Integrate SentinelOne v2 with Google SecOps

Integration version: 37.0

This document explains how to configure and integrate SentinelOne v2 with Google Security Operations (Google SecOps).

This integration uses SentinelOne API 2.0.

This integration uses one or more open source components. You can download a zipped copy of the full source code of this integration from the Cloud Storage bucket .

Use cases

The SentinelOne integration can help you solve the following use cases:

  1. Contain infected endpoints: use Google SecOps capabilities to isolate an infected host and prevent lateral movement and data exfiltration.

  2. Retrieve detailed endpoint information: use Google SecOps capabilities to enrich incident data with in-depth host analysis for better context and decision-making. You can automatically query SentinelOne for detailed information about an endpoint involved in an alert, including agent version, operating system, and network interfaces.

  3. Initiate Deep Visibility scans: use Google SecOps capabilities to hunt for threats and hidden malware on suspect machines and initiate a full disk scan using SentinelOne when suspicious activity is detected, such as unusual file modifications or registry changes.

  4. Investigate threats with threat intelligence: use Google SecOps capabilities to improve accuracy by correlating SentinelOne alerts with threat intelligence data, forward suspicious hashes, file paths, or IP addresses found within SentinelOne alerts to threat intelligence platforms.

  5. Triage malware: use Google SecOps capabilities to automatically classify malware with static analysis tools for streamlined incident response. You can extract samples from infected endpoints, trigger the analysis within your environment, and receive classification for the malware based on the static analysis.

Before you begin

To use the SentinelOne v2 integration, you need a SentinelOne API token.

To generate the API token, complete the following steps:

  1. In your SentinelOne management console, go to Settings > Users.

  2. Click your username.

  3. Go to Actions > API Token Operations.

  4. Click Generate API Token. Copy the API token and use it to configure the integration. The generated API token is valid for six months.

Integration parameters

The SentinelOne v2 integration requires the following parameters:

Parameter Description
API root

Required.

The SentinelOne API root.

The default value is https://{server}.SentinelOne.net/ .

API Token

Required.

The SentinelOne API token.

To learn more about how to generate the API token for th eintegration, see Before you begin . The SentinelOne security policy requires you to create a new API token every six months.

Verify SSL

Required.

If selected, the integration validates the SSL certificate when connecting to the Sentinel server.

Selected by default.

For instructions about how to configure an integration in Google SecOps, see Configure integrations .

You can make changes at a later stage, if needed. After you configure an integration instance, you can use it in playbooks. For more information about how to configure and support multiple instances, see Supporting multiple instances .

Actions

For more information about actions, see Respond to pending actions from Your Workdesk and Perform a manual action .

Add Threat Note

Use the Add Threat Noteaction to add a note to the threat in SentinelOne.

This action doesn't run on Google SecOps entities.

Action inputs

The Add Threat Noteaction requires the following parameters:

Parameter Description
Threat ID

Required.

The ID of the threat to add a note.

Note

Required.

A note to add to the threat.

Action outputs

The Add Threat Noteaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Available
Script result Available
Output messages

The Add Threat Noteaction can return the following output messages:

Output message Message description

Successfully added note to the threat THREAT_ID in SentinelOne.

Action wasn't able to add a note to the threat THREAT_ID in SentinelOne.

The action succeeded.
Error executing action "Add Threat Note". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Add Threat Noteaction:

Script result name Value
is_success True or False

Create Hash Black List Record

Use the Create Hash Black List Recordaction to add hashes to a blocklist in SentinelOne.

This action only supports SHA-1 hashes.

This action runs on the Google SecOps Hash entity.

Action inputs

The Create Hash Black List Recordaction requires the following parameters:

Parameter
Description
Operating System

Required.

An operating system for the hash.

The possible values are as follows:

  • windows
  • windows_legacy
  • macos
  • linux

The default value is windows .

Site IDs

Optional.

A comma-separated list of site IDs to send to the blocklist.

Group IDs

Optional.

A comma-separated list of group IDs to send to the blocklist.

Account IDs

Optional.

A comma-separated list of account IDs to send to the blocklist.

Description

Optional.

Additional information related to a hash.

The default value is "" .

Add to global blocklist

Required.

If selected, the action adds a hash to a global blocklist.

If you select this parameter, the action ignores the Site IDs , Group IDs , and Account IDs parameters.

Action outputs

The Create Hash Black List Recordaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Create Hash Black List Recordaction:

  [ 
  
 { 
  
 "Entity" 
 : 
  
 " ENTITY_ID 
" 
 , 
  
 "EntityResult" 
 : 
  
 [{ 
  
 "userName" 
 : 
  
 "user" 
 , 
  
 "description" 
 : 
  
 "Created by user." 
 , 
  
 "userId" 
 : 
  
 " USER_ID 
" 
 , 
  
 "scopeName" 
 : 
  
 "Test Group" 
 , 
  
 "value" 
 : 
  
 "36F9CA40B3CE96FCEE1CF1D4A7222935536FD25A" 
 , 
  
 "source" 
 : 
  
 "user" 
 , 
  
 "updatedAt" 
 : 
  
 "2020-07-02T14:41:20.678280Z" 
 , 
  
 "osType" 
 : 
  
 "windows" 
 , 
  
 "scope" 
 : 
  
 { 
  
 "groupIds" 
 : 
  
 [ 
 " GROUP_ID 
" 
 ] 
  
 }, 
  
 "type" 
 : 
  
 "white_hash" 
 , 
  
 "id" 
 : 
  
 " ENTITY_ID 
" 
 , 
  
 "createdAt" 
 : 
  
 "2020-07-02T14:41:20.678690Z" 
  
 }, 
  
 { 
  
 "userName" 
 : 
  
 "user" 
 , 
  
 "description" 
 : 
  
 "Created by user." 
 , 
  
 "userId" 
 : 
  
 " USER_ID 
" 
 , 
  
 "scopeName" 
 : 
  
 "Test Group 2" 
 , 
  
 "value" 
 : 
  
 "36F9CA40B3CE96FCEE1CF1D4A7222935536FD25A" 
 , 
  
 "source" 
 : 
  
 "user" 
 , 
  
 "updatedAt" 
 : 
  
 "2020-07-02T14:41:20.683858Z" 
 , 
  
 "osType" 
 : 
  
 "windows" 
 , 
  
 "scope" 
 : 
  
 { 
  
 "groupIds" 
 : 
  
 [ 
 " GROUP_ID 
" 
 ] 
  
 }, 
  
 "type" 
 : 
  
 "white_hash" 
 , 
  
 "id" 
 : 
  
 " ENTITY_ID 
" 
 , 
  
 "createdAt" 
 : 
  
 "2020-07-02T14:41:20.684677Z" 
  
 }] 
  
 } 
 ] 
 
Output messages

The Create Hash Black List Recordaction can return the following output messages:

Output message Message description

Successfully added the following hashes to the blocklist in SentinelOne: ENTITY_ID .

The following hashes were already a part of blocklist in SentinelOne: ENTITY_ID .

Action wasn't able to add the following hashes to the blocklist in SentinelOne: ENTITY_ID .

No hashes were added to the blocklist in SentinelOne.

The action succeeded.
Error executing action "Create Hash Black List Record". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Create Hash Black List Recordaction:

Script result name Value
is_success True or False

Create Hash Exclusion Record

Use the Create Hash Exclusion Recordaction to add a hash to the exclusion list in SentinelOne.

This action only supports SHA-1 hashes.

This action runs on the Google SecOps Hash entity.

Action inputs

The Create Hash Exclusion Recordaction requires the following parameters:

Parameter
Description
Operation System

Required.

An operation system (OS) for the hash.

The possible values are as follows:

  • windows
  • windows_legacy
  • macos
  • linux

The default value is windows .

Site IDs

Optional.

A comma-separated list of site IDs to send the hash to the exclusion list.

The action requires at least one valid value.

Group IDs

Optional.

A comma-separated list of group ID to send the hash to the exclusion list.

The action requires at least one valid value.

Account IDs

Optional.

A comma-separated list of account IDs to send the hash to the exclusion list.

Description

Optional.

Additional information related to the hash.

Add to global exclusion list

Optional.

If selected, the action adds a hash to the global exclusion list.

If you select this parameter, the action ignores the Site IDs , Group IDs , and Account IDs parameters.

Action outputs

The Create Hash Exclusion Recordaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Create Hash Exclusion Recordaction:

  [ 
  
 { 
  
 " ENTITY_ID 
" 
 : 
  
 { 
  
 "ID" 
 : 
  
 " ALLOWLISTED_ENTITY_ID 
" 
 , 
  
 "Created Time" 
 : 
  
 " ITEM_CREATION_TIME 
" 
 , 
  
 "Scope ID" 
 : 
  
 " SITE_OR_GROUP_ID 
" 
 , 
  
 "Scope Name" 
 : 
  
 "example_scope" 
  
 } 
  
 } 
 ] 
 
Output messages

The Create Hash Exclusion Recordaction can return the following output messages:

Output message Message description

Successfully added the following hashes to the exclusion list in SentinelOne: HASH_ID

The following hashes were already a part of exclusion list in SentinelOne: HASH_ID

Action wasn't able to add the following hashes to the exclusion list in SentinelOne: HASH_ID

No hashes were added to the exclusion list in SentinelOne.

