<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SentinelOne on Alfred van Ster</title><link>https://avanster.tech/tags/sentinelone/</link><description>Recent content in SentinelOne on Alfred van Ster</description><generator>Hugo -- 0.160.1</generator><language>en-us</language><lastBuildDate>Sat, 10 Jan 2026 11:00:00 +0000</lastBuildDate><atom:link href="https://avanster.tech/tags/sentinelone/index.xml" rel="self" type="application/rss+xml"/><item><title>SecOps: SentinelOne Global Threat Scraper</title><link>https://avanster.tech/library/s1-threat-scraper/</link><pubDate>Sat, 10 Jan 2026 11:00:00 +0000</pubDate><guid>https://avanster.tech/library/s1-threat-scraper/</guid><description>&lt;p&gt;When a new 0-day vulnerability or a suspicious file hash is identified, waiting for a scheduled scan is not an option. This PowerShell tool utilizes the SentinelOne Management API to &amp;ldquo;scrape&amp;rdquo; the entire fleet for specific indicators of compromise (IOCs).&lt;/p&gt;
&lt;h3 id="1-the-workflow"&gt;1. The Workflow&lt;/h3&gt;
&lt;p&gt;The script performs the following steps:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Authentication:&lt;/strong&gt; Connects via API Token to the S1 Management Console.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Query:&lt;/strong&gt; Requests a list of all endpoints where a specific file hash or process has been detected in the last 24 hours.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Reporting:&lt;/strong&gt; Generates a CSV list of infected Hostnames, IP addresses, and the &amp;ldquo;Detection State&amp;rdquo; (Mitigated vs. Active).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="2-the-implementation"&gt;2. The Implementation&lt;/h3&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-powershell" data-lang="powershell"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# S1 API Configuration&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$ApiToken = &lt;span style="color:#e6db74"&gt;&amp;#34;YOUR_API_TOKEN&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$BaseUrl = &lt;span style="color:#e6db74"&gt;&amp;#34;[https://your-console.sentinelone.net/web/api/v2.1](https://your-console.sentinelone.net/web/api/v2.1)&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$Header = @{ &lt;span style="color:#e6db74"&gt;&amp;#34;Authorization&amp;#34;&lt;/span&gt; = &lt;span style="color:#e6db74"&gt;&amp;#34;Token &lt;/span&gt;$ApiToken&lt;span style="color:#e6db74"&gt;&amp;#34;&lt;/span&gt; }
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Define the Threat Hash to hunt for&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$TargetHash = &lt;span style="color:#e6db74"&gt;&amp;#34;e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Search for the hash across the site&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$Response = Invoke-RestMethod -Uri &lt;span style="color:#e6db74"&gt;&amp;#34;&lt;/span&gt;$BaseUrl&lt;span style="color:#e6db74"&gt;/threats?contentHashes=&lt;/span&gt;$TargetHash&lt;span style="color:#e6db74"&gt;&amp;#34;&lt;/span&gt; -Method Get -Headers $Header
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; ($Response.data) {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; Write-Host &lt;span style="color:#e6db74"&gt;&amp;#34;ALERT: Threat detected on &lt;/span&gt;$($Response.data.count)&lt;span style="color:#e6db74"&gt; endpoints!&amp;#34;&lt;/span&gt; -ForegroundColor Red
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; $Response.data | Select-Object computerName, lastActiveDate, threatName | Export-Csv -Path &lt;span style="color:#e6db74"&gt;&amp;#34;./ThreatReport.csv&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;} &lt;span style="color:#66d9ef"&gt;else&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; Write-Host &lt;span style="color:#e6db74"&gt;&amp;#34;Clear: No matches found for the target hash.&amp;#34;&lt;/span&gt; -ForegroundColor Green
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description></item></channel></rss>