Get started - it's free!
Log in
© 2026

Restrict device access with SentinelOne

SentinelOne device posture integration is available for the Enterprise plan.

SentinelOne collects a series of signals from its agents that can be used to determine the security posture of a device. Tailscale can fetch these signals from SentinelOne and use them as device posture attributes in access rules, which can allow organizations to grant access to sensitive resources only to devices that have a high enough level of trust.

This can be achieved using Tailscale's device posture management features:

  • SentinelOne posture integration, which synchronizes signals from SentinelOne to device posture attributes in Tailscale.
  • Device Identity Collection, which collects identifiers (for example, serial numbers), used to match devices in Tailscale to devices in SentinelOne.
  • Posture conditions in access rules, which lets you configure access restrictions based on device attributes.

This guide explains how to enable Device Identity collection for your Tailscale network (tailnet) and configure SentinelOne posture integration.

What is SentinelOne posture integration?

The SentinelOne integration syncs data between SentinelOne and Tailscale on a recurring schedule. During each sync, Tailscale performs the following actions:

  1. Fetches a list of agents and their reported data from your SentinelOne account.
  2. Matches SentinelOne agents to devices in your tailnet based on serial numbers.
  3. Writes the SentinelOne data to device posture attributes on each matched device.

The integration writes the following device posture attributes to matched devices:

Attribute keyDescriptionAllowed values
sentinelOne:operationalStateOperational state of the agent, the string na means that the agent has not been disabled or corrupted. This is the expected state.string
sentinelOne:activeThreatsNumber of active threats detected by the agentnumber
sentinelOne:agentVersionVersion of the running SentinelOne agentversion
sentinelOne:encryptedApplicationsWhether the agent detects that the disk is encryptedtrue, false
sentinelOne:firewallEnabledWhether the agent detects that the firewall is enabledtrue, false
sentinelOne:infectedWhether the agent detects that the device is infectedtrue, false

Prerequisites

Create SentinelOne Service User and API Token

To authenticate your SentinelOne account with Tailscale, you'll need to create a SentinelOne User and API token. The SentinelOne integration uses these to fetch a list of agents and their data from SentinelOne.

To create a SentinelOne User and API token:

  1. In SentinelOne, in the left-hand panel, select Settings.

  2. From the top menu, select Users and then in the left-hand panel, select Service Users.

  3. Select Actions and then select Create New Service User.

  4. Add a name and expiration date for the Service User and select Next.

    The SentinelOne Create New Service User dialog
  5. Choose the site or account that the Service User will have access to and select Create.

  6. The API Token will be shown once, make sure to copy it for use later.

Also make a note of the Base URL (for example, https://example.sentinelone.net/).

Configure SentinelOne posture integration

To configure Tailscale to fetch data about agents from SentinelOne:

  1. Open the Device management page of the Tailscale admin console.

  2. Under the Device Posture Integrations section, locate the SentinelOne integration, then select Connect.

  3. Enter your SentinelOne URL, the URL you use to access the SentinelOne console.

  4. Enter your API Token.

    The configuration screen for connecting to SentinelOne from the Tailscale admin console.
  5. Select Connect to SentinelOne.

Check the integration status

After you set up the SentinelOne integration, check to ensure the integration has run successfully. You can do so by visiting the Device Posture Integrations section of the Device management page. This page shows the configured integrations and their statuses under the Integrations section. For the SentinelOne integration, it should have the time of the most recent sync, the number of synced agents, and any errors that occurred while synchronizing.

Integrations: SentinelOne: Last sync 4 minutes ago, 1 match between 2 Tailscale devices with identifies and 3 SentinelOne agents.

Check node attributes

After you configure SentinelOne integration, you can confirm that Tailscale is writing the new attributes for your SentinelOne agents on the Machines page of the admin console.

  1. Open the Machines page of the Tailscale admin console.
  2. Select a device to inspect.
  3. The attributes for the device are in the Machine Details section. This should include the set of sentinelOne: attributes listed previously.
View of the machine attributes in the Machines page.

You can also check device attributes using the Tailscale API.

Adjust Tailscale access rules

After you configure SentinelOne posture integration, and your devices have device posture attributes that reflect their signals as reported by SentinelOne, you can use those device posture attributes as part of your posture rules.

For example, to only permit access to tag:production from devices that have an active SentinelOne agent, a good operational state, and have zero active threats, you can create a new posture and use it as part of a corresponding access rule:

"postures": {
  "posture:trusted": [
    "sentinelOne:operationalState == 'na'",
    "sentinelOne:activeThreats == 0",
  ],
},
"grants": [
  {
    "src": ["autogroup:member"],
    "dst": ["tag:production"],
    "ip": ["*"],
    "srcPosture": ["posture:trusted"]
  }
]

You can use the visual policy editor to manage your tailnet policy file. Refer to the visual editor reference for guidance on using the visual editor.

Schedule

For each configured integration, Tailscale will aim to sync device posture attributes every 15 minutes, with a few exceptions:

  • Adding a new integration, or changing configuration of an existing one, will trigger an out-of-schedule sync.
  • If an integration fails due to authentication error (usually caused by invalid credentials), it will be paused for up to 24 hours.

Limitations

  • We have observed that SentinelOne does not report serial numbers for some machines running Linux. Without serial number details, Tailscale will not be able to populate device posture attributes for such machines.

Audit log events

The following audit log events are added for device posture.

TargetActionDescription
IntegrationCreate posture integrationA new posture integration was created
IntegrationUpdate posture integrationA posture integration was updated
IntegrationRemoved posture integrationA posture integration was removed
NodeUpdate node attributeDevice posture attributes for a node were changed

Last updated Jan 16, 2026