Alert Types by XDR Event Name

The following information lists alert types alphabetically by their XDR event name. Details for each alert type can be viewed by clicking the More details link.

For alert types listed alphabetically by their display name, see Alert Types by Name.

XDR Event Name

Display Name

Alert Type, Alert Subtype Based On

ade_outbytes_anomaly

Data Ingestion Volume Anomaly

timestamp

ade_outbytes_anomaly_flip

Sensor Status Anomaly

timestamp

anomalous_file_action

File Action Anomaly

timestamp

asset_violation

Unapproved Asset Activity

timestamp

aws_ami_public

AWS AMI Made Public

write_time

aws_malicious_activity

Potentially Malicious AWS Activity

write_time

aws_s3_ransomware

AWS S3 Ransomware

write_time

aws_stoplogging

AWS Logging Stopped

write_time

aws_suspicious_bucket_enumeration

Suspicious AWS Bucket Enumeration

write_time

aws_suspicious_cloudtrail_logs_modification

Suspicious Modification of AWS CloudTrail Logs

write_time

aws_suspicious_ebs_activity

Suspicious AWS EBS Activity

write_time

aws_suspicious_ec2_activity

Suspicious AWS EC2 Activity

write_time

aws_suspicious_elb_activity

Suspicious AWS ELB Activity

write_time

aws_suspicious_iam_activity

Suspicious AWS IAM Activity

write_time

aws_suspicious_modification_of_route_table

Suspicious Modification of AWS Route Table

write_time

aws_suspicious_modification_of_s3_bucket

Suspicious Modification of S3 Bucket

write_time

aws_suspicious_rds_event

Suspicious AWS RDS Event

write_time

aws_suspicious_root_account_activity

Suspicious AWS Root Account Activity

write_time

aws_suspicious_route53_activity

Suspicious AWS Route 53 Activity

write_time

aws_suspicious_ssl_certificate_activity

Suspicious AWS SSL Certificate Activity

write_time

aws_suspicious_vpc_flow_logs_modification

Suspicious AWS VPC Flow Logs Modification

write_time

aws_suspicious_vpc_mirror_session

Suspicious AWS VPC Mirror Session

write_time

azure_ad_add_app_multitenant

Microsoft Entra Apps Modified to Allow Multi-Tenant Access

write_time

azure_ad_change_domain

Microsoft Entra Custom Domains Changed

write_time

azure_application_configuration_changes

Microsoft Entra Application Configuration Changes

write_time

azure_application_gateway_changed

Azure Application Gateway Changed

write_time

azure_application_permission_changes

Microsoft Entra Application Permission Changes

write_time

azure_bitlocker_key_retrieval

Microsoft Entra BitLocker Key Retrieval

write_time

azure_changes_to_device_registration_policy

Microsoft Entra Changes to Device Registration Policy

write_time

azure_changes_to_privileged_account

Microsoft Entra Changes to Privileged Account

write_time

azure_changes_to_privileged_role_assignment

Microsoft Entra Changes to Privileged Role Assignment

write_time

azure_discovery_using_azurehound

Microsoft Entra ID Discovery Using AzureHound

write_time

azure_dns_zone_change

Azure DNS Zone Changed

write_time

azure_federation_modified

Microsoft Entra Federation Modified

write_time

azure_guest_user_invited_by_non_approved_inviters

Microsoft Entra Guest User Invited by Non-Approved Inviters

write_time

azure_mfa_disabled

Microsoft Entra ID MFA Disabled

write_time

azure_new_cloudshell_created

Azure New CloudShell Created

write_time

azure_pim_setting_changed

Microsoft Entra PIM Setting Changed

write_time

azure_privileged_account_assignment_or_elevation

Microsoft Entra Privileged Account Assignment or Elevation

write_time

azure_security_config_changed

Azure Security Configuration Changed

write_time

azure_sign_in_failures

Microsoft Entra Sign-in Failure

write_time

azure_suspicious_changes_to_conditional_access_policy

Microsoft Entra Changes to Conditional Access Policy

write_time

azure_suspicious_sign_in_activity

Microsoft Entra Suspicious Sign-in Activity

write_time

azure_unusual_account_creation

Microsoft Entra Unusual Account Creation

write_time

bad_process

Process Anomaly

timestamp

bad_reputation_login

Bad Reputation Login

write_time

carbonblack_edr_anomaly

Carbon Black: XDR Anomaly

timestamp

cloud_account_login_failure_okta

Account MFA Login Failure Anomaly

write_time, write_time

cnc_reputation

Command & Control Reputation Anomaly

timestamp

command_anomaly

Command Anomaly

timestamp

country_communication_anomaly

Outbound Destination Country Anomaly

timestamp

cryptojacking

Cryptojacking

timestamp

cylance_edr_anomaly

CylanceOPTICS: XDR Anomaly

