n8n node for SentinelOne API - Manage agents, threats, device control, and tags
npm install n8n-nodes-sentinelone!SentinelOne
!n8n
!TypeScript
!License
An n8n community node for interacting with the SentinelOne API v2.1. Manage your endpoint security infrastructure directly from your n8n workflows.
1. Go to Settings > Community Nodes
2. Select Install
3. Enter n8n-nodes-sentinelone
4. Agree to the risks and click Install
``bash`In your n8n installation directory
npm install n8n-nodes-sentinelone
You'll need to configure your SentinelOne API credentials:
| Field | Description |
|-------|-------------|
| API URL | Your SentinelOne console URL (e.g., https://usea1-partners.sentinelone.net) |
| API Token | Your API token from SentinelOne console |
1. Log in to your SentinelOne Management Console
2. Navigate to Settings > Users
3. Select your user or create a service user
4. Click Generate API Token
5. Copy the token (it won't be shown again!)
Retrieve a list of agents with powerful filtering capabilities.
Filters Available:
- Account/Site/Group IDs
- Computer name (contains)
- External IP (contains)
- OS Types (Windows, macOS, Linux)
- Machine Types (Desktop, Laptop, Server, Kubernetes, etc.)
- Network Status (Connected, Disconnected)
- Scan Status
- Infection status
- Agent version
- And many more...
Retrieve installed applications for specific agents.
Required: Agent IDs (comma-separated)
Target agents by:
- Agent IDs: Specific agent IDs (comma-separated)
- Filter: Dynamic filter criteria (OS type, site, group, infection status, etc.)
Retrieve threats with filtering:
- Analyst Verdicts (True Positive, False Positive, Suspicious, Undefined)
- Incident Statuses (In Progress, Resolved, Unresolved)
- Mitigation Statuses (Mitigated, Active, Blocked, Pending, etc.)
- Content Hash, Classification
- Date ranges
Apply mitigation actions:
- Kill - Terminate the threat process
- Quarantine - Quarantine the threat file
- Remediate - Remediate the threat (macOS/Windows)
- Rollback Remediation - Rollback remediation (Windows only)
- Un-Quarantine - Release from quarantine
- Network Quarantine - Network isolate the affected endpoint
Create a new device control rule with:
- Scope: Global (Tenant), Account, Site, or Group level
- Interface: USB, Bluetooth, Thunderbolt, eSATA
- Rule Type: Device Class, Vendor ID, Product ID, Device ID, Bluetooth Version
- Action: Allow, Block, Read-Only
- Status: Enabled or Disabled
Retrieve device control rules with filtering:
- Interfaces (USB, Bluetooth, Thunderbolt, eSATA)
- Device Classes (Mass Storage, Printer, Portable Device, Communication)
- Actions (Allow, Block, Read-Only)
- Scopes (Account, Global, Group, Site)
- Statuses (Enabled, Disabled)
Update an existing device control rule by ID. Modifiable fields:
- Rule Name, Action, Status, Device Class, Vendor ID, Product ID
Delete device control rules by providing rule IDs (comma-separated).
Retrieve device control events with filtering:
- Event Types (Blocked, Allowed, Read-Only)
- Interfaces, Agent IDs, Site/Group IDs
- Date ranges, Computer name, Query search
- Get Tags: Retrieve endpoint tags with filtering
- Manage Tags: Add, remove, or override tags
- Supports key-value pairs
- Target by Agent IDs or filter criteria
``
Trigger: Webhook from SIEM
|
SentinelOne: Get Threats (filter: unresolved)
|
IF: severity == high
|
SentinelOne: Mitigate Threat (action: quarantine)
|
SentinelOne: Disconnect from Network
|
Slack: Notify Security Team
``
Trigger: Schedule (Daily 8 AM)
|
SentinelOne: Get Agents (filter: isActive=true)
|
SentinelOne: Get Threats (filter: last 24 hours)
|
Function: Calculate statistics
|
Email: Send daily report
``
Trigger: Webhook (new employee)
|
SentinelOne: Get Agents (filter: computerName contains "new-laptop")
|
SentinelOne: Manage Tags (action: add, key: department, value: engineering)
``
Trigger: Schedule (Weekly)
|
SentinelOne: Get Device Rules (filter: interface=USB, action=Allow)
|
Function: Format audit report
|
Google Sheets: Append to compliance log
``
Trigger: Webhook (new site created)
|
SentinelOne: Create Rule (scope: site, interface: USB, deviceClass: Mass Storage, action: Block)
|
SentinelOne: Get Device Events (filter: siteId, eventType: blocked)
|
Slack: Notify IT team of new policy
This node uses the SentinelOne API v2.1. For complete API documentation, visit your SentinelOne console's API documentation at:
```
https://your-console.sentinelone.net/api-doc/overview
- n8n Version: 0.5.0+
- Node.js: 18+
- SentinelOne API: v2.1
- Issues: GitHub Issues
- SentinelOne Docs: Developer Portal
---
Made with :purple_heart: for the n8n community