SentinelOne

Step 1: Create a New Source

In the Scanner UI, go to the Collect tab.

  • From the Overview page click the '+' icon in the upper right corner

  • Select create new Collect Rule

  • Click Select a Source Type.

  • Choose SentinelOne.

  • Choose the specific SentinelOne log type (the instructions below apply to all log types).

You’ll be prompted to choose an Ingest Method:

  • Select API Pull.

  • Then, choose a Destination: Select Scanner.

Click Next.

Step 2: Configure the Source

Set a Display Name, such as my-sentinelone-logs.

Click Next.

Step 3: Authenticate with SentinelOne

  • If you’ve previously created an SentinelOne connection, select it from the list.

  • Otherwise, select New SentinelOne Connection and fill in the required fields:

    • Connection Name: Give the connection a recognizable name.

    • Base URL: eg. https://usea1-partners.sentinelone.net

    • API Token: Generate this from your SentinelOne console.

Click Next.

Step 4: Configure the Destination

  • Choose the S3 Bucket where the raw SentinelOne logs should be stored.

  • (Optional) Enter a Key Prefix to organize the data path in your bucket.

  • Choose the Scanner Index where logs will be made searchable.

  • Leave the Source Label as sentinelone:<log_type>.

Click Next.

Step 5: Transform and Enrich

  • (Optional) Add additional transformation or enrichment steps if needed.

Click Next.

Step 6: Timestamp Extraction

Leave the default setting. Different log types have different timestamp fields.

Click Next.

Step 7: Review and Create

  • Review all configuration settings.

  • Click Create Source.

What Happens Next

Once created:

  • Scanner will poll the SentinelOne API every 5 minutes.

  • New events will be written to your S3 bucket, under the specified key prefix.

  • Logs will then be indexed for search and detections using your selected Scanner index.

Last updated

Was this helpful?