SentinelOne
- 3 Minutes to read
- Print
- PDF
SentinelOne
- 3 Minutes to read
- Print
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
About this document
This document provides the step-by-step procedure to configure SentinelOne in SAFE.
Introduction
SAFE integrates with SentinelOne and allows you to effortlessly discover and import assets and their EDR findings directly into SAFE.
Key Highlights of This Integration:
- Import Assets and EDR Findings: With this integration, you can now discover and import assets from SentielOne with their respective EDR findings into SAFE.
- Automated and On-Demand Synchronization: Take control of your assessment results with the option to set predefined time intervals for automatic synchronization. Furthermore, you can initiate on-demand assessments as needed.
- Data Filtering Flexibility: SAFE allows users to fine-tune data retrieval from SentileOne through the Group Filter feature. You have the freedom to specify group names for data filtering. In the absence of group names, SAFE pulls all assets accessible to the user into its system.
Prerequisites
You need the following connector details to configure SentielOne in SAFE:
- SentinelOne URL
- SentinelOneAPIToken
Generate SentinelOne API Token
- Log in to your SentinelOne account.
- Click Settings from the left navigation.
- Click the Users tab available in the header.
- Click the Service Users option available in the left navigation.
- Click the Actions dropdown and select Create New Service User. If this option is not available, contact your SentielOne admin.
- On the Create New Service User pop-up, enter the Name, Description, and Expiration Date.
- Click the Next button.
- In the Scope of Access pop-up, Click the Site card.
- In the SelectAccount, search for the account you want to pull the data to SAFE and click it.
- The system displays a checklist for all the available sites for the account.
- Selecting the Default site, the system displays a Role drop-down that allows you to select Roles. Select the Viewer role.
- Click the Create User button.
- The system creates the service user account and also displays an API Token. Copy and save the API Token to use later while configuring the SentielOne account in SAFE. The system displays this API Token only once.
Configuring SentinelOne in SAFE
Navigate to SAFE Hooks.
- Click the SentinelOne card.
- Enter the details in their respective field
- SentinelOne URL
- APIToken generated above.
- AnalystVerdictInclusionList: This field is populated by default. You can modify it to include specific analyst verdict statuses that should appear as failed findings in SAFE.
- AutoSync (in Days)
- Auto Onboard New Assets - By default, any resource that is present in SentinelOne and is not found in SAFE will be onboarded. The identifier used for the same is the Computer Name. To limit the integration to assessing only the endpoints/assets present in SAFE, uncheck this option.
- Update Existing Assets Metadata: If this checkbox is marked, the asset's metadata, such as asset name, IP address, etc., will get updated based on the data pulled from SentinelOne.
- GroupsNames(Optional): This field allows you to select which groups' threat data you wish to synchronize with SAFE. If left blank, it will automatically fetch data from all groups. This field accepts a comma-separated string input.
- Click the TestConnection button to verify the connection.
- Once the connection is verified, click Save to save the configuration.
- To trigger an on-demand sync outside of the scheduled auto-sync, click Sync Now. The auto-sync time is 01:15 UTC.
Viewing Results from SentinelOne
After configuring SentinelOne in SAFE, you can view assets and findings generated from SentinelOne threats.
- To view the Sync statistics, you can click the Details column of the row that corresponds to your Sync in the Integration History table. That system displays the following stats:
- Total Assets - Total assets/endpoints that are identified from SentinelOne which are available to the scope of API Token provided. SAFE onboard all the endpoints based on the group names passed irrespective of active threats count
- Failed Assets - The assets that are identified from SentinelOne but failed during submission as signals.
- Total Signals - Total signals generated and submitted to SAFE during Sync.
- Threats Processed - The count of only those threats that are contributing to a Failed finding status for SAFE based on the below-mentioned fail criteria mapping table.
- To view the assets, click the See Updated Assets option available at the header of the History table.
Alternatively, Navigate to Technology > Assets. Filter the list for Signal Source Equals security.safe.sentinelone. - To see the threats pulled from SentinelOne, click on any asset to navigate to the finding list.
- SentinelOne threat statuses are mapped to SAFE statuses based on the combination of two fields called Threat Mitigation Status and Analyst Verdict. The mapping of the combination to SAFE statuses is as follows.
Note
Please note that finding with failed status will be pulled into SAFE.
Threat Mitigation Status | Analyst Verdict | Finding Status in SAFE |
---|---|---|
Not mitigated | True Positive | Failed |
Not mitigated | Suspicious | Failed |
Not mitigated | Undefined | Failed |
Marked as benign | True Positive | Failed |
Marked as benign | Suspicious | Failed |
Mitigated | True Positive | Passed |
Mitigated | Suspicious | Passed |
Mitigated | Undefined | Passed |
Marked as benign | Undefined | Passed |
Marked as benign | False Positive | Passed |
Was this article helpful?