icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading SentinelOne
SHA256 checksum (sentinelone_229.tgz) 14894819507ed9aae0114e75bcc888261e2357d8cc782b61251bfa4a60afdb39 SHA256 checksum (sentinelone_228.tgz) 159dd9aeb14fddb105fd1bf660246348f8ed0ea1e1f1f0ca6241910375dd4f6f SHA256 checksum (sentinelone_226.tgz) e3866d73a3c1e25a333256e65c822d6c9329efc24496e69a89cc22de7504c604 SHA256 checksum (sentinelone_211.tgz) afcf58fb1d0e220e67d0e4094fd79bd40978df1b2f6f027a282470e203646740

Flag As Inappropriate

soar

SentinelOne

Splunk SOAR Cloud
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
This app integrates with the SentinelOne Singularity platform to perform prevention, detection, remediation, and forensic endpoint management tasks

Supported Actions Version 2.2.9

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • block hash: Add a file hash to the global blocklist
  • unblock hash: Remove a hash from the global blocklist
  • quarantine device: Quarantine an endpoint
  • unquarantine device: Unquarantine an endpoint
  • mitigate threat: Mitigate an identified threat
  • abort scan: Stop a Full Disk Scan on endpoint/agent
  • shutdown endpoint: Shutdown an endpoint
  • broadcast message: Send a Message through the Agents that users can see
  • get file: Fetch files from endpoints to analyze the root of threats
  • fetch firewall rules: Fetch the firewall rules
  • fetch firewall logs: Fetch the firewall logs
  • scan endpoint: Start a Full Disk Scan on endpoint/agent
  • get endpoint info: Get detailed information about an endpoint/agent
  • get threat info: Get detailed information about a threat
  • list applications: Get the applications, and their data, installed on endpoints
  • get cves: Get known CVEs for applications that are installed on endpoints with Application Risk-enabled Agents
  • get devicecontrol events: Get the data of Device Control events on Windows and macOS endpoints
  • list firewall rules: Get the Firewall Control rules for a scope specified
  • create firewall rule: Create a Firewall Control rule
  • hash reputation: Get the reputation of a hash, given the required SHA1
  • get threat notes: Get the threat notes
  • add threat note: Add a threat note to multiple threats
  • export threat timeline: Export a threat's timeline
  • export mitigation report: Export the mitigation report of threat
  • export threats: Export data of threats
  • fetch threat file: Fetch a file associated with the threat
  • update threat analystverdict: Change the verdict of a threat, as determined by a Console user
  • get threat timeline: Get a threat's timeline
  • update threat incident: Update the incident details of a threat
  • download from cloud: Download threat file from cloud
  • on poll: Callback action for the on_poll ingest functionality

Supported Actions Version 2.2.8

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • block hash: Add a file hash to the global blocklist
  • unblock hash: Remove a hash from the global blocklist
  • quarantine device: Quarantine an endpoint
  • unquarantine device: Unquarantine an endpoint
  • mitigate threat: Mitigate an identified threat
  • abort scan: Stop a Full Disk Scan on endpoint/agent
  • shutdown endpoint: Shutdown an endpoint
  • broadcast message: Send a Message through the Agents that users can see
  • get file: Fetch files from endpoints to analyze the root of threats
  • fetch firewall rules: Fetch the firewall rules
  • fetch firewall logs: Fetch the firewall logs
  • scan endpoint: Start a Full Disk Scan on endpoint/agent
  • get endpoint info: Get detailed information about an endpoint/agent
  • get threat info: Get detailed information about a threat
  • list applications: Get the applications, and their data, installed on endpoints
  • get cves: Get known CVEs for applications that are installed on endpoints with Application Risk-enabled Agents
  • get devicecontrol events: Get the data of Device Control events on Windows and macOS endpoints
  • list firewall rules: Get the Firewall Control rules for a scope specified
  • create firewall rule: Create a Firewall Control rule
  • hash reputation: Get the reputation of a hash, given the required SHA1
  • get threat notes: Get the threat notes
  • add threat note: Add a threat note to multiple threats
  • export threat timeline: Export a threat's timeline
  • export mitigation report: Export the mitigation report of threat
  • export threats: Export data of threats
  • fetch threat file: Fetch a file associated with the threat
  • update threat analystverdict: Change the verdict of a threat, as determined by a Console user
  • get threat timeline: Get a threat's timeline
  • update threat incident: Update the incident details of a threat
  • download from cloud: Download threat file from cloud
  • on poll: Callback action for the on_poll ingest functionality

