Am I reading the correct user guide?
Am I reading the correct user guide?
Some connectors on the Vulcan help center offer multiple user guides tailored to different setups and versions.
To open the correct user guide for your setup and version, go to the connector's setup page and click How to connect.
Connector details
About SentinelOne
SentinelOne provides a range of products and services to protect organizations against cyber threats. The SentinelOne security platform, named Singularity XDR, is designed to protect against various threats, including malware, ransomware, and other advanced persistent threats (APTs). It uses machine learning and other advanced analytics techniques to analyze real-time security data and identify patterns and behaviors that may indicate a security threat. When a threat is detected, the platform can automatically trigger a response, such as quarantining a device or issuing an alert to security personnel. Our main products are designed to protect the three security surfaces attackers are targetting today: Endpoint, Cloud, and Identity.
Endpoint: Our main product is a security platform that combines endpoint protection, EDR (Endpoint Detection and Response), and automated threat response capabilities into a single solution.
Support scope
Supported products | Endpoint security
|
Category | Endpoint Security |
Ingestion type | Assets and vulnerabilities |
Ingested asset type(s) | Hosts Cloud Resources |
Integration type | UNI directional (data is transferred from the Connector to the Vulcan Platform in one direction) |
Supported version and type | SaaS (latest) |
Connector Setup
Prerequisites and user permissions
Before you begin configuring the Connector, make sure you have the following:
SentinelOne server URL (https://xxxxx.sentinelone.net)
Generating API token
Go to the SentinelOne platform > My User.
Go to Actions > API Token Operations.
Click Generate API tokens
Enter your Two-Factor Authentication credentials/code.
Copy the generated token to use later on the connector's setup page on the Vulcan platform (notice its validity period).
Configuring the SentinelOne connector
Login to the Vulcan ExposureOS platform and go to Connectors > Add a Connector.
Click on the SentinelOne icon.
Set up the Connector as follows:
If a gateway is required, refer to the Vulcan Gateway guide to configure the gateway before proceeding. If not, continue following the steps in this guide.
Enter your SentinelOne Server URL.
Enter the API Key you generated earlier.
Data pulling configuration:
This configuration has dynamic settings tailored to the specific connector and integration type. Below are the configurations relevant to this connector.
Asset types to fetch: Click the drop-down and select the asset types you want to fetch.
Asset Retention: Configure the retention period for inactive assets based on their last seen date. If an asset has not been detected or updated in a scan within the specified days, it will be automatically removed from the Vulcan ExposureOS platform. This ensures your asset inventory stays current and relevant.
Example:
Click the Test Connectivity button to verify that Vulcan Cyber can connect to your SentinelOne instance.
Notes:
A successful connectivity test confirms that the platform can connect to the SentinelOne instance. However, it does not guarantee that the synchronization process will succeed, as additional syncing or processing issues may arise.
Example:If the connectivity test fails, an error message with details about the issue will appear. Click the arrow next to the error message for more information about the exact error.
Example:
Connector scheduling: Set the connector's sync time and days. By default, all days are selected.
Click Create to start syncing the new connector, or Save Changes if editing an existing connector.
Allow some time for the sync to complete. Then, you can review the sync status on the Connectors main page or underConnector sync logs on the connector's specific setup page.
To confirm the sync is complete, navigate to the Connectors page. The sync is complete once the SentinelOne icon shows Connected.
Example:
SentinelOne in the Vulcan platform
Viewing findings
To view findings (instances) ingested by the SentinelOne connector:
Go to the Findings page.
Click on Filter and set the condition to Vulnerability > Source > is > SentinelOne.
Example:
You can also:
Filter by Business Group and add more filters to narrow your search further.
Filter by Connector-specific parameters (also known as Native Parameters) if available.
Click on a finding for more details.
Viewing vulnerabilities
To view vulnerabilities ingested by the SentinelOne connector:
Go to the Vulnerabilities page.
Click on Filter and set the condition to Vulnerability > Source > is > SentinelOne.
Example:
You can also:
Filter by Business Group and add more filters to narrow your search further.
Filter by Connector-specific parameters (also known as Native Parameters) if available.
Click on a vulnerability for more details.
Viewing assets
To view assets ingested by the SentinelOne connector:
Go to the Assets page.
Click on Filter and set the condition to Asset > Source > is > SentinelOne.
Example:
You can also:
Filter by Business Group and add more filters to narrow your search further.
Filter by Connector-specific parameters (also known as Native Parameters) if available.
Click on an asset for more details.
Taking action on vulnerabilities and assets
To take remediation action on vulnerabilities and assets ingested by SentinelOne:
Go to the Vulnerabilities or Assets Page.
