Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.truu.ai/llms.txt

Use this file to discover all available pages before exploring further.

Threat events returned by this API include a ‘platform_events_ids’ array. Each value is a source-system identifier that you can use to look up the original raw log row directly in Microsoft Sentinel (Log analytics). Use the “source” field on each threat event to identify which table the event originated from, then apply the corresponding KQL field below.
Source tableKQL fieldID formatExample KQL
EmailEventsNetworkMessageIdUUIDEmailEvents | where NetworkMessageId == "<id>"
EmailPostDeliveryEventsReportId{NetworkMessageId}-{numericSuffix}EmailPostDeliveryEvents | where ReportId == "<id>"
AuditLogsIdDirectory_{correlationId}_{code}_{seq}AuditLogs | where Id == "<id>"
SigninLogsIdUUIDSigninLogs | where Id == "<id>"
MicrosoftPurviewInformationProtectionIdUUIDMicrosoftPurviewInformationProtection | where Id == "<id>"
CloudAppEventsReportId79494985_{appId}_{uuid}CloudAppEvents | where ReportId == "<id>"
OfficeActivityOfficeIdUUIDOfficeActivity | where OfficeId == "<id>"
SecurityAlertSystemAlertIdUUIDSecurityAlert | where SystemAlertId == "<id>"
AlertInfoAlertId{numericId}_{signedInt}AlertInfo | where AlertId == "<id>"
IdentityDirectoryEventsReportIdUUIDIdentityDirectoryEvents | where ReportId == "<id>"
IdentityLogonEventsReportIdUUID or 64-char hexIdentityLogonEvents | where ReportId == "<id>"
CommonSecurityLog_ItemIdUUIDCommonSecurityLog | where _ItemId == "<id>"
AADUserRiskEventsComposite Sentinel key — no single queryable row key