heroui logo

SentinelOne Threat External Alerts

Elastic Detection Rules

View Source
Summary
The SentinelOne Threat External Alerts rule is designed to generate detection alerts for each threat detected by the SentinelOne cybersecurity platform. This rule operates by monitoring threat-related events logged in the 'logs-sentinel_one.threat-*' indices. Alerts are generated every minute based on incoming data from SentinelOne, which helps security teams rapidly investigate potential threats. This detection rule includes detailed triage and analysis steps that assist analysts in determining the legitimacy of alerts, correlating events, and identifying potential false positives. The process involves verifying recent activity on affected endpoints, checking source and destination IPs, examining flagged files, and consulting SentinelOne resources as needed. The rule also provides guidance on response strategies that include isolating affected endpoints, removing malicious entities, and conducting network-wide scans. Analysts are encouraged to document incidents and refine alerting configurations for enhanced future protection against similar threats. It is essential to ensure that the SentinelOne integration is properly configured for effective ingestion of alerts, with considerations for avoiding duplicate alerts by properly managing setup for related promotion rules.
Categories
  • Endpoint
  • Cloud
  • Infrastructure
Data Sources
  • Pod
  • Container
  • User Account
  • Process
Created: 2025-08-04