Integrate SentinelOne v2 with Google SecOps
Integration version: 37.0
This document explains how to configure and integrate SentinelOne v2 with Google Security Operations (Google SecOps).
This integration uses SentinelOne API 2.0.
This integration uses one or more open source components. You can download a zipped copy of the full source code of this integration from the Cloud Storage bucket .
Use cases
The SentinelOne integration can help you solve the following use cases:
-
Contain infected endpoints: use Google SecOps capabilities to isolate an infected host and prevent lateral movement and data exfiltration.
-
Retrieve detailed endpoint information: use Google SecOps capabilities to enrich incident data with in-depth host analysis for better context and decision-making. You can automatically query SentinelOne for detailed information about an endpoint involved in an alert, including agent version, operating system, and network interfaces.
-
Initiate Deep Visibility scans: use Google SecOps capabilities to hunt for threats and hidden malware on suspect machines and initiate a full disk scan using SentinelOne when suspicious activity is detected, such as unusual file modifications or registry changes.
-
Investigate threats with threat intelligence: use Google SecOps capabilities to improve accuracy by correlating SentinelOne alerts with threat intelligence data, forward suspicious hashes, file paths, or IP addresses found within SentinelOne alerts to threat intelligence platforms.
-
Triage malware: use Google SecOps capabilities to automatically classify malware with static analysis tools for streamlined incident response. You can extract samples from infected endpoints, trigger the analysis within your environment, and receive classification for the malware based on the static analysis.
Before you begin
To use the SentinelOne v2 integration, you need a SentinelOne API token.
To generate the API token, complete the following steps:
-
In your SentinelOne management console, go to Settings > Users.
-
Click your username.
-
Go to Actions > API Token Operations.
-
Click Generate API Token. Copy the API token and use it to configure the integration. The generated API token is valid for six months.
Integration parameters
The SentinelOne v2 integration requires the following parameters:
Parameter | Description |
---|---|
API root
|
Required. The SentinelOne API root. The default value is |
API Token
|
Required. The SentinelOne API token. To learn more about how to generate the API token for th eintegration, see Before you begin . The SentinelOne security policy requires you to create a new API token every six months. |
Verify SSL
|
Required. If selected, the integration validates the SSL certificate when connecting to the Sentinel server. Selected by default. |
For instructions about how to configure an integration in Google SecOps, see Configure integrations .
You can make changes at a later stage, if needed. After you configure an integration instance, you can use it in playbooks. For more information about how to configure and support multiple instances, see Supporting multiple instances .
Actions
For more information about actions, see Respond to pending actions from Your Workdesk and Perform a manual action .
Add Threat Note
Use the Add Threat Noteaction to add a note to the threat in SentinelOne.
This action doesn't run on Google SecOps entities.
Action inputs
The Add Threat Noteaction requires the following parameters:
Parameter | Description |
---|---|
Threat ID
|
Required. The ID of the threat to add a note. |
Note
|
Required. A note to add to the threat. |
Action outputs
The Add Threat Noteaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Threat Noteaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Add Threat Note". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Add Threat Noteaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Create Hash Black List Record
Use the Create Hash Black List Recordaction to add hashes to a blocklist in SentinelOne.
This action only supports SHA-1 hashes.
This action runs on the Google SecOps Hash
entity.
Action inputs
The Create Hash Black List Recordaction requires the following parameters:
Operating System
Required.
An operating system for the hash.
The possible values are as follows:
-
windows
-
windows_legacy
-
macos
-
linux
The default value is windows
.
Site IDs
Optional.
A comma-separated list of site IDs to send to the blocklist.
Group IDs
Optional.
A comma-separated list of group IDs to send to the blocklist.
Account IDs
Optional.
A comma-separated list of account IDs to send to the blocklist.
Description
Optional.
Additional information related to a hash.
The
default value is ""
.
Add to global blocklist
Required.
If selected, the action adds a hash to a global blocklist.
If you select this parameter, the action ignores the Site IDs
, Group IDs
, and Account IDs
parameters.
Action outputs
The Create Hash Black List Recordaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Create Hash Black List Recordaction:
[
{
"Entity"
:
" ENTITY_ID
"
,
"EntityResult"
:
[{
"userName"
:
"user"
,
"description"
:
"Created by user."
,
"userId"
:
" USER_ID
"
,
"scopeName"
:
"Test Group"
,
"value"
:
"36F9CA40B3CE96FCEE1CF1D4A7222935536FD25A"
,
"source"
:
"user"
,
"updatedAt"
:
"2020-07-02T14:41:20.678280Z"
,
"osType"
:
"windows"
,
"scope"
:
{
"groupIds"
:
[
" GROUP_ID
"
]
},
"type"
:
"white_hash"
,
"id"
:
" ENTITY_ID
"
,
"createdAt"
:
"2020-07-02T14:41:20.678690Z"
},
{
"userName"
:
"user"
,
"description"
:
"Created by user."
,
"userId"
:
" USER_ID
"
,
"scopeName"
:
"Test Group 2"
,
"value"
:
"36F9CA40B3CE96FCEE1CF1D4A7222935536FD25A"
,
"source"
:
"user"
,
"updatedAt"
:
"2020-07-02T14:41:20.683858Z"
,
"osType"
:
"windows"
,
"scope"
:
{
"groupIds"
:
[
" GROUP_ID
"
]
},
"type"
:
"white_hash"
,
"id"
:
" ENTITY_ID
"
,
"createdAt"
:
"2020-07-02T14:41:20.684677Z"
}]
}
]
Output messages
The Create Hash Black List Recordaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Create Hash Black List Record". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Create Hash Black List Recordaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Create Hash Exclusion Record
Use the Create Hash Exclusion Recordaction to add a hash to the exclusion list in SentinelOne.
This action only supports SHA-1 hashes.
This action runs on the Google SecOps Hash
entity.
Action inputs
The Create Hash Exclusion Recordaction requires the following parameters:
Operation System
Required.
An operation system (OS) for the hash.
The possible values are as follows:
-
windows
-
windows_legacy
-
macos
-
linux
The default
value is windows
.
Site IDs
Optional.
A comma-separated list of site IDs to send the hash to the exclusion list.
The action requires at least one valid value.
Group IDs
Optional.
A comma-separated list of group ID to send the hash to the exclusion list.
