Skip to main content
Versa Networks

Configure Endpoint Detection and Response

Versa-logo-release-icon.pngFor supported software information, click here.

Endpoint detection and response (EDR) is a cybersecurity technology that monitors and responds to threats coming from endpoint devices such as laptops, mobile phones, and internet-of-things (IoT) devices. EDR primarily detects advanced threats that can evade front-line defenses and successfully enter the network environment. By collecting and aggregating data from endpoints and other sources, EDR can identify suspicious behavior and alert administrators to eliminate the threat before it can spread.

Concerto integrates with the following EDR vendors:

  • CrowdStrike
  • Microsoft Defender
  • SentinelOne

Note: Before configuring EDR on Concerto, you must create an account with the EDR vendor and configure the EDR service to integrate with Concerto.

Configure EDR

To configure EDR on Concerto:

Note: If you reached this page by clicking + Configure EDR in the Configure Unified Entity Risk Profiles in Concerto article, skip to Configure Crowdstrike

  1. From the Tenant home page, click Configure in the left menu bar.
  2. Select Security Service Edge > Partner Integration > Endpoint Detection & Response.

    Note that for Releases 12.1.1 and earlier, the Partner Integration Profile folder is located at Configure > Security Service Edge > Settings.

    EDR-left-nav-border-v3-border.png

Configure Crowdstrike

When you select Partner Integration > Endpoint Detection and Response in the left navigation menu, the following screen displays with the CrowdStrike tab selected by default.

EDR-CloudStrike-v2-full-border.png

  1. To configure Crowdstrike, enter information for the following fields.
     
    Field Description
    Disabled Click the slider to enable Crowdstrike. The default is Disabled. 
    Client ID Enter the client ID that was generated by Crowdstrike.
    Tenant ID Enter the tenant ID that was generated by Crowdstrike.
    Client Secret Enter the client secret that was generated by Crowdstrike.
    Cloud Region Enter the region of the CrowdStrike instance. 
    Poll Interval

    Enter the time, in minutes, between polling actions.

    Range: 10 through 1440 seconds

    Default: None

  2. Click Save.

Configure Microsoft Defender

To configure Microsoft Defender:

  1. Click the Microsoft Defender tab, then enter information for the following fields.

    EDR-Microsoft-Defender-v2-full-border.png
     
    Field Description
    Disabled Click the slider to enable Microsoft Defender. The default is Disabled. 
    Client ID Enter the client ID that was generated by Microsoft Defender
    Tenant ID Enter the tenant ID that was generated by Microsoft Defender.
    Client Secret Enter the client secret that was generated by Microsoft Defender.
    Poll Interval

    Enter the time, in minutes, between polling actions.

    Range: 10 through 1440 seconds

    Default: None

  2. Click Save.

Configure SentinelOne

To configure SentinelOne:

  1. Click the SentinelOne tab, then enter information for the following fields.

    SentinelOne-border.png
     
    Field Description
    Disabled Click the slider bar to enable SentinelOne.
    Account ID (Required) Enter the account ID.
    Connector URL (Required) Enter the URL of the SentinelOne instance.
    Poll Interval (Required)

    Enter the interval between polling events, in minutes.

    Range: 10 through 1440

    Default: 10

    Admin Email (Required) Enter the email of the SentinelOne administrator.
    API Key (Required) Enter the API key value.

    You can configure additional parameters by clicking Advanced Settings. You can assign weights in percentages for the following parameters:
    1. Critical Risk Indicators
    2. Operational Health Indicators
    3. Risk Bands

      Note: The cumulative weight total for the following parameters must not exceed 100%.
       
  2. Select the Critical Risk Indicators tab, then enter information for the following fields. Note: You can click the eye-icon-blue-on-white.png Example Scores icon to view the following example scores:
     
    1. Low risk—Lean device, all protections active, approximately → ~19
    2. Suspicious—Learning mode, firewall off, stale check-in approximately → ~64
    3. High risk—Active infection, detection disabled, fully degraded approximately → ~99

      SentinelOne-critical-risk-indicators-v2-border.png
       
      Field Description
      Critical Risk Indicators Click the slider bar to enable the Critical Risk Indicators.
      Critical Risk Weight

      Enter the total weight of the Critical Risk Indicators, as a percentage.

      Range: 0 through 100 percent

      Default: 50 percent

      Active Threats (Group of Fields) Enter the weight to give to active threats that are detected, as a percentage.
      • No Threats

      Enter the weight to give when no active threats are detected.

      Range: 0 through 100 percent

      Default: 0 percent

      • One-to-Two

      Enter the weight to give when one-to-two active threats are detected.

      Range: 0 through 100 percent

      Default: 60 percent

      • Three to Five

      Enter the weight to give when three-to-five active threats are detected.

      Range: 0 through 100 percent

      Default: 80 percent

      • Greater than Five

      Enter the weight to give when greater than five active threats are detected.

      Range: 0 through 100 percent

      Default: 100 percent

      Detection State (Group of Fields) Enter the weight to give to the detection state, as a percentage.
      • Full Mode

      Enter the weight to give to Full mode, which detects malicious activity and immediately acts to remediate the activity.

      Range: 0 through 100 percent

      Default: 0 percent

      • Learning Mode

      Enter the weight to give to Learning mode, which monitors for threats and gathers data without taking any action.

