\"testuser@example.com\",\"requestorComment\":\"Quick Scan\",\"scope\":\"Quick\",\"status\":\"Succeeded\",\"title\":null,\"troubleshootInfo\":null,\"type\":\"RunAntiVirusScan\"}",
        "outcome": "success",
        "type": [
            "info"
        ]
    },
    "host": {
        "hostname": "c-lab-24",
        "id": "de693d7fbdabcdefabcdefcfc9cf40b5bf2da1d8",
        "name": "c-lab-24"
    },
    "input": {
        "type": "cel"
    },
    "microsoft_defender_endpoint": {
        "machine_action": {
            "error_h_result": 0,
            "request_source": "Portal",
            "requestor_comment": "Quick Scan",
            "scope": "Quick",
            "status": "Succeeded",
            "type": "RunAntiVirusScan"
        }
    },
    "observer": {
        "product": "Defender for Endpoint",
        "vendor": "Microsoft"
    },
    "related": {
        "hosts": [
            "c-lab-24",
            "de693d7fbdabcdefabcdefcfc9cf40b5bf2da1d8"
        ],
        "user": [
            "testuser",
            "testuser@example.com"
        ]
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "microsoft_defender_endpoint-machine_action"
    ],
    "user": {
        "domain": "example.com",
        "email": "testuser@example.com",
        "name": "testuser"
    }
}

Exported fields

Field Description Type
@timestamp Event timestamp. date
data_stream.dataset Data stream dataset. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
event.dataset Event dataset constant_keyword
event.module Event module constant_keyword
input.type Type of Filebeat input. keyword
labels.is_transform_source Distinguishes between documents that are a source for a transform and documents that are an output of a transform, to facilitate easier filtering. constant_keyword
log.offset Log offset. long
microsoft_defender_endpoint.machine_action.cancellation_comment Comment that was written when canceling the action. keyword
microsoft_defender_endpoint.machine_action.cancellation_date_time_utc The date and time when the action was canceled. date
microsoft_defender_endpoint.machine_action.cancellation_requestor Identity of the person that canceled the action. keyword
microsoft_defender_endpoint.machine_action.commands Commands to run. Allowed values are PutFile, RunScript, GetFile. keyword
microsoft_defender_endpoint.machine_action.computer_dns_name Name of the machine on which the action was executed. keyword
microsoft_defender_endpoint.machine_action.creation_date_time_utc The date and time when the action was created. date
microsoft_defender_endpoint.machine_action.error_h_result long
microsoft_defender_endpoint.machine_action.external_id Id the customer can submit in the request for custom correlation. keyword
microsoft_defender_endpoint.machine_action.id Identity of the Machine Action entity. keyword
microsoft_defender_endpoint.machine_action.last_update_date_time_utc The last date and time when the action status was updated. date
microsoft_defender_endpoint.machine_action.machine_id ID of the machine on which the action was executed. keyword
microsoft_defender_endpoint.machine_action.related_file_info.file_identifier Contains two Properties. string fileIdentifier, Enum fileIdentifierType with the possible values: Sha1, Sha256, and Md5. keyword
microsoft_defender_endpoint.machine_action.related_file_info.file_identifier_type Enum fileIdentifierType with the possible values: Sha1, Sha256, and Md5. keyword
microsoft_defender_endpoint.machine_action.request_source The name of the user/application that submitted the action. keyword
microsoft_defender_endpoint.machine_action.requestor Identity of the person that executed the action. keyword
microsoft_defender_endpoint.machine_action.requestor_comment Comment that was written when issuing the action. keyword
microsoft_defender_endpoint.machine_action.scope Scope of the action. Full or Selective for Isolation, Quick or Full for antivirus scan. keyword
microsoft_defender_endpoint.machine_action.status Current status of the command. Possible values are: Pending, InProgress, Succeeded, Failed, TimeOut, and Cancelled. keyword
microsoft_defender_endpoint.machine_action.title Machine action title. keyword
microsoft_defender_endpoint.machine_action.type Type of the action. Possible values are: RunAntiVirusScan, Offboard, LiveResponse, CollectInvestigationPackage, Isolate, Unisolate, StopAndQuarantineFile, RestrictCodeExecution, and UnrestrictCodeExecution. keyword

Vulnerability

This is the vulnerability dataset.

