Complete Guide to SentinelOne EDR (Endpoint Detection and Response): Exploring the Console in Part 1

Technology Interpreters
7 Aug 202318:11

Summary

TLDRThe video script offers an in-depth introduction to SentinelOne, a leading endpoint detection and response (EDR) solution used by major corporations. The presenter, from a managed security service provider (MSSP), explains the hierarchical structure of SentinelOne's console, which includes global, account, and site levels. The script delves into various features such as threat detection, remediation actions, and policy configurations. It also touches on advanced capabilities like Deep Visibility for incident response and threat hunting, as well as the Ranger product for network device identification. The presenter highlights the importance of threat and alert management, the use of AI engines, and the integration with Active Directory through Ranger AD. Additionally, the script covers application vulnerability scanning, inventory management, and the significance of the activity log for auditing purposes. The video concludes with a teaser for further detailed exploration of these features in subsequent videos, inviting viewers to subscribe for more comprehensive EDR insights.

Takeaways

  • 📊 Sentinel One is a top-tier endpoint detection and response (EDR) product used by large corporations.
  • 👥 The platform operates on a tenant structure with levels including Global, Account, Site, and Groups, catering to various customer sizes and needs.
  • 🏢 For small businesses like Technology Interpreters, access to Sentinel One is typically through a Managed Security Service Provider (MSSP) that has direct access to Global settings.
  • 🔍 The dashboard provides insights into solved and unsolved threats, medicated threats, and the status of endpoints as either infected or healthy.
  • 🛠️ Detection engines are a core part of the policy, with various types for detecting files, scripts, and other potential threats.
  • 🧐 Deep Visibility is a powerful feature for incident response and threat hunting, but it's restricted to prevent misuse that could lock up the console or database.
  • 🚀 The Ranger product identifies devices on the network, especially those without Sentinel One agents, aiding in the detection of rogue devices.
  • 🛡️ Policies within the platform determine the actions taken on threats, including blocking, quarantining, remediating, and rolling back changes.
  • 🔑 The Site Key is used for software installation, linking devices to a specific tenant within the platform.
  • 📋 Identity features, such as Ranger AD and Threat Strike, protect against threats targeting Active Directory and lateral movement within a network.
  • 📊 The Application section offers vulnerability scanning, providing risk assessments and inventory details of installed applications and their versions.

Q & A

  • What is Sentinel One and why is it significant in the cybersecurity industry?

    -Sentinel One is a top endpoint detection and response product used by many large companies and managed security service providers (MSSPs). It is significant because it offers comprehensive security solutions, including threat detection, mitigation, and response capabilities.

  • What is the role of a managed security service provider (MSSP) in the context of Sentinel One?

    -An MSSP is a company that manages multiple customers' security needs through a centralized console. They purchase Sentinel One services from a company with access to the global level of Sentinel One and then provide security services to their own customers, acting as an intermediary.

  • How does the tenant structure work in Sentinel One?

    -The tenant structure in Sentinel One starts with the global level, which is managed by the company providing the service. Under the global level, there are accounts, which belong to MSSPs or individual customers. Under accounts, there are sites, which represent individual customer environments or practice areas. Within sites, there can be groups that allow for specific policy assignments and monitoring.

  • What is Deep Visibility and why is it a valuable feature in Sentinel One?

    -Deep Visibility is a feature in Sentinel One that allows users to run queries for incident response or threat hunting. It provides detailed insights into network activities and is valuable because it can help detect and respond to threats more effectively. However, it's only enabled for users who have been trained and certified to use it, to prevent misuse that could lock up the console or database.

  • What are detection engines in Sentinel One, and how do they contribute to threat detection?

    -Detection engines in Sentinel One are components of the security policies that detect various types of threats. They include static detection for files on the machine and other engines that detect scripts or other non-file based threats. These engines are powered by artificial intelligence, which helps in the remediation process of detected threats.

  • How does the threat intelligence in Sentinel One categorize different types of threats?

    -Sentinel One divides threats into different categories, which can include various types of malware and potentially unwanted programs. The specific number of categories may vary, but the system is designed to provide detailed classification to help with the detection and response to threats.

  • What is the Sentinel One Ranger product, and how does it help in network security?

    -The Ranger product is used to identify devices that connect to a network and detect those without Sentinel One agents installed. It helps in network security by alerting the IT or security department about unmanaged devices, potentially identifying rogue devices on the network that need to be protected.

