Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This table shows information about campaigns identified by Microsoft Defender for Office 365.
Table attributes
Attribute | Value |
---|---|
Resource types | - |
Categories | Security |
Solutions | SecurityInsights |
Basic log | Yes |
Ingestion-time transformation | No |
Sample Queries | - |
Columns
Column | Type | Description |
---|---|---|
_BilledSize | real | The record size in bytes |
CampaignId | string | Unique identifier for the campaign, generated by Office 365. |
CampaignName | string | Name of the email campaign. |
CampaignSubType | string | Contains more details about the campaign, like the brand being phished, or related malware campaigns, if available. |
CampaignType | string | Category of the campaign. |
_IsBillable | string | Specifies whether ingesting the data is billable. When _IsBillable is false ingestion isn't billed to your Azure account |
NetworkMessageId | string | Unique identifier for the email, generated by Office 365. |
RecipientEmailAddress | string | Email address of the recipient, or email address of the recipient after distribution list expansion. |
ReportId | string | Unique identifier for the event. |
SourceSystem | string | The type of agent the event was collected by. For example, OpsManager for Windows agent, either direct connect or Operations Manager, Linux for all Linux agents, or Azure for Azure Diagnostics |
TenantId | string | The Log Analytics workspace ID |
TimeGenerated | datetime | Date and time (UTC) when the record was generated. |
Type | string | The name of the table |