Skip to main content

CollectorsCloud Collectors Administration Guide

Upgrade to the SentinelOne Cloud Collector

The SentinelOne Cloud Collector enables you to ingest logs that include Threats, Alerts, Exclusions, Activities, and Device Control Events from resources monitored by SentinelOne into the Exabeam Security Operations Platform.

Transitioning to the new SentinelOne Cloud collector provides you with access to the newly supported endpoints: Exclusions, Activities, and Device Control Events, simplifies configuration, and reduces monitoring efforts by offering unified insights into data ingestion volumes and errors in a single cloud collector. Additionally, the collector streamlines API token rotation that enhances operational efficiency.

If you previously used the SentinelOne Alerts or SentinelOne Threats Cloud Collector and want to take advantage of the latest SentinelOne Cloud Collector that collects logs from data sources Security Alerts, Threats, Exclusions, Activities, and Device Control Events, upgrading to the new Cloud Collector is recommended.

When you are ready to upgrade:

  1. Ensure that you completed all the prerequisites for configuring the SentinelOne Cloud Collector.

  2. Configure a new SentinelOne Cloud Collector by following the configuration steps.

  3. Ensure that the newly configured collector is collecting data by observing the volume graph for specific threats or alerts endpoints. Then, stop the specific old instances of the Sentinel One Alerts or Sentinel One Threats Cloud Collector.

    Creating a new cloud collector first and then stopping the old instances in this case helps you to avoid data loss that might occur during the transition.