  • What is the purpose of the Application feature in Sentinel One, and how does it assist with vulnerability management?

    -The Application feature in Sentinel One provides a vulnerability scan by using the agent on the machine to assess the software installed. It compares the software against the Common Vulnerability Scoring System (CVSS) to determine the severity of any vulnerabilities found. This helps with vulnerability management by identifying risks and assisting in the remediation process without the need for additional tools like Tenable.

  • What is the Activity Log in Sentinel One, and why is it important for monitoring console actions?

    -The Activity Log in Sentinel One records all actions and events that occur within the console. It is important for monitoring because it allows administrators to track and audit all activities, such as logins, remote access, scans, and device decommissioning. This can help in identifying unauthorized access or actions and ensures transparency in the console usage.

  • How does the automation feature in Sentinel One benefit administrators in managing large groups of machines?

    -The automation feature in Sentinel One allows administrators to run pre-defined scripts, such as PowerShell or shell scripts, on large groups of machines. This can be used for tasks like fixing issues, remediating vulnerabilities, or performing other maintenance tasks. It benefits administrators by streamlining and automating repetitive tasks, saving time and reducing the potential for human error.

  • What is a policy override in Sentinel One, and when might it be necessary to use it?

    -A policy override in Sentinel One is a more advanced method of instructing the AI detection engine to ignore specific parameters, such as processes, hashes, executables, or file types. It might be necessary when standard exclusions do not suffice, and a more detailed instruction is required to prevent the engine from acting on certain items or conditions.

Outlines

00:00

😀 Introduction to Endpoint Detection and Response with SentinelOne

The video script introduces the viewer to endpoint detection and response (EDR), focusing on SentinelOne, a leading EDR product used by major corporations. The speaker, from Technology Interpreters, explains the interface and the concept of tenants in cybersecurity, particularly within a managed security service provider (MSSP) environment. The explanation covers the hierarchy from global level settings down to individual customer sites, and how policies and actions can be applied across this hierarchy. The dashboard is also introduced, highlighting features such as solved and unsolved threats, detection engines, and threat categorization.

05:00

🔍 Deep Visibility and Network Security with Ranger

The speaker delves into the capabilities of SentinelOne's Deep Visibility feature, which allows for incident response and threat hunting through query-based investigations. However, this feature is only enabled for trained professionals to prevent misuse. The Ranger product is introduced as a tool for network device identification and protection against unagented devices. The script also covers the use of SentinelOne for policy management, vulnerability scanning, and incident response, emphasizing the product's adaptability for different needs, such as blocking USB or Bluetooth devices and integrating with firewalls.

10:01

🛡️ Advanced Threat Detection and Response Features

The paragraph outlines various advanced features of SentinelOne, including threat detection through AI engines, alert generation based on Power Expressions, and identity protection with Ranger AD. It discusses the protection against Kerberos attacks, detection of lateral movement with ThreatStrike, and the ability to raise alerts for untrusted endpoints. Additionally, the ThreatPath feature is introduced, which helps analyze and display potential lateral movement paths that adversaries could exploit. The Applications section is highlighted for its vulnerability scanning capabilities, comparing software against the Common Vulnerability Scoring System (CVSS) to determine risks.

15:02

📚 Console Activity Logging, Reporting, and Automation

The final paragraph covers the activity logging within the SentinelOne console, which serves as an audit log for all actions taken within the system. It discusses the generation of reports based on various metrics and the automation features that allow for remote operation tasks through scripts. These tasks can be used for remediation of vulnerabilities or other fixes across multiple machines. The settings section is briefly mentioned, where notifications, user access, and integrations such as SMTP, syslog, and single sign-on can be configured. The speaker concludes by encouraging viewers to subscribe for more in-depth coverage of endpoint detection and response.

Mindmap

Keywords

💡Endpoint Detection and Response (EDR)

Endpoint Detection and Response refers to a type of security solution that monitors and responds to threats on various endpoints within a network. In the video, EDR is the main theme, as the presenter discusses the features and functions of SentinelOne, a top EDR product. It is used to detect, quarantine, and remediate threats, ensuring the security of the network and its endpoints.

💡Managed Security Service Provider (MSSP)

A Managed Security Service Provider is a company that offers a range of security-related services to other businesses on a contract basis. In the context of the video, the presenter works for an MSSP and explains how their company uses SentinelOne to manage security for multiple customers. MSSPs often have access to global settings and can apply security policies across all their clients' networks.