The action succeeded.
Error executing action "Create Hash Exclusion Record". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Create Hash Exclusion Recordaction:

Script result name Value
is_success True or False

Create Path Exclusion Record

Use the Create Path Exclusion Recordaction to add a path to the exclusion list in SentinelOne.

This action doesn't run on Google SecOps entities.

Action inputs

The Create Path Exclusion Recordaction requires the following parameters:

Parameter
Description
Path

Required.

A path to add to the exclusion list.

Operation System

Required.

An operation system (OS) for the hash.

The possible values are as follows:

  • windows
  • windows_legacy
  • macos
  • linux

The default value is windows .

Site IDs

Optional.

A comma-separated list of site IDs to send the hash to the exclusion list.

The action requires at least one valid value.

Group IDs

Optional.

A comma-separated list of group ID to send the hash to the exclusion list.

The action requires at least one valid value.

Account IDs

Optional.

A comma-separated list of account IDs to send the hash to the exclusion list.

Description

Optional.

Additional information related to the hash.

Add to global exclusion list

Optional.

If selected, the action adds a hash to the global exclusion list.

If you select this parameter, the action ignores the Site IDs , Group IDs , and Account IDs parameters.

Include Subfolders

Optional.

If selected, the action includes subfolders for the provided path.

This parameter only applies if you configure a folder path in the Path parameter.

Mode

Optional.

A mode to use for the excluded path.

The possible values are as follows:

  • Suppress Alerts
  • Interoperability
  • Interoperability - Extended
  • Performance Focus
  • Performance Focus - Extended

The default value is Suppress Alerts .

Action outputs

The Create Path Exclusion Recordaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Create Path Exclusion Recordaction:

  [ 
  
 { 
  
 " ENTITY_ID 
" 
 : 
  
 { 
  
 "ID" 
 : 
  
 " ALLOWLISTED_ENTITY_ID 
" 
 , 
  
 "Created Time" 
 : 
  
 " ITEM_CREATION_TIME 
" 
 , 
  
 "Scope ID" 
 : 
  
 " SITE_OR_GROUP_ID 
" 
 , 
  
 "Scope Name" 
 : 
  
 "example_scope" 
  
 } 
  
 } 
 ] 
 
Output messages

The Create Path Exclusion Recordaction can return the following output messages:

Output message Message description

Successfully added the following path to the exclusion list in SentinelOne: PATH

The following paths were already a part of exclusion list in SentinelOne: PATH_LIST

Action wasn't able to add the following paths to the exclusion list in SentinelOne: PATH

No paths were added to the exclusion list in SentinelOne.

The action succeeded.
Error executing action "Create Path Exclusion Record". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Create Path Exclusion Recordaction:

Script result name Value
is_success True or False

Delete Hash Blacklist Record

Use the Delete Hash Blacklist Recordaction to delete hashes from a blocklist in SentinelOne.

This action only supports the SHA-1 hashes.

This action runs on the Google SecOps Hash entity.

Action inputs

The Delete Hash Blacklist Recordaction requires the following parameters:

Parameter Description
Site IDs

Optional.

A comma-separated list of site IDs to remove the hash.

Group IDs

Optional.

A comma-separated list of group IDs to remove the hash.

Account IDs

Optional.

A comma-separated list of account IDs to remove the hash.

Remove from global black list

Optional.

If selected, the action removes the hash from the global blocklist.

If you select this parameter, the action ignores the Site IDs , Group IDs , and Account IDs parameters.

Action outputs

The Delete Hash Blacklist Recordaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Available
Script result Available
Output messages

The Delete Hash Blacklist Recordaction can return the following output messages:

Output message Message description

Successfully removed the following hashes from the blocklist in SentinelOne: ENTITY_ID .

The following hashes were not found in a blocklist in SentinelOne: ENTITY_ID .

Action wasn't able to remove the following hashes to the blocklist in SentinelOne: ENTITY_ID .

No hashes were removed from the blocklist in SentinelOne.

The action succeeded.
Error executing action "Delete Hash Blacklist Record". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Delete Hash Blacklist Recordaction:

Script result name Value
is_success True or False

Disconnect Agent From Network

Use the Disconnect Agent From Networkaction to disconnect an agent from a network using the agent's hostname or IP address.

This action runs on the following Google SecOps entities:

  • IP Address
  • Hostname

Action inputs

None.

Action outputs

The Disconnect Agent From Networkaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Not available
Script result Available
Script result

The following table lists the value for the script result output when using the Disconnect Agent From Networkaction:

Script result name Value
is_success True or False

Download Threat File

Use the Download Threat Fileaction to download a file related to a threat in SentinelOne.

To retrieve threat files in SentinelOne, you need any of the following roles:

  • Admin
  • IR Team
  • SOC

This action doesn't run on Google SecOps entities.

Action limitations

The Download Threat Fileaction can reach timeout when SentinelOne retrieves a file, but doesn't provide a download URL.

To investigate the cause for timeout, go to the threat timeline.

Action inputs

The Download Threat Fileaction requires the following parameters:

Parameter
Description
Threat ID

Required.

The ID of the threat to download a file.

Password

Required.

A password for the zipped folder that contains the threat file.

The password requirements are as follows:

  • Is at least 10 characters long.
  • Includes uppercase letters, lowercase letters, digits, and special symbols.

The maximum length for the password is 256 characters.

Download Folder Path

Required.

A path to a folder to store the threat file.

Overwrite

Required.

If selected, the action overwrites a file with the identical name.

Not selected by default.

Action outputs

The Download Threat Fileaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Download Threat Fileaction:

  { 
  
 "absolute_path" 
 : 
  
 " ABSOLUTE_PATH 
" 
 } 
 
Output messages

The Download Threat Fileaction can return the following output messages:

Output message Message description

Successfully downloaded the file related to threat THREAT_ID in SentinelOne.

Action wasn't able to download the file related to threat THREAT_ID . Reason: The action was able to initiate the downloading of the file, but SentinelOne didn't return a download URL.

Waiting for the download link to appear in SentinelOne.

The action succeeded.
Error executing action "Download Threat File". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Download Threat Fileaction:

Script result name Value
is_success True or False

Enrich Endpoints

Use the Enrich Endpointsaction to enrich information about the endpoint using the IP address or hostname.

This action runs on the following Google SecOps entities:

  • IP Address
  • Hostname

Action inputs

The Enrich Endpointsaction requires the following parameters:

Parameter Description
Create Insight

Optional.

If selected, the action creates an insight with information about endpoints.

Only Infected Endpoints Insights

Optional.

If selected, the action only creates insights for infected endpoints.

Action outputs

The Enrich Endpointsaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Enrich Endpointsaction:

  { 
  
 "accountId" 
 : 
  
 " ACCOUNT_ID 
" 
 , 
  
 "accountName" 
 : 
  
 "SentinelOne" 
 , 
  
 "activeDirectory" 
 : 
  
 { 
  
 "computerDistinguishedName" 
 : 
  
 "CN=LP-EXAMPLE,CN=Computers,DC=EXAMPLE,DC=LOCAL" 
 , 
  
 "computerMemberOf" 
 : 
  
 [], 
  
 "lastUserDistinguishedName" 
 : 
  
 "CN=Example,OU=Users,OU=PS,OU=IL,OU=Operations,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL" 
 , 
  
 "lastUserMemberOf" 
 : 
  
 [ 
  
 "CN=esx.cs,OU=ESX,OU=GROUPS,OU=IL,OU=IT,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL" 
 , 
  
 "CN=Backup Operators,CN=Builtin,DC=EXAMPLE,DC=LOCAL" 
 , 
  
 "CN=esx.product,OU=ESX,OU=GROUPS,OU=IL,OU=IT,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL" 
 , 
  
 "CN=EXAMPLE_Admins,OU=QA,OU=IL,OU=IT,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL" 
 , 
  
 "CN=Local Admin,OU=GROUPS,OU=IL,OU=IT,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL" 
 , 
  
 "CN=CSM,OU=Operations,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL" 
 , 
  
 "CN=Event Log Readers,CN=Builtin,DC=EXAMPLE,DC=LOCAL" 
  
 ] 
  
 }, 
  
 "activeThreats" 
 : 
  
 0 
 , 
  
 "agentVersion" 
 : 
  
 "4.1.4.82" 
 , 
  
 "allowRemoteShell" 
 : 
  
 false 
 , 
  
 "appsVulnerabilityStatus" 
 : 
  
 "patch_required" 
 , 
  
 "computerName" 
 : 
  
 "LP-EXAMPLE" 
 , 
  
 "consoleMigrationStatus" 
 : 
  
 "N/A" 
 , 
  
 "coreCount" 
 : 
  
 8 
 , 
  
 "cpuCount" 
 : 
  
