Skip to content

SentinelOne Setup

SentinelOne is an endpoint detection and response (EDR) platform. Once connected, Junto can look up endpoints, investigate threats and alerts, manage endpoint isolation, trigger scans, and run Deep Visibility queries across your fleet.

Prerequisites

  • A SentinelOne account with API access
  • An API token generated from your SentinelOne management console
  • Your SentinelOne instance URL (e.g., https://usea1.sentinelone.net)

Step 1: Generate an API Token

  1. Log in to your SentinelOne management console.
  2. Navigate to Settings > Users and select your user account.
  3. Under API Token, click Generate to create a new token.
  4. Copy the token. It will not be shown again.

Step 2: Configure in Junto

  1. In Junto, go to Settings > Integrations > SentinelOne.
  2. Click Add Configuration and fill in:
    • API URL -- Your SentinelOne instance URL.
    • API Token -- The token from Step 1. This is encrypted before storage.
  3. Click Create. Junto validates the connection by listing your SentinelOne sites.

Step 3: Map Companies to Sites

SentinelOne organizes endpoints into Sites. Each MSP client is typically a separate site.

  1. After connecting, Junto lists available sites from your SentinelOne account.
  2. Use the company mapping interface to link each Junto company to its SentinelOne site.
  3. Auto-map is available to match by name.
  4. Save mappings.

What the AI Agent Can Do

Endpoint Management

ToolDescriptionRisk Level
List EndpointsSearch for endpoints by hostname, OS type, infection status, or active statusLow
Get Endpoint DetailsView detailed information about a specific endpointLow
Scan EndpointInitiate a full disk scan on one or more endpointsMedium
Isolate EndpointDisconnect an endpoint from the network (network quarantine)High
Reconnect EndpointRestore network access to a previously isolated endpointHigh

Threat Investigation & Response

ToolDescriptionRisk Level
List ThreatsList detected threats with filtering by resolved status, mitigation status, or analyst verdictLow
Get Threat DetailsView detailed information about a specific threatLow
Mitigate ThreatTake action on a threat: kill, quarantine, remediate, or rollbackHigh
Update Threat VerdictSet analyst verdict (true positive, false positive, suspicious, or undefined)Medium
Add Threat NoteAdd analyst notes to a threat for documentationMedium

Alert Management

ToolDescriptionRisk Level
List AlertsList cloud detection alerts with optional filtering by analyst verdictLow
Update Alert VerdictSet analyst verdict on cloud detection alertsMedium

Deep Visibility Queries

ToolDescriptionRisk Level
Create QuerySearch endpoint telemetry data across your fleetMedium
Check Query StatusCheck the status of a running Deep Visibility queryLow
Get Query ResultsRetrieve events from a completed Deep Visibility queryLow

Infrastructure

ToolDescriptionRisk Level
List SitesList all SentinelOne sites in the accountLow

High-impact actions like endpoint isolation, reconnection, and threat mitigation require explicit technician approval before the agent proceeds.

Troubleshooting

  • Connection fails -- Verify your API URL and token. Ensure the token has not expired or been revoked.
  • No sites listed -- Confirm your API token has sufficient permissions to view sites.
  • Endpoint not found -- Check that the company mapping is correct and the endpoint is enrolled in the expected site.
  • Deep Visibility query returns no results -- Ensure target endpoints are online with the SentinelOne agent running. Queries search recent telemetry data.