      Range: 0 through 100 percent

      Default: 60 percent

      Mitigation Mode  Mitigation mode is an active, automated security posture in which the SentinelOne agent automatically remediates, quarantines, or kills malicious threats and processes in real-time.
      • Protect

      Enter the weight to give to Protect mode, which automates the response to malicious activity and remediates, quarantines, or kills malicious threats and processes in real-time.

      Range: 0 through 100 percent

      Default: 0 percent

      • Detect

      Enter the weight to give to Detect mode, which sends alerts on threats but does not take automatic action.

      Range: 0 through 100 percent

      Default: 90 percent

      Mitigation Mode—Suspicious  
      • Protect

      Enter the weight for Protect mode, which automates the response to suspicious activity and remediates, quarantines, or kills suspicious threats and processes in real-time.

      Range: 0 through 100 percent

      Default: 60 percent

      • Detect

      Enter the weight for Detect mode for suspicious traffic, which sends alerts on suspicious threats but does not take automatic action.

      Range: 0 through 100 percent

      Default: 90 percent

  3. Click the Operational Health Indicators tab, then enter information for the following fields.


    SentinelOne-operational-health-indicators-v2-full-border.png

    Field Description
    Configure Operational Health Indicators Click the toggle to enable operational health indicators.
    Operational Health Weight

    Enter the total weight of the operational health of a device, as a percentage.

    Note: If you configure both Critical Risk Indicators and Operational Health, Critical Risk Weight and Operational Health Rate must add up to a total of 100%. 

    Range: 0 through 100 percent

    Default: 20 percent

    Firewall (Group of Fields)  
    • Active
    Enter the weight for devices with an active firewall, as a percentage.

    Range: 0 through 100 percent

    Default: 0 percent

    • Inactive

    Enter the weight for devices with an inactive firewall, as a percentage.
    Range: 0 through 100 percent

    Default: 100 percent

    Last Active Date (Group of Fields)  
    • Less than 1 Day

    Enter the weight for devices that have been active for less than one day, as a percentage.

    Range: 0 through 100 percent

    Default: 20 percent

    • 1 to 3 Days

    Enter the weight for devices that have been active for one to three days, as a percentage.

    Range: 0 through 100 percent

    Default: 40 percent

    • 4 to 7 Days

    Enter the weight for devices that have been active for four to seven days, as a percentage.

    Range: 0 through 100 percent

    Default: 60 percent

    • 8 to 14 Days

    Enter the weight for devices that have been active for eight to fourteen days, as a percentage.

    Range: 0 through 100 percent

    Default: 80 percent

    • Greater than 14 Days

    Enter the weight for devices that have been active for greater than fourteen days, as a percentage.

    Range: 0 through 100 percent

    Default: 100 percent

    User Actions Needed (Group of Fields)  
    • 1 Action

    Enter the weight for devices that require one user action, as a percentage.

    Range: 0 through 100 percent

    Default: 40 percent

    • 2-3 Actions

    Enter the weight for devices that require 2-3 user actions, as a percentage.

    Range: 0 through 100 percent

    Default: 60 percent

    • Greater than 3 Actions

    Enter the weight for devices that require more than 3 user actions, as a percentage.

    Range: 0 through 100 percent

    Default: 80 percent

    Missing Permissions (Group of Fields)  
    • None

    Enter the weight for devices that do not have missing permissions, as a percentage.

    Range: 0 through 100 percent

    Default: 0 percent

    • One Permission

    Enter the weight for devices that are missing one permission, as a percentage.

    Range: 0 through 100 percent

    Default: 60 percent

    • Two to Three Permissions

    Enter the weight for devices that are missing two-to-three permissions, as a percentage.

    Range: 0 through 100 percent

    Default: 80 percent

    • More than Three Permissions

    Enter the weight for devices that are missing more than three permissions, as a percentage.

    Range: 0 through 100 percent

    Default: 100 percent

  4. Select the Risk Band tab, and then enter information for the following fields.

    Note: The allowed range for any band is 0 to 100. There is no requirement that a risk band must be limited to a specific range, such as 0 to 20 or 21 to 40. The only restriction is that the ranges for different bands must not overlap. For example, a configuration in which Trustworthy is set to 0 to 40 and Low Risk is set to 30 to 50 would not be valid because the ranges overlap each other.

    SentinelOne-risk-band-v2-full-border.png
     
    Field Description
    Trustworthy

    Enter the lower and upper range for the Trustworthy risk band.

    Range: 0 through 100

    Default: 0 through 20

    Low Risk

    Enter the lower and upper range for the Low Risk risk band.

    Range: 0 through 100

    Default: 21 through 40

    Moderate Risk

    Enter the lower and upper range for the Moderate Risk risk band.

    Range: 0 through 100

    Default: 41 through 60

    Suspicious

    Enter the lower and upper range for the Suspicious risk band.

    Range: 0 through 100

    Default: 61 through 80

    High Risk

    Enter the lower and upper range for the High Risk risk band.

    Range: 0 through 100

    Default: 81 through 100

  5. Click Save.

Software Release Information

Releases 12.2.1 and later support all content described in this article, except:

  • Releases 13.1.1 and later support SentinelOne integration with Concerto.