SentinelOne Action Bundle
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.0 |
Compatible with ThreatQ Versions | >= 5.6.0 |
ThreatQ TQO License Required | Yes |
Support Tier | ThreatQ Supported |
Introduction
The SentinelOne action bundle contains three actions that provide you with the ability to add/remove hashes to blacklist/whitelist and mitigate actions on indicators.
Credentials and other configurations should be obtained from the SentinelOne instance. These are intended for bulk and/or automated execution of SentinelOne features.
The bundle provides the following actions:
- SentinelOne Blacklist or Whitelist - adds SHA-1 hashes to either the blacklist or the whitelist on the SentinelOne platform.
- SentinelOne Mitigate Threats - performs mitigation actions on indicators on the SentinelOne platform.
- SentinelOne Delete Hashes - removes SHA-1 hashes from either the blacklist or the whitelist on the SentinelOne platform.
The action is compatible with SHA-1 and File Path indicator types and returns indicators and indicator attributes.
This action is intended for use with ThreatQ TDR Orchestrator (TQO). An active TQO license is required for this feature.
Prerequisites
- An active ThreatQ TDR Orchestrator (TQO) license.
- A data collection containing the following indicator objects:
- SHA-1
- File Path
- Your SentinelOne SiteID.
- Your SentinelOne Username.
- Your SentinelOne Password associated with the username.
- Your SentinelOne Hostname.
Installation
This action can be installed in the My Integration section of your ThreatQ instance. See the Installing an Action topic for more details.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Actions option from the Category dropdown (optional).
- Click on the action entry to open its details page.
- Enter the following parameters under the Configuration tab:
The configurations set on this page will be used as the default settings when inserting this action into a new workflow. Updating the configurations on this page will not update any instances of this action that have already been deployed to a workflow. In that scenario, you must update the action’s configurations within the workflow itself.
SentinelOne Blacklist or Whitelist
Parameter Description Hostname Your SentinelOne Hostname. Username Your SentinelOne Username. Password Your SentinelOne Password. Objects Per Run The number of objects to send to this action per run. The max value for this parameter is 50,000. Description Enter a description to be added to the indicators. The default description is Action Handled by ThreatQ. Blacklist or Whitelist? Select how to ingest the Indicator. Options include Blacklist and Whitelist. Site ID The scope of the action. OS Type Select the OS type to use. Options include: - Legacy Windows
- Windows
- Mac
- Linux
SentinelOne Mitigate Threats
Parameter Description Hostname Your SentinelOne Hostname. Username Your SentinelOne Username. Password Your SentinelOne Password. Mitigation Action Select the mitigation action for SentinelOne. Options include: - Quarantine
- Kill
- Remediate
- Rollback Remediate
- Disconnect from Network
- Un_Quarantine
SentinelOne Query string to filter threats by Add additional filter criteria for SentinelOne. You can leave this parameter blank to run the action against the entire threat collection you have specified. Objects Per Run The number of objects to send to this action per run. The max value for this parameter is 50,000.
SentinelOne Delete Hashes
Parameter Description Hostname Your SentinelOne Hostname. Username Your SentinelOne Username. Password Your SentinelOne Password. Blacklist or Whitelist? Select which list to remove hashes from in SentinelOne. Options include Blacklist and Whitelist. Objects Per Run The number of objects to send to this action per run. The max value for this parameter is 50,000.
- Review any additional settings, make any changes if needed, and click on Save.
Actions
The bundle provides the following actions:
Action | Description | Object Type | Object Subtype |
---|---|---|---|
SentinelOne Blacklist or Whitelist Hashes | Adds SHA-1 hashes to either the blacklist or the whitelist on the SentinelOne platform. | Indicators | SHA-1 |
SentinelOne Mitigate Threats | Allows an analyst to perform mitigation actions on indicators on the SentinelOne platform. | Indicators | SHA-1, File Paths |
SentinelOne Delete Hashes | Removes SHA-1 hashes from either the blacklist or the whitelist on the SentinelOne platform. | Indicators | SHA-1 |
SentinelOne Blacklist or Whitelist Hashes
The SentinelOne BlackList or Whitelist Hashes function adds SHA-1 hashes to either the Blacklist or Whitelist (specified by the user) on the SentinelOne platform.
POST https://{{hostname}}/web/api/v2.1/threats/mitigate/{{mitigation_type}}
Sample Request:
{
"data": {},
"filter": {
"contentHash__contains": [
"1af5d01cbcfa335c0f0983386d178dc09956e1cc"
],
"query": "string",
"filePath__contains": [
]
}
}
Sample Response:
{
"data": {
"affected": 1
}
}
ThreatQuotient provides the following default mapping for this function:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.data.osType |
Indicator.Attribute | Blacklisted / Whitelisted in SentinelOne | N/A | macos |
Value generated by the request and not by the response. |
SentinelOne Mitigate Threats
The SentinelOne BlackList Mitigate Threats function provides you with the ability to perform mitigation actions on indicators on the SentinelOne platform.
POST https://{{hostname}}/web/api/v2.1/threats/mitigate/{{mitigation_type}}
Sample Request:
{
"data": {},
"filter": {
"contentHash__contains": [
"1af5d01cbcfa335c0f0983386d178dc09956e1cc"
],
"query": "string",
"filePath__contains": [
]
}
}
Sample Response:
{
"data": {
"affected": 1
}
}
ThreatQuotient provides the following default mapping for this function:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples |
---|---|---|---|---|
.data.affected |
Indicator.Attribute | Computers Affected by mitigation: | N/A | Computers Affected by mitigation: 1 |
SentinelOne Delete Hashes
The SentinelOne Delete Hashes function provides you with the ability to perform mitigation actions on indicators in the SentinelOne platform.
GET https://{{hostname}}/web/api/v2.1/{{action_type}}?value__contains={{indicator_values}}&includeChildren=true
Sample Response:
{
"data": [
{
"createdAt": "2021-10-26T15:05:00.042035Z",
"description": "Action handled Via ThreatQ",
"id": "1275336012951168745",
"includeChildren": false,
"includeParents": false,
"notRecommended": "NONE",
"osType": "windows",
"scope": {
"siteIds": [
"123987123987"
]
},
"scopeName": "site",
"scopePath": "Global\\Threat Quotient\\Default site",
"source": "user",
"type": "black_hash",
"updatedAt": "2021-10-26T15:05:00.041536Z",
"userId": "12345678909875",
"userName": "Our User",
"value": "7eb2197d6fd80c31bd04d3a7fb8c725eb9789013"
}
],
"pagination": {
"nextCursor": null,
"totalItems": 1
}
}
Supplemental Call
The following are request and response examples for the supplemental call to delete the hash from the SentinelOne list.
DELETE https://{{hostname}}/web/api/v2.1/{{action_type}}
Sample Request
{
"data":{
"ids":"1275336012951168745"
}
}
Sample Response
{ "data": { "affected": 1 } }
Enriched Data
Object counts and action runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and action runtime may vary based on system resources and load.
SentinelOne Blacklist or Whitelist Hashes
Metric | Result |
---|---|
Run Time | 2 minutes |
Indicators | 17 |
Indicator Attributes | 14 |
Change Log
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
SentinelOne Action Guide v1.0.0 | 5.6.0 or Greater |