💡Tenant

In the context of the video, a tenant refers to a specific instance or setup within a software application that allows for the isolation and customization of data and settings for individual clients or groups. The presenter discusses how tenants are used in SentinelOne to manage different customer accounts and their respective security settings.

💡Threat Hunting

Threat hunting is the proactive process of searching for, detecting, and understanding potential threats that may have evaded other security measures. The video mentions 'Deep Visibility' as a feature that allows for threat hunting by enabling detailed queries to be run on the system to identify suspicious activities or anomalies.

💡Detection Engines

Detection engines are components of an EDR system that actively scan for signs of malicious activity or vulnerabilities. The video explains that these engines can be static, analyzing files on the machine, or dynamic, monitoring for scripts and other activities that may indicate a security threat. They are a crucial part of the AI-driven response system in SentinelOne.

💡Policy Scripts

Policy scripts are sets of rules or instructions that dictate how an EDR system should behave in certain scenarios. In the video, the presenter mentions that policy scripts can be applied at the global level and propagate down to individual accounts and sites, ensuring consistent security measures across an organization's infrastructure.

💡Vulnerability Management

Vulnerability management involves identifying, classifying, and mitigating vulnerabilities in a system to prevent exploitation by attackers. The video highlights the 'Applications' feature in SentinelOne, which provides a vulnerability scan to assess the risk level of software on endpoints, helping in the remediation process.

💡Active Directory

Active Directory is a directory service developed by Microsoft for Windows domains. It is used for authentication and provides a centralized way to manage permissions and policies for resources within a network. The video discusses 'Ranger AD', a feature that protects against threats targeting Active Directory by detecting indicators of compromise and replacing real credentials with fake ones to mislead attackers.

💡Kerberos

Kerberos is a network authentication protocol that provides secure authentication and communication between two nodes over a non-secure network. The video mentions 'Kerberos roasting', a hacking technique where attackers exploit weaknesses in the Kerberos protocol to gain unauthorized access. Ranger AD Protect is highlighted as a tool that can detect such attempts.

💡Automation

Automation in the context of the video refers to the use of scripts and tasks to perform security operations such as remediating vulnerabilities or responding to threats at scale. The presenter mentions 'Remote Ops' as a feature that allows for the execution of PowerShell or shell scripts across multiple machines, streamlining the process of maintaining security across a network.

💡Alerts and Notifications

Alerts and notifications are mechanisms used to inform administrators of potential security incidents or predefined conditions that require attention. The video explains that alerts are generated by the system based on certain criteria, while notifications can be configured to inform users of various events, such as policy changes or detected threats, through email or syslog.

Highlights

Sentinel One is a top endpoint detection and response product used by big companies.

The presenter works for a managed security service provider (MSSP) and explains the multi-tenant structure of Sentinel One.

Different levels of access in Sentinel One include global, account, site, and group levels.

Policy scripts and configurations can be applied from the global level down to individual customers.

The dashboard provides an overview of solved and unsolved threats, medicated threats, and infected versus healthy endpoints.

Detection engines are a part of the policies and include static detection and script detection.

AI is used to remediate detections and threats are categorized into different types.

Deep Visibility feature allows for advanced querying and incident response, but requires training due to its complexity.

Ranger product identifies devices on the network, especially those without Sentinel One agents.

The presenter discusses the process of remediating vulnerabilities and responding to incidents using Sentinel One.

Policies can include block lists, exclusions, and network control for integrated firewall actions.

Site key is used for installing Sentinel One and associating devices with a specific tenant.

Incident response involves handling threats and alerts, with AI engines generating threats and alerts based on conditions.

Identity feature includes Ranger AD for detecting exposure related to Active Directory and protecting against Kerberos attacks.

Threat Path feature analyzes and shows the path an adversary could take to move laterally within a network.

Applications section provides vulnerability scans, inventory of installed software, and policy-based risk assessments.

Activity log tracks all actions within the console, useful for auditing and monitoring user behavior.

Reports section allows for the generation of PDF reports on various metrics.

Automation feature enables the running of scripts for remediation and vulnerability management.

Settings section includes notification configurations, user access, and integration options like SMTP, Syslog, and Single Sign-On.

Policy Override allows for detailed instructions to the AI engine to ignore specific parameters or processes.

Locations can be defined and parameterized for grouping devices and applying specific settings or actions.

