Linux
View all Worklets
LinuxLinux

Linux - Security - Install SentinelOne Agent

Deploy and register the SentinelOne endpoint security agent on Linux workstations and servers

Worklet Details

What the SentinelOne Agent Installer does

This Automox Worklet™ deploys the SentinelOne endpoint detection and response (EDR) agent to Linux endpoints. The Worklet handles both Debian-based and Red Hat-based distributions by detecting the available package manager and using the appropriate installation method.

After installation, the Worklet registers the agent with your SentinelOne management console by configuring the site token and starting the SentinelOne control service. This automated deployment method removes the need for manual agent installation across your Linux infrastructure.

Why deploy SentinelOne through Automox

Deploying endpoint security agents manually across a Linux fleet introduces delays that leave endpoints unprotected. Each unmonitored system represents a potential entry point for attackers, and Linux servers often handle critical infrastructure workloads that require continuous threat monitoring.

Automating SentinelOne deployment through Automox provides consistent coverage across your environment. You can target specific endpoint groups, schedule deployments during maintenance windows, and verify installation success through Automox reporting. This approach supports compliance requirements that mandate endpoint protection on all systems.

The Worklet handles distribution differences automatically, so you can deploy to mixed Ubuntu, Debian, CentOS, RHEL, and Fedora environments with a single policy.

How SentinelOne deployment works

  1. Evaluation phase: The Worklet executes the sentinelctl version command to check if SentinelOne is already installed. If the command succeeds, the endpoint is compliant and no action is needed. If the command fails, the endpoint is flagged for remediation.

  2. Remediation phase: The Worklet detects whether dpkg (Debian/Ubuntu) or rpm (RHEL/CentOS/Fedora) is available. It then installs the appropriate package file from the Automox cache. After successful installation, the Worklet configures the site token using sentinelctl management token set and starts the agent with sentinelctl control start.

SentinelOne deployment requirements

  • Linux endpoint with either dpkg (Debian/Ubuntu) or rpm (RHEL/CentOS/Fedora) package manager

  • SentinelOne installer packages (both .deb and .rpm files) uploaded to the Worklet

  • Valid SentinelOne site token from your management console

  • Root or sudo privileges on target endpoints

  • Configure the rpm_filename, deb_filename, and site_token variables in the remediation script

Expected state after SentinelOne installation

After successful remediation, the SentinelOne agent runs on the endpoint and appears in your SentinelOne management console. The agent actively monitors the system for threats and reports to your configured site. You can verify this change through the Automox Activity Log or by checking the endpoint configuration directly.

You can verify the installation by running sentinelctl version on the endpoint or by checking the SentinelOne console for the newly registered agent. The endpoint will show as protected in your security dashboard and begin receiving policy updates from SentinelOne.

How to validate install sentinelone agent changes

  1. Run this Worklet on a pilot Linux endpoint and review evaluation output for install sentinelone agent.

  2. Confirm Automox activity logs show successful completion and exit code 0.

  3. Verify endpoint state using checks aligned to evaluation script logic, such as exit, else.

  4. Validate remediation effects from script operations such as exit, elif, else, then rerun evaluation for compliance.

For technical validation, compare endpoint state to the Worklet evaluation logic and remediation flow for install sentinelone agent. This supports repeatable software lifecycle workflows, faster change control review, and auditable compliance evidence.

Useful script references for this Worklet include evaluation operations such as exit, else and remediation operations such as exit, elif, else. Use these indicators to verify that endpoint changes match intended policy outcomes.

View in app
evalutation image
remediation image

Consider Worklets your easy button

What's a Worklet?

A Worklet is an automation script, written in Bash or PowerShell, designed for seamless execution on endpoints – at scale – within the Automox platform. Worklet automation scripts perform configuration, remediation, and the installation or removal of applications and settings across Windows, macOS, and Linux.

do more with worklets