SentinelOne - Vulnerabilities - NEW

EARLY ACCESS

About

SentinelOne delivers autonomous endpoint protection that prevents, detects, and responds to attacks across all major vectors.

Why You Should Integrate

This source will provide insight into what vulnerabilities are impacting your devices, their severity, and solutions for resolving them.

How Does the Integration Work

This integration pulls all vulnerabilities for devices from SentinelOne that have not been identified as decommissioned devices.

This data is only used internally; we do not share it with any parties outside of Sevco. Refer to our privacy policy for details.

⚠️

If you haven't already, please review our instructions for configuring the integration before proceeding with the instructions below.

Configuration Options

📘

Vulnerability integrations must be configured in the same Source Configuration as your Device Integrations for vulnerabilities data to appear on the Vulnerability Inventory page. Learn more

Vulnerabilities

FieldDescriptionExample
Site IDsComma separated list of site IDs to pull from (default: empty list indicates ALL SITES)1407333333333333333,1507333333333333333
Account IDsComma separated list of account IDs to pull from (default: empty list indicates ALL ACCOUNTS)1407333333333333333,1507333333333333333

External Documentation

Creating credentials

See platform documentation for details on Creating Credentials - SentinelOne

Required Permissions

See platform documentation for details on Required Permissions - SentinelOne

Contact Us

If you're having problems configuring an Integration, or if you've found something wrong in this document, please email us at [email protected] or suggest edits directly by selecting the Suggest Edits link located in the upper right hand corner of the documentation.

Tags: cloud