Supported Actions Version 2.2.7

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • block hash: Add a file hash to the global blocklist
  • unblock hash: Remove a hash from the global blocklist
  • quarantine device: Quarantine an endpoint
  • unquarantine device: Unquarantine an endpoint
  • mitigate threat: Mitigate an identified threat
  • abort scan: Stop a Full Disk Scan on endpoint/agent
  • shutdown endpoint: Shutdown an endpoint
  • broadcast message: Send a Message through the Agents that users can see
  • get file: Fetch files from endpoints to analyze the root of threats
  • fetch firewall rules: Fetch the firewall rules
  • fetch firewall logs: Fetch the firewall logs
  • scan endpoint: Start a Full Disk Scan on endpoint/agent
  • get endpoint info: Get detailed information about an endpoint/agent
  • get threat info: Get detailed information about a threat
  • list applications: Get the applications, and their data, installed on endpoints
  • get cves: Get known CVEs for applications that are installed on endpoints with Application Risk-enabled Agents
  • get devicecontrol events: Get the data of Device Control events on Windows and macOS endpoints
  • list firewall rules: Get the Firewall Control rules for a scope specified
  • create firewall rule: Create a Firewall Control rule
  • hash reputation: Get the reputation of a hash, given the required SHA1
  • get threat notes: Get the threat notes
  • add threat note: Add a threat note to multiple threats
  • export threat timeline: Export a threat's timeline
  • export mitigation report: Export the mitigation report of threat
  • export threats: Export data of threats
  • fetch threat file: Fetch a file associated with the threat
  • update threat analystverdict: Change the verdict of a threat, as determined by a Console user
  • get threat timeline: Get a threat's timeline
  • update threat incident: Update the incident details of a threat
  • download from cloud: Download threat file from cloud
  • on poll: Callback action for the on_poll ingest functionality

Supported Actions Version 2.2.6

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • block hash: Add a file hash to the global blocklist
  • unblock hash: Remove a hash from the global blocklist
  • quarantine device: Quarantine an endpoint
  • unquarantine device: Unquarantine an endpoint
  • mitigate threat: Mitigate an identified threat
  • abort scan: Stop a Full Disk Scan on endpoint/agent
  • shutdown endpoint: Shutdown an endpoint
  • broadcast message: Send a Message through the Agents that users can see
  • get file: Fetch files from endpoints to analyze the root of threats
  • fetch firewall rules: Fetch the firewall rules
  • fetch firewall logs: Fetch the firewall logs
  • scan endpoint: Start a Full Disk Scan on endpoint/agent
  • get endpoint info: Get detailed information about an endpoint/agent
  • get threat info: Get detailed information about a threat
  • list applications: Get the applications, and their data, installed on endpoints
  • get cves: Get known CVEs for applications that are installed on endpoints with Application Risk-enabled Agents
  • get devicecontrol events: Get the data of Device Control events on Windows and macOS endpoints
  • list firewall rules: Get the Firewall Control rules for a scope specified
  • create firewall rule: Create a Firewall Control rule
  • hash reputation: Get the reputation of a hash, given the required SHA1
  • get threat notes: Get the threat notes
  • add threat note: Add a threat note to multiple threats
  • export threat timeline: Export a threat's timeline
  • export mitigation report: Export the mitigation report of threat
  • export threats: Export data of threats
  • fetch threat file: Fetch a file associated with the threat
  • update threat analystverdict: Change the verdict of a threat, as determined by a Console user
  • get threat timeline: Get a threat's timeline
  • update threat incident: Update the incident details of a threat
  • download from cloud: Download threat file from cloud
  • on poll: Callback action for the on_poll ingest functionality

Supported Actions Version 2.1.1

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • block hash: Add a file hash to the global blocklist
  • unblock hash: Remove a hash from the global blocklist
  • quarantine device: Quarantine an endpoint
  • unquarantine device: Unquarantine an endpoint
  • mitigate threat: Mitigate an identified threat
  • scan endpoint: Scan an endpoint for dormant threats
  • get endpoint info: Get detailed information about an endpoint/agent
  • get threat info: Get detailed information about a threat
  • on poll: Callback action for the on_poll ingest functionality

Release Notes

Version 2.2.9
April 28, 2025
  • Update Python dependencies for vulnerabilities, package updates, and platform built-in removals
  • Update Python dependencies for Python 3.13 support
  • Update NOTICE file with updated dependencies
  • Apply pre-commit fixes
Version 2.2.8
Feb. 2, 2023
  • Update test connectivity endpoint [PAPP-29334]
  • Bug fix on ingestion pagination error [PAPP-29334]
  • Add new asset configuration parameter for maximum container ingestion count [PAPP-29324]
Version 2.2.6
Jan. 31, 2022

SentinelOne Release Notes - Published by SentinelOne January 31, 2022

Version 2.2.6 - Released January 31, 2022

  • The following actions are modified so that they work with IP addresses too:
    • Quarantine device
    • Unquarantine device
    • Scan endpoint
    • Get endpoint info
  • Modified command to support new SentinelOne API
    • Block hash
  • The following new actions are implemented
    • Abort Scan
    • Broadcast Message
    • Fetch Files (P1)
    • Fetch Firewall Logs
    • Fetch Firewall Rules
    • Shutdown
    • Get Applications
    • Get CVEs
    • Get Device Control Events (given a hostname or IP)
    • Get Firewall Rules
    • Create Firewall Rule
    • Hash Reputation
    • Add Note to Multiple
    • Get Threat Notes
    • Download from cloud
    • Export Mitigation Report
    • Export Threat Timeline
    • Export Threats
    • Fetch Threat File
    • Update Threat Analyst Verdict
    • Get Threat Timeline
    • Update Threat Incident
Version 2.1.1
Sept. 21, 2021

SentinelOne Release Notes - Published by SentinelOne February 25, 2021

Version 2.1.1 - Released February 25, 2019

  • Compatibility changes for Python 3 support
  • Added two new actions 'on poll', 'get threat info'
  • Exception handling for errors returned from APIs
  • Added licensing details in all files
  • Removed 'list endpoints', 'list processes' actions

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.