SentinelOne

SentinelOne is a comprehensive enterprise security platform that provides threat detection, hunting, and response features that enable organizations to discover vulnerabilities and protect IT operations. It provides edge-to-edge protection for assets within an enterprise’s IT architecture.

1. Installation #

In order to integrate SentinelOne:

  • Enable syslog integration from the SentinelOne console.
  • Specify the host and port (wazuh-clientname:514 for cloud-to-cloud collection and ip:2515 for an on-premise collector). The ip:2515 should the ip (example: 192.168.X.X) where Logstash has been installed.
  • Enable TLS (do not upload any certificate or key).
  • Specify CEF 2 format.
  • Get your SentinelOne account ID (query for AccountId) or find it in Sentinels menu. Alternatively, you can obtain a siteId for.

If you are using cloud-to-cloud integration, in LogSentinel SIEM:

  • Create a new data source.
  • Set the syslog identification param name to «accountId» and syslog identification param value to the accountId you obtained in the last step below.
  • Alternatively, set the parameter name to «siteId» and the value to the siteId value obtained above.

2. Logstash Configuration #

We must change Logstash to properly receive and filter SentinelOne logs. This configuration is necessary for on-premise. You can skip this section if you have cloud-to-cloud environment.

The installation of Logstash and its service is located in the ‘Apolo Analytics’ folder, at the default address: ‘C:\Program Files\Apolo Analytics’.

  • We will enter the folder of ‘C:\Program Files\Apolo Analytics\logstash-version.  Where we will find the following files:

  • The file that we will need to modify is ‘logstash.conf’ located in  the previous location which will have a configuration similar to the following.
input {
   udp {
      port => 5144
   }
}
filter {

}
output {
   stdout {
      codec => "line"
   }
tcp {
      codec => "line"
      port => 514
      host => "wazuh-nomclientempresa.apoloanalytics.com"
    }
}
  • We will need to add in the input the following configurations:

For cef2 format:

input {
	syslog {
		port => 2515
		codec => cef
		syslog_field => "syslog"
		grok_pattern => "<%{POSINT:priority}>%{SYSLOGTIMESTAMP:timestamp} CUSTOM GROK HERE"
	}
}

For line or json format change to: codec => json or codec => line

Updated on enero 26, 2023