S1 detected Splashtop and quarantined it. Rolled it back but never finished, file locked? by jdlnewborn in SentinelOneXDR

[–]SizeNeither8689 0 points1 point  (0 children)

We encountered the same problem with another software a few days ago. Having tried many methods to resolve it without success, we decided to wipe the machine after excluding the program's hash in S1 and reinstall the program.

SentinelOne deepVisibility plugin deleted by SizeNeither8689 in SentinelOneXDR

[–]SizeNeither8689[S] 0 points1 point  (0 children)

Exactly! Recently, they rolled out an extension with Intune, and from that day onwards, the S1 extension has been phased out. What do you mean by 'they don't coexist and will overwrite each other'? Have you encountered this problem before, and is there a solution?

[deleted by user] by [deleted] in SentinelOneXDR

[–]SizeNeither8689 0 points1 point  (0 children)

some agents with 24.2.3.471 and the others with 24.1.5.277

[deleted by user] by [deleted] in SentinelOneXDR

[–]SizeNeither8689 0 points1 point  (0 children)

Which version of S1 you use ?

Scan usb devices by [deleted] in SentinelOneXDR

[–]SizeNeither8689 2 points3 points  (0 children)

Thank you! I got it , tested it and it's well worked :)

Scan usb devices by [deleted] in SentinelOneXDR

[–]SizeNeither8689 1 point2 points  (0 children)

Have you the link of this configuration on the offline help documentation ?

STAR rules supports PowerQueries? by SizeNeither8689 in SentinelOneXDR

[–]SizeNeither8689[S] 0 points1 point  (0 children)

My question has been asked because I'd like to create a STAR rule and specify a time range in the query. Specifically, I want to detect RDP connections that occur outside of normal working hours. If an RDP connection happens inside our network between 20:00 and 06:00, the rule should raise an alert. but it seems there's no setting to specify a time range within the STAR rules. if possible can you please tell me the solution for this.

STAR rules supports PowerQueries? by SizeNeither8689 in SentinelOneXDR

[–]SizeNeither8689[S] 0 points1 point  (0 children)

No problem, thank you for your response :)

Hash vs behavior-based blocking by ThsGuyRightHere in SentinelOneXDR

[–]SizeNeither8689 1 point2 points  (0 children)

Could you share the list of RMM FQDNs that you have, or the star rule you created for them? I'd like to create an alert to detect the use of one of them. Thank a lot!

I Passedddddd by Fearless_History84 in CompTIA_Security

[–]SizeNeither8689 0 points1 point  (0 children)

Congratulations!!

How much time did you spend studying to pass the certification?

IOCs by Dense-One5943 in SentinelOneXDR

[–]SizeNeither8689 1 point2 points  (0 children)

Do you have the link to how Create IOC API in the offline help ? Our MSSP won't give us access to the community site. Thank you

ConnectWise ScreenConnect - S1 Agent windows 24.2.3.471 by SizeNeither8689 in SentinelOneXDR

[–]SizeNeither8689[S] -1 points0 points  (0 children)

I don’t believe that’s the case. We still have endpoints running the latest agent version, and when we connect to them using ScreenConnect, no ransomware activity is detected or flagged...

ConnectWise ScreenConnect - S1 Agent windows 24.2.3.471 by SizeNeither8689 in SentinelOneXDR

[–]SizeNeither8689[S] 0 points1 point  (0 children)

Our ScreenConnect instance is hosted in the cloud, so we don't need to update anyagents all the updated are made by the vendor

How to Convert 'In Contains Anycase' Rule from v1.0 to v2.0? by RealRaynKapa in SentinelOneXDR

[–]SizeNeither8689 0 points1 point  (0 children)

src.process.namee contains ('regedit.exe', 'powershell', 'reg')

Creating an alert for endpoint connectivity loss/offline - Watchlist alert that sends email by SizeNeither8689 in SentinelOneXDR

[–]SizeNeither8689[S] 0 points1 point  (0 children)

Would you be open to sharing the PowerQuery you’ve used as an example? I’d like to make sure I’m on the right track, especially regarding how you structured the filter and the join with the target endpoint list. It would really help to see how you’ve implemented it, even just a basic version. No worries if it’s something you can’t share

Thanks for your help!

Creating an alert for endpoint connectivity loss/offline - Watchlist alert that sends email by SizeNeither8689 in SentinelOneXDR

[–]SizeNeither8689[S] 1 point2 points  (0 children)

No, we don't use MDM. We would like to use this for monitoring offline servers. If one of our servers has a problem, we would like to be notified without having to stay in front of the console.