Query Details
# ATP Detection events triggered
### Defender For Endpoint
```
CloudAppEvents
| where ActionType == "AtpDetection"
| extend
DetectionMethod = parse_json(RawEventData).DetectionMethod,
EventDeepLink = parse_json(RawEventData).EventDeepLink,
FileData = parse_json(RawEventData).FileData
| project-reorder
Timestamp,
ActionType,
Application,
AccountId,
DetectionMethod,
FileData,
EventDeepLink
```
### Sentinel
```
CloudAppEvents
| where ActionType == "AtpDetection"
| extend
DetectionMethod = parse_json(RawEventData).DetectionMethod,
EventDeepLink = parse_json(RawEventData).EventDeepLink,
FileData = parse_json(RawEventData).FileData
| project-reorder
TimeGenerated,
ActionType,
Application,
AccountId,
DetectionMethod,
FileData,
EventDeepLink
```
This query retrieves ATP detection events triggered in both Defender for Endpoint and Sentinel. It filters the events where the ActionType is "AtpDetection" and extracts additional information such as DetectionMethod, EventDeepLink, and FileData from the RawEventData. The final result includes the Timestamp/TimeGenerated, ActionType, Application, AccountId, DetectionMethod, FileData, and EventDeepLink fields.

Bert-Jan Pals
Released: February 14, 2023
Tables
Keywords
Operators