Integrations
- Integrations
- 1Password
- Abnormal
- Absolute
- AbuseIPDB
- Adaptive Shield
- Adobe Cloud
- ADP
- Agari Phishing Response
- Airlock
- Airlock Digital
- Akamai Identity Cloud Social
- Alert Logic
- AlgoSec Firewall Analyzer
- AlienVault OTX
- AlienVault USM
- Anodot
- Ansible
- Anvilogic
- Any Run
- Apex One
- ArcSight ESM
- Area 1
- Asana
- Asset Panda
- Atlassian User Management
- Atlassian User Provisioning
- auth0
- Authentik
- Authomize
- Automox
- AWS
- AWS IAM Identity Center
- Axonius
- Azure
- Azure Data Explorer
- Azure DevOps
- Azure Log Analytics
- Azure Storage
- BambooHR
- Big Fix
- BigPanda
- Bitbucket
- Bitdefender
- Bitsight
- Bitwarden
- Black Duck
- Black Kite
- Blink
- BMC Remedy
- Box
- Brinqa
- Cato Networks
- Censys
- Check Point Harmony
- Check Point Infinity Events
- Check Point XDR-XPR
- Check Point Management
- Checkmarx One
- Checkmarx SAST
- Chorus
- Chronicle
- Cisco Advanced Phishing Protection
- Cisco Domain Protection
- Cisco Meraki
- Cisco Talos
- Cisco Umbrella
- Cisco Webex
- Claroty xDome
- ClearPass
- ClickHouse
- ClickUp
- Cloud Custodian
- Cloudflare
- Cobalt
- Compass
- Confluence
- Confluence Data Center
- Coralogix
- Coralogix Incident Management
- Cortex XDR
- Cortex Xpanse
- CredStash
- Cribl
- CrowdStrike
- CyberArk
- Cybersixgill
- CyCognito
- Cyera
- Cylance
- Cyware CTIX
- Darktrace
- Dasera
- Databricks
- Datadog
- DataSet
- Delighted
- Delinea
- Devo
- Discord
- Docusign
- Domo
- Drata
- Dropbox
- Dropbox Business
- Druva
- Duo
- Duo Auth
- Dynatrace
- EasyVista
- EchoTrail
- Egnyte
- Egnyte Secure Govern
- Elasticsearch
- Entro
- Ermetic
- Exabeam
- Exchange Online
- Expel
- F5 BIG IP
- Falcon LogScale
- Falcon Surface
- Flare.io
- Forcepoint DLP
- Forescout
- FortiGate
- Freshservice
- GCP
- Ghostwriter
- Git
- GitHub
- GitLab
- Glean
- Gmail
- Google Calendar
- Google Chat
- Google Docs
- Google Drive
- Google Forms
- Google Looker
- Google Meet
- Google Sheets
- Google Workspace
- Grafana
- Grip Security
- GYTPOL
- Have I Been Pwned
- HiBob
- HubSpot
- Hunters
- Hybrid Analysis
- Hyperproof
- IBM Cloud
- IBM NS1 Connect
- IBM X Force
- Imperva
- incident.io
- Infoblox Cloud Services Portal
- Integrations
- Intercom
- Intezer
- IP API
- IPinfo
- IPWHOIS
- Ironscales
- Ivanti RiskSense
- Jamf
- JetBrains
- JFrog
- Jira
- Jira Data Center
- Joe Sandbox
- JumpCloud
- Kandji
- Keeper Secrets Manager
- Kenna Security
- KnowBe4
- KnowBe4 Events
- Kubernetes
- Lacework
- LaunchDarkly
- Linear
- Litmos
- LogicMonitor
- LogRhythm
- Manage Engine ServiceDesk Plus
- Mattermost
- Maven
- Microsoft Defender For Cloud
- Microsoft Defender For Cloud Apps
- Microsoft Defender For Endpoints
- Microsoft Defender XDR
- Microsoft E-Discovery
- Microsoft Entra ID
- Microsoft Graph
- Microsoft Intune
- Microsoft Office 365 Management Activity
- Microsoft Outlook
- Microsoft Purview
- Microsoft Sentinel
- Microsoft SQL Server
- Microsoft Teams
- Mimecast
- MISP
- Monday
- MongoDB Atlas
- MxToolbox
- Neo4j
- NetBox
- Netography
- Netskope
- New Relic
- Nightfall AI
- NinjaOne
