SentinelOne Alerts

sentinelone

Classification:

attack

Set up the sentinelone integration.

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when SentinelOne raises a custom alert.

Strategy

SentinelOne allows users to create custom rules from event search queries, that trigger alerts and response when the rule matches on the specified criteria.

Triage and response

  1. Investigate the SentinelOne custom alert to determine if it is malicious or benign.
  2. If the alert is benign, consider including the user, host or IP address in a suppression list. See Best practices for creating detection rules with Datadog Cloud SIEM for more information.