The action requires at least one valid value.
Account IDs
Optional.
A comma-separated list of account IDs to send the hash to the exclusion list.
Description
Optional.
Additional information related to the hash.
Add to global exclusion list
Optional.
If selected, the action adds a hash to the global exclusion list.
If you select this parameter, the action ignores the Site
IDs
, Group IDs
, and Account IDs
parameters.
Action outputs
The Create Hash Exclusion Recordaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Create Hash Exclusion Recordaction:
[
{
" ENTITY_ID
"
:
{
"ID"
:
" ALLOWLISTED_ENTITY_ID
"
,
"Created Time"
:
" ITEM_CREATION_TIME
"
,
"Scope ID"
:
" SITE_OR_GROUP_ID
"
,
"Scope Name"
:
"example_scope"
}
}
]
Output messages
The Create Hash Exclusion Recordaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Create Hash Exclusion Record". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Create Hash Exclusion Recordaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Create Path Exclusion Record
Use the Create Path Exclusion Recordaction to add a path to the exclusion list in SentinelOne.
This action doesn't run on Google SecOps entities.
Action inputs
The Create Path Exclusion Recordaction requires the following parameters:
Path
Required.
A path to add to the exclusion list.
Operation System
Required.
An operation system (OS) for the hash.
The possible values are as follows:
-
windows
-
windows_legacy
-
macos
-
linux
The default
value is windows
.
Site IDs
Optional.
A comma-separated list of site IDs to send the hash to the exclusion list.
The action requires at least one valid value.
Group IDs
Optional.
A comma-separated list of group ID to send the hash to the exclusion list.
The action requires at least one valid value.
Account IDs
Optional.
A comma-separated list of account IDs to send the hash to the exclusion list.
Description
Optional.
Additional information related to the hash.
Add to global exclusion list
Optional.
If selected, the action adds a hash to the global exclusion list.
If you select this parameter, the action ignores the Site
IDs
, Group IDs
, and Account IDs
parameters.
Include Subfolders
Optional.
If selected, the action includes subfolders for the provided path.
This parameter only applies if you configure a folder path in the Path
parameter.
Mode
Optional.
A mode to use for the excluded path.
The possible values are as follows:
-
Suppress Alerts
-
Interoperability
-
Interoperability - Extended
-
Performance Focus
-
Performance Focus - Extended
The default
value is Suppress Alerts
.
Action outputs
The Create Path Exclusion Recordaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Create Path Exclusion Recordaction:
[
{
" ENTITY_ID
"
:
{
"ID"
:
" ALLOWLISTED_ENTITY_ID
"
,
"Created Time"
:
" ITEM_CREATION_TIME
"
,
"Scope ID"
:
" SITE_OR_GROUP_ID
"
,
"Scope Name"
:
"example_scope"
}
}
]
Output messages
The Create Path Exclusion Recordaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Create Path Exclusion Record". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Create Path Exclusion Recordaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Delete Hash Blacklist Record
Use the Delete Hash Blacklist Recordaction to delete hashes from a blocklist in SentinelOne.
This action only supports the SHA-1 hashes.
This action runs on the Google SecOps Hash
entity.
Action inputs
The Delete Hash Blacklist Recordaction requires the following parameters:
Parameter | Description |
---|---|
Site IDs
|
Optional. A comma-separated list of site IDs to remove the hash. |
Group IDs
|
Optional. A comma-separated list of group IDs to remove the hash. |
Account IDs
|
Optional. A comma-separated list of account IDs to remove the hash. |
Remove from global black list
|
Optional. If selected, the action removes the hash from the global blocklist. If you select this parameter, the action ignores the |
Action outputs
The Delete Hash Blacklist Recordaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Delete Hash Blacklist Recordaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Delete Hash Blacklist Record". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Delete Hash Blacklist Recordaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Disconnect Agent From Network
Use the Disconnect Agent From Networkaction to disconnect an agent from a network using the agent's hostname or IP address.
This action runs on the following Google SecOps entities:
-
IP Address
-
Hostname
Action inputs
None.
Action outputs
The Disconnect Agent From Networkaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Not available |
Script result | Available |
Script result
The following table lists the value for the script result output when using the Disconnect Agent From Networkaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Download Threat File
Use the Download Threat Fileaction to download a file related to a threat in SentinelOne.
To retrieve threat files in SentinelOne, you need any of the following roles:
-
Admin
-
IR Team
-
SOC
This action doesn't run on Google SecOps entities.
Action limitations
The Download Threat Fileaction can reach timeout when SentinelOne retrieves a file, but doesn't provide a download URL.
To investigate the cause for timeout, go to the threat timeline.
Action inputs
The Download Threat Fileaction requires the following parameters:
Threat ID
Required.
The ID of the threat to download a file.
Password
Required.
A password for the zipped folder that contains the threat file.
The password requirements are as follows:
- Is at least 10 characters long.
- Includes uppercase letters, lowercase letters, digits, and special symbols.
The maximum length for the password is 256 characters.
Download Folder Path
Required.
A path to a folder to store the threat file.
Overwrite
Required.
If selected, the action overwrites a file with the identical name.
Not selected by default.
Action outputs
The Download Threat Fileaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Download Threat Fileaction:
{
"absolute_path"
:
" ABSOLUTE_PATH
"
}
Output messages
The Download Threat Fileaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Download Threat File". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Download Threat Fileaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Enrich Endpoints
Use the Enrich Endpointsaction to enrich information about the endpoint using the IP address or hostname.
