SentinelOne Integration

XGEN SOAR Integration

D3’s integration with SentinelOne Singularity XDR automates and orchestrates workflows for endpoint protection, threat hunting and incident response. Supporting a full range of automated actions, the joint solution reduces MTTR, triages endpoint threats through D3’s Event Pipeline, and increases the quality of investigations.
SentinelOne Integration

Integration Features

1
Ingest SentinelOne threats to trigger automated playbooks in D3
2
Orchestrate SentinelOne actions from D3, such as blocking hashes, retrieving agent info, and quarantining endpoints
3
Update blacklists from D3 based on threat intelligence or investigation results
4
Enrich endpoint threats with D3’s full spectrum of security data

Key Use Case

#1

Endpoint Incident Response Automation

D3 can ingest threats from SentinelOne Singularity. D3 can then enrich, contextualize, and deduplicate the event. If the event is deemed a true positive, D3 will trigger an automated response playbook or assign the incident to an analyst for further investigation or approval. Analysts receive a comprehensive view of the event, including all available IOCs and any links to historical incidents.
#2

Threat Hunting

Using D3 and SentinelOne as an integrated threat hunting solution speeds the investigation of new threats by streamlining the entire process from learning of the threat, to finding instances of it on endpoints, to quickly remediating it. All this can be orchestrated from D3. Being able to build and trigger threat hunting playbooks in D3 also helps ensure consistency and reduce human error.
X SentinelOne Integration