About Endpoint Detection and Response with SentinelOne
LogMeIn Resolve can be integrated with SentinelOne's Endpoint Detection and Response (EDR) solution to enhance your security, simplify threat management, and boost operational efficiency.
It identifies and monitors threats such as viruses, malware, and ransomware on your remote devices, or endpoints, and facilitates immediate remedial actions, such as isolating devices on your network. EDR also evaluates threat behavior over time, recognizing abnormalities and potential security breaches. The system provides comprehensive logs on managing identified threats, enabling root cause analysis.
As a LogMeIn Resolve agent, it only takes a few clicks to turn your remote devices into EDR devices. All you have to do is deploy the latest SentinelOne agent directly from LogMeIn Resolve on devices that, in turn, start communicating with your SentinelOne account.
Integrate SentinelOne to LogMeIn Resolve
Before you can retrieve endpoint detection results from SentinelOne, you need to link your SentinelOne and LogMeIn Resolve accounts.
Results: You are taken to the Console.
page in theView a device's EDR details and threats
The Console provides an overview of all your detected threats and allows you to drill down to the details of how those were discovered and mitigated.
Information on the EDR threats page is collected from your SentinelOne account. This page provides a quick overview of your EDR threats and lists all threats on your devices.
Getting an overview
- Mitigation status: Shows the number of resolved and active threats, as well as Benign issues that do not require your attention.
- Severity status: Displays the number of threats based on their severity.
- Threats by type: Displays the number of threats based on their type or class.

Listing threats
- Threat details: The name of the threat, usually a file on a remote device or a Windows service. It often includes the threat's classification.
- Severity: The urgency level to address a threat, ranging from Low to Critical.
- Confidence level: Indicates how certain SentinelOne is about the detected activity or alert being genuinely Malicious. Threats with low confidence are labeled as Suspicious.
- Mitigation status: Displays whether the threat has been removed from the device.
- Endpoint: The name of the affected device. Select its name to view the device's protection status on the Device EDR insights page.
Note: The endpoint may not be managed in LogMeIn Resolve, but it is protected by SentinelOne.
- Detected: Date and time when the threat was reported on the device.
- Alert status: Displays whether the threat alert is New or Resolved.
- Analytics verdict: Shows the threat's identification category based on SentinelOne's analysis. Common categories include the following:
- True positive: A threat has been identified, and appropriate actions have been taken to reduce risks.
- False positive: The system incorrectly marked a file or activity as a threat.
- Undefined: The system could not classify the threat and no actions were taken to remove it from the device.
- Assignee: The agent responsible for handling the threat.
- Classification: The type of threat on the device. Here are the most common types:
- Malware: Software meant to harm or gain unauthorized access to a device.
- Ransomware: Software that encrypts data on a device, making it inaccessible without paying a "ransom".
- Trojan: Software that can steal passwords, record keystrokes, or harm files.
- PUA: A potentially unwanted application that can slow down a device, show unexpected ads, or install unwanted software.
- Worm: Malware that can replicate itself and spread through a network by exploiting security weaknesses.
For more details on threat types, visit SentinelOne's website.
Filter threats
You can filter threats by date or a specific attribute. By default, you can view threats from the last three months. To change the timeframe, choose a period from the Select time drop-down list in the top right.
To filter by an attribute, select Add filters above the list of threats and choose the appropriate values from the side panel on the right. Then select Apply filters to update the threats list.
View device details
Device details are shown on the following tabs:
- EDR overview tab
-
Displays general device information in these sections:
- Asset properties: Provides hardware and network information on the device.
- Other properties: Lists OS type and other device specifics.
- EDR alerts tab
-
Lists threats on a specific device. You can sort and filter threats using the drop-down lists at the top of the page. Select a threat name to see its details on the Threat details page.
- EDR health tab
-
Displays device health information in these sections:
- Health Indicators: Provides antivirus health details of the device.
- Agent Properties: Displays SentinelOne agent details, such as version.
View threat details
On the
page, select a threat in the Threat details column to open the Threat name page.The Threat overview panel on the left displays the severity, classification, mitigation status, and date of the reported threat. It also lists mitigation actions taken to eliminate the threat.
Detailed threat information is displayed on the right in these tabs:
- Properties tab
-
Displays basic threat properties in the following sections:
- File Properties: Name, size, and publisher of the infected file.
- Detection Details: Information on how and when the threat was discovered.
- Target Asset: Details of the infected device.
- Indicators tab
- Displays the reasons for flagging a file or service as a threat.
- History tab
- Displays the detailed mitigation history of the threat.
View the EDR protection status of your devices
Deploy the SentinelOne agent on your LogMeIn Resolve devices
Before you can view and manage a LogMeIn Resolve device's EDR threats in the LogMeIn Resolve Console, you must deploy the SentinelOne agent. This makes the device available in your SentinelOne account as well as in LogMeIn Resolve.
Mitigate EDR threats
Agents can reduce EDR threats without going to the SentinelOne console.
Frequently Asked Questions
- I have added a new category in SentinelOne. Why can't I see it in LogMeIn Resolve?
- Any attribute that you add in SentinelOne is automatically synchronized with LogMeIn Resolve. If you don't see a particular attribute, such as a new threat category, refresh the page by selecting Reload the page in the top right.
- How does LogMeIn Resolve categorize threats?
- LogMeIn Resolve only reads information from SentinelOne. Threat categories, and essentially all other data, are defined by SentinelOne.
- How do I mitigate EDR threats in LogMeIn Resolve?
- In LogMeIn Resolve, you can manage EDR threats on the page. Select a threat and then take the necessary action as described in Mitigate EDR threats.
- Can I install the SentinelOne agent on a device from LogMeIn Resolve?
- Yes, you can install the agent on Windows devices. See Deploy the SentinelOne agent on your LogMeIn Resolve devices.