Transcripts

play00:00

is Kinder with technology interpreters

play00:02

and I want to welcome you to the first

play00:03

part of a series on any point detection

play00:06

and response I would even go as far as

play00:08

say comprehensive class and so today

play00:10

we're going to be showing you exactly

play00:12

what the interface looks like and we're

play00:14

going to go ahead and start here so this

play00:15

is Sentinel one now Sentinel one is one

play00:18

of the top endpoint detection and

play00:19

response products in the world this is

play00:21

what big companies use not necessarily

play00:24

things that the names that you know so

play00:26

if you don't know since the one

play00:28

crowdstrike Trend Micro those type of

play00:30

things you may want to become acquainted

play00:31

with him because these are some of the

play00:33

ones that the bigger corporations use

play00:34

and so let's start off so the first

play00:36

thing you want to look at is and I'm

play00:37

going to be going with my notes Here is

play00:39

let's talk about tenants so in the world

play00:41

of bit you know cyber security and

play00:44

what's called an mssp a managed security

play00:46

service provider which is what I work

play00:48

for we have many customers and so these

play00:51

interfaces are our mssp console which

play00:54

allows us to manage multiple customers

play00:57

and the way that we go about changing or

play00:59

this well actually let me playing this

play01:01

structure here so to start off it starts

play01:03

with global which means that I don't

play01:05

have access to the global because I'm if

play01:07

I were big enough I could buy this

play01:08

directly from sent to the one but since

play01:10

I'm a small company technology

play01:12

interpreters I have to buy it through

play01:14

another company that's big enough to buy

play01:16

directly from Central one and they have

play01:17

access to global so I'm actually able to

play01:20

be a company that provides security to

play01:23

other companies while being in the

play01:25

console of a company that's selling to

play01:28

other companies like me or the company I

play01:30

work for that sells Security Services of

play01:33

the company like a pyramid right so

play01:35

anyway the way it works is the global

play01:37

level which is going to be the aerate

play01:39

advisors they're the company that I get

play01:41

this from they have access to the global

play01:43

level and these things propagate now so

play01:45

they can put policy scripts all kind of

play01:47

configuration in and it will apply to my

play01:49

console and all my customers and the

play01:52

same thing would apply to any other

play01:54

customers that they have and all of

play01:56

their customers okay my customers are

play01:58

just the mentees in the program so

play01:59

actually this not my primary job I do

play02:02

teach on this console but this is purely

play02:04

for me to have to show you what endpoint

play02:07

detection that response really is so how

play02:10

does this work let's say you got the

play02:11

global level they have access to it and

play02:13

then this is the account which is my

play02:15

account and once again they have other

play02:17

mssps like myself who have accounts in

play02:20

there right and then under the accounts

play02:22

you have the sites which is going to be

play02:24

your say for instance if I had

play02:25

individual customers what you see here I

play02:27

got the other mentees here

play02:30

I'm gonna go to this level right here so

play02:31

you can kind of see so I've got the

play02:33

other mentees listed right here and

play02:35

these are their sites you say that's

play02:37

where they're doing their practice and

play02:38

stuff like that what people are in the

play02:40

cyber security mentorship program all

play02:42

right and so then we have that level and

play02:44

we can go to technology interpreters and

play02:46

then we have groups within the site so

play02:48

once again I can have a monitoring group

play02:50

where I put the stuff in here and the

play02:52

policies assigned to this group don't

play02:54

necessarily do anything but alert if

play02:56

there's an attraction but I also can

play02:58

have it where a sentinel one will

play02:59

actually do something and take action

play03:01

and if there is a detection we'll go

play03:03

ahead kill quarantine remediate roll

play03:04

back okay so now we're in the tenant

play03:07

let's talk about the dashboard okay so

play03:09

if you're on the left side menu here we

play03:11

got a lot of stuff here okay so we're

play03:13

going to go through each of these

play03:14

individual items and we're going to tell

play03:17

you a little bit about it so on the

play03:18

dashboard you got the solved and

play03:20

unsolved threats and medicated threats

play03:22

right

play03:23

so when there's an incident then uh you

play03:27

you need to take action on it right and

play03:30

once you complete whatever action you

play03:31

did on the incident you can mark it as

play03:33

solved okay but until then it's listed

play03:35

as unsolved in the console and I'm going

play03:38

I'm going to go into details and other

