AlienApp for SentinelOne Actions

The AlienApp for SentinelOne provides a set of orchestration actions that you can use to identify threats and manage assets in your USM Anywhere environment. The following table lists the available actions from the AlienApp.

Important: Most AlienApp for SentinelOne actions can only be applied to associated events generated from the SentinelOne AlienApp scheduler or events that contain a SentinelOne threat identifier (ID). Events not associated with SentinelOne will not trigger most actions from USM Anywhere.

Events that do not contain a SentinelOne threat ID can be used to create a denylist entry enabling you to add any process or file to your denylist, not just ones that SentinelOne detects as suspicious.

Actions for the AlienApp for SentinelOne
Action Function
Initiate Scan Initiate a full disk scan on the endpoint asset.
Mitigate Threats

Gives the option to kill, remediate, rollback, quarantine, or un-quarantine a threat based on the analyst verdict of the threat.

Add to Denylist

Add a threat to the denylist.

Scope of restrictions can be defined by account, group, or site.

Add to Exclusion List

Add threat to exclusion list.

Scope of restrictions can be defined by account, group, or site.

Exclusion is defined by type (certificate, path, or hash).

Disconnect Asset from Network

Disconnect the asset from the network.

Disable Agent Disables an asset, and disables detection, device control (Microsoft Windows only), firewall, SentinelOne Ranger scanning (Windows only), and anti-tampering (Windows only) on that asset.
Enable Agent Enables an agent that has been previously disabled.
Reconnect Asset to Network Reconnect the asset to the network.
Restart Machine Restart the machine connected to the asset.

To view information about these actions in USM Anywhere

  1. In USM Anywhere, go to Data Sources > AlienApps.
  2. Click the Available Apps tab.
  3. Search for the AlienApp, and then click the tile.
  4. Click the Actions tab to display information for the supported actions.
  5. Click the History tab to display information about the executed orchestration actions.

Launch Actions from Alarms

You can launch an action directly from alarms or events. If you want to apply an action to similar events that occur in the future, you can also create orchestration rules directly from the action applied to an alarm or event.

To launch a SentinelOne response action for an alarm or event

  1. Go to Activity > Alarms or Activity > Events.
  2. Click the alarm or event to open the details.
  3. Click Select Action.
  4. In the Select Action dialog box, select Run SentinelOne Action.

  5. Select the app action and fill out the fields that are populated below.

  6. Click Run.

    After USM Anywhere initiates the action for an alarm or event, it displays a confirmation dialog box.

    If you want to create a rule to apply the action to similar items that occur in the future, click Create rule for similar alarms or Create rule for similar events and define the new rule. If not, click OK.

Threat Hunting Library

The Threat Hunting Library is a tool that allows you to run predefined queries using the AlienApp for SentinelOne. The Hunting Library contains a list of queries you can select from and a list of endpoints you can click on to expand and see more information in relation to the queries. The Threat Hunting Library is only accessible to users receiving events from the configured AlienApp for SentinelOne.

To access the Threat Hunting Library, go to Data Sources > Threat Hunting Library.

Note: The ability to perform Queries with the AlienApp for SentinelOne is only available for customers with the SentinelOne Singularity Control license, the SentinelOne Singularity Complete license, or for customers who have AT&T Managed Endpoint Security with SentinelOne.