Windows Evidence Artifacts
evidences
Extends the evidences object to add Windows specific fields
Attributes
| Caption | Name | Type | Description |
|---|---|---|---|
| Actor | actor | Actor[] | Describes details about the user/role/process that was the source of the activity that triggered the detection. |
| API Details | api | API[] | Describes details about the API call associated to the activity that triggered the detection. |
| Connection Info | connection_info | Network Connection Information[] | Describes details about the network connection associated to the activity that triggered the detection. |
| Container | container | Container[] | Entity: |
| Data | data | JSON | Additional evidence data that is not accounted for in the specific evidence attributes. Use only when absolutely necessary. |
| Database | database | Database[] | Describes details about the database associated to the activity that triggered the detection. |
| Databucket | databucket | Databucket[] | Describes details about the databucket associated to the activity that triggered the detection. |
| Device | device | Device[] | Entity: |
| Destination Endpoint | dst_endpoint | Network Endpoint[] | Entity: |
email | Email[] | Entity: | |
| File | file | File[] | Entity: |
| HTTP Request | http_request | HTTP Request[] | Describes details about the http request associated to the activity that triggered the detection. |
| HTTP Response | http_response | HTTP Response[] | Describes details about the http response associated to the activity that triggered the detection. |
| JA4+ Fingerprints | ja4_fingerprint_list | JA4+ Fingerprint[] | Describes details about the JA4+ fingerprints that triggered the detection. |
| Job | job | Job[] | Describes details about the scheduled job that was associated with the activity that triggered the detection. |
| Name | name | String | The naming convention or type identifier of the evidence associated with the security detection. For example, the @odata.type from Microsoft Graph Alerts V2 or display_name from CrowdStrike Falcon Incident Behaviors. |
| Process | process | Linux Process[] | Entity: |
| DNS Query | query | DNS Query[] | Describes details about the DNS query associated to the activity that triggered the detection. |
| Raw Data | raw_data | JSON | Group: |
| Record ID | record_id | String | Group: |
| Registry Key | reg_key | Registry Key[] | Describes details about the registry key that triggered the detection. |
| Registry Value | reg_value | Registry Value[] | Describes details about the registry value that triggered the detection. |
| Cloud Resources | resources | Resource Details[] | Describes details about the cloud resources directly related to activity that triggered the detection. For resources impacted by the detection, use Affected Resources at the top-level of the finding. |
| Script | script | Script[] | Describes details about the script that was associated with the activity that triggered the detection. |
| Source Endpoint | src_endpoint | Network Endpoint[] | Entity: |
| TLS | tls | Transport Layer Security (TLS)[] | Describes details about the Transport Layer Security (TLS) activity that triggered the detection. |
| Unique ID | uid | String | The unique identifier of the evidence associated with the security detection. For example, the activity_id from CrowdStrike Falcon Alerts or behavior_id from CrowdStrike Falcon Incident Behaviors. |
| Unmapped | unmapped | Unmapped[] | Data from the source that was not mapped into the schema. |
| URL | url | Uniform Resource Locator[] | Entity: |
| User | user | User[] | Entity: |
| Verdict | verdict | String | The normalized verdict of the evidence associated with the security detection. |
| Verdict ID | verdict_id | Integer | The normalized verdict (or status) ID of the evidence associated with the security detection. For example, Microsoft Graph Security Alerts contain a verdict enumeration for each type of evidence associated with the Alert. This is typically set by an automated investigation process or an analyst/investigator assigned to the finding.
|
| Windows Service | win_service | Windows Service[] | Describes details about the Windows service that triggered the detection. |
Relationships
Inbound Relationships
These objects and events reference Windows Evidence Artifacts in their attributes:
Outbound Relationships
Windows Evidence Artifacts references the following objects and events in its attributes:
- Uniform Resource Locator
- Windows Service
- Registry Key
- Script
- Job
- DNS Query
- Network Connection Information
- HTTP Response
- Registry Value
- User
- File
- Device
- Container
- Transport Layer Security (TLS)
- Database
- Databucket
- Unmapped
- Resource Details
- HTTP Request
- Network Endpoint
- JA4+ Fingerprint
- Linux Process
- API
- Actor
This page describes qdm-1.5.1+ocsf-1.6.0
Updated 13 days ago