- Notion
- Nozomi Networks
- Nuclei
- Nucleus
- Nutanix Hypervisor
- Obsidian
- Okta
- OneDrive
- OneLogin
- OneTrust
- OpenAI
- OpenCTI
- Opsgenie
- OPSWAT
- Oracle Cloud
- Oracle HCM
- Orca Security
- OWASP ZAP
- PagerDuty
- Palo Alto Cloud NGFW
- Palo Alto Firewall
- Panther
- Pentera
- Perception Point
- PhishLabs
- PhishLabs Incident Data
- PhishLabs Open Web Monitoring
- Pingdom
- PingID
- PingOne
- PlexTrac
- PortSwigger
- Postman
- Postman SCIM
- Power BI
- PowerShell
- Prisma Access
- Prisma Cloud CSPM
- Prisma Cloud CWP
- Prometheus
- Proofpoint
- Proofpoint ITM
- Proofpoint Protection Server
- Proofpoint Security Awareness Training
- Proofpoint TAP
- Proofpoint Threat Response Auto Pull
- Pub-Sub
- QRadar
- Qualys
- Rapid7
- Rapid7 InsightIDR
- Rapid7 InsightVM Cloud
- Rapid7 Threat Command
- Reco
- Recorded Future
- Red Hat IdM
- Rippling
- runZero
- SafeBase
- Sage HR
- SailPoint
- SailPoint IdentityIQ
- Salesforce
- SAP Ariba
- ScienceLogic
- Securin
- Securin VI
- SecurityScorecard
- Securonix
- SemGrep
- SentinelOne
- SentinelOne
- Actions
- Overview
- Abort Scan
- Add Threat To Exclusions
- Add To Block List
- Add To Blocklist Deep Visibility
- Ban Hash
- Broadcast Message To Users
- Create Deep Visibility Query
- Create Firewall Rule
- Create USB Device Control Rule
- Deep Visibility Query
- Delete Firewall Rules
- Delete User
- Disable Agent
- Download From Cloud
- Enable Agent
- Export Agents Data
- Export Events
- Export Mitigation Report
- Export Threat Timeline
- Export Threats
- Fetch Deep Visibility Query Results
- Get Account By ID
- Get Agents Count
- Get Alerts
- Get CVEs For Application
- Get Endpoint Tags
- Get Events
- Get Local Upgrade Agent Authorization
- Get Passphrases
- Get Threat Timeline
- Get Threats
- Initiate Scan
- Isolate Endpoint
- Lift Endpoint Isolation
- List Accounts
- List Activities Types
- List Activities
- List Agent Applications
- List Agents
- Mitigate Threats
- SentinelOne Custom Action
- Uninstall Agent
- Update Alert Analyst Verdict
- Update Incident Details Of An Alert
- Update Threat Analyst Verdict
- Update Threat External Ticket ID
- Update Threat Incident
- ServiceNow
- SharePoint
- Shodan
- Shopify
- Silverfort
- Slack
- Smartsheet
- Snipe-IT
- Snowflake
- Snyk
- SolarWinds Service Desk
- SonarQube
- Sophos
- Split
- Splunk
- Splunk Observability
- Splunk SOAR
- Spur
- StrongDM
- Sumo Logic
- Symantec EDR
- Sysdig
- Tableau
- Tanium
- TeamCity
- TeamViewer
- Telegram
- Tenable
- Tenable Security Center
- Terraform
- Terraform Cloud
- TheHive
- Thinkst Canary
- ThreatQuotient
- Trellix Email Security
- Trello
- Trend Vision One
- Twilio
- UKG HR
- Uptycs
- URLScan
- Vault
- Veracode
- Verkada
- Vertica
- VirusTotal
- VMware Carbon Black
- VMware vSphere
- WeChat
- WhatsApp
- Whois
- WildFire
- Wiz
- Workday
- Workspace ONE UEM
- YesWeHack
- Zendesk
- Zero Networks
- Zoom
- Zscaler Internet Access
- Zscaler Private Access
Actions
List Agents
Get the Agents, and their data, that match the filter. This command gives the Agent ID, which you can use in other commands.