This action runs on the following Google SecOps entities:
-
IP Address
-
Hostname
Action inputs
The Enrich Endpointsaction requires the following parameters:
Parameter | Description |
---|---|
Create Insight
|
Optional. If selected, the action creates an insight with information about endpoints. |
Only Infected Endpoints Insights
|
Optional. If selected, the action only creates insights for infected endpoints. |
Action outputs
The Enrich Endpointsaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Enrich Endpointsaction:
{
"accountId"
:
" ACCOUNT_ID
"
,
"accountName"
:
"SentinelOne"
,
"activeDirectory"
:
{
"computerDistinguishedName"
:
"CN=LP-EXAMPLE,CN=Computers,DC=EXAMPLE,DC=LOCAL"
,
"computerMemberOf"
:
[],
"lastUserDistinguishedName"
:
"CN=Example,OU=Users,OU=PS,OU=IL,OU=Operations,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL"
,
"lastUserMemberOf"
:
[
"CN=esx.cs,OU=ESX,OU=GROUPS,OU=IL,OU=IT,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL"
,
"CN=Backup Operators,CN=Builtin,DC=EXAMPLE,DC=LOCAL"
,
"CN=esx.product,OU=ESX,OU=GROUPS,OU=IL,OU=IT,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL"
,
"CN=EXAMPLE_Admins,OU=QA,OU=IL,OU=IT,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL"
,
"CN=Local Admin,OU=GROUPS,OU=IL,OU=IT,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL"
,
"CN=CSM,OU=Operations,OU=EXAMPLE,DC=EXAMPLE,DC=LOCAL"
,
"CN=Event Log Readers,CN=Builtin,DC=EXAMPLE,DC=LOCAL"
]
},
"activeThreats"
:
0
,
"agentVersion"
:
"4.1.4.82"
,
"allowRemoteShell"
:
false
,
"appsVulnerabilityStatus"
:
"patch_required"
,
"computerName"
:
"LP-EXAMPLE"
,
"consoleMigrationStatus"
:
"N/A"
,
"coreCount"
:
8
,
"cpuCount"
:
8
,
"cpuId"
:
"Intel(R) Core(TM) i7-8650U CPU @ 1.90GHz"
,
"createdAt"
:
"2020-05-31T07:22:14.695136Z"
,
"domain"
:
"EXAMPLE"
,
"encryptedApplications"
:
false
,
"externalId"
:
""
,
"externalIp"
:
"192.0.2.91"
,
"groupId"
:
"863712577864500060"
,
"groupIp"
:
"192.0.2.0"
,
"groupName"
:
"Test Group"
,
"id"
:
" ID
"
,
"inRemoteShellSession"
:
false
,
"infected"
:
false
,
"installerType"
:
".msi"
,
"isActive"
:
false
,
"isDecommissioned"
:
false
,
"isPendingUninstall"
:
false
,
"isUninstalled"
:
false
,
"isUpToDate"
:
true
,
"lastActiveDate"
:
"2021-01-12T12:59:43.143066Z"
,
"lastIpToMgmt"
:
"192.0.2.20"
,
"lastLoggedInUserName"
:
"EXAMPLE"
,
"licenseKey"
:
""
,
"locationType"
:
"fallback"
,
"locations"
:
[
{
"id"
:
" ID
"
,
"name"
:
"Fallback"
,
"scope"
:
"global"
}
],
"machineType"
:
"laptop"
,
"mitigationMode"
:
"protect"
,
"mitigationModeSuspicious"
:
"protect"
,
"modelName"
:
"Dell Inc. - Latitude 7490"
,
"networkInterfaces"
:
[
{
"id"
:
" ID
"
,
"inet"
:
[
"192.0.2.20"
],
"inet6"
:
[
"2001:db8:1:1:1:1:1:1"
,
"2001:db8:2:2:2:2:2:2"
,
"2001:db8:ffff:ffff:ffff:ffff:ffff:ffff"
],
"name"
:
"Wi-Fi"
,
"physical"
:
" MAC_ADDRESS
"
},
{
"id"
:
" ID
"
,
"inet"
:
[
"192.168.193.193"
],
"inet6"
:
[
"2001:db8:ffff:ffff:ffff:ffff:ffff:ffff"
],
"name"
:
"vEthernet (Default Switch)"
,
"physical"
:
" MAC_ADDRESS
"
},
{
"id"
:
" ID
"
,
"inet"
:
[
"201.0.113.1"
],
"inet6"
:
[
"2001:db8:1:1:1:1:1:1"
,
"2001:db8:2:2:2:2:2:2"
],
"name"
:
"vEthernet (DockerNAT)"
,
"physical"
:
" MAC_ADDRESS
"
}
],
"networkStatus"
:
"connecting"
,
"osArch"
:
"64 bit"
,
"osName"
:
"Windows 10 Pro"
,
"osRevision"
:
"18363"
,
"osStartTime"
:
"2021-01-03T15:38:32Z"
,
"osType"
:
"windows"
,
"osUsername"
:
null
,
"rangerStatus"
:
"NotApplicable"
,
"rangerVersion"
:
null
,
"registeredAt"
:
"2020-05-31T07:22:14.691561Z"
,
"scanAbortedAt"
:
null
,
"scanFinishedAt"
:
"2020-05-31T09:28:53.867014Z"
,
"scanStartedAt"
:
"2020-05-31T07:25:37.814972Z"
,
"scanStatus"
:
"finished"
,
"siteId"
:
" SITE_ID
"
,
"siteName"
:
"example.com"
,
"threatRebootRequired"
:
false
,
"totalMemory"
:
16263
,
"updatedAt"
:
"2021-01-18T13:33:43.834618Z"
,
"userActionsNeeded"
:
[],
"uuid"
:
" UUID
"
}
Output messages
The Enrich Endpointsaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Enrich Endpoints". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Enrich Endpointsaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Agent Status
Use the Get Agent Statusaction to retrieve information about the status of agents on the endpoints based on the provided entity.
This action runs on the following Google SecOps entities:
-
IP Address
-
Hostname
Action inputs
None.
Action outputs
The Get Agent Statusaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Get Agent Statusaction:
{
"status"
:
"Not active"
}
Output messages
The Get Agent Statusaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Agent Status". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Agent Statusaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Application List for Endpoint
Use the Get Application List for Endpointaction to retrieve information about available applications on an endpoint using the provided entities.
This action runs on the following Google SecOps entities:
-
IP Address
-
Hostname
Action inputs
The Get Application List for Endpointaction requires the following parameters:
Parameter | Description |
---|---|
Max Applications To Return
|
Optional. The maximum number of applications to return. If you don't set a number, the action returns all available applications. |
Action outputs
The Get Application List for Endpointaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Get Application List for Endpointaction:
{
"data"
:
[
{
"installedDate"
:
"2021-01-06T08:55:56.762000Z"
,
"name"
:
"Mozilla Firefox 84.0.1 (x64 en-US)"
,
"publisher"
:
"Mozilla"
,
"size"
:
211562
,
"version"
:
"84.0.1"
}
]
}
Output messages
The Get Application List for Endpointaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Application List for Endpoint".
Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Application List for Endpointaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Blacklist
Use the Get Blacklistaction to get a list of all the items available in the blocklist in SentinelOne.
This action doesn't run on Google SecOps entities.
Action inputs
The Get Blacklistaction requires the following parameters:
Parameter | Description |
---|---|
Hash
|
Optional. A comma-separated list of hashes to check in the blocklist. The action only returns hashes that were found. If
you set the |
Site IDs
|
Optional. A comma-separated list of site IDs to return blocklist items. |
Group IDs
|
Optional. A comma-separated list of group IDs to return blocklist items. |
Account Ids
|
Optional. A comma-separated list of account IDs to return blocklist items. |
Limit
|
Optional. A number of blocklist items to return. If you
set the The maximum value is The default value is |
Query
|
Optional. A query to filter results. |
Use Global Blacklist
|
Optional. If selected, the action returns hashes from a global blocklist. Not selected by default. |
Action outputs
The Get Blacklistaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
Case wall table
The Get Blacklistaction can return the following table:
Table name: Blocklist Hashes
Table columns:
- Hash
- Scope
- Description
- OS
- User
JSON result
The following example shows the JSON result output received when using the Get Blacklistaction:
[
{
"userName"
:
"Example"
,
"description"
:
"test"
,
"userId"
:
" USER_ID
"
,
"scopeName"
:
"Example.com"
,
"value"
:
"cf23df2207d99a74fbe169e3eba035e633bxxxxx"
,
"source"
:
"user"
,
"updatedAt"
:
"2020-02-27T15:02:54.686991Z"
,
"osType"
:
"windows"
,
"scope"
:
{
"siteIds"
:
[
" SITE_ID
"
]
},
"type"
:
"black_hash"
,
"id"
:
"8353960925573xxxxx"
,
"createdAt"
:
"2020-02-27T15:02:54.687675Z"
},
{
"description"
:
"Detected by SentinelOne Cloud"
,
"userId"
:
null
,
"scopeName"
:
"Example.com"
,
"value"
:
"3395856ce81f2b7382dee72602f798b642fxxxxx"
,
"source"
:
"cloud"
,
"updatedAt"
:
"2020-03-18T14:42:02.730095Z"
,
"osType"
:
"linux"
,
"scope"
:
{
"siteIds"
:
[
" SITE_ID
"
]
},
"type"
:
"black_hash"
,
"id"
:
" ENTITY_ID
"
,
"createdAt"
:
"2020-03-18T14:42:02.730449Z"
},
{
"description"
:
"Detected by SentinelOne Cloud"
,
"userId"
:
null
,
"scopeName"
:
"Example.com"
,
"value"
:
"df531d66173235167ac502b867f3cae2170xxxxx"
,
"source"
:
"cloud"
,
"updatedAt"
:
"2020-04-08T07:27:35.686775Z"
,
"osType"
:
"linux"
,
"scope"
:
{
"siteIds"
:
[
" SITE_ID
"
]
},
"type"
:
"black_hash"
,
"id"
:
" ENTITY_ID
"
,
"createdAt"
:
"2020-04-08T07:27:35.687168Z"
}
]
Output messages
The Get Blacklistaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Blacklist". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Blacklistaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Deep Visibility Query Result
Use the Get Deep Visibility Query Resultaction to retrieve information about the Deep Visibility query results.
Run this action in combination with the Initiate Deep Visibility Query action.
This action doesn't run on Google SecOps entities.
Action inputs
The Get Deep Visibility Query Resultaction requires the following parameters:
Parameter | Description |
---|---|
Query ID
|
Required. The ID of the query to return results. The ID
value is available in the JSON result of the Initiate Deep Visibility
Query
action as the |
Limit
|
Optional. The number of events to return. The maximum
value is The default value is |
Action outputs
The Get Deep Visibility Query Resultaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Case wall table
The Get Deep Visibility Query Resultaction can return the following table:
Table name: SentinelOne Events
Table columns:
- Event Type
- Site Name
- Time
- Agent OS
- Process ID
- Process UID
- Process Name
- MD5
- SHA256
Output messages
The Get Deep Visibility Query Resultaction can return the following output messages:
Output message | Message description |
---|---|
Successfully found events for query: QUERY_ID
.
|
The action succeeded. |
Error executing action "Get Deep Visibility Query Result". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Deep Visibility Query Resultaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Events for Endpoint Hours Back
Use the Get Events for Endpoint Hours Backaction to retrieve information about the latest events on an endpoint.
