SentinelOne
Cloudflare Zero Trust can check if SentinelOne ↗ is running on a device to determine if a request should be allowed to reach a protected resource.
- SentinelOne agent is deployed on the device.
 - 
Cloudflare WARP client is deployed on the device. For a list of supported modes and operating systems, refer to WARP Client Checks.
 
- 
In Zero Trust ↗, go to Settings > WARP Client.
 - 
Scroll down to WARP client checks and select Add new.
 - 
Select SentinelOne.
 - 
You will be prompted for the following information:
- 
Name: Enter a unique name for this device posture check.
 - 
Operating system: Select your operating system. You will need to configure one posture check per operating system.
 - 
Application Path: Enter the full path to the SentinelOne process to be checked (for example,
C:\Program Files\SentinelOne\Sentinel Agent 21.7.4.1043\SentinelAgent.exe). - 
Signing certificate thumbprint (recommended): Enter the thumbprint of the publishing certificate used to sign the binary. This proves the binary came from SentinelOne and is the recommended way to validate the process.
 - 
SHA-256 (optional): Enter a SHA-256 value. This is used to validate the SHA256 signature of the binary and ensures the integrity of the binary file on the device. Note: do not fill out this field unless you strictly control updates to SentinelOne, as this will change between versions.
 
 - 
 
Next, go to Logs > Posture and verify that the SentinelOne check is returning the expected results.