Skip to main content
Threat events returned by this API include a ‘platform_events_ids’ array. Each value is a source-system identifier that you can use to look up the original raw log row directly in Microsoft Sentinel (Log analytics). Use the “source” field on each threat event to identify which table the event originated from, then apply the corresponding KQL field below.
Source tableKQL fieldID formatExample KQL
EmailEventsNetworkMessageIdUUIDEmailEvents | where NetworkMessageId == "<id>"
EmailPostDeliveryEventsReportId{NetworkMessageId}-{numericSuffix}EmailPostDeliveryEvents | where ReportId == "<id>"
AuditLogsIdDirectory_{correlationId}_{code}_{seq}AuditLogs | where Id == "<id>"
SigninLogsIdUUIDSigninLogs | where Id == "<id>"
MicrosoftPurviewInformationProtectionIdUUIDMicrosoftPurviewInformationProtection | where Id == "<id>"
CloudAppEventsReportId79494985_{appId}_{uuid}CloudAppEvents | where ReportId == "<id>"
OfficeActivityOfficeIdUUIDOfficeActivity | where OfficeId == "<id>"
SecurityAlertSystemAlertIdUUIDSecurityAlert | where SystemAlertId == "<id>"
AlertInfoAlertId{numericId}_{signedInt}AlertInfo | where AlertId == "<id>"
IdentityDirectoryEventsReportIdUUIDIdentityDirectoryEvents | where ReportId == "<id>"
IdentityLogonEventsReportIdUUID or 64-char hexIdentityLogonEvents | where ReportId == "<id>"
CommonSecurityLog_ItemIdUUIDCommonSecurityLog | where _ItemId == "<id>"
AADUserRiskEventsComposite Sentinel key — no single queryable row key