Skip to main content

SentinelOne

SentinelOne is an endpoint protection and threat response tool. You can bring application application install, device, threat intelligence, and security data from SentinelOne into Brinqa to construct a unified view of your attack surface and strengthen your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with SentinelOne and how to obtain that information from SentinelOne. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select SentinelOne from the Connector drop-down. If you cannot find the connector in the drop-down, make sure that you have installed it first. You must provide the following information to authenticate SentinelOne with Brinqa:

  • Server URL: The SentinelOne Server URL.

  • API token: The API token associated with the SentinelOne account, which must have permissions to log in to the API server and return data.

Generate a SentinelOne API token

For the SentinelOne connector to use the SentinelOne API, you must provide an API token from SentinelOne. SentinelOne does not allow retrieving the API token for an existing user. To generate a new API token, follow these steps:

  1. Log in to your organization's SentinelOne server as an administrator.

  2. Navigate to Settings > Users.

  3. Select the user for which you want to generate a new API token.

  4. Next to API Token, click Generate.

    Your new API token displays. You can not view the token again after this. Copy and save it to a secure location.

note

If you do not have the permissions to create a SentinelOne API token, contact your SentinelOne administrator. Consult SentinelOne documentation for accuracy.

Additional settings

The SentinelOne connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 1000. It is not recommended to go over 1000.

  • Skip certificate verification: Select this option to allow for untrusted certificates.

Types of data to retrieve

The SentinelOne connector can retrieve the following types of data from the SentinelOne API:

Table 1: Data retrieved from SentinelOne

Connector ObjectRequiredMaps to Data Model
ApplicationNoPackage
Application InstallNoInstalled Package
DeviceYesHost
ThreatNoIncident
Threat DefinitionNoIncident Definition
VulnerabilityYesVulnerability
Vulnerability DefinitionYesVulnerability Definition
info

For detailed steps on how to view the data retrieved from SentinelOne in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

Application

Table 2: Application attribute mappings

Source Field NameMaps to Attribute
app.namename
app.osTypeLocal variable
app.publisherLocal variable
app.signedLocal variable
app.sizeLocal variable
app.typeLocal variable
app.uiduid
app.updatedAtLocal variable
app.versionLocal variable
categoriescategories
note

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Application Install

Table 3: Application Install attribute mappings

Source Field NameMaps to Attribute
app.agentIdtargets
app.agentComputerNameLocal variable
app.createdAtLocal variable
app.iduid
app.installedAtLocal variable
app.riskLevelLocal variable
app.uidtype
note

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Device

Table 4: Device attribute mappings

Source Field NameMaps to Attribute
agent.accountIdLocal variable
agent.accountNameLocal variable
agent.activeDirectory.computerDistinguishedNameLocal variable
agent.activeDirectory.computerMemberOfLocal variable
agent.activeDirectory.lastUserDistinguishedNameLocal variable
agent.activeDirectory.lastUserMemberOfLocal variable
agent.activeThreatsLocal variable
agent.agentVersionLocal variable
agent.allowRemoteShellLocal variable
agent.appsVulnerabilityStatusLocal variable
agent.computerNamednsNames, name, hostnames
agent.consoleMigrationStatusLocal variable
agent.coreCountLocal variable
agent.cpuCountLocal variable
agent.cpuIdLocal variable
agent.createdAtsourceCreatedDate
agent.detectionStateLocal variable
agent.domainLocal variable
agent.encryptedApplicationsLocal variable
agent.externalIdLocal variable
agent.externalIpipAddresses, publicIpAddresses
agent.firewallEnabledLocal variable
agent.groupIdLocal variable
agent.groupNameLocal variable
agent.iduid
agent.inRemoteShellSessionLocal variable
agent.instanceIdinstanceId
agent.installerTypeLocal variable
agent.isActiveLocal variable
agent.isDecommissionedstatus
agent.isPendingUninstallLocal variable
agent.isUninstalledLocal variable
agent.isUpToDateLocal variable
agent.lastActiveDatelastSeen
agent.lastIpToMgmtipAddresses, privateIpAddresses
agent.lastLoggedInUserNameLocal variable
agent.lastSuccessfulScanDateLocal variable
agent.locations.nameLocal variable
agent.machineTypeLocal variable
agent.macAddressmacAddresses
agent.mitigationModeLocal variable
agent.mitigationModeSuspiciousLocal variable
agent.modelNamemodel
agent.networkInterfaces.physicalmacAddresses
agent.networkStatusLocal variable
agent.operationalStateLocal variable
agent.osArchLocal variable
agent.osNameLocal variable
agent.osRevisionLocal variable
agent.osStartTimelastStarted
agent.osTypeLocal variable
agent.osUsernameLocal variable
agent.rangerStatusLocal variable
agent.rangerVersionLocal variable
agent.registeredAtfirstSeen
agent.scanAbortedAtLocal variable
agent.scanFinishedAtLocal variable
agent.scanStartedAtLocal variable
agent.scanStatusLocal variable
agent.serialNumberserialNumber
agent.siteIdLocal variable
agent.siteNameLocal variable
agent.threatRebootRequiredLocal variable
agent.totalMemoryLocal variable
agent.updatedAtsourceLastModified
agent.userActionsNeededLocal variable
note