This action runs on the following Google SecOps entities:
-
IP Address
-
Hostname
Action inputs
The Get Events for Endpoint Hours Backaction requires the following parameters:
Parameter | Description |
---|---|
Hours Back
|
Required. The number of hours prior to now to fetch events. |
Events Amount Limit
|
Optional. The maximum number of events to return for every event type. The default value is |
Include File Events Information
|
Optional. If selected, the action queries information about |
Include Indicator Events Information
|
Optional. If selected, the action queries information about |
Include DNS Events Information
|
Optional. If selected, the action queries information about |
Include Network Actions Events Information
|
Optional. If selected, the action queries information about the |
Include URL Events Information
|
Optional. If selected, the action queries information about |
Include Registry Events Information
|
Optional. If selected, the action queries information about |
Include Scheduled Task Events Information
|
Optional. If selected, the action queries information about |
Action outputs
The Get Events for Endpoint Hours Backaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Get Events for Endpoint Hours Backaction:
{
"data"
:
[
{
"activeContentFileId"
:
null
,
"activeContentHash"
:
null
,
"activeContentPath"
:
null
,
"activeContentSignedStatus"
:
null
,
"activeContentType"
:
null
,
"agentDomain"
:
""
,
"agentGroupId"
:
" GROUP_ID
"
,
"agentId"
:
" ID
"
,
"agentInfected"
:
false
,
"agentIp"
:
"192.0.2.160"
,
"agentIsActive"
:
true
,
"agentIsDecommissioned"
:
false
,
"agentMachineType"
:
"server"
,
"agentName"
:
"ip-203-0-113-205"
,
"agentNetworkStatus"
:
"connected"
,
"agentOs"
:
"linux"
,
"agentTimestamp"
:
"2020-03-19T08:17:01.575Z"
,
"agentUuid"
:
" UUID
"
,
"agentVersion"
:
"3.3.1.14"
,
"attributes"
:
[
{
"display"
:
"Created At"
,
"display_attribute"
:
false
,
"field_id"
:
"agentTimestamp"
,
"priority"
:
3
,
"queryable"
:
false
,
"section"
:
"Main Attributes"
,
"value"
:
"2020-03-19T08:17:01.575Z"
},{
"display"
:
"Site ID"
,
"display_attribute"
:
false
,
"field_id"
:
"siteId"
,
"priority"
:
7
,
"queryable"
:
true
,
"section"
:
"Endpoint Info"
,
"value"
:
null
}
],
"containerId"
:
null
,
"containerImage"
:
null
,
"containerLabels"
:
null
,
"containerName"
:
null
,
"createdAt"
:
"2020-03-19T08:17:01.575000Z"
,
"eventType"
:
"Process Creation"
,
"hasParent"
:
true
,
"id"
:
" ID
"
,
"k8sCluame"
:
null
,
"k8sControllerLabels"
:
null
,
"k8sControllerName"
:
null
,
"k8sControllerType"
:
null
,
"k8sNamespace"
:
null
,
"k8sNamespaceLabels"
:
null
,
"k8sNode"
:
null
,
"k8sPodLabels"
:
null
,
"k8sPodName"
:
null
,
"md5"
:
null
,
"objectType"
:
"process"
,
"parentPid"
:
"32461"
,
"parentProcessName"
:
"dash"
,
"parentProcessStartTime"
:
"2020-03-19T08:17:01.785Z"
,
"parentProcessUniqueKey"
:
" KEY
"
,
"pid"
:
"32462"
,
"processCmd"
:
" run-parts --report /etc/cron.hourly"
,
"processDisplayName"
:
null
,
"processGroupId"
:
" GROUP_ID
"
,
"processImagePath"
:
"/bin/run-parts"
,
"processImageSha1Hash"
:
"66df74a1f7cc3509c87d6a190ff90ac86caf440d"
,
"processIntegrityLevel"
:
"INTEGRITY_LEVEL_UNKNOWN"
,
"processIsRedirectedCommandProcessor"
:
"False"
,
"processIsWow64"
:
"False"
,
"processName"
:
"run-parts"
,
"processRoot"
:
"False"
,
"processSessionId"
:
"0"
,
"processStartTime"
:
"2020-03-19T08:17:01.787Z"
,
"processSubSystem"
:
"SUBSYSTEM_UNKNOWN"
,
"processUniqueKey"
:
" KEY
"
,
"publisher"
:
null
,
"relatedToThreat"
:
"False"
,
"sha256"
:
null
,
"signatureSignedInvalidReason"
:
null
,
"signedStatus"
:
"unsigned"
,
"siteName"
:
"example.com"
,
"trueContext"
:
"c98a4557-94b5-da31-5074-fe6360f17228"
,
"user"
:
"unknown"
,
"verifiedStatus"
:
null
}
],
"pagination"
:
{
"nextCursor"
:
" VALUE
"
,
"totalItems"
:
632
}
}
Output messages
The Get Events for Endpoint Hours Backaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Events for Endpoint Hours Back".
Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Events for Endpoint Hours Backaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Group Details
Use the Get Group Detailsaction to retrieve detailed information about provided groups.
This action doesn't run on Google SecOps entities.
Action inputs
The Get Group Detailsaction requires the following parameters:
Parameter | Description |
---|---|
Group Names
|
Required. Group names to retrieve details. This parameter accepts multiple values as a comma-separated list. |
Action outputs
The Get Group Detailsaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
Case wall table
The Get Group Detailsaction can return the following table:
Table name: SentinelOne Groups
Table columns:
- ID
- Name
- Type
- Rank
- Creator
- Creation Time
JSON result
The following example shows the JSON result output received when using the Get Group Detailsaction:
[
{
" GROUP_NAME
"
:
" UNEDITABLE_VARIABLE
RESPONSE_DATA"
}
]
Output messages
The Get Group Detailsaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Group Details". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Group Detailsaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Hash Reputation
(Deprecated) Use the Get Hash Reputationaction to retrieve information about hashes from SentinelOne.
This action runs on the Google SecOps Hash
entity.
Action inputs
The Get Hash Reputationaction requires the following parameters:
Parameter | Description |
---|---|
Reputation Threshold
|
Optional. A reputation threshold to mark entity as suspicious. If you don't set a value, the action doesn't mark any entity as suspicious. The maximum value is The
default value is |
Create Insight
|
Optional. If selected, the action creates an insight that contains information about the reputation. |
Only Suspicious Hashes Insight
|
Optional. If selected, the action only creates an insight for
hashes with the reputation exceeding or equal to the |
Action outputs
The Get Hash Reputationaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Available |
JSON result | Not available |
Output messages | Not available |
Script result | Available |
Enrichment table
The Get Hash Reputationaction can enrich the following fields:
Enrichment field name | Applicability |
---|---|
SENO_reputation
|
Returns if it exists in the JSON result. |
Script result
The following table lists the value for the script result output when using the Get Hash Reputationaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Process List for Endpoint - Deprecated
Get System Status
Use the Get System Statusaction to retrieve the status of a system.
This action runs on all Google SecOps entities.
Action inputs
None.
Action outputs
The Get System Statusaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Not available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Get System Statusaction:
{
"system_status"
:
{
"data"
:
{
"health"
:
"ok"
}},
"db_status"
:
{
"data"
:
{
"health"
:
"ok"
}},
"cache_status"
:
{
"data"
:
{
"health"
:
"ok"
}
}
}
Script result
The following table lists the value for the script result output when using the Get System Statusaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get System Version
Use the Get System Versionaction to retrieve the version of a system.
This action runs on all Google SecOps entities.
Action inputs
None.
Action outputs
The Get System Versionaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Not available |
Script result | Available |
Script result
The following table lists the value for the script result output when using the Get System Versionaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Get Threats
Use the Get Threatsaction to retrieve information about threats in SentinelOne.
This action doesn't run on Google SecOps entities.
Action inputs
The Get Threatsaction requires the following parameters:
Mitigation Status
Optional.
