SentinelOne - Vulnerabilities - NEW
EARLY ACCESS
About
SentinelOne delivers autonomous endpoint protection that prevents, detects, and responds to attacks across all major vectors.
Why You Should Integrate
This source will provide insight into what vulnerabilities are impacting your devices, their severity, and solutions for resolving them.
How Does the Integration Work
This integration pulls all vulnerabilities for devices from SentinelOne that have not been identified as decommissioned devices.
This data is only used internally; we do not share it with any parties outside of Sevco. Refer to our privacy policy for details.
If you haven't already, please review our instructions for configuring the integration before proceeding with the instructions below.
Configuration Options
Vulnerability integrations must be configured in the same Source Configuration as your Device Integrations for vulnerabilities data to appear on the Vulnerability Inventory page. Learn more
Vulnerabilities
Field | Description | Example |
---|---|---|
Site IDs | Comma separated list of site IDs to pull from (default: empty list indicates ALL SITES) | 1407333333333333333,1507333333333333333 |
Account IDs | Comma separated list of account IDs to pull from (default: empty list indicates ALL ACCOUNTS) | 1407333333333333333,1507333333333333333 |
External Documentation
Creating credentials
See platform documentation for details on Creating Credentials - SentinelOne
Required Permissions
See platform documentation for details on Required Permissions - SentinelOne
Contact Us
If you're having problems configuring an Integration, or if you've found something wrong in this document, please email us at [email protected] or suggest edits directly by selecting the Suggest Edits
link located in the upper right hand corner of the documentation.
Tags: cloud
Updated 10 months ago