SentinelOne Hardening Guide
Endpoint Detection and Response (EDR) hardening for SentinelOne Singularity platform
Overview
SentinelOne is a leading AI-powered Endpoint Detection and Response (EDR) platform protecting millions of endpoints worldwide. As a critical security control for endpoint protection, SentinelOne configurations directly impact threat detection, prevention, and response capabilities. Misconfigured policies or suboptimal settings can leave endpoints vulnerable despite having EDR deployed.
Intended Audience
- Security engineers managing SentinelOne deployments
- IT administrators configuring endpoint protection
- SOC analysts tuning detection and response
- GRC professionals assessing endpoint security
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers SentinelOne Management Console hardening, policy configuration, detection tuning, and response procedures.
Table of Contents
- Management Console Security
- Policy Configuration
- Detection & Prevention
- Response & Remediation
- Monitoring & Operations
- Compliance Quick Reference
1. Management Console Security
1.1 Secure Console Access
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Secure SentinelOne Management Console with SSO, MFA, and role-based access controls.
Rationale
Why This Matters:
- Console access controls all endpoint protection
- Compromised admin can disable protection or exfiltrate data
- Role-based access limits blast radius of compromise
ClickOps Implementation
Step 1: Configure SSO
- Navigate to: SentinelOne Console → Settings → Users → SSO
- Configure SAML SSO:
- Upload IdP metadata
- Configure attribute mappings
- Test SSO authentication
Step 2: Enable MFA
- If using SSO, enforce MFA through identity provider
- For local accounts: Settings → Users → Enable MFA requirement
- Require MFA for all admin accounts
Step 3: Configure Role-Based Access
- Navigate to: Settings → Users → Roles
- Review default roles:
- Admin: Full access
- IR Team: Incident response capabilities
- SOC: Alert review and basic response
- Viewer: Read-only
- Create custom roles as needed
- Assign minimum required permissions
Time to Complete: ~45 minutes
1.2 Configure API Security
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Secure SentinelOne API access and token management.
ClickOps Implementation
Step 1: Manage API Tokens
- Navigate to: Settings → Users → API Token
- Review existing API tokens
- Remove unused tokens
- Set appropriate token expiration
Step 2: Configure Token Permissions
- Create tokens with minimum required scope
- Use separate tokens for different integrations
- Document token usage and owners
Best Practices:
- Store tokens in secure vault
- Rotate tokens regularly
- Monitor API token usage
- Revoke tokens immediately if compromised
2. Policy Configuration
2.1 Configure Protection Mode
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 10.1 |
| NIST 800-53 | SI-3 |
Description
Configure SentinelOne agents to “Protect” mode for automatic threat mitigation.
Rationale
Why This Matters:
- Protect mode automatically mitigates threats
- Detect-only mode requires manual intervention
- Automatic response reduces dwell time
ClickOps Implementation
Step 1: Set Global Policy
- Navigate to: Sentinels → Policy
- Select scope (Global, Site, or Group)
- Under Agent Mode, select Protect
Step 2: Configure Mitigation Actions
- In Policy settings, configure:
- Threats: Kill process, Quarantine file, Remediate
- Suspicious: Alert (or Kill for high-security)
- Ransomware: Enable Rollback
Mitigation Settings:
| Threat Type | Recommended Action |
|---|---|
| Malware | Kill, Quarantine, Remediate |
| Ransomware | Kill, Quarantine, Rollback |
| Fileless | Kill process |
| PUP | Alert or Block (based on policy) |
Time to Complete: ~20 minutes
2.2 Configure Detection Engines
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 10.1, 10.5 |
| NIST 800-53 | SI-3, SI-4 |
Description
Configure SentinelOne’s detection engines for optimal threat detection.
ClickOps Implementation
Step 1: Enable All Detection Engines
- Navigate to: Sentinels → Policy
- Verify all engines are enabled:
- Static AI: On-write file analysis
- Behavioral AI: Runtime behavior analysis
- Anti-tampering: Agent self-protection
- Rollback: Ransomware recovery
Step 2: Configure Engine Sensitivity
- Set AI detection sensitivity:
- Low: Fewer false positives, may miss threats
- Normal: Balanced (recommended)
- Aggressive: Maximum detection, more false positives
- Tune based on environment needs
Step 3: Configure Cloud Intelligence
- Enable Cloud Intelligence for reputation lookups
- Enable Deep Visibility for advanced telemetry
- Configure network connectivity for cloud services
2.3 Configure Ransomware Protection
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 10.1 |
| NIST 800-53 | SI-3 |
Description
Configure SentinelOne’s ransomware protection and rollback capabilities.
