Skip to content

neerajvohradev/Sentinel-One-STAR-Rules-Threat-Hunts

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 

Repository files navigation

SentinelOneStarRules

SentinelOne STAR Rules and Threat Hunts:::::::::::::::

#Command tradecraft detections for Malware and other behaviors used by Ransomware Operators and APT.

#The following Repository Contains STAR rules and Threat Hunts for the EDR S0lution SentinelOne.

STAR - custom detection rules, SOC teams can turn queries from Deep Visibility, SentinelOne’s EDR data collection and querying mechanism, into automated hunting rules that trigger alerts and responses when rules detect matches. STAR also allows users an automated way to look at every endpoint event collected across their entire fleet and evaluate each of those events against a list of rules.

Hunt - Lower fidelity rules to cast a wide net for certain behaviors which may be used for hunting within an environment and could potentially be turned into a higher fidelity STAR rule.

About

SentinelOne STAR Rules

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published