Use the Filter to view the assets/vulnerabilities by source. You can always filter by Business Group and add more filters to narrow your search.
Select the relevant vulnerabilities/assets from the results list.
Click on Take Action to proceed with remediation or further actions.
Example:
Automating remediation actions on vulnerabilities
Use Vulcan Playbooks to create automation and remediate vulnerabilities at scale.
Data Mapping
The Vulcan Platform integrates with SentinelOne through an API that pulls relevant vulnerability and asset data and maps it to the platform's pages and fields. The vulnerabilities and/or assets data is ingested from the vendor platform and mapped into the Vulcan ExposureOs platform.
Host data mapping
Asset data
SentinelOne UI field | SentinelOne API field | Vulcan field |
Cloud id | cloudProviders.<CloudProvider>.cloudInstanceId | Cloud ID cloud_instance_id |
Application name | computerName | Host Name (hostname) |
OS | osName | Host OS (os) |
os version | osRevision | Host OS Version (os_version) |
IP | externalIp or networkInterfaces[*].inet | Host IP (ip ) |
EXTERNAL IP | externalIp or networkInterfaces[*].inet | Host external IP (ip ) |
- | networkInterfaces[*].physical | Host MAC addresses (mac_address) |
Application detection date | createdAt | Host first Seen (first_seen) |
last active date | lastActiveDate | Host Last report (last_seen) |
Type | machineType siteName groupName
| Host details (added_data)
|
Cloud tags | tags | Host Tags - Vendor’s tags (tags) |
group name | groupName | Host Tags - Additional (tags) |
Application | applicationName | Host Component - Package name (package) |
package version | applicationVersion | Image Component - Package Version (package_version) |
Unique vulnerability data
SentinelOne UI field | SentinelOne API field | Vulcan field |
cve id | cveId | Unique Vulnerability uniqueness criteria |
CVE | cveId | Vulnerability title (title) |
risk score / cvss score? | baseScore | Vulnerability score (cvss_score) |
description | description | Vulnerability description (description) |
published date | publishedDatecve baseScore lastScanDate mitreUrl sevrity | Vulnerability details (added_data) |
cve | - | CVE/S (report_item_cve) |
Finding data (asset-instance connection)
SentinelOne UI field | SentinelOne API field | Vulcan field |
endpoint + application + CVES | id | Vulnerability instance uniqueness criteria |
first seen | detectionDate | Vulnerability instance First seen (first_seen) |
- | lastScanDate | Vulnerability instance Last seen (last_seen) |
|
id | Vulnerability instance details(added_data) |
Cloud Resource data mapping
Asset data
SentinelOne API field | Vulcan field |
computerName | Cloud resource Name (name) |
machineType | resource type(resource_type) |
createdAt | Cloud resource first Seen (first_seen) |
lastActiveDate | Cloud resource Last report (last_seen) |
tags | Cloud resource Tags - Additional (tags) |
Unique vulnerability data
SentinelOne API field | Vulcan field |
cveId | Vulnerability title (title) |
baseScore | Vulnerability score (cvss_score) |
description | Vulnerability description (description) |
vulnerability data / description | Vulnerability details (added_data) |
Finding data (asset-instance connection)
SentinelOne UI field | SentinelOne API field | Vulcan field |
endpoint + application + CVES | id | Vulnerability instance uniqueness criteria |
first seen | detectionDate | Vulnerability instance First seen (first_seen) |
- | lastScanDate | Vulnerability instance Last seen (last_seen) |
|
id | Vulnerability instance details(added_data) |
Vulnerability status mapping
Findings (instances) ingested from connectors are mapped into the Vulcan platform by status.
Based on the
status
andseverity
fields.
SentinelOne status | Vulcan status |
If status is | Vulnerable |
If status is | Fixed |
If status is | False positive |
The statuses are mapped into the Findings page > Show <status> view:
Vulnerability score mapping
Risk scores ingested from connectors are converted into numeric scores and mapped into the Vulcan platform risk score field, which eventually impacts the contextualized risk calculation.
Based on the
baseScore
field
SentinelOne score | Vulcan score |
Critical | 10 |
High | 7 |
Medium | 5 |
Low | 3 |
- | 0 |
The scores are mapped into the Score field of the Vulnerability details:
Status update Mechanisms
Every day, the Vulcan Platform syncs with the vendor's platform to receive updates on existing vulnerabilities and assets and to retrieve new ones.
The table below lists how the status update mechanism works in the <X Connector> for the vulnerabilities and assets in the Vulcan Platform.