 8 
 , 
  
 "cpuId" 
 : 
  
 "Intel(R) Core(TM) i7-8650U CPU @ 1.90GHz" 
 , 
  
 "createdAt" 
 : 
  
 "2020-05-31T07:22:14.695136Z" 
 , 
  
 "domain" 
 : 
  
 "EXAMPLE" 
 , 
  
 "encryptedApplications" 
 : 
  
 false 
 , 
  
 "externalId" 
 : 
  
 "" 
 , 
  
 "externalIp" 
 : 
  
 "192.0.2.91" 
 , 
  
 "groupId" 
 : 
  
 "863712577864500060" 
 , 
  
 "groupIp" 
 : 
  
 "192.0.2.0" 
 , 
  
 "groupName" 
 : 
  
 "Test Group" 
 , 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "inRemoteShellSession" 
 : 
  
 false 
 , 
  
 "infected" 
 : 
  
 false 
 , 
  
 "installerType" 
 : 
  
 ".msi" 
 , 
  
 "isActive" 
 : 
  
 false 
 , 
  
 "isDecommissioned" 
 : 
  
 false 
 , 
  
 "isPendingUninstall" 
 : 
  
 false 
 , 
  
 "isUninstalled" 
 : 
  
 false 
 , 
  
 "isUpToDate" 
 : 
  
 true 
 , 
  
 "lastActiveDate" 
 : 
  
 "2021-01-12T12:59:43.143066Z" 
 , 
  
 "lastIpToMgmt" 
 : 
  
 "192.0.2.20" 
 , 
  
 "lastLoggedInUserName" 
 : 
  
 "EXAMPLE" 
 , 
  
 "licenseKey" 
 : 
  
 "" 
 , 
  
 "locationType" 
 : 
  
 "fallback" 
 , 
  
 "locations" 
 : 
  
 [ 
  
 { 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "name" 
 : 
  
 "Fallback" 
 , 
  
 "scope" 
 : 
  
 "global" 
  
 } 
  
 ], 
  
 "machineType" 
 : 
  
 "laptop" 
 , 
  
 "mitigationMode" 
 : 
  
 "protect" 
 , 
  
 "mitigationModeSuspicious" 
 : 
  
 "protect" 
 , 
  
 "modelName" 
 : 
  
 "Dell Inc. - Latitude 7490" 
 , 
  
 "networkInterfaces" 
 : 
  
 [ 
  
 { 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "inet" 
 : 
  
 [ 
  
 "192.0.2.20" 
  
 ], 
  
 "inet6" 
 : 
  
 [ 
  
 "2001:db8:1:1:1:1:1:1" 
 , 
  
 "2001:db8:2:2:2:2:2:2" 
 , 
  
 "2001:db8:ffff:ffff:ffff:ffff:ffff:ffff" 
  
 ], 
  
 "name" 
 : 
  
 "Wi-Fi" 
 , 
  
 "physical" 
 : 
  
 " MAC_ADDRESS 
" 
  
 }, 
  
 { 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "inet" 
 : 
  
 [ 
  
 "192.168.193.193" 
  
 ], 
  
 "inet6" 
 : 
  
 [ 
  
 "2001:db8:ffff:ffff:ffff:ffff:ffff:ffff" 
  
 ], 
  
 "name" 
 : 
  
 "vEthernet (Default Switch)" 
 , 
  
 "physical" 
 : 
  
 " MAC_ADDRESS 
" 
  
 }, 
  
 { 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "inet" 
 : 
  
 [ 
  
 "201.0.113.1" 
  
 ], 
  
 "inet6" 
 : 
  
 [ 
  
 "2001:db8:1:1:1:1:1:1" 
 , 
  
 "2001:db8:2:2:2:2:2:2" 
  
 ], 
  
 "name" 
 : 
  
 "vEthernet (DockerNAT)" 
 , 
  
 "physical" 
 : 
  
 " MAC_ADDRESS 
" 
  
 } 
  
 ], 
  
 "networkStatus" 
 : 
  
 "connecting" 
 , 
  
 "osArch" 
 : 
  
 "64 bit" 
 , 
  
 "osName" 
 : 
  
 "Windows 10 Pro" 
 , 
  
 "osRevision" 
 : 
  
 "18363" 
 , 
  
 "osStartTime" 
 : 
  
 "2021-01-03T15:38:32Z" 
 , 
  
 "osType" 
 : 
  
 "windows" 
 , 
  
 "osUsername" 
 : 
  
 null 
 , 
  
 "rangerStatus" 
 : 
  
 "NotApplicable" 
 , 
  
 "rangerVersion" 
 : 
  
 null 
 , 
  
 "registeredAt" 
 : 
  
 "2020-05-31T07:22:14.691561Z" 
 , 
  
 "scanAbortedAt" 
 : 
  
 null 
 , 
  
 "scanFinishedAt" 
 : 
  
 "2020-05-31T09:28:53.867014Z" 
 , 
  
 "scanStartedAt" 
 : 
  
 "2020-05-31T07:25:37.814972Z" 
 , 
  
 "scanStatus" 
 : 
  
 "finished" 
 , 
  
 "siteId" 
 : 
  
 " SITE_ID 
" 
 , 
  
 "siteName" 
 : 
  
 "example.com" 
 , 
  
 "threatRebootRequired" 
 : 
  
 false 
 , 
  
 "totalMemory" 
 : 
  
 16263 
 , 
  
 "updatedAt" 
 : 
  
 "2021-01-18T13:33:43.834618Z" 
 , 
  
 "userActionsNeeded" 
 : 
  
 [], 
  
 "uuid" 
 : 
  
 " UUID 
" 
 } 
 
Output messages

The Enrich Endpointsaction can return the following output messages:

Output message Message description

Successfully retrieved information about the following endpoints from SentinelOne: ENTITY_ID

Action wasn't able to retrieve information about the following endpoints from SentinelOne: ENTITY_ID

No information was retrieved for provided entities.

The action succeeded.
Error executing action "Enrich Endpoints". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Enrich Endpointsaction:

Script result name Value
is_success True or False

Get Agent Status

Use the Get Agent Statusaction to retrieve information about the status of agents on the endpoints based on the provided entity.

This action runs on the following Google SecOps entities:

  • IP Address
  • Hostname

Action inputs

None.

Action outputs

The Get Agent Statusaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Get Agent Statusaction:

  { 
 "status" 
 : 
  
 "Not active" 
 } 
 
Output messages

The Get Agent Statusaction can return the following output messages:

Output message Message description

Successfully retrieved information about agent status for the following endpoints: ENTITY_ID

Action wasn't able to retrieve information about agent status for the following endpoints: ENTITY_ID

No information about agent status was found for the provided endpoints.

The action succeeded.
Error executing action "Get Agent Status". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Get Agent Statusaction:

Script result name Value
is_success True or False

Get Application List for Endpoint

Use the Get Application List for Endpointaction to retrieve information about available applications on an endpoint using the provided entities.

This action runs on the following Google SecOps entities:

  • IP Address
  • Hostname

Action inputs

The Get Application List for Endpointaction requires the following parameters:

Parameter Description
Max Applications To Return

Optional.

The maximum number of applications to return.

If you don't set a number, the action returns all available applications.

Action outputs

The Get Application List for Endpointaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Get Application List for Endpointaction:

  { 
  
 "data" 
 : 
  
 [ 
  
 { 
  
 "installedDate" 
 : 
  
 "2021-01-06T08:55:56.762000Z" 
 , 
  
 "name" 
 : 
  
 "Mozilla Firefox 84.0.1 (x64 en-US)" 
 , 
  
 "publisher" 
 : 
  
 "Mozilla" 
 , 
  
 "size" 
 : 
  
 211562 
 , 
  
 "version" 
 : 
  
 "84.0.1" 
  
 } 
  
 ] 
 } 
 
Output messages

The Get Application List for Endpointaction can return the following output messages:

Output message Message description

Successfully retrieved available applications for the following endpoints: ENTITY_ID .

Action wasn't able to retrieve available applications for the following endpoints: ENTITY_ID .

No applications were retrieved for provided endpoints.

The action succeeded.
Error executing action "Get Application List for Endpoint". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Get Application List for Endpointaction:

Script result name Value
is_success True or False

Get Blacklist

Use the Get Blacklistaction to get a list of all the items available in the blocklist in SentinelOne.

This action doesn't run on Google SecOps entities.

Action inputs

The Get Blacklistaction requires the following parameters:

Parameter Description
Hash

Optional.

A comma-separated list of hashes to check in the blocklist.

The action only returns hashes that were found.

If you set the Hash , the action ignores the Limit parameter.

Site IDs

Optional.

A comma-separated list of site IDs to return blocklist items.

Group IDs

Optional.

A comma-separated list of group IDs to return blocklist items.

Account Ids

Optional.

A comma-separated list of account IDs to return blocklist items.

Limit

Optional.

A number of blocklist items to return.

If you set the Hash parameter, the action ignores this parameter.

The maximum value is 1000 .

The default value is 50 .

Query

Optional.

A query to filter results.