timestamp

dga_resolvable

DGA

timestamp

dhcp_anomaly

DHCP Server Anomaly

timestamp

dns_phishing_file_extension_tld

Phishing Domain with File Extension TLD

write_time

dns_tor_proxy_domain

DNS Query to TOR Proxy Domain

write_time

dns_tunnel

DNS Tunneling Anomaly

timestamp

dstip_bad_reps

Bad Destination Reputation Anomaly

timestamp

email_recent_domain_correlation

Possible Phishing Site Visit from Email

timestamp

emerging_threat

Emerging Threat

write_time

encoded_powershell

Encoded PowerShell

timestamp

encrypted_phishing_site

Possible Encrypted Phishing Site Visit

write_time

exploit_attempt_correlation

Exploited C&C Connection

timestamp

exploit_attempt_priv_priv

Private to Private Exploit Anomaly

timestamp

exploit_attempt_priv_pub

Private to Public Exploit Anomaly

timestamp

exploit_attempt_pub_priv

Public to Private Exploit Anomaly

timestamp

exploit_attempt_pub_pub

Public to Public Exploit Anomaly

timestamp

external_clear_password

External Plain Text Passwords Detected

timestamp

external_cloud_account_login_failure

External Account Login Failure Anomaly

write_time

external_credential_stuffing

External Credential Stuffing

write_time

external_database_command

External SQL Shell Command

timestamp

external_fw_action

External Firewall Denial Anomaly

timestamp

external_fw_policy_id

External Firewall Policy Anomaly

timestamp

external_handshake_failure

External Handshake Failure

timestamp

external_ids_signature_spike

External IDS Signature Spike

timestamp

external_malware_activity

External Other Malware

timestamp

external_mysql_anomaly

External SQL Anomaly

timestamp

external_non_std_port_anomaly

External Non-Standard Port Anomaly

timestamp

external_password_spray

External Password Spraying

timestamp

external_pii_leak

External PII Leaked

timestamp

external_port_scan

External IP / Port Scan Anomaly

write_time, timestamp

external_protocol_account_login_failure

External Protocol Account Login Failure Anomaly

write_time

external_pua

External PUA

timestamp

external_ransomware

External Ransomware

timestamp

external_rdp_bluekeep

External RDP BlueKeep

timestamp

external_rdp_brute_force

External RDP Brute Force Attack

timestamp

external_rdp_suspicious_outbound

External RDP Suspicious Outbound

write_time

external_scan_anomalies

External Scanner Behavior Anomaly

timestamp

external_smb_anomaly

External SMB Write Anomaly

timestamp

external_smb_read_anomaly

External SMB Read Anomaly

timestamp

external_smb_user_scan

External SMB Username Enumeration

timestamp

external_spyware_activity

External Spyware

timestamp

external_sql_db_dump

External SQL Dumpfile Execution

write_time

external_suspected_malicious_user_agent

External Suspected Malicious User Agent

timestamp

external_syn_flood

External SYN Flood Victim

timestamp

external_syn_flood_attacker

External SYN Flood Attacker

timestamp

external_trojan_activity

External Trojan

timestamp

external_url_scan

External URL Reconnaissance Anomaly

write_time

external_user_bytes_sum

External User Data Volume Anomaly

timestamp

external_user_login_fail

External User Login Failure Anomaly

write_time

external_user_success_brute_forcer

External Brute-Forced Successful User Login

timestamp

external_user_uncommon_app

External User Application Usage Anomaly

timestamp

external_vuln_exploit_correlation

External Exploited Vulnerability

timestamp

file_creation

File Creation Anomaly

timestamp

gsuite_account_manipulation

Google Workspace Account Manipulation

write_time

gsuite_attack_warning

Google Workspace Attack Warning

write_time

gsuite_suspicious_activities

Google Workspace Suspicious Activities

write_time

gsuite_user_suspended

Google Workspace User Suspended

write_time

hydra_password_guessing_hack_tool

Hydra Password Guessing Hack Tool

timestamp

internal_clear_password

Internal Plain Text Passwords Detected

write_time

internal_cloud_account_login_failure

Internal Account Login Failure Anomaly

write_time

internal_credential_stuffing

Internal Credential Stuffing

write_time

internal_database_command

Internal SQL Shell Command

write_time

internal_fw_action

Internal Firewall Denial Anomaly

timestamp

internal_fw_policy_id

Internal Firewall Policy Anomaly

timestamp

internal_handshake_failure

Internal Handshake Failure

write_time

internal_ids_signature_spike

Internal IDS Signature Spike

timestamp

internal_malware_activity

Internal Other Malware

