Contact sales
Details

SentinelOne Singularity is an Extended Detection and Response (XDR) and Endpoint Detection and Response (EDR) offering.

SentinelOne Singularity is an Extended Detection and Response (XDR) and Endpoint Detection and Response (EDR) offering. In Cisco XDR, we enable Singularity users to leverage it for threat hunting and investigation features, as well as rapid response actions to understand and defend against threats on the endpoint. It also provides important device inventory context to help triage detected threats.

Use the SentinelOne integration to search for security detections involving specific hostnames, host GUIDs, filenames, paths, hashes, process names, and process arguments. SentinelOne can also be used through Cisco XDR to isolate hosts from the network and block file hashes on the endpoint. This integration can also be used to provide host information, including vulnerability information for use in triaging incidents and detections.

Note: This integration requires XDR Advantage or XDR Premier licensing tier.

Capabilities
Automation
Automatic target creation for Cisco XDR automation
Health
Validates that the integration is healthy
Observe
Provides sightings for an observable
Refer
Provides links to additional resources for an observable
Device Insights
Provides information about assets
Data Ingestion
Ingests and analyzes data from the integrated product to generate detections for incidents
Regions
North America
Europe
Asia-Pacific, Japan & China
Installable workflows

These are workflows that you can install in Cisco XDR automation and use with this integration. These are different from built-in workflows which are built into Cisco XDR by default for all customers.

Cisco Managed
This workflow appears in the pivot menu and allows you to add a file hash to a blocklist in SentinelOne.
Cisco Managed
This playbook task workflow can be added to an incident response playbook and allows you to add one or more SHA1 file hashes to the blocklist in SentinelOne.
Cisco Managed
This workflow appears in the pivot menu and allows a user to re-connect an agent to the network in SentinelOne.
Cisco Managed
This workflow appears in the pivot menu and allows a user to disconnect an agent from the network in SentinelOne.
Cisco Managed
This incident response workflow allows you to identify and document vulnerabilities of hosts in an incident using SentinelOne from a playbook or using an automation rule.
Cisco Managed
This workflow appears in the pivot menu and allows you to remove a file hash from the blocklist in SentinelOne.
Built-in workflows

These workflows are built into Cisco XDR automation and can be used with this integration. These are different from installable workflows, which are optional workflows you can install from Cisco and its partners.

Configuration details