SentinelOne delivers autonomous endpoint protection that prevents, detects, and responds to attacks across all major vectors.
Integrating with SentinelOne will provide insight into your Software environment. It will help you identify software that is outdated or requiring removal.
This integration pulls all applications for devices from SentinelOne that have not been identified as decommissioned devices.
If you haven't already, please review our instructions for configuring the integration before proceeding with the instructions below.
Software integrations must be configured in the same Source Configuration as your Device Integrations for software data to appear on the Software Inventory page. Learn more
|Comma separated list of site IDs to pull from (default: empty list indicates ALL SITES)|
|Comma separated list of account IDs to pull from (default: empty list indicates ALL ACCOUNTS)|
See platform documentation for details on Creating Credentials - SentinelOne
See platform documentation for details on Required Permissions - SentinelOne
If you're having problems configuring an Integration, or if you've found something wrong in this document, please email us at [email protected] or suggest edits directly by selecting the
Suggest Edits link located in the upper right hand corner of the documentation.
Updated 27 days ago