Use Global Blacklist

Optional.

If selected, the action returns hashes from a global blocklist.

Not selected by default.

Action outputs

The Get Blacklistaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
Case wall table

The Get Blacklistaction can return the following table:

Table name: Blocklist Hashes

Table columns:

  • Hash
  • Scope
  • Description
  • OS
  • User
JSON result

The following example shows the JSON result output received when using the Get Blacklistaction:

  [ 
  
 { 
  
 "userName" 
 : 
  
 "Example" 
 , 
  
 "description" 
 : 
  
 "test" 
 , 
  
 "userId" 
 : 
  
 " USER_ID 
" 
 , 
  
 "scopeName" 
 : 
  
 "Example.com" 
 , 
  
 "value" 
 : 
  
 "cf23df2207d99a74fbe169e3eba035e633bxxxxx" 
 , 
  
 "source" 
 : 
  
 "user" 
 , 
  
 "updatedAt" 
 : 
  
 "2020-02-27T15:02:54.686991Z" 
 , 
  
 "osType" 
 : 
  
 "windows" 
 , 
  
 "scope" 
 : 
  
 { 
  
 "siteIds" 
 : 
  
 [ 
 " SITE_ID 
" 
 ] 
  
 }, 
  
 "type" 
 : 
  
 "black_hash" 
 , 
  
 "id" 
 : 
  
 "8353960925573xxxxx" 
 , 
  
 "createdAt" 
 : 
  
 "2020-02-27T15:02:54.687675Z" 
  
 }, 
  
 { 
  
 "description" 
 : 
  
 "Detected by SentinelOne Cloud" 
 , 
  
 "userId" 
 : 
  
 null 
 , 
  
 "scopeName" 
 : 
  
 "Example.com" 
 , 
  
 "value" 
 : 
  
 "3395856ce81f2b7382dee72602f798b642fxxxxx" 
 , 
  
 "source" 
 : 
  
 "cloud" 
 , 
  
 "updatedAt" 
 : 
  
 "2020-03-18T14:42:02.730095Z" 
 , 
  
 "osType" 
 : 
  
 "linux" 
 , 
  
 "scope" 
 : 
  
 { 
  
 "siteIds" 
 : 
  
 [ 
 " SITE_ID 
" 
 ] 
  
 }, 
  
 "type" 
 : 
  
 "black_hash" 
 , 
  
 "id" 
 : 
  
 " ENTITY_ID 
" 
 , 
  
 "createdAt" 
 : 
  
 "2020-03-18T14:42:02.730449Z" 
  
 }, 
  
 { 
  
 "description" 
 : 
  
 "Detected by SentinelOne Cloud" 
 , 
  
 "userId" 
 : 
  
 null 
 , 
  
 "scopeName" 
 : 
  
 "Example.com" 
 , 
  
 "value" 
 : 
  
 "df531d66173235167ac502b867f3cae2170xxxxx" 
 , 
  
 "source" 
 : 
  
 "cloud" 
 , 
  
 "updatedAt" 
 : 
  
 "2020-04-08T07:27:35.686775Z" 
 , 
  
 "osType" 
 : 
  
 "linux" 
 , 
  
 "scope" 
 : 
  
 { 
  
 "siteIds" 
 : 
  
 [ 
 " SITE_ID 
" 
 ] 
  
 }, 
  
 "type" 
 : 
  
 "black_hash" 
 , 
  
 "id" 
 : 
  
 " ENTITY_ID 
" 
 , 
  
 "createdAt" 
 : 
  
 "2020-04-08T07:27:35.687168Z" 
  
 } 
 ] 
 
Output messages

The Get Blacklistaction can return the following output messages:

Output message Message description

Successfully retrieved blocklisted hashes based on the provided filter criteria in SentinelOne.

No blocklisted hashes were found for the provided criteria in SentinelOne.

The action succeeded.
Error executing action "Get Blacklist". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Get Blacklistaction:

Script result name Value
is_success True or False

Get Deep Visibility Query Result

Use the Get Deep Visibility Query Resultaction to retrieve information about the Deep Visibility query results.

Run this action in combination with the Initiate Deep Visibility Query action.

This action doesn't run on Google SecOps entities.

Action inputs

The Get Deep Visibility Query Resultaction requires the following parameters:

Parameter Description
Query ID

Required.

The ID of the query to return results.

The ID value is available in the JSON result of the Initiate Deep Visibility Query action as the query_id parameter.

Limit

Optional.

The number of events to return.

The maximum value is 100 .

The default value is 50 .

Action outputs

The Get Deep Visibility Query Resultaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Available
Enrichment table Not available
JSON result Not available
Output messages Available
Script result Available
Case wall table

The Get Deep Visibility Query Resultaction can return the following table:

Table name: SentinelOne Events

Table columns:

  • Event Type
  • Site Name
  • Time
  • Agent OS
  • Process ID
  • Process UID
  • Process Name
  • MD5
  • SHA256
Output messages

The Get Deep Visibility Query Resultaction can return the following output messages:

Output message Message description
Successfully found events for query: QUERY_ID . The action succeeded.
Error executing action "Get Deep Visibility Query Result". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Get Deep Visibility Query Resultaction:

Script result name Value
is_success True or False

Get Events for Endpoint Hours Back

Use the Get Events for Endpoint Hours Backaction to retrieve information about the latest events on an endpoint.

This action runs on the following Google SecOps entities:

  • IP Address
  • Hostname

Action inputs

The Get Events for Endpoint Hours Backaction requires the following parameters:

Parameter Description
Hours Back

Required.

The number of hours prior to now to fetch events.

Events Amount Limit

Optional.

The maximum number of events to return for every event type.

The default value is 50 .

Include File Events Information

Optional.

If selected, the action queries information about file events.

Include Indicator Events Information

Optional.

If selected, the action queries information about indicator events.

Include DNS Events Information

Optional.

If selected, the action queries information about DNS events.

Include Network Actions Events Information

Optional.

If selected, the action queries information about the network actions events.

Include URL Events Information

Optional.

If selected, the action queries information about URL events.

Include Registry Events Information

Optional.

If selected, the action queries information about registry events.

Include Scheduled Task Events Information

Optional.

If selected, the action queries information about scheduled task events.

Action outputs

The Get Events for Endpoint Hours Backaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Get Events for Endpoint Hours Backaction:

  { 
  
 "data" 
 : 
  
 [ 
  
 { 
  
 "activeContentFileId" 
 : 
  
 null 
 , 
  
 "activeContentHash" 
 : 
  
 null 
 , 
  
 "activeContentPath" 
 : 
  
 null 
 , 
  
 "activeContentSignedStatus" 
 : 
  
 null 
 , 
  
 "activeContentType" 
 : 
  
 null 
 , 
  
 "agentDomain" 
 : 
  
 "" 
 , 
  
 "agentGroupId" 
 : 
  
 " GROUP_ID 
" 
 , 
  
 "agentId" 
 : 
  
 " ID 
" 
 , 
  
 "agentInfected" 
 : 
  
 false 
 , 
  
 "agentIp" 
 : 
  
 "192.0.2.160" 
 , 
  
 "agentIsActive" 
 : 
  
 true 
 , 
  
 "agentIsDecommissioned" 
 : 
  
 false 
 , 
  
 "agentMachineType" 
 : 
  
 "server" 
 , 
  
 "agentName" 
 : 
  
 "ip-203-0-113-205" 
 , 
  
 "agentNetworkStatus" 
 : 
  
 "connected" 
 , 
  
 "agentOs" 
 : 
  
 "linux" 
 , 
  
 "agentTimestamp" 
 : 
  
 "2020-03-19T08:17:01.575Z" 
 , 
  
 "agentUuid" 
 : 
  
 " UUID 
" 
 , 
  
 "agentVersion" 
 : 
  
 "3.3.1.14" 
 , 
  
 "attributes" 
 : 
  
 [ 
  
 { 
  
 "display" 
 : 
  
 "Created At" 
 , 
  
 "display_attribute" 
 : 
  
 false 
 , 
  
 "field_id" 
 : 
  
 "agentTimestamp" 
 , 
  
 "priority" 
 : 
  
 3 
 , 
  
 "queryable" 
 : 
  
 false 
 , 
  
 "section" 
 : 
  
 "Main Attributes" 
 , 
  
 "value" 
 : 
  
 "2020-03-19T08:17:01.575Z" 
  
 },{ 
  
 "display" 
 : 
  
 "Site ID" 
 , 
  
 "display_attribute" 
 : 
  
 false 
 , 
  
 "field_id" 
 : 
  
 "siteId" 
 , 
  
 "priority" 
 : 
  
 7 
 , 
  
 "queryable" 
 : 
  
 true 
 , 
  
 "section" 
 : 
  
 "Endpoint Info" 
 , 
  
 "value" 
 : 
  
 null 
  
 } 
  
 ], 
  
 "containerId" 
 : 
  
 null 
 , 
  
 "containerImage" 
 : 
  
 null 
 , 
  
 "containerLabels" 
 : 
  
 null 
 , 
  
 "containerName" 
 : 
  
 null 
 , 
  
 "createdAt" 
 : 
  
