0% found this document useful (0 votes)
21 views10 pages

Using The Storyline Process Graph

The document provides an overview of the Storyline process graph used in SentinelOne for optimizing threat investigations and proactive threat hunting. It describes the components of the graph, including process connections, event timelines, and behavioral indicators, and explains how to interact with the graph for detailed analysis. Additionally, it outlines the functionalities available for viewing and sharing the graph, as well as accessing related event data.

Uploaded by

churchbus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views10 pages

Using The Storyline Process Graph

The document provides an overview of the Storyline process graph used in SentinelOne for optimizing threat investigations and proactive threat hunting. It describes the components of the graph, including process connections, event timelines, and behavioral indicators, and explains how to interact with the graph for detailed analysis. Additionally, it outlines the functionalities available for viewing and sharing the graph, as well as accessing related event data.

Uploaded by

churchbus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Using the Storyline process graph https://community.sentinelone.

com/s/article/000006310

Home (/s/) Knowledge Base (/s/knowledge-base) Support Groups (/s/group/CollaborationGroup/00Bw0000006x�JEAQ)

SEARCH SENTINELONE

Search...

All Categories (/s/knowledge-base)


Getting Started
> Singularity Endpoint Security (/s/topic/0TOTc0000000NHZOA2)

Release Notes & Requirements > Event Collection And Analysis (/s/topic/0TOUW0000005wUn4AI)
> Using the Storyline process graph (/s/article/000006310)
Setting Up The Management Console

Working With The Management Console Article Detail (?tabse… Attachments (?tabset…

Working With The Agent

Singularity Endpoint Security Using the Storyline process graph


Policies & Modules Last Updated: Jan 22, 2025

Event Collection And Analysis

Threat Detection
Objective: Optimize threat investigations and proactive threat hunting
with the Storyline process graph.
Reports

Legacy Deep Visibility


Storyline™ is a sequence of related processes and events that are
correlated intelligently by the SentinelOne Agent. Each Storyline™ has a
Singularity Mobile Security
unique ID that shows in Event Search results and in threat or alerts
Uni�ed EDR And Identity Security details, and can be used to �nd related events in the Storyline™.

Singularity Exposure Management The details of the Storyline™ also show graphically in the Storyline™
process graph.
Singularity Cloud Security
The process graph has these sections: A graph of the process Storyline™
Singularity Data Lake (SDL) or OS View, a card with details about the selected process on the graph,
layer selection for the graph, a timeline of the Storyline™, and process-
Purple AI related events and behavioral indicators.

In the Singularity™ Operations Center, this is called the Storyline™


Singularity Identity Security
Report from version S-24.3.5.

Singularity Threat Services

Singularity Marketplace

Singularity Hyperautomation

Support & Professional Services

1 of 10 7/23/25, 21:36
Using the Storyline process graph https://community.sentinelone.com/s/article/000006310

Getting Started

Release Notes & Requirements

Setting Up The Management Console

Working With The Management Console

Working With The Agent

Singularity Endpoint Security

Policies & Modules

Event Collection And Analysis

Threat Detection

Reports • Process Graph (1) - A visual representation of the primary


process connections to other processes, either from the
Legacy Deep Visibility
perspective of the Storyline™, the OS, or both. This includes
Singularity Mobile Security
special connections between different processes on the graph,
Uni�ed EDR And Identity Security like cross-process activity. Use the layers to select the
information that shows and click the plus signs to see more
Singularity Exposure Management
parents and children.

Singularity Cloud Security


• Process Card/ Layers (2) - Switch between a process card that

Singularity Data Lake (SDL) shows details for the selected node and layer selection for the
graph.
Purple AI

Singularity Identity Security

Singularity Threat Services

Singularity Marketplace • Timeline (3) - Shows events related to the Storyline™ of the
primary node, organized by time.
Singularity Hyperautomation

• Event Count and Event Table (4) - Shows a detailed list of the
Support & Professional Services
events that the primary node caused. In Event Count, the
information is organized by the event type with the count of each
type. In Event Table, see the events in the table format of the
Deep Visibility™ query results, with all Actions, Export, and table
options from Deep Visibility™ available.

• Indicators (5) - Shows the behavioral indicators related to the


primary node, with a link to the MITRE technique.

To open the Storyline™ Report:

• In the query results, if a process has a graph available, the name


of the process shows with a hyperlink. Click a link to open the
Process Graph in a new tab.

Using the Process Graph

In the graph, open and close nodes, select the view, add layers, hover or
click a node for counts and details, zoom in and out, and send the graph

2 of 10 7/23/25, 21:36
Using the Storyline process graph https://community.sentinelone.com/s/article/000006310

to others to accelerate your threat investigation and threat hunting.

Each node represents a process. The primary node is the process you
clicked on to open the graph. The selected node gets a purple border
when you click on it.

• Open the legend to better understand the graph.

• See the process name and icons that represent which activities
the process did. Hover over the icons to see the counts of events.

• Click the plus sign on the right to open the children of a node, and
the plus sign on the left to open its parents.

• Select Full Graph, Storyline View, or OS View to see the chain of


events based on the Storyline™, based on what the endpoint OS
reports, or both.

See Storyline Source vs. OS Source in Deep Visibility™ (https://


community.sentinelone.com/s/article/000006217) for more
information.

• Open the Layers and select options to re�ne what you see in the

3 of 10 7/23/25, 21:36
Using the Storyline process graph https://community.sentinelone.com/s/article/000006310

graph:

◦ Select Cross Process to see when a process injects or


otherwise interacts with a different process. Cross process
activity traces threat execution from its original source to
actions that seem to come from legitimate processes. It
gives more context around processes and their
connections.