play03:39

parts of this series I'm going to go

play03:40

into all the details about this infected

play03:43

endpoints and healthy endpoints so once

play03:45

again if your endpoint has some type of

play03:47

detection or there's an incident or a

play03:49

particular endpoint it is listed as

play03:51

infected once it's mitigated it's listed

play03:53

as healthy uh you got detection engines

play03:56

we'll go into those those are part of

play03:57

the policies but there is static

play03:59

detection which detects files that are

play04:01

on your machine you got other type of

play04:03

like detection engines that detect

play04:05

scripts that may be run that don't have

play04:06

anything to do with files and stuff like

play04:08

that so lots of different detection

play04:10

engine and this is the artificial

play04:12

intelligence behind it that actually

play04:14

goes through and does things to actually

play04:17

fix or remediate a detection and then

play04:21

you got threat to our type which is over

play04:23

here so threat to my type once again you

play04:25

can have malware you can have

play04:27

potentially on programs they're like

play04:29

nine different or well probably not

play04:31

maybe more than nine different

play04:32

categories that sent to the one divides

play04:35

these threats into okay also on the left

play04:37

hand man you got the little magnifying

play04:38

glass this is called Deep visibility and

play04:41

so this is where it allows you to

play04:42

basically do like when you're doing

play04:44

either you're doing incident response to

play04:46

follow up on something that's been

play04:47

detected or maybe you're doing threat

play04:49

hunting but the visibility allows you to

play04:51

run queries and you see I don't have

play04:53

access to this in this console I could

play04:54

probably pay to have this feature added

play04:56

but it allows you to do some really cool

play04:58

stuff the reason that they don't enable

play05:00

this because you could if you don't know

play05:02

what you're doing and deep visibility

play05:03

and I can get this enabled they already

play05:04

told me I could and maybe it's something

play05:06

I'll go into once we get further into

play05:08

the series but if there's something

play05:10

that's not necessarily

play05:12

um you do a bad query you could

play05:14

essentially lock up their whole console

play05:16

and lock up the database and so they

play05:18

only enable this feature for people who

play05:20

are they certify that you've been

play05:22

trained and know what you're doing

play05:24

um the ranger product

play05:26

this is used to identify devices that

play05:29

connect to your network and identify

play05:30

those that don't have symptom one agents

play05:32

so this is a great way if I come in I

play05:34

plug my computer into your network I

play05:36

don't have a symptom one installed well

play05:39

guess what this Ranger product will

play05:41

detect it let me know I got a rogue on

play05:43

my network and then we can reach out for

play05:45

as far as the I.T Department the

play05:47

security department whatever to get that

play05:49

device protected Sentinels right here

play05:51

these are going to be devices in the

play05:53

console you still got this is my VM I'm

play05:55

going to move I got an older laptop

play05:56

that's a gaming laptop I'll move here

play05:58

and we're just going to put all kind of

play05:59

vulnerable soft vulnerable software on

play06:01

it I'm going to use it for stuff in the

play06:03

future videos and stuff like that to

play06:04

show you the process of remediating

play06:06

vulnerabilities and responding to

play06:08

incidents and stuff like that so but

play06:10

anyway this is where you see your

play06:11

endpoints but it's also where you can do

play06:13

your policies which is what determines

play06:15

like we're going to go into all these

play06:16

and explain all these These are

play06:17

different type of engines that you can't

play06:19

like that detect malware you got block

play06:22

lists you can block things of course

play06:24

exclusions this is like programs that

play06:26

you may need need to run that you want

play06:28

to like that we detect them and we don't

play06:30

want Sentinel one to act on them Network

play06:33

control is where we can integrate with

play06:34

the firewalls take action based on the

play06:36

firewall device control this allows us

play06:38

to block USB devices and also Bluetooth

play06:41

devices packages this is where we're

play06:43

going to actually download The Sentinel

play06:45

one software there's my site key I'm

play06:48

probably gonna have to regenerate after

play06:49

showing that but either way I can

play06:51

regenerate that side key once again if

play06:53

you install it using the site key then

play06:55

it will put you in my tenant and all

play06:57

that stuff and I'll just basically just

play06:58

regenerate it just to stop that uh site

play07:01

info of course this is all my

play07:02

information my account information

play07:03

probably should show that you're gonna

play07:05

have to cut that out the video and group

play07:06

