Defender-DeviceEvents
16 events across 16 channels
| Event ID | Title | Channel |
|---|---|---|
| 9007000 | Defender event (any) | DeviceEvents |
| 9007001 | PowerShell command executed | PowerShellCommand |
| 9007002 | AMSI script detected | AmsiScriptDetected |
| 9007003 | AMSI script content captured | AmsiScriptContent |
| 9007004 | CreateRemoteThread API call | CreateRemoteThreadApiCall |
| 9007005 | Process injection detected | ProcessInjectionDetected |
| 9007006 | Named pipe event | NamedPipeEvent |
| 9007007 | User account added to local group | UserAccountAddedToLocalGroup |
| 9007008 | User account removed from local group | UserAccountRemovedFromLocalGroup |
| 9007009 | ASR audit event | AsrAuditEvent |
| 9007010 | ASR — LSASS credential theft (audited) | AsrLsassCredentialTheftAudited |
| 9007011 | ASR — Office child process (audited) | AsrOfficeChildProcessAudited |
| 9007012 | Antivirus report | AntivirusReport |
| 9007013 | Scheduled task created | ScheduledTaskCreated |
| 9007014 | Scheduled task deleted | ScheduledTaskDeleted |
| 9007015 | Scheduled task updated | ScheduledTaskUpdated |
Event ID 9007000 — Defender event (any)
#Description
Defender event (any) — DeviceEvents is a catch-all; bridges only apply per-ActionType.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
ActionType | — |
AdditionalFields | — |
InitiatingProcessFileName | — |
InitiatingProcessCommandLine | — |
Detection Rules #
View all rules referencing this event →
Kusto Query Language # view in reference
- Windows host username encoded in base64 web request source medium: 'This detection will identify network requests in HTTP proxy data that contains Base64 encoded usernames from machines in the DeviceEvents table. This technique was seen usee by POLONIUM in their RunningRAT tool.'
- Office ASR rule triggered from browser spawned office process. source medium: The attacker sends a spearphishing email to a user. The email contains a link which points to a website that eventually presents the user a download of an MS Office document. This document contains a malicious macro. The macro triggers one of the ASR rules. This detection looks for Office ASR violations triggered by an Office document opened from a browser. Note: be aware that you need to have the proper ASR rules enabled for this detection to work.
- SUNSPOT malware hashes source medium: 'This query uses Microsoft Defender for Endpoint data to look for IoCs associated with the SUNSPOT malware shared by Crowdstrike. More details: - https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/ - https://techcommunity.microsoft.com/blog/microsoftsentinelblog/monitoring-the-software-supply-chain-with-azure-sentinel/2176463/'
Show 1 more (4 total)
- TEARDROP memory-only dropper source high: Identifies SolarWinds TEARDROP memory-only dropper IOCs in Window's defender Exploit Guard activity References: - https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html - https://gist.github.com/olafhartong/71ffdd4cab4b6acd5cbcd1a0691ff82f
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007001 — PowerShell command executed
#Description
PowerShell command executed — PowerShell ScriptBlockLogging captures the same surface.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
AdditionalFields | — |
InitiatingProcessFileName | — |
InitiatingProcessCommandLine | — |
Detection Patterns #
Execution: Command and Scripting Interpreter
1 rule
Kusto Query Language
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007002 — AMSI script detected
Description
AMSI script detected — Defender-only; no Windows-native equivalent.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
AdditionalFields | — |
InitiatingProcessFileName | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007003 — AMSI script content captured
#Description
AMSI script content captured — Defender-only; no Windows-native equivalent.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
AdditionalFields | — |
Detection Rules #
View all rules referencing this event →
Kusto Query Language # view in reference
- Deimos Component Execution source high: Jupyter, otherwise known as SolarMarker, is a malware family and cluster of components known for its info-stealing and backdoor capabilities that mainly proliferates through search engine optimization manipulation and malicious advertising in order to successfully encourage users to download malicious templates and documents. This malware has been popular since 2020 and currently is still active as of 2021.
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007004 — CreateRemoteThread API call
#Description
CreateRemoteThread API call
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
ProcessId | — |
InitiatingProcessFileName | — |
Detection Patterns #
Execution: User Execution
1 rule
Kusto Query Language
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007005 — Process injection detected
Description
Process injection detected — Defender-only; no Windows-native equivalent.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
ProcessId | — |
InitiatingProcessFileName | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007006 — Named pipe event
#Description
Named pipe event
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
FileName | — |
InitiatingProcessFileName | — |
Detection Patterns #
Named Pipe
15 rules
Sigma
Splunk
Show 3 more (6 total)
Kusto Query Language
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007007 — User account added to local group
#Description
User account added to local group
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
AccountName | — |
AdditionalFields | — |
Detection Patterns #
Persistence: Account Manipulation
1 rule
Kusto Query Language
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007008 — User account removed from local group
Description
User account removed from local group
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
AccountName | — |
AdditionalFields | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007009 — ASR audit event
Description
ASR audit event — Defender ASR audit; loosely maps to Defender-1121 channel events.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
AdditionalFields | — |
InitiatingProcessFileName | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007010 — ASR — LSASS credential theft (audited)
Description
ASR — LSASS credential theft (audited) — Defender ASR; no native equivalent.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
InitiatingProcessFileName | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007011 — ASR — Office child process (audited)
Description
ASR — Office child process (audited) — Defender ASR; no native equivalent.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
InitiatingProcessFileName | — |
FileName | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007012 — Antivirus report
Description
Antivirus report — Defender AV; loosely maps to Defender-1116/1117 detected/quarantined events.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
FileName | — |
FolderPath | — |
AdditionalFields | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007013 — Scheduled task created
Description
Scheduled task created
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
AdditionalFields | — |
InitiatingProcessFileName | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007014 — Scheduled task deleted
Description
Scheduled task deleted
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
AdditionalFields | — |
InitiatingProcessFileName | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table
Event ID 9007015 — Scheduled task updated
Description
Scheduled task updated
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
AdditionalFields | — |
InitiatingProcessFileName | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceevents-table