API & Integrations - SentinelOne Integration - Cloud Gateway

This article provides information on integrating Mimecast with SentinelOne to enhance Human Risk scoring by adding human interaction with malware on devices, allowing security awareness practitioners to send users training and other information based on users' malware-associated behavior. 

Overview

The integration periodically reads endpoint protection events from the threats endpoint of the SentinelOne API. These are then forwarded to the Human Risk Control Center, which associates each event with a specific user and updates the malware behavior score for that user. 

  • Only alerts marked true positive in the SentinelOne Security console will be scored.
  • Malware data from SentinelOne will be pulled from the point of integration onwards. Historical data will not be included.

Prerequisites

  • SentinelOne subscription.
  • Mimecast Engage subscription.
  • Mimecast Administrator account.

Authentication

To authenticate with SentinelOne, the following two pieces of information are required:

  1. The SentinelOne platform url. This is the management URL of SentinelOne and is in the following format:

    https://<your company name>.sentinelone.net

  2. An API Token. We recommend that the token be from a service user, so that the token is not tied to a specific user and email address.

Service User Considerations

The following provides details on service user permissions:

  • Service users can use the API, but cannot log in to the Management Console.
  • Service users use the same RBAC and scopes as Console users. They can perform most of the actions permitted by their RBAC permissions and access level, but only through the API.

The following details the requirements for creating a service user:

  • A service user requires a name. A description is optional, and an email address is not required.
  • The name cannot be changed after you create the user; only the description can be changed.
  • The name of a service user is not required to be unique in the scope or in the environment. However, we recommend that you choose a unique name for tracking and auditing purposes.
  • Two-factor authentication and Single Sign-On requirements do not apply.
  • The expiration date of the API token can be set when you create a service user. The expiration time can be as long or as short as required.

After creating the service user, the expiration date cannot be changed.

Information on creating a service user can be found here. To create a service user, you can use the following link: Create a service user.

Permissions

View permissions are required for:

  • Endpoint Threats
  • Accounts
  • Groups
  • Roles
  • Sites

Configuration

To integrate Mimecast with SentinelOne:

  1. Navigate to your API Provider's website to obtain the Client Secret and Base URL, which will be required for step 6.
  2. Log in to the Mimecast Administration Console.
  3. Navigate to Integrations | Integrations Hub.
inthub.png
  1. Navigate to the SentinelOne menu item.
  2. Click on the Configure New button.

You may also select the View option, then choose Create New Integration to create an integration.

view-createnew.png

  1. Complete the Details section with the following:
    • Application Name 
    • Description

details.png

  1. Complete the Activate section by entering the API credentials provided by SentinelOne.
    • Client Secret: The Client Secret is retrieved from your API provider's site.
    • Base URL: This is the consistent part, or the root of your API's website address.

activate.png

  1. Click on SaveThis will validate the API credentials by connecting to the SentinelOne app.
  2. Your new integration will be added, and you will see the following toast message to confirm this. 

success.png

  1. Ensure that the Status reflects as Connected.

The new integration status will initially be reflected as Unavailable. You will need to refresh your page to see the Connected Status.

status.png

You can also click on the ellipsis Ellipsis.pngView/Edit or Delete an Integration.

  1. Navigate to Human Risk | Dashboard. The integration is now successful, and you should be able to receive the data from SentinelOne.

hrd.png

  1. Click View Details in the Malware section of the Human Risk Behaviours section, which is where data from SentinelOne will be found.

malware.png

  1. You can also click on a specific user under Highest Risks to see the Individual Risk Profile of that user.

irp.png

  1. You can then click on Malware to see the Events related to Malware in more detail.

events.png

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.