Wider attack surface coverage powered by hundreds of integrations and deeper threat visibility powered by thousands of detections.
SentinelOne is a next-generation endpoint security product used to protect against all threat vectors. Keep known and unknown malware and other bad programs out of endpoints.
Netsurion collects the events from SentinelOne API and filters it out to get some critical event types for creating reports, dashboards, and alerts. These are considered as Data Source Integrations and helps you to analyze and manage the SentinelOne easily.
Flex reports will contain detailed overview of activities like login/ logout, firewall block activity, threat detection activity, and user management activities.
Alerts will be triggered when critical security events like threat detected, an external device connected, suspicious process detected, etc.
The dashboard provides a visual representation of all the activities like top user login, top threat activities, device control activities by the system, etc.
Once events are received into Netsurion, Reports, Knowledge Objects, Categories and Dashboards can be configured into Netsurion.
Netsurion monitors all the SentinelOne events, they are given as below.
Once SentinelOne is configured to deliver events to Netsurion alerts, dashboards, and reports can be configured into Netsurion.
Some of the Data Source Integrations available in Netsurion are listed below.
The configuration details are consistent with Netsurion version 9.X and later, and SentinelOne.
Download Integration Guide and How-to Guide for more information and to configuration instructions.