 "2020-03-19T08:17:01.575000Z" 
 , 
  
 "eventType" 
 : 
  
 "Process Creation" 
 , 
  
 "hasParent" 
 : 
  
 true 
 , 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "k8sCluame" 
 : 
  
 null 
 , 
  
 "k8sControllerLabels" 
 : 
  
 null 
 , 
  
 "k8sControllerName" 
 : 
  
 null 
 , 
  
 "k8sControllerType" 
 : 
  
 null 
 , 
  
 "k8sNamespace" 
 : 
  
 null 
 , 
  
 "k8sNamespaceLabels" 
 : 
  
 null 
 , 
  
 "k8sNode" 
 : 
  
 null 
 , 
  
 "k8sPodLabels" 
 : 
  
 null 
 , 
  
 "k8sPodName" 
 : 
  
 null 
 , 
  
 "md5" 
 : 
  
 null 
 , 
  
 "objectType" 
 : 
  
 "process" 
 , 
  
 "parentPid" 
 : 
  
 "32461" 
 , 
  
 "parentProcessName" 
 : 
  
 "dash" 
 , 
  
 "parentProcessStartTime" 
 : 
  
 "2020-03-19T08:17:01.785Z" 
 , 
  
 "parentProcessUniqueKey" 
 : 
  
 " KEY 
" 
 , 
  
 "pid" 
 : 
  
 "32462" 
 , 
  
 "processCmd" 
 : 
  
 " run-parts --report /etc/cron.hourly" 
 , 
  
 "processDisplayName" 
 : 
  
 null 
 , 
  
 "processGroupId" 
 : 
  
 " GROUP_ID 
" 
 , 
  
 "processImagePath" 
 : 
  
 "/bin/run-parts" 
 , 
  
 "processImageSha1Hash" 
 : 
  
 "66df74a1f7cc3509c87d6a190ff90ac86caf440d" 
 , 
  
 "processIntegrityLevel" 
 : 
  
 "INTEGRITY_LEVEL_UNKNOWN" 
 , 
  
 "processIsRedirectedCommandProcessor" 
 : 
  
 "False" 
 , 
  
 "processIsWow64" 
 : 
  
 "False" 
 , 
  
 "processName" 
 : 
  
 "run-parts" 
 , 
  
 "processRoot" 
 : 
  
 "False" 
 , 
  
 "processSessionId" 
 : 
  
 "0" 
 , 
  
 "processStartTime" 
 : 
  
 "2020-03-19T08:17:01.787Z" 
 , 
  
 "processSubSystem" 
 : 
  
 "SUBSYSTEM_UNKNOWN" 
 , 
  
 "processUniqueKey" 
 : 
  
 " KEY 
" 
 , 
  
 "publisher" 
 : 
  
 null 
 , 
  
 "relatedToThreat" 
 : 
  
 "False" 
 , 
  
 "sha256" 
 : 
  
 null 
 , 
  
 "signatureSignedInvalidReason" 
 : 
  
 null 
 , 
  
 "signedStatus" 
 : 
  
 "unsigned" 
 , 
  
 "siteName" 
 : 
  
 "example.com" 
 , 
  
 "trueContext" 
 : 
  
 "c98a4557-94b5-da31-5074-fe6360f17228" 
 , 
  
 "user" 
 : 
  
 "unknown" 
 , 
  
 "verifiedStatus" 
 : 
  
 null 
  
 } 
  
 ], 
  
 "pagination" 
 : 
  
 { 
  
 "nextCursor" 
 : 
  
 " VALUE 
" 
 , 
  
 "totalItems" 
 : 
  
 632 
  
 } 
 } 
 
Output messages

The Get Events for Endpoint Hours Backaction can return the following output messages:

Output message Message description

Successfully retrieved information about the events for the following endpoints: ENDPOINT_ID .

Action wasn't able to find any events for the following endpoints: ENDPOINT_ID .

No information events for the provided endpoints.

The action succeeded.
Error executing action "Get Events for Endpoint Hours Back". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Get Events for Endpoint Hours Backaction:

Script result name Value
is_success True or False

Get Group Details

Use the Get Group Detailsaction to retrieve detailed information about provided groups.

This action doesn't run on Google SecOps entities.

Action inputs

The Get Group Detailsaction requires the following parameters:

Parameter Description
Group Names

Required.

Group names to retrieve details. This parameter accepts multiple values as a comma-separated list.

Action outputs

The Get Group Detailsaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
Case wall table

The Get Group Detailsaction can return the following table:

Table name: SentinelOne Groups

Table columns:

  • ID
  • Name
  • Type
  • Rank
  • Creator
  • Creation Time
JSON result

The following example shows the JSON result output received when using the Get Group Detailsaction:

  [ 
  
 { 
  
 " GROUP_NAME 
" 
 : 
 " UNEDITABLE_VARIABLE 
RESPONSE_DATA" 
  
 } 
 ] 
 
Output messages

The Get Group Detailsaction can return the following output messages:

Output message Message description

Successfully retrieved information about the following groups in SentinelOne: GROUP_NAME .

Action wasn't able to retrieve information about the following groups in SentinelOne: GROUP_NAME .

No information about provided groups was found.

The action succeeded.
Error executing action "Get Group Details". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Get Group Detailsaction:

Script result name Value
is_success True or False

Get Hash Reputation

(Deprecated) Use the Get Hash Reputationaction to retrieve information about hashes from SentinelOne.

This action runs on the Google SecOps Hash entity.

Action inputs

The Get Hash Reputationaction requires the following parameters:

Parameter Description
Reputation Threshold

Optional.

A reputation threshold to mark entity as suspicious.

If you don't set a value, the action doesn't mark any entity as suspicious.

The maximum value is 10 .

The default value is 5 .

Create Insight

Optional.

If selected, the action creates an insight that contains information about the reputation.

Only Suspicious Hashes Insight

Optional.

If selected, the action only creates an insight for hashes with the reputation exceeding or equal to the Reputation Threshold value.

Action outputs

The Get Hash Reputationaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Available
JSON result Not available
Output messages Not available
Script result Available
Enrichment table

The Get Hash Reputationaction can enrich the following fields:

Enrichment field name Applicability
SENO_reputation Returns if it exists in the JSON result.
Script result

The following table lists the value for the script result output when using the Get Hash Reputationaction:

Script result name Value
is_success True or False

Get Process List for Endpoint - Deprecated

Get System Status

Use the Get System Statusaction to retrieve the status of a system.

This action runs on all Google SecOps entities.

Action inputs

None.

Action outputs

The Get System Statusaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Not available
Script result Available
JSON result

The following example shows the JSON result output received when using the Get System Statusaction:

  { 
  
 "system_status" 
 : 
  
 { 
  
 "data" 
 : 
  
 { 
  
 "health" 
 : 
  
 "ok" 
  
 }}, 
  
 "db_status" 
 : 
  
 { 
  
 "data" 
 : 
  
 { 
  
 "health" 
 : 
  
 "ok" 
  
 }}, 
  
 "cache_status" 
 : 
  
 { 
  
 "data" 
 : 
  
 { 
  
 "health" 
 : 
  
 "ok" 
  
 } 
  
 } 
 } 
 
Script result

The following table lists the value for the script result output when using the Get System Statusaction:

Script result name Value
is_success True or False

Get System Version

Use the Get System Versionaction to retrieve the version of a system.

This action runs on all Google SecOps entities.

Action inputs

None.

Action outputs

The Get System Versionaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Not available
Script result Available
Script result

The following table lists the value for the script result output when using the Get System Versionaction:

Script result name Value
is_success True or False

Get Threats

Use the Get Threatsaction to retrieve information about threats in SentinelOne.

This action doesn't run on Google SecOps entities.

Action inputs

The Get Threatsaction requires the following parameters:

Parameter
Description
Mitigation Status

Optional.

A comma-separated list of threat statuses.

The action only returns threats that match the configured statuses.

The possible values are as follows:

  • mitigated
  • active
  • blocked
  • suspicious
  • suspicious_resolved
Created until

Optional.

The end time for the threats, such as 2020-03-02T21:30:13.014874Z .

Created from

Optional.

The start time for the threats, such as 2020-03-02T21:30:13.014874Z .

Resolved Threats

Optional.

If selected, the action only returns resolved threats.

Threat Display Name

Optional.

A display name of the threat to return.

Limit

Optional.

A number of threats to return.

The default value is 10 .

API Version

Optional.

A version of API to use in the action.

If you don't set a value, the action uses the 2.1 version.

API version impacts the JSON result structure. We recommend to set the latest API version.

The possible values are as follows:

  • 2.0
  • 2.1

The default value is 2.0 .