Basic Parameters
Parameter | Description |
---|---|
Cursor | Cursor position returned by the last request. Use to iterate over more than 1000 items. Example: “YWdlbnRfaWQ6NTgwMjkzODE=”. |
Limit | Limit number of returned items (1-1000). Example: “10”. |
Query | A free-text search term, will match applicable attributes (sub-string match).Note: Device’s physical addresses will be matched if they start with the search term only (no match if they contain the term). |
Return All Pages | Automatically fetch all resources, page by page. |
Sort By | The column to sort the results by. |
Sort Order | Sort direction. |
Advanced Parameters
Parameter | Description |
---|---|
Custom Queries | Additional custom query parameters.For more information about the available query parameters, visit https://your-subdomain.sentinelone.net/api-doc/api-details?category=agents&api=get-agents. |
Example Output
{ "data": [ { "registeredAt": "2018-02-27T04:49:26.257525Z", "rangerStatus": "NotApplicable", "mitigationModeSuspicious": "detect", "cloudProviders": "object", "serialNumber": "string", "operationalState": "string", "networkQuarantineEnabled": "boolean", "coreCount": 8, "firstFullModeTime": "string", "cpuId": "Acme chips inc. Pro5555 @ 3.33GHz", "computerName": "JOHN-WIN-4125", "isPendingUninstall": "boolean", "detectionState": "string", "networkStatus": "connected", "infected": "boolean", "consoleMigrationStatus": "N/A", "cpuCount": 2, "scanStatus": "none", "createdAt": "2018-02-27T04:49:26.257525Z", "siteName": "string", "fullDiskScanLastUpdatedAt": "2018-02-27T04:49:26.257525Z", "lastIpToMgmt": "string", "groupUpdatedAt": "2018-02-27T04:49:26.257525Z", "domain": "mybusiness.net", "osArch": "32 bit", "siteId": "225494730938493804", "userActionsNeeded": [ { "type": "string", "example": "none", "enum": [ "none", "reboot_needed", "user_action_needed", "upgrade_needed", "incompatible_os", "unprotected", "user_action_needed_fda", "user_action_needed_rs_fda", "user_action_needed_network", "rebootless_without_dynamic_detection", "extended_exclusions_partially_accepted", "user_action_needed_bluetooth_per", "reboot_required" ] } ], "updatedAt": "2018-02-27T04:49:26.257525Z", "scanAbortedAt": "2018-02-27T04:49:26.257525Z", "rangerVersion": "string", "threatRebootRequired": "boolean", "locationType": "not_applicable", "accountName": "string", "allowRemoteShell": "boolean", "uuid": "ff819e70af13be381993075eb0ce5f2f6de05be2", "activeDirectory": { "computerMemberOf": [ { "type": "string" } ], "mail": "ActiveDirectory UPN", "computerDistinguishedName": "CN=TEMP-T470P,CN=Computers,DC=sentinelone,DC=com", "userPrincipalName": "some@mail.com", "lastUserMemberOf": [ { "type": "string" } ], "lastUserDistinguishedName": "CN=John Doe,CN=Users,DC=sentinelone,DC=com" }, "isActive": "boolean", "osType": "linux", "totalMemory": 8192, "isUninstalled": "boolean", "locations": [ { "name": "office1", "scope": "global", "id": "225494730938493804" } ], "networkInterfaces": [ { "inet": [ { "type": "string" } ], "gatewayMacAddress": "00:25:96:FF:FE:12", "inet6": [ { "type": "string" } ], "gatewayIp": "192.168.1.1", "physical": "00:25:96:FF:FE:12:34:56", "name": "string", "id": "225494730938493804" } ], "storageType": "string", "externalIp": "31.155.5.7", "scanStartedAt": "2018-02-27T04:49:26.257525Z", "modelName": "Acme computers - 15x4k", "id": "225494730938493804", "groupId": "225494730938493804", "activeThreats": 3, "scanFinishedAt": "2018-02-27T04:49:26.257525Z", "isUpToDate": "boolean", "operationalStateExpiration": "2018-02-27T04:49:26.257525Z", "machineType": "unknown", "osUsername": "string", "tags": { "sentinelone": [ { "assignedBy": "string", "key": "string", "assignedById": "225494730938493804", "id": "225494730938493804", "value": "string", "assignedAt": "2018-02-27T04:49:26.257525Z" } ] }, "licenseKey": "string", "showAlertIcon": "boolean", "osRevision": "string", "appsVulnerabilityStatus": "patch_required", "storageName": "string", "osName": "Windows 10", "lastActiveDate": "2018-02-27T04:49:26.257525Z", "accountId": "225494730938493804", "groupIp": "31.155.5.x", "groupName": "string", "isDecommissioned": "boolean", "firewallEnabled": "boolean", "inRemoteShellSession": "boolean", "remoteProfilingStateExpiration": "string", "locationEnabled": "boolean", "installerType": ".msi", "policyUpdatedAt": "2018-02-27T04:49:26.257525Z", "encryptedApplications": "boolean", "osStartTime": "2018-02-27T04:49:26.257525Z", "remoteProfilingState": "string", "mitigationMode": "detect", "lastLoggedInUserName": "janedoe3", "externalId": "string", "agentVersion": "2.5.0.2417" } ], "pagination": { "nextCursor": "YWdlbnRfaWQ6NTgwMjkzODE=", "totalItems": 580 }, "errors": [ { "type": "object" } ]}
Workflow Library Example
Validate That Sentinelone Edr is Installed for All Employees on Google Workspace
Preview this Workflow on desktop
Was this page helpful?