High
Threat with confidence level malicious detected
T1059 – Command and Scripting InterpreterT1204 – User ExecutionT1105 – Ingress Tool TransferT1486 – Data Encrypted for Impact
syslog_type:sentinelone AND cat:MALWARE AND threatConfidenceLevel:malicious
Medium
Threat with confidence level suspicious detected
T1059 – Command and Scripting InterpreterT1036 – MasqueradingT1078 – Valid AccountsT1027 – Obfuscated/Encrypted Files or Information
syslog_type:sentinelone AND cat:MALWARE AND threatConfidenceLevel:suspicious
Kill performed successfully
syslog_type:sentinelone AND cat:MITIGATION AND eventDesc:"Kill performed successfully"
Quarantine performed successfully
T1547 – Boot or Logon Autostart ExecutionT1053 – Scheduled Task/JobT1105 – Ingress Tool Transfer
syslog_type:sentinelone AND cat:MITIGATION AND eventDesc:"Quarantine performed successfully"
Exclusion was added/modified by user
T1562.001 – Disable or Modify ToolsT1562.006 – Indicator Blocking
syslog_type:sentinelone AND cat:WHITELISTBLACKLIST AND eventDesc:"Exclusion was added/modified by user"
Path Exclusion added
T1562.001 – Disable or Modify Tools
syslog_type:sentinelone AND cat:WHITELISTBLACKLIST AND eventDesc:"Path Exclusion added"
A management user changed the analyst verdict to True positive.
syslog_type:sentinelone AND cat:THREATMANAGEMENT AND data_newAnalystVerdict:true_positive
A management user changed the analyst verdict to False Positive.
syslog_type:sentinelone AND cat:THREATMANAGEMENT AND data_newAnalystVerdict:false_positive
Was this article helpfu?
Thank you for voting
You are related to multiple companies. Please select the company you wish to login as.