Action outputs

The Get Threatsaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Get Threatsaction:

  { 
  
 "accountId" 
 : 
  
 " ACCOUNT_ID 
" 
 , 
  
 "accountName" 
 : 
  
 " ACCOUNT_NAME 
" 
 , 
  
 "agentComputerName" 
 : 
  
 "desktop-example" 
 , 
  
 "agentDomain" 
 : 
  
 "WORKGROUP" 
 , 
  
 "agentId" 
 : 
  
 " AGENT_ID 
" 
 , 
  
 "agentInfected" 
 : 
  
 false 
 , 
  
 "agentIp" 
 : 
  
 "192.0.2.176" 
 , 
  
 "agentIsActive" 
 : 
  
 false 
 , 
  
 "agentIsDecommissioned" 
 : 
  
 false 
 , 
  
 "agentMachineType" 
 : 
  
 "desktop" 
 , 
  
 "agentNetworkStatus" 
 : 
  
 "connected" 
 , 
  
 "agentOsType" 
 : 
  
 "windows" 
 , 
  
 "agentVersion" 
 : 
  
 "3.6.6.104" 
 , 
  
 "annotation" 
 : 
  
 null 
 , 
  
 "automaticallyResolved" 
 : 
  
 false 
 , 
  
 "browserType" 
 : 
  
 null 
 , 
  
 "certId" 
 : 
  
 "" 
 , 
  
 "classification" 
 : 
  
 "generic.heuristic" 
 , 
  
 "classificationSource" 
 : 
  
 "Cloud" 
 , 
  
 "classifierName" 
 : 
  
 "MANUAL" 
 , 
  
 "cloudVerdict" 
 : 
  
 "provider_unknown" 
 , 
  
 "collectionId" 
 : 
  
 "838490132723152335" 
 , 
  
 "commandId" 
 : 
  
 "835975626369402963" 
 , 
  
 "createdAt" 
 : 
  
 "2020-03-02T21:30:13.014874Z" 
 , 
  
 "createdDate" 
 : 
  
 "2020-03-02T21:30:12.748000Z" 
 , 
  
 "description" 
 : 
  
 "malware detected - not mitigated yet" 
 , 
  
 "engines" 
 : 
  
 [ 
  
 "manual" 
  
 ], 
  
 "external_ticket_id" 
 : 
  
 null 
 , 
  
 "fileContentHash" 
 : 
  
 "fc5a9b5e806f35a7b285e012ef8df3f06f399492" 
 , 
  
 "fileCreatedDate" 
 : 
  
 null 
 , 
  
 "fileDisplayName" 
 : 
  
 "example.exe" 
 , 
  
 "fileExtensionType" 
 : 
  
 "Executable" 
 , 
  
 "fileIsDotNet" 
 : 
  
 null 
 , 
  
 "fileIsExecutable" 
 : 
  
 true 
 , 
  
 "fileIsSystem" 
 : 
  
 false 
 , 
  
 "fileMaliciousContent" 
 : 
  
 null 
 , 
  
 "fileObjectId" 
 : 
  
 "99FF941D82E382D1" 
 , 
  
 "filePath" 
 : 
  
 "\\Device\\HarddiskVolume3\\Program Files\\example.exe" 
 , 
  
 "fileSha256" 
 : 
  
 null 
 , 
  
 "fileVerificationType" 
 : 
  
 "NotSigned" 
 , 
  
 "fromCloud" 
 : 
  
 false 
 , 
  
 "fromScan" 
 : 
  
 false 
 , 
  
 "id" 
 : 
  
 " THREAT_ID 
" 
 , 
  
 "indicators" 
 : 
  
 [], 
  
 "initiatedBy" 
 : 
  
 "dvCommand" 
 , 
  
 "initiatedByDescription" 
 : 
  
 "Deep Visibility Command" 
 , 
  
 "initiatingUserId" 
 : 
  
 " INITIATING_USER_ID 
" 
 , 
  
 "isCertValid" 
 : 
  
 false 
 , 
  
 "isInteractiveSession" 
 : 
  
 false 
 , 
  
 "isPartialStory" 
 : 
  
 false 
 , 
  
 "maliciousGroupId" 
 : 
  
 "0BB46E119EF0AE51" 
 , 
  
 "maliciousProcessArguments" 
 : 
  
 "-ServerName:App.Example.mca" 
 , 
  
 "markedAsBenign" 
 : 
  
 true 
 , 
  
 "mitigationMode" 
 : 
  
 "protect" 
 , 
  
 "mitigationReport" 
 : 
  
 { 
  
 "kill" 
 : 
  
 { 
  
 "status" 
 : 
  
 "success" 
  
 }, 
  
 "network_quarantine" 
 : 
  
 { 
  
 "status" 
 : 
  
 null 
  
 }, 
  
 "quarantine" 
 : 
  
 { 
  
 "status" 
 : 
  
 "success" 
  
 }, 
  
 "remediate" 
 : 
  
 { 
  
 "status" 
 : 
  
 null 
  
 }, 
  
 "rollback" 
 : 
  
 { 
  
 "status" 
 : 
  
 null 
  
 }, 
  
 "unquarantine" 
 : 
  
 { 
  
 "status" 
 : 
  
 "sent" 
  
 } 
  
 }, 
  
 "mitigationStatus" 
 : 
  
 "mitigated" 
 , 
  
 "publisher" 
 : 
  
 "" 
 , 
  
 "rank" 
 : 
  
 2 
 , 
  
 "resolved" 
 : 
  
 true 
 , 
  
 "siteId" 
 : 
  
 " SITE_ID 
" 
 , 
  
 "siteName" 
 : 
  
 "Example.com" 
 , 
  
 "threatAgentVersion" 
 : 
  
 "3.6.6.104" 
 , 
  
 "threatName" 
 : 
  
 "example.exe" 
 , 
  
 "updatedAt" 
 : 
  
 "2020-07-07T17:19:48.260119Z" 
 , 
  
 "username" 
 : 
  
 "DESKTOP-example\\ddiserens" 
 , 
  
 "whiteningOptions" 
 : 
  
 [] 
 } 
 
Output messages

The Get Threatsaction can return the following output messages:

Output message Message description

Successfully retrieved information about the available threats in SentinelOne.

No information about threats was found based on the provided criteria.

The action succeeded.
Error executing action "Get Threats". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Get Threatsaction:

Script result name Value
is_success True or False

Initiate Deep Visibility Query

Use the Initiate Deep Visibility Queryaction to initiate a Deep Visibility query search.

This action returns the query ID value which the Get Deep Visibility Query Result action requires.

This action doesn't run on Google SecOps entities.

Action inputs

The Initiate Deep Visibility Queryaction requires the following parameters:

Parameter Description
Query

Required.

A query for the search.

For more information about the query syntax, see SentinelOne Deep Visibility Cheat Sheet .

Start Date

Optional.

A start date for the search.

If you don't set a value, the action retrieves events 30 days prior to now by default.

End Date

Optional.

An end date for the search.

If you don't set a value, the action uses current time.

Action outputs

The Initiate Deep Visibility Queryaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Initiate Deep Visibility Queryaction:

  [ 
  
 { 
  
 "query_id" 
 : 
  
 " QUERY_ID 
" 
  
 } 
 ] 
 
Output messages

The Initiate Deep Visibility Queryaction can return the following output messages:

Output message Message description

Successfully created a Deep Visibility query. Query ID: QUERY_ID .

Failed to create a Deep Visibility query.

The action succeeded.
Error executing action "Initiate Deep Visibility Query". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Initiate Deep Visibility Queryaction:

Script result name Value
is_success True or False

Initiate Full Scan

Use the Initiate Full Scanaction to initiate a full disk scan on an endpoint in SentinelOne.

This action runs on the following Google SecOps entities:

  • IP Address
  • Hostname

Action inputs

None.

Action outputs

The Initiate Full Scanaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Available
Script result Available
Output messages

The Initiate Full Scanaction can return the following output messages:

Output message Message description

Successfully started the full disk scan on the following endpoints in SentinelOne: ENTITY_ID .

Action wasn't able to start a full disk scan on the following endpoints in SentinelOne: ENTITY_ID .

No full disk scans were initiated.

The action succeeded.
Error executing action "Initiate Full Scan". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Initiate Full Scanaction:

Script result name Value
is_success True or False

List Sites

Use the List Sitesaction to list available sites in SentinelOne.

This action doesn't run on Google SecOps entities.

Action inputs

The List Sitesaction requires the following parameters:

Parameter
Description
Filter Key

Optional.

The key to filter sites.

The possible values are as follows:

  • Select One
  • Name
  • ID

The default value is Select One .

Filter Logic

Optional.

The filter logic to apply.

The filter logic uses the value set in the Filter Key parameter.

The possible values are as follows:

  • Not Specified
  • Equal
  • Contains

The default value is Not Specified .

Filter Value

Optional.

The value to use in the filter.

The filter logic uses the value set in the Filter Key parameter.

If you select Equal in the Filter Logic parameter, the action searches for the exact match among results.

If you select Contains in the Filter Logic parameter, the action searches for results that contain the specified substring.

If you don't set a value, the action ignores the filter.

Max Records To Return

Optional.

The number of records to return.

The default value is 50 .

