Blog Post

Microsoft Defender XDR Blog
2 MIN READ

Advanced hunting product name changes

Tali Ash's avatar
Tali Ash
Icon for Microsoft rankMicrosoft
Dec 22, 2020

As announced in Ignite, we have updated our Microsoft 365 threat detection portfolio. We have made the following branding changes to align these solutions:

 

Microsoft 365 Defender (previously Microsoft Threat Protection).

Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection).

Microsoft Defender for Office 365 (previously Office 365 Advanced Threat Protection).

Microsoft Defender for Identity (previously Azure Advanced Threat Protection).

 

With this change, values in the AlertInfo and AlertEvidence tables in the advanced hunting schema for Microsoft 365 Defender will also need to change. On Jan 25, 2021 we will update the values in the ServiceSource and DetectionSource columns as shown in the tables below.

 

ServiceSource values

 

Old value

New value

Microsoft Defender ATP

Microsoft Defender for Endpoint

Microsoft Cloud App Security

Microsoft Cloud App Security

Microsoft Threat Protection

Microsoft 365 Defender

Office 365 ATP

Microsoft Defender for Office 365

Azure ATP

Microsoft Defender for Identity

 

DetectionSource values

 

Old value

New value

MCAS

Cloud App Security

 

WindowsDefenderAtp

EDR

WindowsDefenderAv

Antivirus

WindowsDefenderSmartScreen

SmartScreen

CustomerTI

Custom TI

OfficeATP

Microsoft Defender for Office 365

MTP

Microsoft 365 Defender

AzureATP

Microsoft Defender for Identity

CustomDetection

Custom Detection

AutomatedInvestigation

Automated investigation

ThreatExperts

Microsoft Threat Experts

3rd party TI

3rd Party sensors

 

You’ll need to update queries that search for these values. For example:

 

AlertInfo
| where ServiceSource == "Microsoft Defender ATP" 

 

Within 30 days of the change, you should update this query to include both new and old values. This will match both existing alerts and newly logged alerts.

 

AlertInfo
| where ServiceSource in ("Microsoft Defender ATP", "Microsoft Defender for Endpoint")

 

Beyond 30 days of the change, you can switch to using just the new names:

 

AlertInfo
| where ServiceSource == "Microsoft Defender for Endpoint"

 

Please make sure to update all your saved queries, custom detection rules, and queries you run using the API.

Updated Dec 22, 2020
Version 2.0