heroui logo

SentinelOne External Alerts

Elastic Detection Rules

View Source
Summary
The SentinelOne External Alerts rule generates detection alerts for every alert produced by the SentinelOne cybersecurity platform. It pulls in alerts from `logs-sentinel_one.alert-*` indices, allowing security analysts to promptly investigate potential threats. When enabled, this rule operates on a 1-minute interval and can process up to 1,000 alerts per execution. Analysts are encouraged to follow systematic investigation steps, including correlating alerts with recent endpoint activity, examining related logs, and analyzing the nature of flagged files and processes. The rule outlines procedures for addressing false positives stemming from normal software operations and provides remediation strategies such as isolating affected endpoints and taking necessary actions against identified threats. The rule integrates seamlessly with the SentinelOne platform, enhancing the detection capabilities within the Elastic framework.
Categories
  • Endpoint
  • Cloud
  • Application
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Image
  • Web Credential
Created: 2025-07-31