Action outputs

The List Sitesaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Available
Enrichment table Not available
JSON result Not available
Output messages Available
Script result Available
Case wall table

The List Sitesaction can return the following table:

Table name: Available Sites

Table columns:

  • Name
  • ID
  • Creator
  • Expiration
  • Type
  • State
Output messages

The List Sitesaction can return the following output messages:

Output message Message description

Successfully found sites for the provided criteria in SentinelOne.

No sites were found for the provided criteria in SentinelOne.

The filter was not applied, because parameter "Filter Value" has an empty value.

The action succeeded.
Error executing action "List Sites". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the List Sitesaction:

Script result name Value
is_success True or False

Mark as Threat

Use the Mark as Threataction to mark suspicious threats as true positive threats in SentinelOne.

To mark threats in SentinelOne, you need any of the following roles:

  • Admin
  • IR Team
  • SOC

You can mark as threats only suspicious detections.

This action doesn't run on Google SecOps entities.

Action inputs

The Mark as Threataction requires the following parameters:

Parameter Description
Threat IDs

Required.

A comma-separated list of detection IDs to mark as threats.

Action outputs

The Mark as Threataction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Mark as Threataction:

  [ 
  
 { 
  
 "ID" 
 : 
  
 " DETECTION_ID 
" 
 , 
  
 "marked_as_threat" 
 : 
  
 "true" 
  
 } 
 ] 
 
Output messages

The Mark as Threataction can return the following output messages:

Output message Message description

Successfully marked the following threats in SentinelOne: THREAT_ID .

Action wasn't able to mark the following threats in SentinelOne: THREAT_ID .

No threats were marked.

The action succeeded.
Error executing action "Mark as Threat". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Mark as Threataction:

Script result name Value
is_success True or False

Mitigate Threat

Use the Mitigate Threataction to execute mitigation actions on the threats in SentinelOne.

To mitigate threats in SentinelOne, you need any of the following roles:

  • Admin
  • IR Team
  • SOC

The rollback applies only to Windows. The threat remediation applies only to macOS and Windows.

This action doesn't run on Google SecOps entities.

Action inputs

The Mitigate Threataction requires the following parameters:

Parameter
Description
Mitigation action

Required.

A mitigation action for the detected threats.

The possible values are as follows:

  • quarantine
  • kill
  • un-quarantine
  • remediate
  • rollback-remediate

The default value is quarantine .

Threat IDs

Required.

A comma-separated list of threat IDs to mitigate.

Action outputs

The Mitigate Threataction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Mitigate Threataction:

  [ 
  
 { 
  
 "mitigated" 
 : 
  
 true 
 , 
  
 "mitigation_action" 
 : 
  
 "quarantine" 
 , 
  
 "Threat_ID" 
 : 
  
 " THREAT_ID 
" 
  
 } 
 ] 
 
Output messages

The Mitigate Threataction can return the following output messages:

Output message Message description

Successfully mitigated the following threats in SentinelOne: THREAT_ID .

Action wasn't able to mitigate the following threats in SentinelOne: THREAT_ID .

No threats were mitigated.

The action succeeded.
Error executing action "Mitigate Threat". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Mitigate Threataction:

Script result name Value
is_success True or False

Move Agents

Use the Move Agentsaction to move agents to the provided group from the same site.

This action runs on the following Google SecOps entities:

  • IP Address
  • Hostname

Action inputs

The Move Agentsaction requires the following parameters:

Parameter Description
Group ID

Optional.

The ID of the group to move agents.

Group Name

Optional.

The name of the group to move agents.

If you configure both the Group ID parameter and the Group Name parameters, the action prioritizes the Group ID parameter.

Action outputs

The Move Agentsaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Available
Script result Available
Output messages

The Move Agentsaction can return the following output messages:

Output message Message description

Successfully moved the following endpoints to the group with ID_OR_NAME GROUP_ID_OR_NAME in SentinelOne: ENTITY_ID .

Action wasn't able to move the following endpoints to the group with ID_OR_NAME GROUP_ID_OR_NAME in SentinelOne: ENTITY_ID .

No endpoints were moved to the group ID_OR_NAME GROUP_ID_OR_NAME in SentinelOne.

The action succeeded.
Error executing action "Move Agents". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Move Agentsaction:

Script result name Value
is_success True or False

Ping

Use the Pingaction to test the connectivity.

This action runs on all Google SecOps entities.

Action inputs

None.

Action outputs

The Pingaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Not available
Script result Available
Script result

The following table lists the value for the script result output when using the Pingaction:

Script result name Value
is_success True or False

Reconnect Agent to the Network

Use the Reconnect Agent to the Networkaction to reconnect a disconnected endpoint to a network.

This action runs on the following Google SecOps entities:

  • IP Address
  • Hostname

Action inputs

None.

Action outputs

The Reconnect Agent to the Networkaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Not available
Script result Available
Script result

The following table lists the value for the script result output when using the Reconnect Agent to the Networkaction:

Script result name Value
is_success True or False

Resolve Threat

Use the Resolve Threataction to resolve threats in SentinelOne.

This action doesn't run on Google SecOps entities.

Action inputs

The Resolve Threataction requires the following parameters:

Parameter Description
Threat IDs

Required.

A comma-separated list of threat IDs to resolve.

Annotation

Optional.

A justification for resolving the threat.

Action outputs

The Resolve Threataction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Available
Output messages Available
Script result Available
JSON result

The following example shows the JSON result output received when using the Resolve Threataction:

  [ 
  
 { 
  
 "resolved" 
 : 
  
 false 
 , 
  
 "Threat_ID" 
 : 
  
 " THREAT_ID 
" 
  
 } 
 ] 
 
Output messages

The Resolve Threataction can return the following output messages:

Output message Message description

Successfully resolved the following threats in SentinelOne: THREAT_ID .

Action wasn't able to resolve the following threats in SentinelOne: THREAT_ID .

No threats were resolved.

The action succeeded.
Error executing action "Resolve Threat". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Resolve Threataction:

Script result name Value
is_success True or False

Update Analyst Verdict

Use the Update Analyst Verdictaction to update the analyst verdict of the threat in SentinelOne.

This action doesn't run on Google SecOps entities.

Action inputs

The Update Analyst Verdictaction requires the following parameters:

Parameter
Description
Threat ID

Required.

A comma-separated list of threat IDs to update the analyst verdict.

Analyst Verdict

Required.

An analyst verdict.

The possible values are as follows:

  • True Positive
  • False Positive
  • Suspicious
  • Undefined

The default value is Undefined .

Action outputs

The Update Analyst Verdictaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Available
Script result Available
Output messages

The Update Analyst Verdictaction can return the following output messages:

Output message Message description

Successfully updated analyst verdict for the following threats in SentinelOne: THREAT_ID .

Action wasn't able to update analyst verdict for the following threats in SentinelOne: THREAT_ID .

Action wasn't able to update analyst verdict for the provided threats in SentinelOne.

The action succeeded.
Error executing action "Update Analyst Verdict". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Update Analyst Verdictaction:

Script result name Value
is_success True or False

Update Incident Status

Use the Update Incident Statusaction to update threat incident status in SentinelOne.

This action doesn't run on Google SecOps entities.

Action inputs

The Update Incident Statusaction requires the following parameters:

Parameter
Description
Threat ID

Required.

A comma-separated list of threat IDs to update the incident status.

Status

Required.

An incident status.

The possible values are as follows:

  • Unresolved
  • In Progress
  • Resolved

The default value is Resolved .

Action outputs

The Update Incident Statusaction provides the following outputs:

Action output type Availability
Case wall attachment Not available
Case wall link Not available
Case wall table Not available
Enrichment table Not available
JSON result Not available
Output messages Available
Script result Available
Output messages

The Update Incident Statusaction can return the following output messages:

Output message Message description

Successfully updated incident status for the following threats in SentinelOne: THREAT_ID .

Action wasn't able to update incident status for the following threats in SentinelOne: THREAT_ID .

Action wasn't able to update incident status for the provided threats in SentinelOne.

The action succeeded.
Error executing action "Update Incident Status". Reason: ERROR_REASON

The action failed.

Check the connection to the server, input parameters, or credentials.

Script result

The following table lists the value for the script result output when using the Update Incident Statusaction:

Script result name Value
is_success True or False

Connectors

For more detail about how to configure connectors in Google SecOps, see Ingest your data (connectors) .

SentinelOne - Threats Connector

Use the SentinelOne - Threats Connectorto ingest threats from SentinelOne.

The connector lets you filter alerts based on dynamic lists.

The SentinelOne - Threats Connectorfilters alerts using the alert_name parameter.

If you select the Use whitelist as a blacklist parameter, the connector only ingests alerts whose alert_name doesn't match any value in the dynamic list.

If you don't configure alert_name values in the dynamic list, the connector ingests all alerts.

If don't select the Use whitelist as a blacklist parameter, the connector only ingests alerts whose alert_name matches a value in the dynamic list.

Connector inputs

The SentinelOne - Threats Connectorrequires the following parameters:

Parameter Description
Product Field Name

Required.

The name of the field where the product name is stored.

