SentinelOne
104 events across 2 channels
Event ID 1 — Windows Agent is starting in AgentMode mode.
Event ID 2 — Policy was changed in the Console: %1.
Description
Policy was changed in the Console.
Message #
Event ID 3 — Policy was changed with override commands: %1.
Description
Policy was changed with override commands.
Message #
Event ID 4 — Failed to register with management because it no longer exists.
Event ID 5 — Failed to register with management: Reason (ErrorCode).
Event ID 6 — Threat remediation: Failed to delete file FilePath because it was already deleted.
Event ID 7 — Threat remediation: Failed to delete file FilePath.
Event ID 8 — Threat remediation: Failed to rename file SourceFilePath to DestinationFilePath because the file was deleted.
Event ID 9 — Threat remediation: Failed to rename file SourceFilePath to DestinationFilePath because the file's parent directory does not exist.
Event ID 10 — Threat remediation: Failed to rename file SourceFilePath to DestinationFilePath because the destination path already exists.
Event ID 11 — Threat remediation: Failed to rename file SourceFilePath to DestinationFilePath.
Event ID 12 — Threat remediation: Failed to restore file FilePath to timestamp DesiredTimestamp because no snapshots were found up to the desired period.
Event ID 13 — Threat remediation: Failed to restore file FilePath to timestamp DesiredTimestamp because it is being used by another process.
Event ID 14 — Threat remediation: Failed to restore file FilePath to timestamp DesiredTimestamp because access was denied.
Event ID 15 — Threat remediation: Failed to restore registry value (key: RegistryKeyPath, value: Value) because it does not exist.
Event ID 16 — Threat mitigation: Failed to kill malicious processes because the true context does not exist.
Description
Threat mitigation: Failed to kill malicious processes because the true context does not exist.
Message #
Event ID 17 — Threat mitigation completion after reboot requested another reboot.
Event ID 18 — Threat mitigation: Not killing process ProcessName (Path: ProcessPath, Process ID: ProcessID) due to relation Relation.
Event ID 19 — Threat mitigation: Cannot kill process ProcessName (Path: ProcessPath, Process ID: ProcessID) because it is a core OS process.
Event ID 20 — Threat mitigation: Cannot kill process ProcessName (Path: ProcessPath, Process ID: ProcessID) because it is signed by SentinelOne.
Event ID 21 — Threat mitigation: Cannot kill process ProcessName (Path: ProcessPath, Process ID: ProcessID) due to an unknown error.
Event ID 22 — Threat mitigation: Cannot kill threads of process ProcessName (Path: ProcessPath, Process ID: ProcessID) due to an unknown error.
Event ID 23 — Threat mitigation: Failed to quarantine file FilePath because the file is remote.
Event ID 24 — Threat mitigation: Failed to quarantine file FilePath because the file belongs to a core OS process.
Event ID 25 — Threat mitigation: Failed to scramble file FilePath.
Event ID 26 — Threat mitigation: skipping quarantine of file FilePath because the file was already quarantined by another threat mitigation.
Event ID 27 — Threat mitigation: Failed to quarantine file FilePath because the file does not exist.
Event ID 28 — Threat mitigation: A reboot is required to complete the quarantine of file FilePath.
Event ID 29 — Threat mitigation: Failed to quarantine a file.
Event ID 30 — Network quarantine failed.
Event ID 31 — Malware detected!
Event ID 32 — Mitigation report.
Event ID 33 — Failed to unquarantine file FilePath because the file cannot be found.
Event ID 34 — Unquarantine: Failed to restore file times for FilePath.
Event ID 35 — Failed to unquarantine files affected by threat of True Context ID TrueContextID.
Event ID 36 — Network unquarantine failed.
Event ID 37 — Policy not changed. Verification key not provided.
Description
Policy not changed. Verification key not provided. Get the Agent passphrase and enter it with the -k flag.
Message #
Event ID 38 — Policy not changed. The provided verification key is incorrect.
Description
Policy not changed. The provided verification key is incorrect.
