Going deeper into SentinelOne: Advanced use of the Singularity environment for proactive identification of IOCs
- Welcome and introduction to the Training session
- Topics that will be addressed in the session, with interactive participation of attendees.
- Ranger Insights
- Requirements
- Initial configuration and customization of ports to detect
- How does Ranger deploy new agents centrally?
- Configuring deployment keys for Windows and Linux
- Identification of unprotected devices
- Expanded capabilities
- Extended Vulnerability Scanning (OS)
- CVE exploit code maturity
- Creation of alerts when new devices appear on the network
- DeepVisibility
- Requirements and policy definition for telemetry collection
- Advanced Threat Hunting with PowerQueries
- PurpleAI: A smart assistant
- Advanced Custom Dashboards
- STAR Custom Rules
- Execution of lateral movement and proactive application of mitigation policies
- Singularity Marketplace
- First basic integrations (Alien Valut and Virus Total)
- Advanced integration for identity risk management (Azure)
- XDR in action
- Maintenance and visibility
- Centralized update
- SIEM Centralization
- Ranger Insights
- End of session
This session will be carried out online, through Microsoft Teams, with the aim of sharing your opinions and experiences with SentinelOne with others, if you wish.
Who is this training for?
People who already know the SentinelOne solution and want to know the new features and features in depth to get the most out of the tool.
Sign up HERE!