Breadcrumbs

SentinelOne Deployment

Overview

The SentinelOne + EnforceDNS integration offers a powerful, deployment path that enables DNS-layer threat protection using your existing SentinelOne footprint and Agent. By leveraging SentinelOne’s Cloud Funnel, EnforceDNS gains visibility into DNS activity across all managed endpoints—both on-network and remote—without needing to install a separate agent.

This integration not only allows EnforceDNS to detect and report on suspicious DNS activity, but optionally block malicious domains by dynamically updating SentinelOne’s Network Control firewall rules. It’s a fast and seamless way to roll out Protective DNS across your organization using infrastructure already in place.

If you're looking for rapid deployment with minimal friction, this option is a great fit—especially for environments that already rely on SentinelOne for endpoint security.

Prerequisites

  • SentinelOne is deployed on all target endpoints (Windows/macOS)

  • Cloud Funnel is licensed and enabled in your SentinelOne environment

  • You have access to the SentinelOne console and EnforceDNS portal

  • SentinelOne Role/Access Requirements

    • Optional, if blocking, API Token created from a service user with:

      • Account level scope access: Account

Please make sure your account level scope access is set as ‘Account’ and not ‘Site’. If set incorrectly, you’ll receive an API key issue error.

  • Minimum Built-in RBAC Role: Standard built-in RBAC role not recommended

    • Custom Role Requirements: Firewall -> Manage Rules and Tags=Allowed

husXt89A-QkvlmHeLfQBLPB0a4IXjUR0_I94hlE4UYYJUJfBXrqWX-Ffn_tdRtY-UEoha4BSxYej4gIgyLnIBjejT4cqmqY9PjkTBamJKk9RNwVEAyB_5uurAogI3hEvw8YbMvn0NLJzhNAgIydKLpo


Key Features, Benefits & Considerations

Features, Benefits

Considerations

Does not require installation of the EnforceDNS Agent

Requires SentinelOne Cloud Funnel license and configuration

Leverages existing SentinelOne deployment for fast rollout

Blocks occur at the IP level – may cause over-blocking in CDN or shared-host environments

Works across both on-network and off-network device

No user or device-level attribution in EnforceDNS


No per-user or group-based policy enforcement


No Local DNS, Split-Horizon or Safe Search capabilities




SentinelOne Deployment and Configuration Overview

By integrating EnforceDNS and SentinelOne, it’s easy to deploy EnforceDNS rapidly and easily throughout an organization. It enables all the EnforceDNS protection and blocking access to malicious domains. There are 2 parts to the integration:

  1. Reading all DNS query logs to gain visibility into DNS traffic (required for integration)

  2. Blocking access to malicious domains (optional)

When EnforceDNS identifies an FQDN for blocking, it adds it to SentinelOne's Network Control Sentinel as a firewall rule. Although the rule lists the FQDN, SentinelOne blocks based on the IP address the FQDN resolves to. Consequently, other FQDNs and domains may also get blocked if they share the same IP as the one listed in the firewall rule.

Deployment

S3 Bucket Creation
  1. Create an S3 Bucket on AWS for storing logs using SentinelOne’s recommended settings

    1. Instructions Here

Please be sure to give HYAS both ‘list’ & ‘get’ access for the integration to work.

Enabling Cloud Funnel Streaming
  1. On SentinelOne enable Cloud Funnel streaming

    1. Instructions Here

Configure Integration in EnforceDNS
  1. In EnforceDNS go to Configuration -> SentinelOne

    sN6sfNnhSuSbfW2uAgipLRY-swlLyqVOlOenJK-qdvSB16JQMG8c4xGBI-JB84vAdBPnpAnNLlaZqr-Acmx8KdWLG85y6j-Ro3eZZvN9kHsrrFo5oz5ebBTDRuFH-p_6JuPRePqM8bZBcgHPJ4b8Auw
  2. Set the integration to “Enabled” 

    Screenshot 2025-06-09 at 8.57.16 AM.png
  3. Configure the details of the AWS S3 bucket as configured in step 1

    Screenshot 2025-06-09 at 8.57.46 AM.png
  4. Click “Verify Access” to ensure everything is working correctly.

    1jBHjSL_cnZMhhAIsrB7sOpdwpXLlJ1MT8Vj9MSb-1ZUTEzRqmN9KKQCe-rQloW8Je2Zjldut032XINgjRwdUwRXk9js773vnhXJySro-jyJiqkwDUTTshjyolecOaYVA7GoxfN0ljRVmNDk7LYD_Ko
Enable Blocking - Optional

Only required if blocking of malicious domains is desired

  1. Obtain your SentinelOne Account ID

    1. In SentinelOne, navigate to Sentinels>Account Info. Your account ID will be in the on the left side of the page under your account name.

  2. Obtain SentinelOne API Token

    1. In SentinelOne create a new role with only the the following permissions

      1. Firewall -> Manage Rules and Tags = Allowed

      2. Instructions on creating a new role Here

    2. Create a Service User and assign the aforementioned role.

      1. Choose the Access Level Global or Account

      2. Make note of the API token generated as it is needed to complete the configuration and cannot be retrieved later (only reset)

      3. Instructions on creating a Service user Here

  3. Enter the SentinelOne Account ID, API Key and Tenant URL as configured in previous steps.

    Screenshot 2025-06-09 at 8.58.26 AM.png
  4. Click 'Verify SentinelOne Access’

  5. Click 'Save'

  6. Blocking is now configured.

SentinelOne Deployment Checklist & Verification

  • SentinelOne integration is enabled in the EnforceDNS portal
  • S3 access verified
  • DNS queries from SentinelOne-managed devices appear in Log View


Configuring Policies

Now that you’ve successfully deployed EnforceDNS, your environment is already safeguarded against malicious domains—including phishing sites, malware delivery networks, and command-and-control (C2) infrastructure (among others). These threats are blocked by default using HYAS’s infrastructure intelligence and real-time decision engine.

If you'd like to customize your protection further, you can configure additional policies—such as blocking unwanted content categories, managing allow/block lists, or tailoring behavior by source network or user group. [Learn how to configure policies →]