Solutions/SentinelOne/Hunting Queries/SentinelOneScannedHosts.yaml (25 lines of code) (raw):
id: 17c77743-8bdb-4d29-a3cb-a7a08676122f
name: Sentinel One - Scanned hosts
description: |
'Query searches for hosts with completed full scan.'
severity: Low
requiredDataConnectors:
- connectorId: SentinelOne
dataTypes:
- SentinelOne
tactics:
- DefenseEvasion
relevantTechniques:
- T1070
query: |
SentinelOne
| where TimeGenerated > ago(24h)
| where ActivityType == 92
| order by TimeGenerated
| project EventCreationTime, DataComputerName
| extend HostCustomEntity = DataComputerName
entityMappings:
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: HostCustomEntity