◦ In Behavioral Indicator Categories, select which


behavioral indicators to show in the graph. Click Select All
to show all of them.

◦ Click Restore to default to go back to the original graph,


with no cross process activity or behavioral indicators
shown. Click Clear to remove the Behavioral Indicator
selections.

• Cross-process activity shows as an arrow. The number next to the


arrow is the number of different types of cross process activity
between the nodes. Hover over the number to see the types.
Storyline connections show in the graph with a straight line. OS
connections show with dotted lines. When you select Behavioral
Indicators in the Layers, they show on the node where they

occurred as . Hover over a behavioral indicator or node to

4 of 10 7/23/25, 21:36
Using the Storyline process graph https://community.sentinelone.com/s/article/000006310

see details.

• When a link icon shows, it means the connection is based on the


SentinelOne Storyline™ and it is different than the connection
reported by the endpoint OS.

Tip: In some scenarios, the SentinelOne Storyline™ connection is


because of cross-process activity. If you select Cross Process in
the Layers, you can see activity between processes that gives
more context around processes and their connections.

For example, in the graph below, when Cross Process is selected,


we see two events of cross process activity sent by
radDB8D5.tmp.exe to OneDrive.exe . This means that
activity from OneDrive.exe to cmd,exe , was caused by
radDB8D5.tmp.exe , which sent commands to
OneDrive.exe .

Without Cross Process With Cross Process selected

• When you click a node, see detailed information about the


process itself and a detailed count of its activities.

To pivot to a graph for the selected node, click the process name.
A new graph opens for the process in a new browser tab.

5 of 10 7/23/25, 21:36
Using the Storyline process graph https://community.sentinelone.com/s/article/000006310

• Processes that have the same parent and name, and do not have
their own children, are combined as one aggregated node for
clearer visibility. You can click the plus sign to show each process
individually (ten items open for each click).

If the aggregated process is malicious, it shows in red.

• To change your view of the graph:

◦ Drag the graph to a different part of your screen. For


example, drag it up to see the bottom of the graph.

◦ Change the graph size.

◦ Open the graph in Full Screen mode.

• To share the graph:

◦ Export - Get the graph as a PNG �le.

◦ Share - Get a URL to send to other users who have


permission to see it.

6 of 10 7/23/25, 21:36
Using the Storyline process graph https://community.sentinelone.com/s/article/000006310

Using the Timeline

The timeline shows events related to the primary process and its
Storyline™, organized by time. When you select a node in the process
graph, the process creation event of that node is highlighted in the
timeline. The timeline does not use the selected process graph layers.

• Click a point in the timeline to see aggregated events for that


time.

• Open the legend in the timeline to see how events are shown.
Behavioral indicators, cross-process events, and threat
intelligence events are all included in the timeline.

• As in the process graph, red nodes are malicious and the primary
node that was selected originally is purple.

• To expand a speci�c time period in the timeline, click in the


timeline and a cross pointer shows. Drag it over the time period in
the timeline. The timeline will update to show only that time
period.

• Click the calendar next to the legend to open a calendar. Select a


date, enter the exact time, and click Apply.

7 of 10 7/23/25, 21:36
Using the Storyline process graph https://community.sentinelone.com/s/article/000006310

• To go back to the �rst timeline on the process graph, click Reset


Timeline Zoom. Reset Timeline Zoom only shows if you changed
the timeline.

Using the Event Count and Event Table

In Event Count, see a detailed list of the events that the selected node
caused. The information is organized by the event type, with the count
of each type.

• Click the event type to open the list of distinct �les or activities.

• Click Open in Deep Visibility™ to open a query for the process


and event type in a new browser tab. This same view with the
same actions available is in the Event Table, but is smaller there.

• You can search in the distinct values.

8 of 10 7/23/25, 21:36
Using the Storyline process graph https://community.sentinelone.com/s/article/000006310

In Event Table, see a detailed list of the events that the selected node
caused in the format of the Deep Visibility™ query results.

• Use the tabs to select All Events or a speci�c event type.

• Expand the rows.

• Select an event and run Actions on it: Fetch Logs, Disconnect


from Network, Mark as Threat, Mark as Suspicious, Add to
Blocklist, and Run Script (when RSO is available in the Console).

• Click Export to export the data to a CSV �le.

• Click a detail to pivot on it and open a new query in a new


browser tab.

Was this ar�cle helpful? Yes No

Related Articles

Storyline in Deep Visibility


(/s/article/000006216)

Hunter Chrome extension for Deep Visibility™


(/s/article/000006296)

9 of 10 7/23/25, 21:36
Using the Storyline process graph https://community.sentinelone.com/s/article/000006310

How to Run sentinelctl management type on Linux


(/s/article/000005569)

Deep Visibility settings panel


(/s/article/000006299)

Supported file types for Event Collection


(/s/article/000006220)

(https://twitter.com/SentinelOne) (https:// 444 Castro Street Suite 400 Mountain View, CA 94041
www.linkedin.com/company/sentinelone/) (https:// +1-855-868-3733
www.facebook.com/SentinelOne/) (https://www.youtube.com/ [email protected] (mailto:[email protected])
c/Sentinelone-inc)

©2025 SentinelOne, Con�dential and All Rights Reserved


Privacy Policy (https://www.sentinelone.com/legal/privacy-policy/)
Support Terms (https://www.sentinelone.com/legal/support-terms/)
Customer Community Terms of Use (https://www.sentinelone.com/
legal/customer-community-terms-of-use/)

10 of 10 7/23/25, 21:36

You might also like