SentinelOne Logs

Overview

Evidence: SentinelOne Logs Description: Collect SentinelOne Logs Category: Applications Platform: windows Short Name: sntlnls Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

Background

SentinelOne is an advanced AI-powered EDR platform that provides autonomous endpoint protection with behavioral detection and automated response capabilities. It maintains comprehensive logs of threats, processes, and security events.

Data Collected

This collector gathers structured data about sentinelone logs.

Collection Method

This collector gathers SentinelOne log files from the Sentinel directory in ProgramData, containing EDR events, threat detections, and autonomous response actions.

Forensic Value

SentinelOne logs are critical for EDR investigations, providing AI-detected threats, behavioral analysis, process execution chains, and automated remediation actions. They offer detailed visibility into advanced attacks and zero-day threats.

Last updated

Was this helpful?