Skip to main content
All CollectionsSentinelOne & Guardz
Auto-Association of SentinelOne Endpoints to Users

Auto-Association of SentinelOne Endpoints to Users

Updated over a month ago

This article is based on SentinelOne community documentation about LDAP and Entra for the purpose of identifying user accounts.

πŸš€ Enhanced Guide:

πŸ”Ή Introduction

This guide explains how Guardz automatically maps SentinelOne (S1) endpoints to users using LDAP and Entra ID (formerly Azure AD).

βœ… Why is this important?

  • Connect threats to users πŸ›‘οΈ – Helps link SentinelOne detections to end users.

  • Improved investigation & response πŸ” – Provides context to security events, making incident response faster and more efficient.

  • Actionable remediation ⚑ – Ensures issues are addressed by the right people in your organization.

This feature is compatible with both Guardz Managed SentinelOne (S1) and BYO-S1 (Bring Your Own SentinelOne).


πŸ”Ή How It Works

The Auto Association feature in Guardz maps SentinelOne endpoint data to known users in your organization profile (from Microsoft 365 & Google Workspace).

πŸ› οΈ Data Sources

Guardz relies on SentinelOne’s ability to retrieve user login information from:
1️⃣ LDAP / Active Directory (AD) – No additional setup is required in Guardz.
2️⃣ Entra ID (Azure AD) – Requires specific permissions & conditions to function properly.

Once SentinelOne retrieves the logged-in user information, Guardz automatically assigns the endpoint to the correct user in your organization.


πŸ“Œ Requirements & Setup

πŸ”Ή LDAP / Active Directory (AD) Integration

βœ… Fully automated – No setup is required in Guardz.
βœ… SentinelOne will pull user data automatically if AD integration is enabled in your environment.
βœ… No configuration of an AD server is needed within Guardz.


πŸ’‘ Note: Guardz does not provide technical support for LDAP-specific issues within SentinelOne.


πŸ”Ή Entra ID (Azure AD) Integration

⚠ Entra ID auto-association requires additional conditions to function correctly.

βœ… SentinelOne Agent Version – The S1 agent must be v23.4.5 or later.
βœ… Entra Graph API Access – Logins must not be throttled, blocked, or restricted by Microsoft security policies.
βœ… User Login Method – Users must log in individually to their endpoints using M365 credentials (SSO).


πŸ’‘ Common Issues & Fixes:
​
🚨 Issue: "User mapping failed for Entra ID"
πŸ”§ Fix: Check Microsoft Entra policies that might block API access (e.g., rate limits or conditional access policies).


🚨 Issue: "SentinelOne agent not updating user association"
πŸ”§ Fix: Ensure the SentinelOne agent is up-to-date (v23.4.5+ required).


πŸ“Œ How Does SentinelOne Update User Data?

SentinelOne updates Active Directory (AD) and Entra ID (Azure AD) at regular intervals based on:

1️⃣ Agent Startup – The SentinelOne agent loads on an endpoint.
2️⃣ User Login / Logout – When a user logs in or logs out of a device.
3️⃣ Periodic Refresh – The agent updates every 180 minutes (3 hours).


⏳ Important Note: Guardz only maps each user once. Subsequent changes to user data are NOT automatically updated.


πŸš€ Need to update user info manually?

  • Manually assigned users will NOT be overwritten by Auto Association.

  • To change a user’s mapping, remove the existing manual assignment first.


πŸ“Œ Troubleshooting Auto-Association Issues

πŸ”Ή Issue: "User not found" in Guardz
βœ… Ensure the user exists in the organization profile in Guardz (via M365 or Google Workspace sync).


πŸ”Ή Issue: "SentinelOne agent does not report the user"
βœ… Check that the device is properly joined to the domain.
βœ… Ensure AD or Entra ID integration is active in SentinelOne.


πŸ”Ή Issue: "User mapped incorrectly"
βœ… If manually assigned, Auto Association will not override manual mappings.
βœ… If incorrect, manually remove the user assignment and let the auto-mapping refresh in the next update cycle.


πŸ”Ή Issue: "Multiple users logged into the same device"
βœ… Auto Association maps only the primary user login session. Shared devices may not have consistent user assignments.


πŸ“Œ Best Practices & Security Considerations

βœ” Keep SentinelOne updated – Use S1 Agent v23.4.5 or newer to ensure Entra ID compatibility.
βœ” Review Microsoft Entra policies – Avoid security restrictions that block API logins.
βœ” Monitor mapped users in Guardz – Regularly check for accuracy and update manual assignments if needed.
βœ” Use Manual Overrides for Shared Devices – If devices are shared across multiple users, manually assign users when needed.


πŸš€ Stay secure, stay protected! Guardz makes SentinelOne endpoint management easier than ever. πŸ”

Did this answer your question?