This article is based on SentinelOne community documentation about LDAP and Entra for the purpose of identifying user accounts.
π Enhanced Guide:
πΉ Introduction
This guide explains how Guardz automatically maps SentinelOne (S1) endpoints to users using LDAP and Entra ID (formerly Azure AD).
β Why is this important?
Connect threats to users π‘οΈ β Helps link SentinelOne detections to end users.
Improved investigation & response π β Provides context to security events, making incident response faster and more efficient.
Actionable remediation β‘ β Ensures issues are addressed by the right people in your organization.
This feature is compatible with both Guardz Managed SentinelOne (S1) and BYO-S1 (Bring Your Own SentinelOne).
πΉ How It Works
The Auto Association feature in Guardz maps SentinelOne endpoint data to known users in your organization profile (from Microsoft 365 & Google Workspace).
π οΈ Data Sources
Guardz relies on SentinelOneβs ability to retrieve user login information from:
1οΈβ£ LDAP / Active Directory (AD) β No additional setup is required in Guardz.
2οΈβ£ Entra ID (Azure AD) β Requires specific permissions & conditions to function properly.
Once SentinelOne retrieves the logged-in user information, Guardz automatically assigns the endpoint to the correct user in your organization.
π Requirements & Setup
πΉ LDAP / Active Directory (AD) Integration
β
Fully automated β No setup is required in Guardz.
β
SentinelOne will pull user data automatically if AD integration is enabled in your environment.
β
No configuration of an AD server is needed within Guardz.
π‘ Note: Guardz does not provide technical support for LDAP-specific issues within SentinelOne.
πΉ Entra ID (Azure AD) Integration
β Entra ID auto-association requires additional conditions to function correctly.
β
SentinelOne Agent Version β The S1 agent must be v23.4.5 or later.
β
Entra Graph API Access β Logins must not be throttled, blocked, or restricted by Microsoft security policies.
β
User Login Method β Users must log in individually to their endpoints using M365 credentials (SSO).
π‘ Common Issues & Fixes:
β
π¨ Issue: "User mapping failed for Entra ID"
π§ Fix: Check Microsoft Entra policies that might block API access (e.g., rate limits or conditional access policies).
π¨ Issue: "SentinelOne agent not updating user association"
π§ Fix: Ensure the SentinelOne agent is up-to-date (v23.4.5+ required).
π How Does SentinelOne Update User Data?
SentinelOne updates Active Directory (AD) and Entra ID (Azure AD) at regular intervals based on:
1οΈβ£ Agent Startup β The SentinelOne agent loads on an endpoint.
2οΈβ£ User Login / Logout β When a user logs in or logs out of a device.
3οΈβ£ Periodic Refresh β The agent updates every 180 minutes (3 hours).
β³ Important Note: Guardz only maps each user once. Subsequent changes to user data are NOT automatically updated.
π Need to update user info manually?
Manually assigned users will NOT be overwritten by Auto Association.
To change a userβs mapping, remove the existing manual assignment first.
π Troubleshooting Auto-Association Issues
πΉ Issue: "User not found" in Guardz
β
Ensure the user exists in the organization profile in Guardz (via M365 or Google Workspace sync).
πΉ Issue: "SentinelOne agent does not report the user"
β
Check that the device is properly joined to the domain.
β
Ensure AD or Entra ID integration is active in SentinelOne.
πΉ Issue: "User mapped incorrectly"
β
If manually assigned, Auto Association will not override manual mappings.
β
If incorrect, manually remove the user assignment and let the auto-mapping refresh in the next update cycle.
πΉ Issue: "Multiple users logged into the same device"
β
Auto Association maps only the primary user login session. Shared devices may not have consistent user assignments.
π Best Practices & Security Considerations
β Keep SentinelOne updated β Use S1 Agent v23.4.5 or newer to ensure Entra ID compatibility.
β Review Microsoft Entra policies β Avoid security restrictions that block API logins.
β Monitor mapped users in Guardz β Regularly check for accuracy and update manual assignments if needed.
β Use Manual Overrides for Shared Devices β If devices are shared across multiple users, manually assign users when needed.
π Stay secure, stay protected! Guardz makes SentinelOne endpoint management easier than ever. π