Example

An example event for vulnerability looks as following:

{
    "@timestamp": "2026-03-10T13:37:45.682Z",
    "agent": {
        "ephemeral_id": "db614f6f-8a16-472a-80e2-83cfa2ebcbbf",
        "id": "b3f5093a-16fa-48c6-89df-08b621bceec2",
        "name": "elastic-agent-42544",
        "type": "filebeat",
        "version": "8.19.3"
    },
    "data_stream": {
        "dataset": "microsoft_defender_endpoint.vulnerability",
        "namespace": "48522",
        "type": "logs"
    },
    "ecs": {
        "version": "8.17.0"
    },
    "elastic_agent": {
        "id": "b3f5093a-16fa-48c6-89df-08b621bceec2",
        "snapshot": false,
        "version": "8.19.3"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "vulnerability"
        ],
        "dataset": "microsoft_defender_endpoint.vulnerability",
        "id": "1212121212121212121212_red_hat_kernel_0:5.14.0-427.42.1.el9_4_CVE-2022-49226",
        "ingested": "2026-03-10T13:37:46Z",
        "kind": "event",
        "original": "{\"CveBatchTitle\":\"Red_hat February 2025 Vulnerabilities\",\"CveBatchUrl\":\"https://security.access.redhat.com/data/oval/v2/RHEL9/rhel-9.8-eus.oval.xml.bz2\",\"CveId\":\"CVE-2022-49226\",\"CvssScore\":5.5,\"DeviceId\":\"1212121212121212121212\",\"DeviceName\":\"sample-host-1\",\"ExploitabilityLevel\":\"NoExploit\",\"FirstSeenTimestamp\":\"2025-10-06 10:43:58\",\"Id\":\"1212121212121212121212_red_hat_kernel_0:5.14.0-427.42.1.el9_4_CVE-2022-49226\",\"IsOnboarded\":true,\"LastSeenTimestamp\":\"2025-10-06 22:45:00\",\"OSArchitecture\":\"x64\",\"OSPlatform\":\"Linux\",\"OSVersion\":\"enterprise_linux_9.4\",\"RbacGroupId\":0,\"RbacGroupName\":\"Unassigned\",\"RecommendationReference\":\"va-_-red_hat-_-kernel\",\"RecommendedSecurityUpdate\":\"CVE-2022-49226_oval:com.redhat.rhsa:def:20249315\",\"RecommendedSecurityUpdateId\":\"RHSA-2024:9315\",\"RecommendedSecurityUpdateUrl\":\"https://access.redhat.com/errata/RHSA-2024:9315\",\"RegistryPaths\":[],\"SecurityUpdateAvailable\":true,\"SoftwareName\":\"kernel\",\"SoftwareVendor\":\"red_hat\",\"SoftwareVersion\":\"0:5.14.0-427.42.1.el9_4\",\"VulnerabilitySeverityLevel\":\"Medium\"}",
        "type": [
            "info"
        ]
    },
    "group": {
        "id": "0",
        "name": "Unassigned"
    },
    "host": {
        "architecture": "x64",
        "hostname": "sample-host-1",
        "id": "1212121212121212121212",
        "name": "sample-host-1",
        "os": {
            "name": "Linux enterprise_linux_9.4",
            "platform": "Linux",
            "type": "linux",
            "version": "enterprise_linux_9.4"
        }
    },
    "input": {
        "type": "cel"
    },
    "message": "Red_hat February 2025 Vulnerabilities",
    "microsoft_defender_endpoint": {
        "vulnerability": {
            "cve_batch_title": "Red_hat February 2025 Vulnerabilities",
            "cve_batch_url": "https://security.access.redhat.com/data/oval/v2/RHEL9/rhel-9.8-eus.oval.xml.bz2",
            "cve_id": "CVE-2022-49226",
            "cvss_score": 5.5,
            "device_id": "1212121212121212121212",
            "device_name": "sample-host-1",
            "exploitability_level": "NoExploit",
            "first_seen_timestamp": "2025-10-06T10:43:58.000Z",
            "id": "1212121212121212121212_red_hat_kernel_0:5.14.0-427.42.1.el9_4_CVE-2022-49226",
            "is_onboarded": true,
            "last_seen_timestamp": "2025-10-06T22:45:00.000Z",
            "os_architecture": "x64",
            "os_platform": "Linux",
            "os_version": "enterprise_linux_9.4",
            "rbac_group_id": "0",
            "rbac_group_name": "Unassigned",
            "recommendation_reference": "va-_-red_hat-_-kernel",
            "recommended_security_update": "CVE-2022-49226_oval:com.redhat.rhsa:def:20249315",
            "recommended_security_update_id": "RHSA-2024:9315",
            "security_update_available": true,
            "severity_level": "Medium",
            "software_name": "kernel",
            "software_vendor": "red_hat",
            "software_version": "0:5.14.0-427.42.1.el9_4"
        }
    },
    "observer": {
        "product": "Microsoft Defender for Endpoint",
        "vendor": "Microsoft"
    },
    "package": {
        "name": "kernel",
        "version": "0:5.14.0-427.42.1.el9_4"
    },
    "related": {
        "hosts": [
            "1212121212121212121212",
            "sample-host-1"
        ]
    },
    "resource": {
        "id": "1212121212121212121212",
        "name": "sample-host-1"
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "microsoft_defender_endpoint-vulnerability"
    ],
    "vulnerability": {
        "classification": "CVSS",
        "cve": "CVE-2022-49226",
        "enumeration": "CVE",
        "id": "CVE-2022-49226",
        "reference": "https://www.cve.org/CVERecord?id=CVE-2022-49226",
        "scanner": {
            "vendor": "Microsoft"
        },
        "score": {
            "base": 5.5
        },
        "severity": "Medium",
        "title": "Vulnerability found in kernel 0:5.14.0-427.42.1.el9_4 - CVE-2022-49226"
    }
}

