SentinelOne AI SIEM

The SentinelOne SIEM HEC(HTTP Event Collector) logs destination forwards security events and operational telemetry to SentinelOne's Singularity AI SIEM platform via HTTP Event Collector(HEC) endpoints, supporting multiple encoding formats, Bearer token authentication, and regional data routing with customizable field mapping.

Purpose

The Observo AI SentinelOne SIEM HEC Logs destination forwards security events and operational telemetry to SentinelOne's Singularity platform for advanced threat analytics and automated incident response. This connector streamlines security data aggregation, threat correlation, and automated response workflows within SentinelOne's AI-driven security operations center, enabling organizations to centralize threat intelligence and accelerate security incident resolution.

Prerequisites

Before configuring the SentinelOne HEC Logs destination in Observo AI, ensure the following requirements are met to facilitate seamless data forwarding:

SentinelOne Configuration

  • SentinelOne Instance Access: Valid credentials and access to SentinelOne management console

  • HTTP Event Collector Configuration:

    • Endpoint URL: The base URL of the SentinelOne instance (must include http or https scheme)

    • API Token: Generate HEC token in SentinelOne for data ingestion authentication

  • Data Collection Settings: Configure the SentinelOne data collector to accept incoming events from Observo AI

    • Protocol Selection: Choose between event endpoint (metadata in payload) or raw endpoint (metadata as query parameters)

    • Index/Collection Configuration: Verify target index or collection exists and token has write permissions

  • How to Get API Key:

    • Log into SentinelOne Management Console

    • Navigate to Policy & Settings → Singularity AI SIEM → API Keys

    • Generate a new API Key or retrieve an existing one for HEC authentication

    • Copy and securely store the API Key for use in Observo AI configuration

Network and Connectivity

  • Firewall Rules: Configure firewall rules to allow outbound traffic from Observo AI to the SentinelOne endpoints.

Integration

To configure SentinelOne AI SIEM HEC Logs as a destination in Observo AI, follow these steps:

  1. Access Observo AI Destinations:

    • Navigate to the Destinations tab in the Observo AI interface.

    • Click on the "Add Destination" button and select "Create New".

    • Choose "S1 HEC Logs" from the list of available destinations.

  2. General Settings:

    • Name: Provide a unique identifier for the destination (e.g., sentinelone-hec-prod-1).

    • Description (Optional): Add a description for the destination.

    • Endpoint: The base URL of the SentinelOne instance. The scheme (http or https) must be specified. No path should be included since the paths are configured separately.

    • Default Token: SentinelOne HEC token for authentication. If an event has a token set in its secrets (splunk_hec_token), it will override the default token configured here.

    • Host Key: Overrides the name of the log field used to grab the hostname to send to SentinelOne HEC. Default: host

    • Index: The name of the index to send events to. If not specified, the default index defined within SentinelOne is used.

      Examples

      {{ host }}

      security_index

    • Timestamp Key: Overrides the name of the log field used to grab the timestamp to send to SentinelOne HEC. When set to "", timestamp is not set in the events sent to SentinelOne HEC.

      Examples

      timestamp

      event_time

  3. Acknowledgement (Optional):

    • Acknowledgements Enabled (False): Whether or not end-to-end acknowledgements are enabled. When enabled, any source connected to this supporting end-to-end acknowledgements will wait for events to be acknowledged by the destination before acknowledging them at the source.

    • Acknowledgements Indexer Acknowledgements Enabled (True): Controls if the destination will integrate with SentinelOne HEC indexer acknowledgements for end-to-end acknowledgements.

    • Acknowledgements Max Pending Acks: Maximum number of pending acknowledgements from events sent to the SentinelOne HEC collector. Once reached, the destination will begin applying backpressure.

    • Acknowledgements Query Interval (Seconds): The amount of time in seconds to wait between queries to the SentinelOne HEC indexer acknowledgement endpoint. Default: 10

    • Acknowledgements Retry Limit: Maximum number of times an acknowledgement ID will be queried for its status. Default: 30

  4. Encoding:

    • Encoding Codec: The codec to use for encoding events. Default: JSON Encoding.

      Options
      Sub-Options

      JSON Encoding

      Pretty JSON (False): Format JSON with indentation and line breaks for better readability.

      logfmt Encoding

      Standard logfmt format for structured logging

      Apache Avro Encoding

      Avro Schema (Required): Specify the Apache Avro schema definition. Example: { "type": "record", "name": "log", "fields": [{ "name": "message", "type": "string" }] }

      Newline Delimited JSON Encoding

      NDJSON format with one JSON object per line

      No encoding

      Pass through data without encoding

      Plain text encoding

      Simple text format

      Parquet

      Include Raw Log (False): Capture complete log message as additional field (observo_record) Parquet Schema (Required): Enter parquet schema for encoding

      Common Event Format (CEF)

      CEF Device Event Class ID (Required): Unique event identifier (max 1023 chars) CEF Device Product (Required): Product name (max 63 chars) CEF Device Vendor (Required): Vendor name (max 63 chars) CEF Device Version (Required): Product version (max 31 chars) CEF Name (Required): Human-readable event description (max 512 chars) CEF Severity (Required): Event importance (0-10) CEF Version: Specification version (0.1 or 1.x) CEF Extensions: Custom key-value pairs

      CSV Format

      CSV Fields (Required): Field names for CSV columns CSV Buffer Capacity: Buffer size in bytes (default: 8192) CSV Delimiter: Field separator (default: ",") Enable Double Quote Escapes (True): Escape quotes by doubling CSV Escape Character: Escape character when double_quote disabled CSV Quote Character: Character for quoting fields CSV Quoting Style: When to use quotes (always/necessary/never/non_numeric)

      Protocol Buffers

      Protobuf Message Type (Required): Fully qualified message type Protobuf Descriptor File (Required): Path to .desc file

      Graylog Extended Log Format (GELF)

      GELF format for structured logging

    • Encoding Avro Schema (Optional): The Avro schema definition for applicable encoding types.

