Understand common tables
When Sentinel ingests data from the Data Connectors, the following table lists the most commonly used tables.
Table | Description |
---|---|
AzureActivity |
Entries from the Azure Activity log that provides insight into any subscription-level or management group level events that occurred in Azure. |
AzureDiagnostics |
Stores resource logs for Azure services that use Azure Diagnostics mode. Resource logs describe the internal operation of Azure resources. |
AuditLogs |
Audit log for Microsoft Entra ID. Includes system activity information about user and group management, managed applications, and directory activities. |
CommonSecurityLog |
Syslog messages using the Common Event Format (CEF). |
McasShadowItReporting |
Microsoft Defender for Cloud Apps logs |
OfficeActivity |
Audit logs for Office 365 tenants collected by Microsoft Sentinel. Including Exchange, SharePoint and Teams logs. |
SecurityEvent |
Security events collected from windows machines by Azure Security Center or Microsoft Sentinel |
SigninLogs |
Azure Activity Directory Sign-in logs |
Syslog |
Syslog events on Linux computers using the Log Analytics agent. |
Event |
Sysmon Events collected from a Windows host. |
WindowsFirewall |
Windows Firewall Events |