Wazuh-SentinelOne/sentinelone.xml

39 lines
1.6 KiB
XML
Raw Normal View History

2025-02-26 15:51:19 +01:00
<!-- Rules for SentinelOne via API -->
<!-- SentinelOne logs grouped -->
<group name="sentinelone_API">
<rule id="100600" level="3">
<decoded_as>json</decoded_as>
<location>/var/log/sentinelone.json</location>
<description>Logs from SentinelOne.</description>
</rule>
<!-- Rules to detect active threat -->
<rule id="100601" level="10">
<if_sid>100600</if_sid>
<field name="agentDetectionInfo.agentMitigationMode">detect</field>
<description>SentinelOne: New active threat $(threatInfo.threatName) detected on $(agentRealtimeInfo.agentComputerName).</description>
</rule>
<!-- Rules to detect successfully mitigated threat -->
<rule id="100602" level="5">
<if_sid>100600</if_sid>
<field name="threatInfo.mitigationStatus">mitigated</field>
<description>SentinelOne: Threat $(threatInfo.threatName) successfully mitigated on $(agentRealtimeInfo.agentComputerName).</description>
</rule>
<!-- Rules to detect multiple active threats -->
<rule id="100603" level="12" ignore="120">
<if_sid>100600</if_sid>
<field name="agentRealtimeInfo.activeThreats">[4-9]\d*|\d{2,}</field>
<description>SentinelOne: Multiple active threats detected on $(agentRealtimeInfo.agentComputerName).</description>
</rule>
<!-- Rules to detect reboot required -->
<rule id="100604" level="7">
<if_sid>100600</if_sid>
<field name="agentRealtimeInfo.rebootRequired">true</field>
<description>SentinelOne: System reboot required on $(agentRealtimeInfo.agentComputerName) to complete actions.</description>
</rule>
</group>