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
data_stream.dataset The field can contain anything that makes sense to signify the source of the data. Examples include nginx.access, prometheus, endpoint etc. For data streams that otherwise fit, but that do not have dataset set we use the value "generic" for the dataset value. event.dataset should have the same value as data_stream.dataset. Beyond the Elasticsearch data stream naming criteria noted above, the dataset value has additional restrictions: * Must not contain - * No longer than 100 characters constant_keyword
data_stream.namespace A user defined namespace. Namespaces are useful to allow grouping of data. Many users already organize their indices this way, and the data stream naming scheme now provides this best practice as a default. Many users will populate this field with default. If no value is used, it falls back to default. Beyond the Elasticsearch index naming criteria noted above, namespace value has the additional restrictions: * Must not contain - * No longer than 100 characters constant_keyword
data_stream.type An overarching type for the data stream. Currently allowed values are "logs" and "metrics". We expect to also add "traces" and "synthetics" in the near future. constant_keyword
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. constant_keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. constant_keyword
input.type Type of Filebeat input. keyword
log.file.device_id Device Id of the log file this event came from. keyword
log.file.inode Inode number of the log file. keyword
log.offset Log offset. long
microsoft_defender_endpoint.vulnerability.cve_batch_title keyword
microsoft_defender_endpoint.vulnerability.cve_batch_url keyword
microsoft_defender_endpoint.vulnerability.cve_id Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system. keyword
microsoft_defender_endpoint.vulnerability.cvss_score The CVSS score of the CVE. float
microsoft_defender_endpoint.vulnerability.device_id Unique identifier for the device in the service. keyword
microsoft_defender_endpoint.vulnerability.device_name Fully qualified domain name (FQDN) of the device. keyword
microsoft_defender_endpoint.vulnerability.disk_paths Disk evidence that the product is installed on the device. keyword
microsoft_defender_endpoint.vulnerability.exploitability_level The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit) keyword
microsoft_defender_endpoint.vulnerability.first_seen_timestamp First time this product CVE was seen on the device. date
microsoft_defender_endpoint.vulnerability.id Unique identifier for the record. keyword
microsoft_defender_endpoint.vulnerability.is_onboarded boolean
microsoft_defender_endpoint.vulnerability.last_seen_timestamp Last time the software was reported on the device. date
microsoft_defender_endpoint.vulnerability.os_architecture Architecture of the operating system running on the device. keyword
microsoft_defender_endpoint.vulnerability.os_platform Platform of the operating system running on the device. keyword
microsoft_defender_endpoint.vulnerability.os_version Version of the operating system running on the device. keyword
microsoft_defender_endpoint.vulnerability.rbac_group_id keyword
microsoft_defender_endpoint.vulnerability.rbac_group_name The role-based access control (RBAC) group. keyword
microsoft_defender_endpoint.vulnerability.recommendation_reference A reference to the recommendation ID related to this software. keyword
microsoft_defender_endpoint.vulnerability.recommended_security_update Name or description of the security update provided by the software vendor to address the vulnerability. keyword
microsoft_defender_endpoint.vulnerability.recommended_security_update_id Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles. keyword
microsoft_defender_endpoint.vulnerability.registry_paths Registry evidence that the product is installed in the device. keyword
microsoft_defender_endpoint.vulnerability.security_update_available Indicates whether a security update is available for the software. boolean
microsoft_defender_endpoint.vulnerability.severity_level Severity level assigned to the security vulnerability based on the CVSS score. keyword
microsoft_defender_endpoint.vulnerability.software_name Name of the software product. keyword
microsoft_defender_endpoint.vulnerability.software_vendor Name of the software vendor. keyword
microsoft_defender_endpoint.vulnerability.software_version Version number of the software product. keyword
observer.vendor Vendor name of the observer. constant_keyword
package.fixed_version keyword
package.name Package name keyword
package.version Package version keyword
resource.id keyword
resource.name keyword
vulnerability.cve The CVE id of the vulnerability. keyword
vulnerability.published_date date
vulnerability.scanner.vendor The name of the vulnerability scanner vendor. constant_keyword
vulnerability.title keyword