The default value is siemplify_event .

The product name primarily impacts mapping. To streamline and improve the mapping process for the connector, the default value siemplify_event resolves to a fallback value that is referenced from the code. Any invalid input for this parameter resolves to a fallback value by default.

Event Field Name

Required.

The name of the field that determines the event name (subtype).

The default value is threatinfo_classification .

Environment Field Name

Optional.

The name of the field where the environment name is stored.

If the environment field is missing, the connector uses the default value.

The default value is "" .

Environment Regex Pattern

Optional.

A regular expression pattern to run on the value found in the Environment Field Name field. This parameter lets you manipulate the environment field using the regular expression logic.

Use the default value .* to retrieve the required raw Environment Field Name value.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout

Required.

The timeout limit, in seconds, for the Python process that runs the current script.

The default value is 180 .

API Root

Required.

The SentinelOne API root.

The default value is https://usea1-partners.sentinelone.net/ .

API Token

Required.

The SentinelOne API token.

API Version

Optional.

The version of SentinelOne API for the connector to use.

If you don't set a value, the connector uses the API version 2.0 by default.

Fetch Max Days Backwards

Optional.

The number of days prior to now to retrieve alerts.

This parameter can apply to the initial connector iteration after you enable the connector for the first time, or the fallback value for an expired connector timestamp.

The default value is 1 .

Max Alerts Per Cycle

Optional.

The maximum number of alerts to process in every connector iteration.

The default value is 25 .

Disable Overflow

Optional.

If selected, the connector ignores the Google SecOps overflow mechanism.

Not selected by default.

Use whitelist as a blacklist

Required.

If selected, the connector uses the dynamic list as a blocklist.

Not selected by default.

Verify SSL

Required.

If selected, the integration validates the SSL certificate when connecting to the SentinelOne server.

Selected by default.

Proxy Server Address

Optional.

The address of the proxy server to use.

Proxy Username

Optional.

The proxy username to authenticate with.

Proxy Password

Optional.

The proxy password to authenticate with.

Event Object Type Filter

Optional.

A comma-separated list of event objects to return with the threat information.

The connector uses this parameter as a filter to only return certain objects, such as process, ip, indicators .

If you don't set a value, the connector ingests all event object types.

Event Type Filter

Optional.

A comma-separated list of event types to return with the threat information.

The connector uses this parameter as a filter to only return certain event types, such as Process Creation, Behavioral Indicators .

Max Events To Return

Optional.

The number of events to return for every threat.

The maximum value is 199 .

The default value is 199 .

Connector rules

The connector supports proxies.

The connector supports allowlist and blocklist.

Connector events

The example of the connector event is as follows:

  { 
  
 "data" 
 : 
  
 [ 
  
 { 
  
 "accountId" 
 : 
  
 " ACCOUNT_ID 
" 
 , 
  
 "accountName" 
 : 
  
 "SentinelOne" 
 , 
  
 "agentComputerName" 
 : 
  
 "desktop-example" 
 , 
  
 "agentDomain" 
 : 
  
 "WORKGROUP" 
 , 
  
 "agentId" 
 : 
  
 " AGENT_ID 
" 
 , 
  
 "agentInfected" 
 : 
  
 false 
 , 
  
 "agentIp" 
 : 
  
 "203.0.113.180" 
 , 
  
 "agentIsActive" 
 : 
  
 false 
 , 
  
 "agentIsDecommissioned" 
 : 
  
 true 
 , 
  
 "agentMachineType" 
 : 
  
 "desktop" 
 , 
  
 "agentNetworkStatus" 
 : 
  
 "connecting" 
 , 
  
 "agentOsType" 
 : 
  
 "windows" 
 , 
  
 "agentVersion" 
 : 
  
 "3.6.6.104" 
 , 
  
 "annotation" 
 : 
  
 null 
 , 
  
 "annotationUrl" 
 : 
  
 null 
 , 
  
 "automaticallyResolved" 
 : 
  
 false 
 , 
  
 "browserType" 
 : 
  
 null 
 , 
  
 "certId" 
 : 
  
 "" 
 , 
  
 "classification" 
 : 
  
 "generic.heuristic" 
 , 
  
 "classificationSource" 
 : 
  
 "Cloud" 
 , 
  
 "classifierName" 
 : 
  
 "MANUAL" 
 , 
  
 "cloudVerdict" 
 : 
  
 "provider_unknown" 
 , 
  
 "collectionId" 
 : 
  
 " COLLECTION_ID 
" 
 , 
  
 "commandId" 
 : 
  
 "835975626369402963" 
 , 
  
 "createdAt" 
 : 
  
 "2020-03-02T21:30:13.014874Z" 
 , 
  
 "createdDate" 
 : 
  
 "2020-03-02T21:30:12.748000Z" 
 , 
  
 "description" 
 : 
  
 "malware detected - not mitigated yet" 
 , 
  
 "engines" 
 : 
  
 [ 
  
 "manual" 
  
 ], 
  
 "fileContentHash" 
 : 
  
 "fc5a9b5e806f35a7b285e012ef8df3f06f399492" 
 , 
  
 "fileCreatedDate" 
 : 
  
 null 
 , 
  
 "fileDisplayName" 
 : 
  
 "example.exe" 
 , 
  
 "fileExtensionType" 
 : 
  
 "Executable" 
 , 
  
 "fileIsDotNet" 
 : 
  
 null 
 , 
  
 "fileIsExecutable" 
 : 
  
 true 
 , 
  
 "fileIsSystem" 
 : 
  
 false 
 , 
  
 "fileMaliciousContent" 
 : 
  
 null 
 , 
  
 "fileObjectId" 
 : 
  
 "99FF941D82E382D1" 
 , 
  
 "filePath" 
 : 
  
 "\\Device\\HarddiskVolume3\\Program Files\\example.exe" 
 , 
  
 "fileSha256" 
 : 
  
 null 
 , 
  
 "fileVerificationType" 
 : 
  
 "NotSigned" 
 , 
  
 "fromCloud" 
 : 
  
 false 
 , 
  
 "fromScan" 
 : 
  
 false 
 , 
  
 "id" 
 : 
  
 " ID 
" 
 , 
  
 "indicators" 
 : 
  
 [], 
  
 "initiatedBy" 
 : 
  
 "dvCommand" 
 , 
  
 "initiatedByDescription" 
 : 
  
 "Deep Visibility Command" 
 , 
  
 "initiatingUserId" 
 : 
  
 " INITIATING_USER_ID 
" 
 , 
  
 "isCertValid" 
 : 
  
 false 
 , 
  
 "isInteractiveSession" 
 : 
  
 false 
 , 
  
 "isPartialStory" 
 : 
  
 false 
 , 
  
 "maliciousGroupId" 
 : 
  
 " MALICED_GROUP_ID 
" 
 , 
  
 "maliciousProcessArguments" 
 : 
  
 "-ServerName:App.Example.mca" 
 , 
  
 "markedAsBenign" 
 : 
  
 false 
 , 
  
 "mitigationMode" 
 : 
  
 "protect" 
 , 
  
 "mitigationReport" 
 : 
  
 { 
  
 "kill" 
 : 
  
 { 
  
 "status" 
 : 
  
 "success" 
  
 }, 
  
 "network_quarantine" 
 : 
  
 { 
  
 "status" 
 : 
  
 null 
  
 }, 
  
 "quarantine" 
 : 
  
 { 
  
 "status" 
 : 
  
 "success" 
  
 }, 
  
 "remediate" 
 : 
  
 { 
  
 "status" 
 : 
  
 null 
  
 }, 
  
 "rollback" 
 : 
  
 { 
  
 "status" 
 : 
  
 null 
  
 }, 
  
 "unquarantine" 
 : 
  
 { 
  
 "status" 
 : 
  
 null 
  
 } 
  
 }, 
  
 "mitigationStatus" 
 : 
  
 "mitigated" 
 , 
  
 "publisher" 
 : 
  
 "" 
 , 
  
 "rank" 
 : 
  
 2 
 , 
  
 "resolved" 
 : 
  
 true 
 , 
  
 "siteId" 
 : 
  
 " SITE_ID 
" 
 , 
  
 "siteName" 
 : 
  
 "Example.com" 
 , 
  
 "threatAgentVersion" 
 : 
  
 "3.6.6.104" 
 , 
  
 "threatName" 
 : 
  
 "example.exe" 
 , 
  
 "updatedAt" 
 : 
  
 "2020-04-02T14:51:21.901754Z" 
 , 
  
 "username" 
 : 
  
 "DESKTOP-example\\username" 
 , 
  
 "whiteningOptions" 
 : 
  
 [ 
  
 "hash" 
  
 ] 
  
 } 
  
 ], 
  
 "pagination" 
 : 
  
 { 
  
 "nextCursor" 
 : 
  
 " VALUE 
" 
 , 
  
 "totalItems" 
 : 
  
 161 
  
 } 
 } 
 

Need more help? Get answers from Community members and Google SecOps professionals.

Design a Mobile Site
View Site in Mobile | Classic
Share by: