SentinelOne

Configure the action connector for SentinelOne.

In this guide, you'll configure the integration between SentinelOne and Radiant to automatically run containment and remediation actions after endpoint attacks.

chevron-rightbolt-lightning Available actionshashtag

The following actions are available after you set up the SentinelOne action connector. Keep in mind, additional permissions are required.

  • Isolate devices

  • Release devices from isolation

  • Block files

  • Run full disk scan

To be able to add the action connector, you will need to provide Radiant Security with the following values, from the data connector onboarding:

  • API Base URL (console URL). For example: https://usea1-swprd1.sentinelone.net

  • API Token

circle-info

plug If you haven't configured the SentinelOne data connectors yet, check out the SentinelOne EDR guide.

Add the action connector in Radiant Security

  1. From the navigation menu, select Settings > Action Connectors and click + Add Connector.

  2. Select SentinelOne from the menu and click Credentials.

  3. Add the following values from the previous section:

    • API Base URL (console URL). For example: https://usea1-swprd1.sentinelone.net

    • API Token

  4. Click Add Connector to save the connector configuration.

Last updated