Microsoft Sentinel Tables

In Microsoft Sentinel, tables are where all your collected data is stored and organized within the Log Analytics workspace. Each table represents a specific type of data—like security events, sign-ins, alerts, or network logs—and has its own schema with defined fields.

These tables are the foundation for running Kusto Query Language (KQL) queries, building workbooks, creating analytics rules, and powering automation.

Sentinel Data Table NameDescription
Defender for Endpoint Event Types
DeviceInfoMachine information, including OS information
DeviceNetworkInfoNetwork   properties of devices, including physical adapters, IP and MAC addresses, as   well as connected networks and domains
DeviceProcessEventsProcess creation and related events
DeviceNetworkEventsNetwork connection and related events
DeviceFileEventsFile creation, modification, and other file system events
DeviceRegistryEventsCreation and modification of registry entries
DeviceLogonEventsSign-ins and other authentication events on devices
DeviceImageLoadEventsDLL loading events
DeviceEventsMultiple event types, including events triggered by security controls such as Windows Defender Antivirus and exploit protection
DeviceFileCertificateInfoCertificate information of signed files obtained from certificate verification events on endpoints
Defender for O365 Event Types
EmailAttachmentInfoInformation about files attached to emails
EmailEventsMicrosoft 365 email events, including email delivery and blocking events
EmailPostDeliveryEventsSecurity events that occur post-delivery, after Microsoft 365 has delivered the emails to the recipient mailbox
EmailUrlInfoInformation about URLs in emails
Defender for Identity Event Types
IdentityDirectoryEventsVarious identity-related events, like password changes, password expirations, and user principal name (UPN) changes, captured from an on-premises Active Directory
 domain controller Also includes system events on the domain controller
IdentityInfoInformation about user accounts obtained from various services, including Azure Active Directory
IdentityLogonEventsAuthentication activities made through your on-premises Active Directory, as captured by Microsoft Defender for Identity  Authentication activities related to Microsoft online services, as captured by Microsoft Defender for Cloud Apps
IdentityQueryEventsInformation about queries performed against Active Directory objects such as users, groups, devices, and domains.
Defender for Cloud Apps Event Type
CloudAppEventsInformation about activities in various cloud apps and services covered by Microsoft Defender for Cloud Apps
Defender Alerts
AlertInfoInformation about alerts from Microsoft 365 Defender components
AlertEvidenceInformation about various entities – files, IP addresses, URLs, users, devices – associated with alerts from Microsoft 365 Defender components