Solutions/SentinelOne/Hunting Queries/SentinelOneAgentStatus.yaml (25 lines of code) (raw):

id: 4b2ed4b6-10bf-4b2c-b31e-ae51b575dfd4 name: Sentinel One - Agent status description: | 'Query shows agent properties.' severity: Low requiredDataConnectors: - connectorId: SentinelOne dataTypes: - SentinelOne tactics: - DefenseEvasion relevantTechniques: - T1070 query: | SentinelOne | where TimeGenerated > ago(24h) | where EventType =~ 'Agents.' | extend Properties = pack('IsActive', IsActive,'ActiveThreats',ActiveThreats,'FirewallEnabled',FirewallEnabled,'Infected',Infected,'IsUpToDate',IsUpToDate,'MitigationMode',MitigationMode,'MitigationModeSuspicious',MitigationModeSuspicious,'NetworkStatus',NetworkStatus) | summarize max(TimeGenerated) by ComputerName, tostring(Properties) | extend HostCustomEntity = ComputerName entityMappings: - entityType: Host fieldMappings: - identifier: HostName columnName: HostCustomEntity