![]() Networks that the adapter is connected to. Tunneling protocol, if the interface is used for this purpose, for example 6to4, Teredo, ISATAP, PPTP, SSTP, and SSH For the possible values, refer to this enumeration Operational status of the network adapter. Unique identifier for the machine in the serviceįully qualified domain name (FQDN) of the machine Column nameĭate and time when the event was recorded Use this reference to construct queries that return information from this table.įor information on other tables in the advanced hunting schema, see the advanced hunting reference. The DeviceNetworkInfo table in the advanced hunting schema contains information about networking configuration of machines, including network adapters, IP and MAC addresses, and connected networks or domains. Want to experience Microsoft 365 Defender? Learn more about how you can evaluate and pilot Microsoft 365 Defender.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |