In this guide, you'll configure the integration between SentinelOne and Radiant to automatically run containment and remediation actions after endpoint attacks.
Available actions
The following actions are available after you set up the SentinelOne action connector. Keep in mind, additional permissions are required.
Isolate devices
Release devices from isolation
Block files
Run full disk scan
To be able to add the action connector, you will need to provide Radiant Security with the following values, from the data connector onboarding:
API Base URL (console URL). For example: https://usea1-swprd1.sentinelone.net