ranking so anyway that's all of that so

play07:09

let's go next uh that covers that's

play07:12

incident this is where we have detection

play07:15

so I'm going to go up a level and so we

play07:17

had a few devices and they kind of you

play07:18

saw we ran icar and some of the desktop

play07:21

devices and stuff like that that we um

play07:24

that we had detections on but anyway

play07:26

this is this is where we go and we have

play07:28

basically threats and alerts so threats

play07:31

once again those those AI engines that's

play07:34

where threats come from alerts are we

play07:36

able to set up certain type of

play07:37

conditions and if things meet certain

play07:40

alert conditions and once again this

play07:41

feature that I don't have currently

play07:43

enabled with my agreement with the uh

play07:45

the company but something happens and

play07:47

then it will generate alert but alert is

play07:50

not a threat okay

play07:52

threat is really what you're going to be

play07:53

like mostly focused on alerts are kind

play07:56

of more like proactive detection to kind

play07:57

of like building some additional things

play07:59

in addition to the automatic or the AI

play08:01

engines and stuff like that that detect

play08:03

threats

play08:05

um let's see in addition to that I think

play08:08

that's good there we're gonna go right

play08:10

here identity all right so identity

play08:12

uh oh by the way it says on the threats

play08:15

I did make a note here that for the

play08:16

alert uh you create basically you know

play08:19

you create what's called Power

play08:20

Expressions to kind of Define things

play08:23

that will generate these alerts so

play08:24

basically you kind of Define certain

play08:25

criteria using this kind of query

play08:28

language and this it will generate

play08:29

alerts on this I don't have this

play08:31

identity feature but in in this feature

play08:34

you have what's called Ranger ad which

play08:36

reviews active director if you know

play08:37

active directory when you log into a

play08:39

Windows on a corporate network of

play08:40

usually a major company you have to

play08:43

authenticate put your credentials in and

play08:45

stuff like that and typically they're

play08:46

Microsoft shop and they have active

play08:48

directory which is where your

play08:49

credentials are housed and stuff like

play08:50

that and basically you have to log in

play08:52

well this Ranger 80 product looks for

play08:55

indicators of compromise uh or any type

play08:57

of exposure related to active directory

play08:59

it has what's called 80 secure EP which

play09:02

replaces real active director access so

play09:05

the thing is if I get on your network

play09:06

there are different kind of hacks right

play09:07

that attack uh active directory right I

play09:11

can't think of the name of it but you

play09:12

put in a chat y'all know the name of it

play09:14

uh but anyway you can't attack after

play09:15

directory and then what this does

play09:18

instead of you like being able to

play09:19

identify real computers and accounts it

play09:22

basically replaces those with fake

play09:24

accounts and fake assets or computer

play09:26

names to kind of throw an adversary off

play09:28

which basically increases the likelihood

play09:31

that they're going to get detected okay

play09:32

you also have what's called Ranger ad

play09:35

protect which detects Kerberos which is

play09:37

uh basically kerberosis a lot of times

play09:39

this way it's it's a way where you're

play09:41

like accessing file shares and make sure

play09:43

I correct me on this because Kerberos

play09:45

really confusing

play09:47

I've dug into Kerberos and stuff like

play09:48

that but when you're basically doing

play09:50

file share Kirby roast is what uh does

play09:52

these exchanges that prevents you from

play09:54

having to do all this like logging in

play09:56

constantly when you're accessing fire

play09:58

like file shares and stuff like that and

play10:00

so it exchanges credentials in a way

play10:02

using Kerberos and Kerberos tickets but

play10:05

there's this process called Kerber

play10:06

roasting that allows you to be able to

play10:08

like hack Kerberos okay it's not easy I

play10:10

tried it okay not easy but anyway Ranger

play10:13

ad protect actually detects those type

play10:15

of detections you have what's called

play10:17

threat strike which detects lateral

play10:20

movement basically moving from one

play10:22

machine to another to attack it and I

play10:25

just realized I don't even have a webcam

play10:26

I just type just talking away here and

play10:28

no webcam and then also you have uh

play10:31

what's this what else we got detect or

play10:34

deflect which basically when an

play10:36

untrusted endpoint gets on the network

play10:38

it raises a an alert

play10:40

um so great way of detecting stuff that

play10:43

may be wrote

play10:44

so it basically says raise the event

play10:46

when untrusted endpoints access

play10:48

forbidden network access so I guess if

play10:50

it's something on your network that you

play10:52

know you can kind of designate this

play10:54

