Skip to main content

Connect SentinelOne to Anzenna

This guide walks you through creating a service user in the SentinelOne Management Console and connecting it to Anzenna for endpoint security monitoring, threat detection, and device visibility.

Prerequisites

  • SentinelOne Management Console administrator access
  • Access to the Anzenna platform

Step-by-Step Instructions

Part 1: Create a Service User in SentinelOne

  1. Navigate to your SentinelOne Management Console and click on Service Users.
Click on Service Users
  1. Click on Actions.
Click on Actions
  1. Click on Create New Service User.
Click on Create New Service User
  1. Type Anzenna as the service user name.
Type Anzenna

Part 2: Set Token Expiration

  1. Click on the Expiration Date dropdown.
Click on the Expiration Date dropdown
  1. Click on Custom.
Click on Custom
  1. Pick a date, ideally 2 years out. Choosing a shorter time period will result in needing to rotate the API key sooner.
Pick a date, ideally 2 years out
  1. Pick a year.
Pick a year
  1. Pick a specific date.
Pick a date
  1. Click Apply to confirm the date selection.
Click on Apply

Part 3: Configure Scope and Create User

  1. Click Next to proceed to the scope configuration.
Click on Next
  1. Click on Select Scope of Access.
Click on Select Scope of Access
  1. Select the appropriate scope of access for your organization.
Click on Select Scope of Access
  1. Click Create User to finalize the service user.
Click on Create User

Part 4: Copy the API Token and Complete Setup

  1. Click Copy API Token to copy the generated token.
Click on Copy API Token
warning

The API token is only shown once. Copy it immediately and store it securely — if lost, you will need to regenerate a new token.

  1. Click Close to exit the dialog.
Click on Close
  1. In Anzenna, navigate to Settings > Integrations, find the SentinelOne card, paste the API token, enter your SentinelOne console URL, and click Save.
success

Your SentinelOne integration is now active. Anzenna will begin collecting endpoint data for security monitoring and threat visibility.