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Threat

Table 5: Threat attribute mappings

Source Field NameMaps to Attribute
threat.agentRealtimeInfo.agentUuidtargets
threat.iduid
threat.threatInfo.createdAtfirstFound
threat.threatInfo.createdAt.updatedAtlastFound
threat.threatInfo.filePathpath
threat.threatInfo.fileSizeLocal variable
threat.threatInfo.incidentStatusDescriptionstatus
threat.threatInfo.mitigationStatusDescriptionLocal variable
threat.threatInfo.threatNametype, uid
note

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Threat Definition

Table 6: Threat Definition attribute mappings

Source Field NameMaps to Attribute
threat.threatInfo.classificationcategories
threat.threatInfo.confidenceLevelLocal variable
threat.threatInfo.threatNametype, name
note

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Vulnerability

Table 7: Vulnerability attribute mappings

Source Field NameMaps to Attribute
vulnerability.applicationVendortargets
vulnerability.applicationNametargets
vulnerability.applicationVersiontargets
vulnerability.endpointIdtargets
vulnerability.detectionDatefirstFound
vulnerability.iduid
vulnerability.lastScanDatelastFound
vulnerability.statusproviderStatus, status, sourceStatus, statusCategory
vulnerability.daysDetectedLocal variable
vulnerability.lastScanResultLocal variable
vulnerability.markTypeLocal variable
vulnerability.markedByLocal variable
vulnerability.markedDateLocal variable
vulnerability.reasonLocal variable
note

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Vulnerability Definition

Table 8: Vulnerability Definition attribute mappings

Source Field NameMaps to Attribute
vulnerability.cveIdtype, name, cveIds, cveRecords
vuln.baseScorecvssV3BaseScore
vuln.publishedDatepublishedDate
vuln.severityseverity

Operation options

The SentinelOne connector supports the following operation options. See connector operation options for information about how to apply them.

Table 2: SentinelOne connector operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
DeviceosTypeswindows, macos, or linuxA comma-separated list of operating systems. You can use this option to retrieve data from SentinelOne that only contains the specified operating system.Key: osTypes Value: linux. This key and value combination only retrieves data from SentinelOne that pertains to the Linux operating system.
machineTypesdesktop, laptop, server, storage, or kubernetes nodeA comma-separated list of machine types. You can use this option to retrieve data from SentinelOne that only contains the specified machine type.Key: machineTypes Value: desktop. This key and value combination only retrieves data from SentinelOne that pertains to desktop machines.
note

The option keys are case-sensitive and the possible values are in lowercase as they are shown in the documentation.

APIs

The SentinelOne connector uses the SentinelOne REST API. Specifically, it uses the following endpoints:

Table 3: SentinelOne API Endpoints

Connector ObjectAPI Endpoint
Application/web/api/v2.1/installed-applications
Application Install/web/api/v2.1/installed-applications
Device/web/api/v2.1/agents
Threat/web/api/v2.1/agents
web/api/v2.1/threats
Threat Definitionweb/api/v2.1/agents
/web/api/v2.1/threats
Vulnerabilityweb/api/v2.1/application-management/risks
Vulnerability Definitionweb/api/v2.1/application-management/risks

Changelog

The SentinelOne connector has undergone the following changes:

3.2.2

  • Code clean up and general maintenance.

3.2.1

  • Added more attributes to the Device object.

  • Code clean up and general maintenance.

3.2.0

  • Changed the CVSS_V3_BASE_SCORE attribute type on the Vulnerability Definition object from string to double.

  • Code clean up and general maintenance.

3.1.18

3.1.7

  • Added the Threat, Threat Definition, Vulnerability, and Vulnerability Definition objects.

3.1.6

  • Updated dependencies.

3.1.15

  • Fixed some sync errors.

  • Made the Application and Application Install objects optional.

3.1.14

  • Fixed an error when syncing the Device object.

3.0.7

  • Added cloud metadata as a source for the Device object.

3.0.6

  • Added a FIRST_SEEN attribute to the Device object.

3.0.0