Solutions/SentinelOne/Hunting Queries/SentinelOneSourcesByAlertCount.yaml (25 lines of code) (raw):
id: acd0a127-461e-48c8-96fa-27d14595abe0
name: Sentinel One - Sources by alert count
description: |
'Query shows sources (hosts) by alert count.'
severity: High
requiredDataConnectors:
- connectorId: SentinelOne
dataTypes:
- SentinelOne
tactics:
- InitialAccess
relevantTechniques:
- T1204
query: |
SentinelOne
| where TimeGenerated > ago(24h)
| where ActivityType == 3608
| extend DstHostname = extract(@'detected on\s(\S+)\.', 1, EventOriginalMessage)
| summarize count() by DstHostname
| extend HostCustomEntity = DstHostname
entityMappings:
- entityType: Host
fieldMappings:
- identifier: HostName
columnName: HostCustomEntity