Event Time

Copper Contributor

We have recently noticed that an Azure AD a user had (18) events that spanned over 7 minutes, whereas Sentinel morphed this into (35) events spanning over 2 days. We have been told by support that "by design" it is rare but entirely possible for this to happen. We have also been told that "TimeGenerated" reflects the time Sentinel received the event, not the time when the event was created on the actual data source. This seems to conflict with Microsoft's definition of "TimeGenerated", which is "The TimeGenerated column contains the date and time that the record was created by the data source".

 

  1. If initial or duplicated events can stroll in days later, what does that mean for the accuracy of analytic rules as it sure seems like rules routinely use "TimeGenerated" as if it where the time the event was created?
  2. Is there a normalized field that reflects actual event creation time?
  3. At least in my tiny little mind Security Events are like banking transactions, they should never under any circumstances be duplicated.

Many SIEMs track three time parameters for an Event (McAfee, Splunk, ArcSight):

  1. Event Time - Actual time that the event happened, user A logged into system B.
  2. Received Time - When the event was received by the SIEM.
  3. Storage Time - When the event was stored.

My own experience has lead me to believe that the "Event Time" is what should be used for Security Analytics, while the other two are important for understanding SIEM performance, for example latency.

 

We're curious to know if anyone else has noticed this and how it's being handled.

 

J-

2 Replies
You can try using ingestion time like this to extract the ingestion time
SigninLogs
| extend ingestionTime = ingestion_time()

https://learn.microsoft.com/en-us/azure/data-explorer/kusto/query/ingestiontimefunction?pivots=azure...
Thanks. We're trying to identify if there is a specific field (or function) that can be counted on as the time the event was created by the given Data Source. Microsoft's definition above leads us to believe that's "TimeGenerated", but our observation and statements from Microsoft Support don't agree. For Security Analytics, the events creation time (when the thing actually happened) is what's relevant.