shouldn't have access to you at a

play10:55

computer that's trying to access it then

play10:57

this feature will then kind of like act

play11:00

on that okay and that's uh that's going

play11:02

and then also you got threat path which

play11:04

basically is a great a pretty cool

play11:06

feature I'm actually probably going to

play11:07

recommend this as a potential uh

play11:11

solution for one of my customers uh for

play11:13

a remain company I work for because the

play11:16

thing is it basically it's able to

play11:18

analyze it and it kind of like shows the

play11:21

path that you could take to move

play11:22

laterally before somebody some adversary

play11:24

actually exploits it okay and so then

play11:27

that's all that and then we get down to

play11:30

What's called the applications okay

play11:32

applications which is right here and

play11:34

this is cool I love application because

play11:36

you get a bonus here so the thing is

play11:38

application actually gives us a many

play11:41

vulnerability scan so they're able to

play11:43

system sensor it has the agent on the

play11:45

machine

play11:47

and so what it's doing is actually this

play11:49

risk section it's actually started to do

play11:51

very much what like tenable and

play11:53

qualities doing which is being able to

play11:55

read the software compare that against

play11:57

the CVSs to determine if there are

play11:59

vulnerabilities uh and I think it was

play12:01

cbss common vulnerability scoring system

play12:04

which is what uh the kind of like

play12:07

it's the governing body that basically

play12:09

determines whether this vulnerability is

play12:11

critical or high medium low and stuff

play12:13

like that it's the scoring system for

play12:14

that so anyway they're able to access

play12:16

that compare it with the software that

play12:18

they're already seeing on your machine

play12:19

which they already have agent and then

play12:20

they're able to give you a risk and

play12:22

basically giving you kind of like a a

play12:24

scaled down vulnerability scan which is

play12:26

good when you're actually using these to

play12:28

remediate uh me working with the mentees

play12:31

we're using these to remediate

play12:32

vulnerabilities on our scene and not

play12:34

having to buy tenable and I actually

play12:35

have customers who actually are trying

play12:38

to rely on this and as an alternative to

play12:42

attainable for vulnerability scans we

play12:44

got inventory this is basically telling

play12:46

me all the applications and their

play12:48

versions the stuff that's installed on

play12:49

my machine and then we have policies

play12:51

right here and what you can do is you

play12:53

can do an extensive scan which is

play12:55

basically to me it seems like it just

play12:57

increases the Fidelity of the the

play13:00

vulnerability scan this year and this

play13:01

confirms it like it's literally saying

play13:02

vulnerability scan so your risk is a

play13:05

vulnerability scan that sent to the one

play13:07

has been included once again when

play13:09

inventors they're probably going to

play13:09

break it onto a new product and charge

play13:11

you extra for it okay so man a lot going

play13:14

on activity activity this is where

play13:16

anything that happens in a console

play13:17

dishes your audit log this is like

play13:19

anything that you want to know if I log

play13:21

in if I remote into somebody's machine

play13:23

but you can do through Sentinel one I'll

play13:24

be showing you that feature in upcoming

play13:26

videos login log out the whole night I

play13:29

shouldn't initiate a scan a decommission

play13:31

or basically there's a device that's

play13:33

been gone it's never going to check in

play13:34

again I decommissioned it which flagged

play13:36

it so it doesn't show up in the

play13:37

interface all these things show up right

play13:39

here in this activity log okay so this

play13:42

is this is my bread and butter when I'm

play13:44

trying to see what I was doing like if I

play13:46

want to see if somebody's in here I feel

play13:47

like oh somebody feel like somebody

play13:49

might have logged in and done something

play13:50

they want to but it's going to be right

play13:51

here in this activity law so love that

play13:55

let's see what else we got we got

play13:57

reports ports are straightforward you

play13:59

can generate PDF reports some different

play14:01

metrics and stuff like that we'll dig

play14:03

into reporting automation automation is

play14:05

cool because first of all you got this

play14:07

remote Ops task I look I was even look

play14:10

digging the doc into the documentation

play14:12

don't necessarily know the tasks are

play14:13

maybe it's because I don't have any

play14:14

remote Ops created but the company that

play14:17

owns this they have a lot I'm going to

play14:18

show this because these are their

play14:19

scripts I don't want to expose that to

play14:21

everybody on YouTube you know what I'm

play14:23

saying but if you become one of their

play14:24

customers you can see it you know what

play14:25

I'm saying so anyway they got all these

play14:28

different scripts that they're running