ClickOps Implementation
Step 1: Enable Ransomware Protection
- Navigate to: Sentinels → Policy → Engines
- Verify Anti-Ransomware engine is enabled
- Set action to Kill and Quarantine
Step 2: Enable Ransomware Rollback
- Enable Rollback in policy settings
- Configure VSS snapshots for Windows
- Verify disk space for snapshots
Step 3: Test Rollback Capability
- In test environment, simulate ransomware
- Verify automatic detection and rollback
- Document recovery time
2.4 Configure Network Control
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 13.4 |
| NIST 800-53 | SC-7 |
Description
Configure network control features for threat containment and investigation.
ClickOps Implementation
Step 1: Configure Network Isolation
- Navigate to: Sentinels → Policy
- Enable Network Quarantine capability
- Configure auto-isolation for critical threats (optional)
Step 2: Configure Firewall Control
- Enable firewall control if licensed
- Configure baseline firewall rules
- Use for additional network segmentation
3. Detection & Prevention
3.1 Configure Exclusions Carefully
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 10.1 |
| NIST 800-53 | SI-3 |
Description
Manage exclusions to prevent false positives while maintaining security coverage.
Rationale
Why This Matters:
- Excessive exclusions create security gaps
- Attackers target exclusion paths
- Each exclusion should be documented and justified
ClickOps Implementation
Step 1: Review Existing Exclusions
- Navigate to: Sentinels → Exclusions
- Audit all exclusions by type:
- Path exclusions
- Hash exclusions
- Certificate exclusions
- Browser extension exclusions
- Document business justification for each
Step 2: Minimize Exclusions
- Remove unnecessary exclusions
- Use most specific exclusion type possible:
- Prefer hash over path
- Prefer specific path over wildcard
- Set exclusion scope narrowly (site/group vs global)
Step 3: Monitor Exclusion Usage
- Review threats that would have been blocked
- Periodically re-evaluate exclusion necessity
- Alert on new exclusion creation
Exclusion Best Practices:
| Approach | Security Impact |
|---|---|
| File hash exclusion | Safest - specific to file |
| Certificate exclusion | Safe - signed software only |
| Specific path exclusion | Moderate - limited scope |
| Wildcard path exclusion | Risk - avoid if possible |
| Process exclusion | High risk - carefully evaluate |
3.2 Configure Custom Detection Rules
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 8.5 |
| NIST 800-53 | SI-4 |
Description
Create custom detection rules for organization-specific threats and behaviors.
ClickOps Implementation
Step 1: Access Custom Rules
- Navigate to: Custom Rules or Watchlist (depending on version)
- Review existing custom detections
Step 2: Create Detection Rule
- Click New Rule
- Configure:
- Name: Descriptive rule name
- Query: Deep Visibility query
- Severity: Critical, High, Medium, Low
- Action: Alert, Kill, Quarantine
Example Rules:
3.3 Enable Local Upgrade Authorization
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | CM-7 |
Description
Enable Local Upgrade Authorization to control agent upgrades and prevent unauthorized modifications.
Rationale
Why This Matters:
- Prevents unauthorized agent downgrades
- Increases accountability for changes
- Protects against tampering via version manipulation
ClickOps Implementation
Step 1: Enable Upgrade Authorization
- Navigate to: Sites → Select Site → Settings
- Enable Local Upgrade Authorization
- Configure approval workflow
Step 2: Test Upgrade Process
- Attempt local upgrade
- Verify approval request is generated
- Approve and verify completion
4. Response & Remediation
4.1 Configure Automated Response
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 10.1 |
| NIST 800-53 | IR-4 |
Description
Configure automated threat response to minimize dwell time and analyst workload.
ClickOps Implementation
Step 1: Configure Auto-Mitigation
- Navigate to: Sentinels → Policy
- Enable automatic mitigation for:
- Malicious threats: Auto-kill and quarantine
- Ransomware: Auto-kill, quarantine, rollback
- Configure notification settings
Step 2: Configure Auto-Remediation
- Enable automatic remediation
- Configure remediation actions:
- Delete malicious files
- Restore modified files
- Clean registry modifications
4.2 Configure Threat Intelligence
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 10.5 |
| NIST 800-53 | SI-5 |
Description
Integrate threat intelligence feeds for enhanced detection.
