You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
MCP server for SentinelOne integration. Enables AI assistants like Claude Code to manage threats, investigate endpoints, query alerts, and run Deep Visibility hunts.
"List all unmitigated threats"
"Investigate threat 1234567890"
"Show infected agents"
"How many agents per OS?"
"Isolate agent 1234567890"
"What's the reputation of this SHA256?"
"Hunt for PowerShell processes in the last 24 hours"
"Show high severity alerts"
Tools Reference
Threats
Tool
Description
s1_list_threats
List threats with classification, status, and computer filters
s1_get_threat
Get threat details including hashes, file path, and storyline
s1_mitigate_threat
Kill, quarantine, un-quarantine, remediate, or rollback a threat
s1_investigate_threat
Full investigation: threat details, correlated alerts, and timeline
s1_set_analyst_verdict
Set analyst verdict: true_positive, false_positive, suspicious, undefined
s1_set_incident_status
Set incident status (with optional verdict in one call)
Agents
Tool
Description
s1_list_agents
List agents with OS, status, infection filters, and count-by grouping
s1_get_agent
Get agent details including version, site, and network info
s1_isolate_agent
Network isolate an endpoint (maintains S1 communication)
s1_reconnect_agent
Remove network isolation from an agent
Alerts
Tool
Description
s1_list_alerts
Query unified alerts via GraphQL — includes endpoint, process, command line, severity, and verdict
Intelligence
Tool
Description
s1_hash_reputation
Hash verdict lookup plus fleet-wide hunt via Deep Visibility
Deep Visibility
Tool
Description
s1_dv_query
Run a Deep Visibility query with automatic status polling