
Summary
This detection rule is designed to identify and classify threats detected by SentinelOne, a cybersecurity solution that provides real-time threat detection and response. The rule specifically focuses on activities indicating potentially malicious events, with a particular attention to file events that include indicators of compromise (IoCs). It captures specific log types related to SentinelOne activities such as those classified as 'malicious' or 'suspicious'. The expected results of the tests validate the detection capabilities against known threats like the EICAR test file. The rule has a medium severity rating and employs a 60-minute deduplication period to minimize redundant alerts for the same threat.
Categories
- Endpoint
- Cloud
- Infrastructure
Data Sources
- Process
- Application Log
- Network Traffic
- Malware Repository
Created: 2022-12-07