Message #
Event ID 39 — Policy not changed. A parameter cannot be both set and undefined.
Description
Policy not changed. A parameter cannot be both set and undefined.
Message #
Event ID 40 — Policy not changed. Parameter was not provided.
Description
Policy not changed. Parameter was not provided.
Message #
Event ID 41 — Policy not changed.
Event ID 42 — Policy not changed.
Event ID 43 — Policy not changed. The provided proxy credentials are invalid.
Event ID 44 — Policy not changed.
Event ID 45 — Policy not changed.
Event ID 46 — Policy not changed.
Event ID 47 — Policy not changed.
Event ID 48 — Policy not changed.
Event ID 49 — Policy not changed.
Event ID 50 — Cannot scan Path because the path does not exist.
Event ID 51 — Cannot scan Path because it is not a folder.
Event ID 52 — Scan not started because a previous scan is still in progress.
Description
Scan not started because a previous scan is still in progress.
Message #
Event ID 53 — Cannot scan because Sentinel Agent is not running.
Description
Cannot scan because Sentinel Agent is not running. Load the Agent and try again.
Message #
Event ID 54 — Scan aborted.
Description
Scan aborted.
Message #
Event ID 55 — Full Disk Scan started.
Description
Full Disk Scan started.
Message #
Event ID 56 — Scan of Path started.
Event ID 57 — Scan completed successfully.
Description
Scan completed successfully.
Message #
Event ID 58 — Failed to execute command Command.
Event ID 59 — Remote Shell: Error.
Event ID 60 — Agent Upgrade: BITS job created for downloading the new Agent.
Event ID 61 — Agent Upgrade: BITS download job complete.
Event ID 62 — Agent Upgrade: BITS download job failed.
Event ID 63 — Agent Upgrade: BITS download job failed.
Event ID 64 — Agent Upgrade: BITS is unavailable.
Description
Agent Upgrade: BITS is unavailable. Falling back to the classic downloader.
Message #
Event ID 65 — Agent handled the creation of process Name (PID: PID).
Event ID 66 — DB pruning Result.
Event ID 67 — Customer ID: customerID.
Event ID 68 — Mark as Status on True Context ID TrueContextID received from Deep Visibility.
Description
Mark as Status on True Context ID TrueContextID received from Deep Visibility.
Message #
Fields #
| Name | Description |
|---|---|
TrueContextID UnicodeString | — |
Status UnicodeString | — NTSTATUS reference |
Event ID 69 — Failed to Mark True Context ID TrueContextID as Status.
Description
Failed to Mark True Context ID TrueContextID as Status.
Message #
Fields #
| Name | Description |
|---|---|
TrueContextID UnicodeString | — |
Status UnicodeString | — NTSTATUS reference |
Event ID 70 — Failed to Mark as Status: True Context ID TrueContextID.
Description
Failed to Mark as Status: True Context ID TrueContextID.
Message #
Fields #
| Name | Description |
|---|---|
TrueContextID UnicodeString | — |
Status UnicodeString | — NTSTATUS reference |
Event ID 71 — True Context ID TrueContextID was changed from suspicious to threat.
Event ID 72 — Failed to Mark as Status: True Context ID TrueContextID.
Description
Failed to Mark as Status: True Context ID TrueContextID.
Message #
Fields #
| Name | Description |
|---|---|
TrueContextID UnicodeString | — |
Status UnicodeString | — NTSTATUS reference |
Event ID 73 — Failed to Mark as Suspicious True Context ID TrueContextID.
Event ID 74 — Failed to Mark as Status True Context ID TrueContextID.
Description
Failed to Mark as Status True Context ID TrueContextID.
Message #
Fields #
| Name | Description |
|---|---|
TrueContextID UnicodeString | — |
Status UnicodeString | — NTSTATUS reference |
Event ID 75 — Agent handled the termination of process Name (PID: PID).
Event ID 76 — Agent encountered invalid pattern: Pattern.
