The Engine settings shows the various detection engines that scan and inspect activity.
Engine settings can be found under Security Policies-> Threat Protection-> Open Respective Policy-> Engine Settings
Pre-Execution Engine
The SentinelOne agent leverages static AI and reputation engines to monitor files as they are written to disk.
Capture ATP Engine
Capture ATP Auto-Mitigation when enabled along with the DFI-Suspicious Engine allows detection of a potential threat, reports it and sends it to Capture ATP for further analysis. Based on policy settings, the verdict from Capture ATP can trigger automatic mitigation actions like "Kill & Quarantine" or "Mark as Threat"
On-Execution Engine
Monitor behavior and detect malicious activity when a process initiates.
The SentinelOne agent leverages behavioral AI engines to monitor behavior on the endpoint. When the SentinelOne agent is installed, the endpoints must be rebooted to enable the behavioral engines.
