One of the biggest pain points of cyber security teams is alert fatigue – trying to keep up with a tedious, never-ending stream of alerts to triage. In today’s reality, security teams can spend a large amount of their valuable time on confirming alerts instead of investigating real incidents. Integrating Intezer with EDRs in your alert triage workflow allows you to automate tasks and make sure your team can identify and focus on the most critical alerts.
To tackle the alert fatigue security teams experience and help improve MTTR (mean time to respond), Intezer’s integration with the SentinelOne Singularity XDR combines best of breed solutions to automatically triage incidents and provide advanced, enriched verdicts. SentinelOne provides prevention, detection, response, and threat hunting across all major OSs and cloud workloads.
When an incident is created in SentinelOne, the artifact is automatically sent to Intezer for deep analysis and investigation down to the code level. The results of Intezer’s analysis are returned in the SentinelOne console, along with a verdict and link to Intezer for additional context and extracted threat hunting detection opportunities. By replacing manual processes with machine-speed detection and deep malware analysis, security teams can respond to incidents with greater speed and confidence.
Here we’ll look at how it works.
Intezer + SentinelOne Joint Solution Highlights
- Reduced response time for critical security investigations.
- Increased accuracy and validation of suspicious incidents using threat analysis.
- Auto remediate alerts that Intezer identifies as false positives, based on your pre-defined classifications.
- Retention of past investigations for future events and campaigns.
- Simplified rule extraction from Intezer for threat hunting.
How Manual Incident Triage Limits Investigations
As the cybersecurity skills gap continues to widen, organizations face challenges in hiring and retaining skilled security professionals. The deluge of alerts from security tooling and the tedious nature of the Tier 1 analyst position makes burnout one of the leading contributors to the shortage of security talent. Security teams look to automation to help alleviate some of the repetitive tasks of incident triage to focus their limited resources on the highest impact and most critical incidents, increasing throughput and reducing the time to respond.
Get a quick preview of how it works for alert triage in this 3-minute video:
- Alert triage and time savings with a unified workflow.
- Additional context to scanned artifacts including attribution, malware families, indicators of compromise (IOC), and TTPs mapped to MITRE ATT&CK®.
- Rapid verdicts of both malicious and benign artifacts classified using Intezer’s proprietary genetic analysis solution.
- Auto remediate false positives identified by Intezer’s analysis: based on your pre-defined classifications for SentinelOne alerts, Intezer updates the Analyst Verdict to “False Positive” and updates the Incident Status to “Resolved.”
- Hunt for traces of advanced in-memory threats such as fileless and packed malware, malicious code injections, or any unrecognized code by running Intezer’s Live Endpoint Scanner from inside your SentinelOne console.
- Out-of-the-box detection content and queries for threat hunting provide immediate time-to-value.
How It Works
- SentinelOne detects malicious activity on an endpoint and creates an incident.
- Intezer is alerted to the incident and SentinelOne retrieves the artifact from the endpoint for analysis. The artifact is sent to Intezer for analysis.
- Intezer enriches the incident in SentinelOne with an analysis link, context, verdict, and malware family information.
- Users can dive into the linked Intezer analysis report to identify additional IOCs and threat hunting queries.
- Additional indicators can be added to the SentinelOne blacklist or used in a Storyline Active Response (STAR) rule to alert and perform an automated response next time those indicators are seen.
- Autonomously respond in SentinelOne by killing, quarantining, remediating (including auto remediation by Intezer), or rolling back the effects of the malicious file.
- Scan a suspicious endpoint or proactively hunt for traces of advanced in-memory threats (such as fileless and packed malware, malicious code injections, or any unrecognized code) by using Intezer’s Live Endpoint Scanner as a script from inside SentinelOne.
- Threat hunting queries can be extracted from Intezer and used with SentinelOne Deep Visibility to hunt for additional indicators across the environment.
Solution Use Cases
- Alert Triage – With automated analysis of suspicious binaries, analysts are able to determine and confirm whether an alert is a true positive which warrants escalation to incident responders.
- Incident Response – Run the script from SentinelOne for Intezer’s Endpoint Scanner, which downloads the lightweight executable to a temporary directory on the suspicious endpoint, executes the scan, logs the resulting analysis as a report in Intezer, and then deletes the Scanner from the endpoint.
- Curated Threat Hunting – Intezer provides out-of-the-box detection content and threat hunting queries that can be used within SentinelOne Deep Visibility.
“Too many teams face challenges hiring and retaining skilled security professionals, but they can feel empowered by introducing more automation into their workflows for alert triage, response, and threat hunting with Intezer’s integration that combines seamlessly with SentinelOne’s platform.”
— Itai Tevet, CEO and Founder, Intezer
Reducing Alert Fatigue for SOC/IR Teams to Improve MTTR
When security teams are overwhelmed with alerts and experiencing alert fatigue, integrating automation into an alert triage process is key to reducing the mean time to respond (MTTR) to an incident.
If you are an Intezer customer, login and then use your SentinelOne API key to activate the integration here.
Not yet an Intezer customer? Sign up for a free Intezer account and try it out for yourself.