A comma-separated list of threat statuses.
The action only returns threats that match the configured statuses.
The possible values are as follows:
-
mitigated
-
active
-
blocked
-
suspicious
-
suspicious_resolved
Created until
Optional.
The end time for the threats, such as 2020-03-02T21:30:13.014874Z
.
Created from
Optional.
The start time for the threats, such as 2020-03-02T21:30:13.014874Z
.
Resolved Threats
Optional.
If selected, the action only returns resolved threats.
Threat Display Name
Optional.
A display name of the threat to return.
Limit
Optional.
A number of threats to return.
The default
value is 10
.
API Version
Optional.
A version of API to use in the action.
If you don't set a value, the action uses the 2.1 version.
API version impacts the JSON result structure. We recommend to set the latest API version.
The possible values are as follows:
-
2.0
-
2.1
The default
value is 2.0
.
Action outputs
The Get Threatsaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Get Threatsaction:
{
"accountId"
:
" ACCOUNT_ID
"
,
"accountName"
:
" ACCOUNT_NAME
"
,
"agentComputerName"
:
"desktop-example"
,
"agentDomain"
:
"WORKGROUP"
,
"agentId"
:
" AGENT_ID
"
,
"agentInfected"
:
false
,
"agentIp"
:
"192.0.2.176"
,
"agentIsActive"
:
false
,
"agentIsDecommissioned"
:
false
,
"agentMachineType"
:
"desktop"
,
"agentNetworkStatus"
:
"connected"
,
"agentOsType"
:
"windows"
,
"agentVersion"
:
"3.6.6.104"
,
"annotation"
:
null
,
"automaticallyResolved"
:
false
,
"browserType"
:
null
,
"certId"
:
""
,
"classification"
:
"generic.heuristic"
,
"classificationSource"
:
"Cloud"
,
"classifierName"
:
"MANUAL"
,
"cloudVerdict"
:
"provider_unknown"
,
"collectionId"
:
"838490132723152335"
,
"commandId"
:
"835975626369402963"
,
"createdAt"
:
"2020-03-02T21:30:13.014874Z"
,
"createdDate"
:
"2020-03-02T21:30:12.748000Z"
,
"description"
:
"malware detected - not mitigated yet"
,
"engines"
:
[
"manual"
],
"external_ticket_id"
:
null
,
"fileContentHash"
:
"fc5a9b5e806f35a7b285e012ef8df3f06f399492"
,
"fileCreatedDate"
:
null
,
"fileDisplayName"
:
"example.exe"
,
"fileExtensionType"
:
"Executable"
,
"fileIsDotNet"
:
null
,
"fileIsExecutable"
:
true
,
"fileIsSystem"
:
false
,
"fileMaliciousContent"
:
null
,
"fileObjectId"
:
"99FF941D82E382D1"
,
"filePath"
:
"\\Device\\HarddiskVolume3\\Program Files\\example.exe"
,
"fileSha256"
:
null
,
"fileVerificationType"
:
"NotSigned"
,
"fromCloud"
:
false
,
"fromScan"
:
false
,
"id"
:
" THREAT_ID
"
,
"indicators"
:
[],
"initiatedBy"
:
"dvCommand"
,
"initiatedByDescription"
:
"Deep Visibility Command"
,
"initiatingUserId"
:
" INITIATING_USER_ID
"
,
"isCertValid"
:
false
,
"isInteractiveSession"
:
false
,
"isPartialStory"
:
false
,
"maliciousGroupId"
:
"0BB46E119EF0AE51"
,
"maliciousProcessArguments"
:
"-ServerName:App.Example.mca"
,
"markedAsBenign"
:
true
,
"mitigationMode"
:
"protect"
,
"mitigationReport"
:
{
"kill"
:
{
"status"
:
"success"
},
"network_quarantine"
:
{
"status"
:
null
},
"quarantine"
:
{
"status"
:
"success"
},
"remediate"
:
{
"status"
:
null
},
"rollback"
:
{
"status"
:
null
},
"unquarantine"
:
{
"status"
:
"sent"
}
},
"mitigationStatus"
:
"mitigated"
,
"publisher"
:
""
,
"rank"
:
2
,
"resolved"
:
true
,
"siteId"
:
" SITE_ID
"
,
"siteName"
:
"Example.com"
,
"threatAgentVersion"
:
"3.6.6.104"
,
"threatName"
:
"example.exe"
,
"updatedAt"
:
"2020-07-07T17:19:48.260119Z"
,
"username"
:
"DESKTOP-example\\ddiserens"
,
"whiteningOptions"
:
[]
}
Output messages
The Get Threatsaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Threats". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Threatsaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Initiate Deep Visibility Query
Use the Initiate Deep Visibility Queryaction to initiate a Deep Visibility query search.
This action returns the query ID value which the Get Deep Visibility Query Result action requires.
This action doesn't run on Google SecOps entities.
Action inputs
The Initiate Deep Visibility Queryaction requires the following parameters:
Parameter | Description |
---|---|
Query
|
Required. A query for the search. For more information about the query syntax, see SentinelOne Deep Visibility Cheat Sheet . |
Start Date
|
Optional. A start date for the search. If you don't set a value, the action retrieves events 30 days prior to now by default. |
End Date
|
Optional. An end date for the search. If you don't set a value, the action uses current time. |
Action outputs
The Initiate Deep Visibility Queryaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Initiate Deep Visibility Queryaction:
[
{
"query_id"
:
" QUERY_ID
"
}
]
Output messages
The Initiate Deep Visibility Queryaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Initiate Deep Visibility Query". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Initiate Deep Visibility Queryaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Initiate Full Scan
Use the Initiate Full Scanaction to initiate a full disk scan on an endpoint in SentinelOne.
This action runs on the following Google SecOps entities:
-
IP Address
-
Hostname
Action inputs
None.
Action outputs
The Initiate Full Scanaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Initiate Full Scanaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Initiate Full Scan". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Initiate Full Scanaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
List Sites
Use the List Sitesaction to list available sites in SentinelOne.
This action doesn't run on Google SecOps entities.
Action inputs
The List Sitesaction requires the following parameters:
Filter Key
Optional.
The key to filter sites.
The possible values are as follows:
-
Select One
-
Name
-
ID
The default value is Select
One
.