ClickOps Implementation
Step 1: Enable Built-in Intelligence
- Verify Cloud Intelligence is enabled
- Configure reputation lookups
Step 2: Add Custom Intelligence
- Navigate to: Threat Intelligence
- Upload IOC feeds:
- STIX/TAXII feeds
- Custom IOC lists
- Industry-specific intelligence
- Configure alert actions for IOC matches
5. Monitoring & Operations
5.1 Configure Alerting and Notifications
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | SI-4 |
Description
Configure alerting and notifications for threat visibility and response.
ClickOps Implementation
Step 1: Configure Email Notifications
- Navigate to: Settings → Notifications
- Configure notification rules:
- Critical threats → Immediate email
- Agent offline → Daily digest
- Policy changes → Admin notification
Step 2: Configure SIEM Integration
- Navigate to: Settings → Integrations
- Configure syslog/CEF export to SIEM
- Or use API integration for Splunk, Sentinel, etc.
Step 3: Configure Slack/Teams Integration
- If available, configure chat notifications
- Route critical alerts to security channel
5.2 Health Monitoring
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 10.1 |
| NIST 800-53 | SI-4 |
Description
Monitor agent health to ensure consistent protection coverage.
Key Metrics to Monitor
| Metric | Target | Alert Threshold |
|---|---|---|
| Agent coverage | 100% | < 95% |
| Agents online | 100% | < 90% |
| Agent version | Latest | > 2 versions behind |
| Policy compliance | 100% | < 98% |
| Detection rate | Baseline | Significant deviation |
ClickOps Implementation
Step 1: Review Dashboard
- Navigate to: Dashboard
- Review:
- Total agents deployed
- Agents online/offline
- Threat trends
- Unresolved threats
Step 2: Configure Health Alerts
- Alert on agents going offline
- Alert on outdated agent versions
- Alert on policy non-compliance
5.3 Maintain Agent Updates
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | SI-2 |
Description
Keep SentinelOne agents updated to ensure latest protection capabilities.
ClickOps Implementation
Step 1: Configure Auto-Update
- Navigate to: Sentinels → Policy
- Enable auto-upgrade for agents
- Configure maintenance windows if needed
Step 2: Monitor Update Status
- Review agent version distribution
- Identify outdated agents
- Investigate agents failing to update
6. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | SentinelOne Control | Guide Section |
|---|---|---|
| CC6.1 | Console access control | 1.1 |
| CC7.1 | Threat protection | 2.1 |
| CC7.2 | Detection & alerting | 5.1 |
| CC7.3 | Incident response | 4.1 |
NIST 800-53 Rev 5 Mapping
| Control | SentinelOne Control | Guide Section |
|---|---|---|
| AC-6(1) | Admin roles | 1.1 |
| SI-3 | Malware protection | 2.1 |
| SI-4 | Detection rules | 3.2 |
| IR-4 | Automated response | 4.1 |
Appendix A: Feature Compatibility
| Feature | Control | Complete | Commercial |
|---|---|---|---|
| EPP/EDR | ✅ | ✅ | ✅ |
| Ransomware Rollback | ✅ | ✅ | ✅ |
| Firewall Control | ❌ | ✅ | ✅ |
| Device Control | ❌ | ✅ | ✅ |
| Ranger (Network Discovery) | ❌ | ❌ | ✅ |
| Storyline Active Response | ❌ | ❌ | ✅ |
Appendix B: References
Official SentinelOne Documentation:
- SentinelOne Community / Knowledge Base
- Endpoint Security Best Practices
- Policy Configuration Guide (requires login)
Trust & Compliance:
- SentinelOne Trust Center
- SOC 2 Type II, ISO 27001, ISO 27017, ISO 27018 – via SentinelOne Trust Center
Security Incidents:
- China-Linked Attack Attempt (2024-2025): Chinese state-sponsored threat actors (APT41/PurpleHaze) attempted a supply chain attack against SentinelOne by targeting an IT services vendor working with the company. SentinelOne confirmed no compromise was detected on its software or hardware. The campaign was part of a broader operation targeting 70+ organizations globally between June 2024 and March 2025.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with policy configuration and detection tuning | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide