SentinelOne Alerts

sentinelone

Classification:

attack

Set up the sentinelone integration.

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when SentinelOne raises a custom alert.

Strategy

SentinelOne allows users to create custom rules from event search queries, that trigger alerts and response when the rule matches on the specified criteria.

Triage and response

  1. Investigate the SentinelOne custom alert to determine if it is malicious or benign.
  2. If the alert is benign, consider including the user, host or IP address in a suppression list. See Best practices for creating detection rules with Datadog Cloud SIEM for more information.