Loading

SentinelOne

<div class="condensed-table">
| | |
| --- | --- |
| Version | 1.27.0 (View all) |
| Compatible Kibana version(s) | 8.13.0 or higher |
| Supported Serverless project types
What’s this? | Security
Observability |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Elastic |

</div>
The SentinelOne integration collects and parses data from SentinelOne REST APIs. This integration also offers the capability to perform response actions on SentinelOne hosts directly through the Elastic Security interface (introduced with v8.12.0). Additional configuration is required; for detailed guidance, refer to documentation.

This module has been tested against SentinelOne Management Console API version 2.1.

To collect data from SentinelOne APIs, you must have an API token. To create an API token, follow these steps:

  1. Log in to the SentinelOne Management Console as an Admin. image::images/sentinel_one/sentinel-one-dashboard.png[SentinelOne dashboards]
  2. Navigate to Logged User Account from top right panel in the navigation bar.
  3. Click My User.
  4. In the API token section, click Generate.
    image::images/sentinel_one/sentinel-one-api-token-generate.png[SentinelOne generate API token ]

The API token generated by the user is time-limited. To rotate a new token, log in with the dedicated admin account.

The alert data stream depends on STAR Custom Rules. STAR Custom Rules are supported in Cloud environments, but are not supported in on-premises environments. Because of this, the alert data stream is not supported in on-premises environments.

This is the activity dataset.

This is the agent dataset.

This is the alert dataset.

This is the group dataset.

This is the threat dataset.