Back to Resources

Level Verified

Sentinel One (S1) Monitoring Policy

Created by

Level

Type

Monitor

Category

Software

Platforms
WindowsApple iOSLinux

Problem Overview

IT teams often discover too late that critical SentinelOne services have stopped running, leaving endpoints vulnerable. This Monitor addresses that gap by keeping a constant watch on all relevant SentinelOne services across Windows, macOS, and Linux. It flags any downtime, attempts an immediate restart, and ensures uninterrupted security coverage for your clients.

Description

This Monitor continuously checks the status of SentinelOne services on endpoints tagged with “S1.” If a service is found to be inactive, the Monitor creates a critical alert and automatically tries to restart it. Should the service recover successfully, the alert auto-resolves—minimizing manual work and ensuring all operating systems remain secure. By providing comprehensive oversight of SentinelOne, this policy enables MSPs and IT professionals to respond faster to threats and maintain reliable endpoint protection.

Preview

Sentinel One Monitoring Policy

Use Cases

  • Multi-OS Protection: Maintain downtime-free SentinelOne services across Windows, macOS, and Linux.
  • Proactive Auto-Remediation: Detect and restart stopped services in real time to prevent security lapses.
  • Reduced Manual Intervention: Automatically resolve alerts once a service is successfully restarted.
  • Compliance & Regulatory: Offer consistent endpoint protection that meets industry regulations.
  • Scalable Monitoring: Monitor numerous remote endpoints without adding overhead to your team’s workload.

Recommendations

  • Validate Compatibility: Ensure your SentinelOne agents and services are supported on Windows, macOS, and Linux endpoints before deploying.
  • Pilot First: Test the policy on a small batch of devices to confirm it restarts services correctly and auto-resolves alerts.
  • Tagging Strategy: Standardize the “S1” tag to guarantee coverage for all relevant endpoints.
  • Review Logs: Regularly monitor service logs and resolved alerts to identify any recurring issues or conflicts.
  • Stay Updated: Keep the Monitor’s policy settings and SentinelOne installer in sync with the latest security patches and best practices.

FAQ

  • What if the service fails to restart?
    Check system event logs for conflicting processes or error messages. If you see repeated failures, consult SentinelOne documentation or your organization’s runbooks for further troubleshooting steps.
  • Will this Monitor conflict with other security tools?
    Typically, no. However, it’s good practice to review policy logs to detect any potential overlap or interference with other security software.
  • Does the Monitor support older OS versions?
    Generally, yes—provided SentinelOne services are supported. Verify compatibility with any legacy operating systems in your environment.
  • Can alert settings be customized?
    Absolutely. Within Level’s platform, you can configure thresholds, notification preferences, and severity levels to match your operational standards.
  • How does the alert auto-resolve?
    Once a stopped SentinelOne service successfully restarts, the Monitor closes out the associated alert, ensuring your queue remains clear of resolved issues.

Included with this Monitor:

Below is a list of what you can expect to find when importing this Monitor.

Script details:

The following data and settings will be imported with your script.

Monitors

  • Service Monitor

Tags

  • S1
Import into Level

Related resources

Explore more automations, scripts, and policies to further enhance your IT operations.

View all resources