play14:29

Powershell scripts shell scripts that

play14:31

you can run on a large groups of

play14:33

machines to either fix things remediate

play14:36

vulnerabilities all kind of stuff really

play14:37

cool glad to have this feature and plan

play14:39

on using and this is a set of the remote

play14:41

settings is where basically you can

play14:43

include default credentials and stuff

play14:45

like that and once again I don't have

play14:46

permission based on my access and then

play14:48

we get into the settings section okay

play14:51

this is great because this is where I

play14:53

want to go to click on a lot of these

play14:54

but you can set up the notifications you

play14:55

can go ahead and add the groups and you

play14:57

can notify on different aspects and it's

play14:59

a lot of options in the notifications

play15:01

okay so and basically you can send the

play15:04

notifications either via syslog or email

play15:07

okay since all your email system is when

play15:10

you send it to like a server that's

play15:12

aggregating login information from lots

play15:14

of other devices like it could be Splunk

play15:16

it could be elastic it could be some

play15:18

others and it's aggregating the

play15:20

information and then it's presenting

play15:21

that information in some way shape or

play15:23

form that allows you to be able to like

play15:25

kind of like sift through the

play15:26

information to find something specific

play15:29

so syslog and email alerts you put your

play15:31

recipients in here then of course you

play15:33

got I'm already no notification you got

play15:35

users not going to click there because

play15:36

this is where how the user set up who

play15:38

are accessed to the console integration

play15:40

we can do SMTP syslog and single sign-on

play15:44

which is like logging it through an

play15:45

identity and access provider like OCTA

play15:47

or something like that so we can

play15:49

configure that uh looks like that's just

play15:51

there's just a lot of information I'll

play15:52

click off of that policy override this

play15:55

is how awful sometimes we have sent to

play15:56

the one like not we can't put an

play15:59

exclusion for a process that's like we

play16:01

might we want Sentinel one not to act on

play16:03

something and so what we would do is we

play16:05

put an exclusion but if the exclusion

play16:07

doesn't work then we sometimes have to

play16:09

do a policy override which makes it

play16:10

literally it's just kind of like code

play16:12

that really gets very detailed and tells

play16:14

the detection engines not to touch this

play16:17

so it's like a Step Beyond an exclusion

play16:20

exclusion is just saying a process or

play16:22

ignore this hash or ignore this

play16:25

executable or ignore this file type or

play16:27

something like that a policy override is

play16:29

literally telling the engine the AI

play16:32

engine what to not touch what to not do

play16:34

stand down on this particular feature or

play16:37

this particular whatever search or

play16:40

whatever parameter redefined okay

play16:44

all right man it's a lie okay all right

play16:46

so then we gotta count I'm not going to

play16:48

click on accounts this basically shows

play16:49

the accounts we got sites okay so we're

play16:52

basically these are all the sites that

play16:54

are in um

play16:56

system one and these are the sites right

play16:58

here okay so remember Global this is the

play17:00

that my account and then these all the

play17:03

sites uh for the people that are in the

play17:05

mentor program and then also the one I'm

play17:07

just using for testing and one I used to

play17:08

manage my devices too

play17:11

um let's see what else we got uh

play17:13

locations

play17:15

um locations we can basically we can go

play17:17

into locations so it's pretty cool

play17:19

because it allows us to Define certain

play17:22

parameters So based on General like we

play17:25

can put location name description IP

play17:27

address DNS server DNS resolution

play17:29

network interface system one connection

play17:31

connected or not registry key uh and

play17:34

then also let's see what was one network

play17:35

interface wired or Wireless so we can

play17:37

basically use these parameters to group

play17:39

like different devices into a location

play17:41

to act on them in a certain way

play17:44

and uh that's it so that's a lot that's

play17:49

a lot okay that I covered in a short

play17:51

period of time 17 minutes of straight

play17:53

talking but this is a good interview

play17:56

this is just the overview we haven't

play17:58

even dug into any of the features but if

play17:59

this is helpful and you want to learn

play18:01

endpoint detection and response

play18:02

subscribe to my channel I'm about to

play18:04

upload this video thanks for watching

play18:06

don't forget to like And subscribe I

play18:08

said that already and I'll see you on

play18:09

the next video

Rate This

5.0 / 5 (0 votes)

Related Tags
CybersecurityEndpoint DetectionResponse ManagementSentinelOneMSSPSecurity PoliciesThreat HuntingIncident ResponseVulnerability ScanActive DirectoryAutomation