Filter Logic
Optional.
The filter logic to apply.
The filter logic
uses the value set in the Filter Key
parameter.
The possible values are as follows:
-
Not Specified
-
Equal
-
Contains
The default
value is Not Specified
.
Filter Value
Optional.
The value to use in the filter.
The filter logic
uses the value set in the Filter Key
parameter.
If you
select Equal
in the Filter Logic
parameter, the
action searches for the exact match among results.
If you select Contains
in the Filter Logic
parameter, the action
searches for results that contain the specified substring.
If you don't set a value, the action ignores the filter.
Max Records To Return
Optional.
The number of records to return.
The default
value is 50
.
Action outputs
The List Sitesaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Case wall table
The List Sitesaction can return the following table:
Table name: Available Sites
Table columns:
- Name
- ID
- Creator
- Expiration
- Type
- State
Output messages
The List Sitesaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "List Sites". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the List Sitesaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Mark as Threat
Use the Mark as Threataction to mark suspicious threats as true positive threats in SentinelOne.
To mark threats in SentinelOne, you need any of the following roles:
-
Admin
-
IR Team
-
SOC
You can mark as threats only suspicious detections.
This action doesn't run on Google SecOps entities.
Action inputs
The Mark as Threataction requires the following parameters:
Parameter | Description |
---|---|
Threat IDs
|
Required. A comma-separated list of detection IDs to mark as threats. |
Action outputs
The Mark as Threataction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Mark as Threataction:
[
{
"ID"
:
" DETECTION_ID
"
,
"marked_as_threat"
:
"true"
}
]
Output messages
The Mark as Threataction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Mark as Threat". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Mark as Threataction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Mitigate Threat
Use the Mitigate Threataction to execute mitigation actions on the threats in SentinelOne.
To mitigate threats in SentinelOne, you need any of the following roles:
-
Admin
-
IR Team
-
SOC
The rollback applies only to Windows. The threat remediation applies only to macOS and Windows.
This action doesn't run on Google SecOps entities.
Action inputs
The Mitigate Threataction requires the following parameters:
Mitigation action
Required.
A mitigation action for the detected threats.
The possible values are as follows:
-
quarantine
-
kill
-
un-quarantine
-
remediate
-
rollback-remediate
The default value is quarantine
.
Threat IDs
Required.
A comma-separated list of threat IDs to mitigate.
Action outputs
The Mitigate Threataction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Mitigate Threataction:
[
{
"mitigated"
:
true
,
"mitigation_action"
:
"quarantine"
,
"Threat_ID"
:
" THREAT_ID
"
}
]
Output messages
The Mitigate Threataction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Mitigate Threat". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Mitigate Threataction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Move Agents
Use the Move Agentsaction to move agents to the provided group from the same site.
This action runs on the following Google SecOps entities:
-
IP Address
-
Hostname
Action inputs
The Move Agentsaction requires the following parameters:
Parameter | Description |
---|---|
Group ID
|
Optional. The ID of the group to move agents. |
Group Name
|
Optional. The name of the group to move agents. If you
configure both the |
Action outputs
The Move Agentsaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Move Agentsaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Move Agents". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Move Agentsaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Ping
Use the Pingaction to test the connectivity.
This action runs on all Google SecOps entities.
Action inputs
None.
Action outputs
The Pingaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Not available |
Script result | Available |
Script result
The following table lists the value for the script result output when using the Pingaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Reconnect Agent to the Network
Use the Reconnect Agent to the Networkaction to reconnect a disconnected endpoint to a network.
This action runs on the following Google SecOps entities:
-
IP Address
-
Hostname
Action inputs
None.
Action outputs
The Reconnect Agent to the Networkaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Not available |
Script result | Available |
Script result
The following table lists the value for the script result output when using the Reconnect Agent to the Networkaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Resolve Threat
Use the Resolve Threataction to resolve threats in SentinelOne.
This action doesn't run on Google SecOps entities.
Action inputs
The Resolve Threataction requires the following parameters:
Parameter | Description |
---|---|
Threat IDs
|
Required. A comma-separated list of threat IDs to resolve. |
Annotation
|
Optional. A justification for resolving the threat. |
Action outputs
The Resolve Threataction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Resolve Threataction:
[
{
"resolved"
:
false
,
"Threat_ID"
:
" THREAT_ID
"
}
]
Output messages
The Resolve Threataction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Resolve Threat". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Resolve Threataction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Update Analyst Verdict
Use the Update Analyst Verdictaction to update the analyst verdict of the threat in SentinelOne.
This action doesn't run on Google SecOps entities.
Action inputs
The Update Analyst Verdictaction requires the following parameters:
Threat ID
Required.
A comma-separated list of threat IDs to update the analyst verdict.
Analyst Verdict
Required.
An analyst verdict.
The possible values are as follows:
-
True Positive
-
False Positive
-
Suspicious
-
Undefined
The default value is Undefined
.
Action outputs
The Update Analyst Verdictaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Update Analyst Verdictaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Update Analyst Verdict". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Update Analyst Verdictaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Update Incident Status
Use the Update Incident Statusaction to update threat incident status in SentinelOne.
This action doesn't run on Google SecOps entities.
Action inputs
The Update Incident Statusaction requires the following parameters:
Threat ID
Required.
A comma-separated list of threat IDs to update the incident status.
Status
Required.
An incident status.
The possible values are as follows:
-
Unresolved
-
In Progress
-
Resolved
The default value is Resolved
.
Action outputs
The Update Incident Statusaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Update Incident Statusaction can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Update Incident Status". Reason: ERROR_REASON
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Update Incident Statusaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Connectors
For more detail about how to configure connectors in Google SecOps, see Ingest your data (connectors) .
SentinelOne - Threats Connector
Use the SentinelOne - Threats Connectorto ingest threats from SentinelOne.
The connector lets you filter alerts based on dynamic lists.
The SentinelOne - Threats Connectorfilters alerts using the alert_name
parameter.
If you select the Use whitelist as a blacklist
parameter, the connector
only ingests alerts whose alert_name
doesn't match any value in the dynamic
list.
If you don't configure alert_name
values in the dynamic list, the connector
ingests all alerts.
If don't select the Use whitelist as a blacklist
parameter, the connector
only ingests alerts whose alert_name
matches a value in the dynamic list.