Event ID 77 — USB device DeviceName was Action based on SentinelOne Device Control policy.
Event ID 78 — Bluetooth device DeviceName was Action based on SentinelOne Device Control policy.
Description
Bluetooth device DeviceName was Action based on SentinelOne Device Control policy.
Message #
Fields #
| Name | Description |
|---|---|
DeviceName UnicodeString | — |
Action UnicodeString | — |
DeviceClass UnicodeString | — |
DeviceMinorClass UnicodeString | — |
VendorId UnicodeString | — |
ProductId UnicodeString | — |
ManufacturerName UnicodeString | — |
BluetoothAddress UnicodeString | — |
BluetoothVersion UnicodeString | — |
GATTService UnicodeString | — |
DeviceInformation UnicodeString | — |
Event ID 79 — Interface device DeviceName was Action based on SentinelOne Device Control policy Info.
Event ID 80 — The agent encountered an error that is usually ignored, but shouldn't be ignored in automation: Message.
Event ID 81 — Scan ended.
Description
Scan ended.
Message #
Fields #
| Name | Description |
|---|---|
ScanStartTime FILETIME | — |
ScanEndTime FILETIME | — |
ScannedPath UnicodeString | — |
TriggerType UnicodeString | — |
ScannedCount UInt64 | — |
MaliciousCount UInt64 | — |
ExcludedMaliciousCount UInt64 | — |
Status UnicodeString | — NTSTATUS reference |
Event ID 82 — BlueKeep exploitation attempt detected from: IP.
Event ID 83 — Resizing the VSS diff area on VolumeName was blocked.
Event ID 84 — Blocked PacketDirection connection.
Description
Blocked PacketDirection connection. Rule Id: RuleId Rule Name: RuleName PID: ProcessId Remote Address: RemoteAddress:Port, FQDN: Fqdn.
Message #
Fields #
| Name | Description |
|---|---|
RemoteAddress UnicodeString | — |
Port UInt16 | — |
ProcessId UInt32 | — |
AppId UnicodeString | — |
PacketDirection UnicodeString | — |
FilterId UInt64 | — |
LayerId UInt16 | — |
Fqdn UnicodeString | — |
RuleId UnicodeString | — |
RuleName UnicodeString | — |
Event ID 85 — Unable to handle configuration change, dropping the configuration
Description
Unable to handle configuration change, dropping the configuration.
Message #
Event ID 86 — UI storage reached maximum allowed file size
Description
UI storage reached maximum allowed file size.
Message #
Event ID 87 — UI storage read error ErrorCode "ErrorMessage".
Event ID 88 — UI storage write error ErrorCode "ErrorMessage".
Event ID 89 — UI storage is corrupted and will be deleted.
Description
UI storage is corrupted and will be deleted.
Message #
Event ID 90 — Error deleting corrupted UI storage.
Description
Error deleting corrupted UI storage.
Message #
Event ID 91 — Remote script orchestrator: script ScriptName execution completed.
Event ID 92 — File FilePath was detected as a malicious driver when attempting to load it (Malicious Driver Type: MaliciousDriverType).
Event ID 93 — SentinelCTL command of type "CommandType" was executed - result was: Result.
Event ID 94 — Anti-tampering was activated.
Description
Anti-tampering was activated.
Message #
Event ID 95 — Anti-tampering was deactivated.
Description
Anti-tampering was deactivated.
Message #
Event ID 96 — Agent upgrade was initiated.
Event ID 97 — Windows Agent is shutting down.
Description
Windows Agent is shutting down.
Message #
Event ID 98 — Sentinel process has crashed.
Event ID 99 — Dump file was deleted, as dump limit of DumpFileLimit was reached.
Event ID 100 — The agent has successfully connected to the SentinelOne console (ConsoleURL).
Event ID 101 — The agent received a "CommandType" command from console.
Event ID 102 — Entering disable mode by command.
Description
Entering disable mode by command.
Message #
Event ID 103 — Exiting disable mode.
Description
Exiting disable mode.