timestamp

internal_mysql_anomaly

Internal SQL Anomaly

timestamp

internal_non_std_port_anomaly

Internal Non-Standard Port Anomaly

timestamp

internal_password_spray

Internal Password Spraying

timestamp

internal_pii_leak

Internal PII Leaked

timestamp

internal_port_scan

Internal IP / Port Scan Anomaly

write_time, timestamp

internal_protocol_account_login_failure

Internal Protocol Account Login Failure Anomaly

write_time

internal_pua

Internal PUA

timestamp

internal_ransomware

Internal Ransomware

timestamp

internal_rdp_bluekeep

Internal RDP BlueKeep

timestamp

internal_rdp_brute_force

Internal RDP Brute Force Attack

timestamp

internal_rdp_suspicious_outbound

Internal RDP Suspicious Outbound

timestamp

internal_scan_anomalies

Internal Scanner Behavior Anomaly

timestamp

internal_smb_anomaly

Internal SMB Write Anomaly

timestamp

internal_smb_read_anomaly

Internal SMB Read Anomaly

timestamp

internal_smb_user_scan

Internal SMB Username Enumeration

timestamp

internal_spyware_activity

Internal Spyware

timestamp

internal_sql_db_dump

Internal SQL Dumpfile Execution

timestamp

internal_suspected_malicious_user_agent

Internal Suspected Malicious User Agent

timestamp

internal_syn_flood

Internal SYN Flood Victim

timestamp

internal_syn_flood_attacker

Internal SYN Flood Attacker

timestamp

internal_trojan_activity

Internal Trojan

timestamp

internal_url_scan

Internal URL Reconnaissance Anomaly

write_time

internal_user_bytes_sum

Internal User Data Volume Anomaly

timestamp

internal_user_login_fail

Internal User Login Failure Anomaly

write_time

internal_user_success_brute_forcer

Internal Brute-Forced Successful User Login

timestamp

internal_user_uncommon_app

Internal User Application Usage Anomaly

timestamp

internal_vuln_exploit_correlation

Internal Exploited Vulnerability

timestamp

ips_signature_spike_priv_priv

Private to Private IPS Signature Spike

timestamp

ips_signature_spike_priv_pub

Private to Public IPS Signature Spike

timestamp

ips_signature_spike_pub_priv

Public to Private IPS Signature Spike

timestamp

ips_signature_spike_pub_pub

Public to Public IPS Signature Spike

timestamp

long_session_anomaly

Long App Session Anomaly

timestamp

mal_access

Malicious Site Access

write_time

malware_on_disk

Malware on Disk

write_time

microsoft_entra_app_deleted

Microsoft Entra Application Deleted

write_time

microsoft_entra_hybrid_health_adfs_new_server

Microsoft Entra Hybrid Health AD FS New Server

write_time

microsoft_entra_hybrid_health_adfs_service_deleted

Microsoft Entra Hybrid Health AD FS Service Deleted

write_time

microsoft_entra_owner_removed_from_app

Microsoft Entra Owner Removed from Application

write_time

mimikatz_dcsync

Mimikatz DCSync

timestamp

mimikatz_mem_scan

Mimikatz Credential Dump

write_time

network_uncommon_app

Uncommon Application Anomaly

timestamp

network_uncommon_process

Uncommon Process Anomaly

timestamp

new_registered_domain

Recently Registered Domains

write_time

office365_admin_audit_logging_disabled

Office 365 Admin Audit Logging Disabled

write_time

office365_content_filter_policy_changed

Office 365 Content Filter Policy Changed

write_time

office365_malware_filter_policy_changed

Office 365 Malware Filter Policy Changed

write_time

office365_multi_file_restore

Office 365 Multiple Files Restored

write_time

office365_multi_user_deleted

Office 365 Multiple Users Deleted

write_time

office365_outside_entity_file_sharing

Office 365 File Sharing with Outside Entities

write_time

office365_password_policy_changed

Office 365 Password Policy Changed

write_time

office365_security_conf_changed

Office 365 Network Security Configuration Changed

write_time

office365_sharing_policy_changed

Office 365 Sharing Policy Changed

write_time

office365_user_network_admin_changed

Office 365 User Network Admin Changed

write_time

outbytes_anomaly

Outbytes Anomaly

timestamp

parent_child

Abnormal Parent / Child Process

timestamp, write_time

password_cracking_with_hashcat

Password Cracking With Hashcat

timestamp

password_resets_anomaly

Password Resets Anomaly

timestamp

password_spraying_attempts_using_dsacls

Password Spraying Attempts Using Dsacls

timestamp

phishing

Phishing URL

timestamp

powershell_cnc

PowerShell Remote Access

write_time

pripub_appid

Application Usage Anomaly

timestamp

ransomware_delete_backup_catalogs

Backup Catalogs Deleted by Ransomware

write_time