    • Encoding Metric Tag Values: Controls how metric tag values are encoded.

      • Tag values will be exposed as single strings (default)

      • Tags exposed as arrays of strings

    • Encoding Timestamp Format: Format used for timestamp fields.

      • RFC 3339 timestamp

      • Unix timestamp

    • Fields to exclude from serialization: List of fields that are excluded from the encoded event.

  5. Request Configuration:

    • Request Concurrency: Configuration for outbound request concurrency. Default: Adaptive concurrency.

      Options
      Description

      Adaptive concurrency

      Adjusts parallelism based on system load

      A fixed concurrency of 1

      Processes one task at a time only

    • Request Rate Limit Duration Secs: The time window used for the rate_limit_num option. Default: 1

    • Request Rate Limit Num: The maximum number of requests allowed within the rate_limit_duration_secs time window.

    • Request Retry Attempts: The maximum number of retries to make for failed requests. The default represents an infinite number of retries.

    • Request Retry Initial Backoff Secs: The amount of time to wait in seconds before attempting the first retry for a failed request. Default: 1

    • Request Retry Max Duration Secs: The maximum amount of time to wait between retries. Default: 3600

    • Request Timeout Secs: The time a request waits before being aborted. Default: 60

    • Request Headers: Custom HTTP request headers to include with each request.

  6. Batching Configuration:

    • Batch Max Bytes: The maximum size of a batch that will be processed by the destination. This is based on the uncompressed size of the batched events, before they are serialized/compressed.

    • Batch Max Events: The maximum size of a batch before it is flushed.

    • Batch Timeout Secs: The maximum age of a batch before it is flushed. Default: 1.0

  7. TLS Configuration (Optional):

    • TLS CA: The CA certificate provided as an inline string in PEM format.

    • TLS CRT: The certificate as a string in PEM format.

    • TLS Key: The key provided as a string in PEM format.

    • TLS Verify Certificate (False): Enables certificate verification. Do NOT set this to false unless you understand the risks of not verifying the validity of certificates.

    • TLS Verify Hostname (False): Enables hostname verification. Do NOT set this to false unless you understand the risks of not verifying the remote hostname.

  8. Buffering Configuration (Optional):

    • Buffer Type: Specifies the buffering mechanism for event delivery.

      Options
      Description

      Memory

      High-Performance, in-memory buffering Max Events: Maximum number of events allowed in the buffer. Default: 500 When Full: Event handling behavior when buffer is full. - Block: Wait for free space in the buffer - Drop Newest: Drop the event instead of waiting

      Disk

      Lower-Performance, persistent disk buffering Max Bytes Size: Maximum bytes allowed in buffer. Must be at least 268435488 When Full: Event handling behavior when buffer is full. - Block: Wait for free space in the buffer - Drop Newest: Drop the event instead of waiting

  9. Advanced Settings (Optional):

    • Compression: Compression algorithm to use for the request body. Default: No compression

      Options
      Description

      Gzip compression

      DEFLATE compression with headers

      No compression

      Data transmitted in original form

      Zlib compression

      DEFLATE format with minimal wrapper

    • Endpoint Target: SentinelOne HEC endpoint configuration.

      Options

      Event endpoint (Metadata sent with event payload)

      Raw endpoint (Metadata as query parameters)

    • Source: The source of events sent to this destination. This is typically the filename the logs originated from. If unset, the SentinelOne collector will set it.

      Examples

      {{ file }}

      /var/log/security

      TCP:9514

    • Sourcetype: The sourcetype of events sent to this destination. If unset, SentinelOne will default to httpevent.

      Examples

      {{ sourcetype }}

      _json

    • Path: Change the default HEC path. If unset, Observo will default to /services/collector/event?isParsed=true or /services/collector/raw depending on endpoint target. Default: /services/collector/event?isParsed=true

      Example

      /app/sentinelone/hec

  10. Save and Test Configuration:

    • Save the configuration settings.

    • Send sample data from Observo AI and verify its ingestion in SentinelOne.

Troubleshooting

If issues arise with the SentinelOne HEC Logs destination in Observo AI, use the following steps to diagnose and resolve them:

Verify Configuration Settings

  • Ensure that the Endpoint URL, Default Token, Index, and Source Type are correctly entered and match the SentinelOne setup.

  • Confirm that the SentinelOne HEC input is enabled and configured to accept data from Observo AI.

Check Authentication

  • Verify that the HEC Token is valid and has the necessary permissions to write to the specified index.

  • Ensure that the token has not expired or been revoked.

Validate Data Format and Schema

  • Ensure that the data sent from Observo AI matches the expected format and schema in SentinelOne.

  • If using custom source types, verify that they are properly configured in SentinelOne.

Network and Connectivity

  • Ensure that Observo AI can reach the SentinelOne HEC endpoint over the network.

  • If using firewalls or proxies, verify their configurations to allow necessary traffic.

Common Error Messages

  • "Authorization failed": Indicates invalid or missing HEC Token. Verify the token's validity and permissions.

  • "Index not found": Check that the specified index exists in SentinelOne and that the token has write permissions.

  • "No data ingested": Confirm that data is being sent and matches the expected format.

  • Best Practices:

    • Use HTTPS with TLS for secure data transmission

    • Configure appropriate field mappings for optimal search and analytics

    • Test connectivity and data flow before deploying to production

    • Use compression to optimize bandwidth usage for large data volumes

Last updated

Was this helpful?