Status change | When? |
The asset is archived | - Asset not found on the connector's last sync - Asset not seen for X days according to "Last Seen" |
The vulnerability instance status changes to "Fixed" | - If the vulnerability no longer appears in the scan findings - Vulnerability status on the connector's side changes to 'removed' |
Note: Asset or vulnerability updates on the vendor side are reflected on the Vulcan Platform only on the next scheduled connector sync (the next day).
Support limitations and expected behavior
This section outlines any irregularities, expected behaviors, or limitations related to integrating the Vulcan Cyber ExposureOS platform and SentinelOne. It also highlights details about ingested and non-ingested data to clarify data handling and functionality within this integration.
Cloud and identity are not supported.
“Unprotected assets” are not supported.
API endpoints in use
API version: 2.1
API | Use in Vulcan |
{{baseUrl}}/web/api/v2.1/agents | Assets |
{{baseUrl}}/web/api/v2.1/application-management/risks | findings, vulnerabilities |
{{baseUrl}}/web/api/v2.1/application-management/risks/cves | vulnerabilities enrichment |
Data Validation
This section shows how to validate and compare data between Vulcan ExposureOS and the SentinelOne platform.
Matching Asset Count
Objective: Ensure the number of endpoints (assets) in SentinelOne aligns with the assets displayed in Vulcan.
In SentinelOne:
Go to the Sentinels section where all endpoints are listed. These endpoints represent the assets that should be ingested into Vulcan.
Note the total number of endpoints. If applicable, apply any filters or export options for a refined list.
Example:
In Vulcan:
Go to Assets and filter by connector (Set
Where → Asset → Connector
to SentinelOne).
The filtered list in Vulcan should match (or closely align with) the number of endpoints in SentinelOne.|
Example:
Validations if an asset is not present in Vulcan:
Archive by date: Ensure the asset is not archived in Vulcan based on an outdated last-seen date.
Archive by status: If the asset is no longer present or valid, confirm that it was removed or deleted.
Data pulling configuration: Verify that the relevant data-pulling configurations are correctly set on the connectors setup page. Make sure to click Save Changes if you modify the connector's setup.
Matching vulnerabilities count
Objective: Ensure the number of unique vulnerabilities found in SentinelOne aligns with Vulcan’s unique vulnerabilities.
In SentinelOne:
Go to the Applications section and select a specific application from the list.
Example:Switch the toggle from Endpoints to CVEs. This screen displays the vulnerabilities associated with that application.
Example:
Note: SentinelOne’s UI may only show vulnerabilities for a single application at a time. To see the total set of vulnerabilities, you may need to repeat this step for each application.
In Vulcan:
Go to Vulnerabilities and filter by connector (Set
Where → Vulnerability → Source
to SentinelOne).
Verify that the categories or identifiers (e.g., CVEs) match the vulnerabilities shown in SentinelOne.
Example:
Validations if vulnerability is not present in Vulcan:
No asset has this vulnerability: Check if the vulnerability is tied to an asset in <X> that exists in Vulcan.
Asset-vulnerability mapping: Ensure correct mapping between the asset and its vulnerabilities.
Filtered Severities: If you configured the connector to exclude certain severities, those vulnerabilities won’t appear in Vulcan.
Matching findings (instances) count
Objective: Ensure that the total number of vulnerability instances (connections between specific endpoints and CVEs) between SentinelOne and Vulcan is consistent.
In SentinelOne:
Go to the Applications section and select a specific application from the list.
You will see the endpoint and the associated CVEs for each application. The combined set of these endpoints plus CVEs represents the total findings (asset-vulnerability instances) in SentinelOne.
Example:
In Vulcan:
Go to Findings and filter by connector (Set
Where → Asset → Connector
to SentinelOne).Compare the total count of findings to SentinelOne’s asset-CVE connections. The final sum of asset-vulnerability connections in SentinelOne should match the number of findings displayed in Vulcan.
Example:
Possible discrepancies:
Fix or Resolution: If a vulnerability instance is fixed in SentinelOne, you should see it on Vulcan’s Fixed screen.
Unsupported Asset Types: If SentinelOne provides data for asset types not supported by Vulcan, the data will not appear in Vulcan.
Branch or Scan Differences (if applicable): Only the latest scan or default branch might sync.
Validations if a connection is not present in Vulcan:
Archived or Removed Assets: If an endpoint was removed in SentinelOne, check if Vulcan archived it based on your retention rules.
Filtered Severities: Some vulnerabilities might not appear if the connector is configured to ignore certain severity levels.
Unsupported Data: SentinelOne might display data (e.g., partial scans, specialized application metrics) that Vulcan does not ingest.
keywords: sentinel one, sentinelone