SentinelOne
Cloudflare Zero Trust can check if SentinelOne ↗ is running on a device to determine if a request should be allowed to reach a protected resource.
- SentinelOne agent is deployed on the device.
-
Cloudflare WARP client is deployed on the device. For a list of supported modes and operating systems, refer to WARP Client Checks.
-
In Zero Trust ↗, go to Settings > WARP Client.
-
Scroll down to WARP client checks and select Add new.
-
Select SentinelOne.
-
You will be prompted for the following information:
-
Name: Enter a unique name for this device posture check.
-
Operating system: Select your operating system. You will need to configure one posture check per operating system.
-
Application Path: Enter the full path to the SentinelOne process to be checked (for example,
C:\Program Files\SentinelOne\Sentinel Agent 21.7.4.1043\SentinelAgent.exe
). -
Signing certificate thumbprint (recommended): Enter the thumbprint of the publishing certificate used to sign the binary. This proves the binary came from SentinelOne and is the recommended way to validate the process.
-
SHA-256 (optional): Enter a SHA-256 value. This is used to validate the SHA256 signature of the binary and ensures the integrity of the binary file on the device. Note: do not fill out this field unless you strictly control updates to SentinelOne, as this will change between versions.
-
Next, go to Logs > Posture and verify that the SentinelOne check is returning the expected results.