ransomware_volume_shadow_copy_deletion_via_vssadminedit

Volume Shadow Copy Deletion via VssAdmin

write_time

ransomware_volume_shadow_copy_deletion_via_wmicredit

Volume Shadow Copy Deletion via WMIC

write_time

rdp_outbytes_anomaly

RDP Outbytes Anomaly

timestamp

rdp_port_opening

RDP Port Opening

write_time

rdp_registry_modification

RDP Registry Modification

write_time

rdp_reverse_tunnel

RDP Reverse Tunnel

write_time

rdp_session_hijacking

RDP Session Hijacking

write_time

rdp_settings_hijack

RDP Settings Hijacking

write_time

rdp_suspicious_logon

RDP Suspicious Logon

write_time

rdp_suspicious_logon_attempt

RDP Suspicious Logon Attempt

write_time

scanner_rep

Scanner Reputation Anomaly

timestamp

smb_hack_smbexec

SMB Specific Service Installation

write_time

smb_impacket_lateralization

SMB Impacket Lateralization

write_time

smb_suspicious_copy

SMB Suspicious Copy

write_time

srcip_bad_reps

Bad Source Reputation Anomaly

timestamp

ssl_certificate

Encrypted C&C

timestamp

suspicious_azure_account_permission_elevation

Suspicious Azure Account Permission Elevation

write_time

suspicious_azure_deployment_activity

Suspicious Azure Deployment Activity

write_time

suspicious_azure_device_activity

Suspicious Microsoft Entra Device Activity

write_time

suspicious_azure_firewall_activity

Suspicious Azure Firewall Activity

write_time

suspicious_azure_key_vault_activity

Suspicious Azure Key Vault Activity

write_time

suspicious_azure_kubernetes_activity_credential_access

Suspicious Azure Kubernetes Activity: Credential Access

write_time

suspicious_azure_kubernetes_activity_defense_evasion

Suspicious Azure Kubernetes Activity: Defense Evasion

write_time

suspicious_azure_kubernetes_activity_impact

Suspicious Azure Kubernetes Activity: Impact

write_time

suspicious_azure_kubernetes_activity_persistence

Suspicious Azure Kubernetes Activity: Persistence

write_time

suspicious_azure_kubernetes_activity_privilege_escalation

Suspicious Azure Kubernetes Activity: Privilege Escalation

write_time

suspicious_azure_network_activity

Suspicious Azure Network Activity

write_time

suspicious_azure_service_principal_activity

Suspicious Microsoft Entra Service Principal Activity

write_time

suspicious_commandline

Suspicious Process Creation Commandline

write_time

suspicious_powershell_script

Suspicious Powershell Script

write_time

suspicious_process_access_lsass

Suspicious LSASS Process Access

write_time

suspicious_windows_network_connection

Suspicious Windows Network Connection

write_time

suspicious_windows_registry_event_impact

Suspicious Windows Registry Event: Impact

write_time

suspicious_windows_registry_event_persistence

Suspicious Windows Registry Event: Persistence

write_time

unencrypted_phishing_site

Possible Unencrypted Phishing Site Visit

write_time

user_asset_access

User Asset Access Anomaly

timestamp

user_impossible_travel

Impossible Travel Anomaly

write_time

user_login_region

User Login Location Anomaly

write_time

user_login_time

Login Time Anomaly

write_time

user_uncommon_process

User Process Usage Anomaly

timestamp

waf_internal_attacker

WAF Internal Attacker Anomaly

timestamp

waf_rule_violation

WAF Rule Violation Anomaly

timestamp

windows_security_ad_sensitive_attribute_modification

Sensitive Windows Active Directory Attribute Modification

write_time

windows_security_ad_suspicious_operation

Suspicious Windows Active Directory Operation

write_time

windows_security_malicious_event

Potentially Malicious Windows Event

write_time

windows_security_object_access_suspicious_attempt

Suspicious Access Attempt to Windows Object

write_time

windows_security_sensitive_networkshare

Sensitive Windows Network Share File or Folder Accessed

write_time

windows_security_steal_or_forge_kerberos_tickets

Steal or Forge Kerberos Tickets

write_time

windows_security_suspicious_activity_related_to_security_enabled_group

Suspicious Activity Related to Security-Enabled Group

write_time

windows_security_suspicious_connection_process

Suspicious Connection to Another Process

write_time

windows_security_suspicious_handle_request

Suspicious Handle Request to Sensitive Object

write_time

windows_security_suspicious_logon_event

Suspicious Windows Logon Event

write_time

windows_security_suspicious_service_installation

Suspicious Windows Service Installation

write_time

windows_suspicious_process_creation

Suspicious Windows Process Creation

write_time