SentinelOne

Download 3
Last updated Jan 5, 2025

sentinelone-alerts

Enuemrate alerts in the SentinelOne service.

sentinelone-alerts [profile=PROFILE] [duration=NUM{mon|w|d|h|m|s}] [from=yyyyMMddHHmmss] [to=yyyyMMddHHmmss] [order=ORDER]
profile=PROFILE
Connect profile code of SentinelOne
duration=NUM{mon|w|d|h|m|s}
Scan only recent data. You should use s(second), m(minute), h(hour), d(day), mon(month) time unit. For example, 10s means data from 10 seconds earlier.
from=yyyyMMddHHmmss
Start time of range. yyyyMMddHHmmss format. If you omit time part, it will be padded by zero.
to=yyyyMMddHHmmss
End time of range. yyyyMMddHHmmss format. If you omit time part, it will be padded by zero.
order=ORDER
asc or desc.

Output Fields

FieldTypeNameDescription
_timeStringEvent time
profileStringConnect profileSentinelOne connect profile code
severityStringSeveritye.g. Low, Medium, High
account_idStringAccount IDe.g. 1555111777777111111
alert_idStringAlert ID
agent_idStringAgent IDe.g. 2111111111111111111
event_typeStringEvent typee.g. TCPV4, BEHAVIORALINDICATORS, OPENPROCESS, PROCESSCREATION, FILECREATION, REGVALUECREATE, SCRIPTS
hostnameStringHostnamee.g. DESKTOP-AAAAAAA
os_nameStringOS namee.g. Windows 11 Pro
machine_typeStringMachine typee.g. laptop, desktop, server
directionStringDirectione.g. INCOMING
src_ipIP addressSource IP address
src_portIntegerSource port
dst_ipIP addressDestination IP address
dst_portIntegerDestination porte.g. 22
signatureStringSignaturee.g. Powershell Download Cradles
verdictStringVerdicte.g. Suspicious, False positive
incident_statusStringIncident statuse.g. Resolved, Unresolved
is_decommissionedBoolIs decommissioned
is_infectedBoolIs infectedtrue or false
is_activeBoolIs activetrue or false
rule_idStringRule ID
rule_verdictStringRule verdicte.g. Suspicious, UNDEFINED
rule_descriptionStringRule description
rule_queryStringRule query
parent_cmd_lineStringParent command linee.g. "C:\WINDOWS\system32\cmd.exe"
cmd_lineStringCommand linee.g. powershell
target_cmd_lineStringTarget command line
indicator_categoryStringIndicator categorye.g. InfoStealer
indicator_nameStringIndicator namee.g. CredsReadFromLsass
indicator_descriptionStringIndicator descriptione.g. Identified read action of sensitive information from LSASS
ppidLongPPIDParent process ID
parent_imageStringParent process imagee.g. cmd.exe
parent_integrity_levelStringParent process integrity levele.g. system, medium, high
parent_image_signerStringParent process image signere.g. MICROSOFT WINDOWS
parent_image_pathStringParent process image pathe.g. C:\WINDOWS\System32\cmd.exe
parent_start_timeDateParent process start time
parent_userStringParent process usere.g. root
parent_effective_userStringParnet process effective usere.g. root
pidLongPIDProcess ID
imageStringProcess image namee.g. net.exe
integrity_levelStringProcess integrity levele.g. system, medium, high
image_signerStringProcess image signere.g. MICROSOFT WINDOWS
image_pathStringProcess image pathe.g. C:\Windows\System32\net.exe
userStringProcess usere.g. root
effective_userStringProcess effective usere.g. root
target_pidLongTarget PIDTarget process ID
target_imageStringTarget process image namee.g. bitsadmin.exe
target_image_signedBoolIs target process image signedtrue or false
target_integrity_levelStringTarget process integrity levele.g. system, medium, high
target_image_pathStringTarget process image pathe.g. C:\Windows\System32\bitsadmin.exe
target_process_start_timeDateTarget process start time
parent_process_uuidStringParent process UUIDe.g. B67891B2AC1447F4
parent_storylineStringParent process storylinee.g. B78901B2AC1447F4
parent_subsystemStringParent process subsysteme.g. sys_win32
parent_image_md5StringParent process image MD5e.g. 30ccf8526d14753859937739548dc7a8
parent_image_sha1StringParent process image SHA1e.g. 0bf35689202b1faacdc4651fb04a01bc8b91a4ed
parent_image_sha256StringParent process image SHA256e.g. 4c93e558cc5e401aed8e3659c62506f2ba6070e200833c00529ef5825e0b085d
process_uuidStringProcess UUIDe.g. 247A82B2AC1346F4
storylineStringProcess storylinee.g. 247A82B3AC1457F4
subsystemStringProcess subsysteme.g. sys_win32
user_infoStringProcess user infoe.g. NT AUTHORITY\SYSTEM
target_process_uuidStringTarget process UUIDe.g. 02C792B1AC2347F4
target_process_storylineStringTarget process storylinee.g. A3C792B3BC1447F4
file_idStringFile IDe.g. 8ED2B2FE156F321E
file_pathStringFile pathe.g. C:\ProgramData\Lenovo\Udc\diagnostics\latest\da96dff290661b75a7a0b16f7e..
file_old_pathStringFile old path
file_ctimeDateFile creation time
file_mtimeDateFile modification time
file_md5StringFile MD5
file_sha1StringFile SHA1
file_sha256StringFile SHA256
reg_key_pathStringRegistry key pathe.g. MACHINE\SYSTEM\ControlSet001\Services\LanmanWorkstation..
reg_valueStringRegistry valuee.g. 0
reg_old_value_typeStringRegistry old value type
reg_old_valueStringRegistry old value
agent_uuidStringAgent UUIDe.g. 5eeee111111111111111111111111111
agent_verStringAgent versione.g. 24.1.4.257, 23.2.3.358
os_familyStringOS familye.g. linux, osx, windows
os_revStringOS revisione.g. 22000, 22631, Ubuntu 22.04.3 LTS 6.5.0-1013-gcp
image_md5StringImage MD5e.g. 8ec922c7a58a8701ab481b7be9644536
image_sha1StringImage SHA1e.g. 3f64c98f22da277a07cab248c44c56eedb796a81
image_sha256StringImage SHA256e.g. 949bfb5b4c7d58d92f3f9c5f8ec7ca4ceaffd10ec5f0020f0a987c472d61c54b
parent_user_infoStringParent process user infoe.g. NT AUTHORITY\SYSTEM
module_pathStringModule path
module_sha1StringModule SHA1
rule_query_typeStringRule query type
rule_query_langStringRule query language
alert_sourceStringAlert sourcee.g. STAR
site_idStringSite IDe.g. 1555111777666559999
dv_event_idStringDV event IDe.g. 01HVVCCCC33FFWWSS66QQJJXXZ_000
reportedDateReport time
createdDateCreation time
updatedDateUpdated time
parent_unique_idStringparent_unique_idparent_unique_id
file_signedBoolfile_signedfile_signed