This section provides information about integrating Sentinel with external systems.
Section 16.0, Configuring Actions
Section 17.0, Configuring Integrators
Section 18.0, Integrating Identity Information
Section 19.0, Configuring Threat Intelligence Data Sources
Section 20.0, Detecting Vulnerabilities and Exploits