Connector inputs
The SentinelOne - Threats Connectorrequires the following parameters:
Parameter | Description |
---|---|
Product Field Name
|
Required. The name of the field where the product name is stored. The default value is The
product name primarily impacts mapping. To streamline and improve the
mapping process for the connector, the default value |
Event Field Name
|
Required. The name of the field that determines the event name (subtype). The default value is |
Environment Field Name
|
Optional. The name of the field where the environment name is stored. If the environment field is missing, the connector uses the default value. The default value is |
Environment Regex Pattern
|
Optional. A regular expression pattern to run on the value found in the Use the default value If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment. |
Script Timeout
|
Required. The timeout limit, in seconds, for the Python process that runs the current script. The default value is |
API Root
|
Required. The SentinelOne API root. The default value is |
API Token
|
Required. The SentinelOne API token. |
API Version
|
Optional. The version of SentinelOne API for the connector to use. If you don't set a value, the connector uses the API version 2.0 by default. |
Fetch Max Days Backwards
|
Optional. The number of days prior to now to retrieve alerts. This parameter can apply to the initial connector iteration after you enable the connector for the first time, or the fallback value for an expired connector timestamp. The default value is |
Max Alerts Per Cycle
|
Optional. The maximum number of alerts to process in every connector iteration. The default value is |
Disable Overflow
|
Optional. If selected, the connector ignores the Google SecOps overflow mechanism. Not selected by default. |
Use whitelist as a blacklist
|
Required. If selected, the connector uses the dynamic list as a blocklist. Not selected by default. |
Verify SSL
|
Required. If selected, the integration validates the SSL certificate when connecting to the SentinelOne server. Selected by default. |
Proxy Server Address
|
Optional. The address of the proxy server to use. |
Proxy Username
|
Optional. The proxy username to authenticate with. |
Proxy Password
|
Optional. The proxy password to authenticate with. |
Event Object Type Filter
|
Optional. A comma-separated list of event objects to return with the threat information. The connector uses this parameter as a
filter to only return certain objects, such as If you don't set a value, the connector ingests all event object types. |
Event Type Filter
|
Optional. A comma-separated list of event types to return with the threat information. The connector uses this parameter as a filter
to only return certain event types, such as |
Max Events To Return
|
Optional. The number of events to return for every threat. The maximum value is The default value is |
Connector rules
The connector supports proxies.
The connector supports allowlist and blocklist.
Connector events
The example of the connector event is as follows:
{
"data"
:
[
{
"accountId"
:
" ACCOUNT_ID
"
,
"accountName"
:
"SentinelOne"
,
"agentComputerName"
:
"desktop-example"
,
"agentDomain"
:
"WORKGROUP"
,
"agentId"
:
" AGENT_ID
"
,
"agentInfected"
:
false
,
"agentIp"
:
"203.0.113.180"
,
"agentIsActive"
:
false
,
"agentIsDecommissioned"
:
true
,
"agentMachineType"
:
"desktop"
,
"agentNetworkStatus"
:
"connecting"
,
"agentOsType"
:
"windows"
,
"agentVersion"
:
"3.6.6.104"
,
"annotation"
:
null
,
"annotationUrl"
:
null
,
"automaticallyResolved"
:
false
,
"browserType"
:
null
,
"certId"
:
""
,
"classification"
:
"generic.heuristic"
,
"classificationSource"
:
"Cloud"
,
"classifierName"
:
"MANUAL"
,
"cloudVerdict"
:
"provider_unknown"
,
"collectionId"
:
" COLLECTION_ID
"
,
"commandId"
:
"835975626369402963"
,
"createdAt"
:
"2020-03-02T21:30:13.014874Z"
,
"createdDate"
:
"2020-03-02T21:30:12.748000Z"
,
"description"
:
"malware detected - not mitigated yet"
,
"engines"
:
[
"manual"
],
"fileContentHash"
:
"fc5a9b5e806f35a7b285e012ef8df3f06f399492"
,
"fileCreatedDate"
:
null
,
"fileDisplayName"
:
"example.exe"
,
"fileExtensionType"
:
"Executable"
,
"fileIsDotNet"
:
null
,
"fileIsExecutable"
:
true
,
"fileIsSystem"
:
false
,
"fileMaliciousContent"
:
null
,
"fileObjectId"
:
"99FF941D82E382D1"
,
"filePath"
:
"\\Device\\HarddiskVolume3\\Program Files\\example.exe"
,
"fileSha256"
:
null
,
"fileVerificationType"
:
"NotSigned"
,
"fromCloud"
:
false
,
"fromScan"
:
false
,
"id"
:
" ID
"
,
"indicators"
:
[],
"initiatedBy"
:
"dvCommand"
,
"initiatedByDescription"
:
"Deep Visibility Command"
,
"initiatingUserId"
:
" INITIATING_USER_ID
"
,
"isCertValid"
:
false
,
"isInteractiveSession"
:
false
,
"isPartialStory"
:
false
,
"maliciousGroupId"
:
" MALICED_GROUP_ID
"
,
"maliciousProcessArguments"
:
"-ServerName:App.Example.mca"
,
"markedAsBenign"
:
false
,
"mitigationMode"
:
"protect"
,
"mitigationReport"
:
{
"kill"
:
{
"status"
:
"success"
},
"network_quarantine"
:
{
"status"
:
null
},
"quarantine"
:
{
"status"
:
"success"
},
"remediate"
:
{
"status"
:
null
},
"rollback"
:
{
"status"
:
null
},
"unquarantine"
:
{
"status"
:
null
}
},
"mitigationStatus"
:
"mitigated"
,
"publisher"
:
""
,
"rank"
:
2
,
"resolved"
:
true
,
"siteId"
:
" SITE_ID
"
,
"siteName"
:
"Example.com"
,
"threatAgentVersion"
:
"3.6.6.104"
,
"threatName"
:
"example.exe"
,
"updatedAt"
:
"2020-04-02T14:51:21.901754Z"
,
"username"
:
"DESKTOP-example\\username"
,
"whiteningOptions"
:
[
"hash"
]
}
],
"pagination"
:
{
"nextCursor"
:
" VALUE
"
,
"totalItems"
:
161
}
}
Need more help? Get answers from Community members and Google SecOps professionals.