Knowledge Hub
The definitive guide to the Companion Sentinel intelligence layer, agent internals, and multimodal security orchestration model.
Getting Started
Deploying Companion Sentinel is a one-line operation. Our lightweight Bash agent executes read-only audits and pushes telemetry over an encrypted TLS 1.3 tunnel.
Provisioning Logic
curl -sL -H "X-Sentinel-Key: YOUR_SK" "https://the-companion.com/api/download/agent" | bashNote: Agent requires Root access for CIS and FIM deep-scans.
Intelligence Plane
Protocol Validation
Active kernel-level integrity monitoring. Audits system network stacks to ensure anti-spoofing and DDoS reflection protection protocols are strictly enforced.
Cryptographic Fingerprinting (FIM)
Advanced File Integrity Monitoring utilizes high-fidelity cryptographic seals for critical system assets, detecting unauthorized tampering attempts in real-time.
Heuristic Malware Discovery
Industrial-grade malware discovery. Employs behavioral analysis to detect backdoors, credential theft patterns, and remote loaders hidden within complex application hierarchies.
Real-time Threat Intelligence
Automated reconnaissance detection. Aggregates and analyzes aggressive external connection patterns to provide immediate visibility into emerging attack vectors.
Cross-Feed Vulnerability Scanning
Real-time synchronization with global security intelligence feeds to identify and remediate unpatched binary vulnerabilities across your entire fleet.
Hardware-Level Fingerprinting
Deep system topology profiling. Monitors kernel state, hardware architecture, and virtualization context for precise asset lifecycle management.
Advanced AI Interrogation
XDR Forensic Engine
Extended Detection and Response. Autonomous behavioral monitoring utilizing advanced heuristic signatures. Detects real-time threats including Ransomware patterns, PwnKit exploits, and unauthorized C2 connections.
Emergency Containment
One-click threat suppression. Every forensic detection includes an idempotent containment protocol to instantly isolate threats and terminate malicious processes.
Forensic Vision Sandbox
Visual forensic analysis. Paste terminal screenshots or upload technical logs (.log, .conf) for instant parsing. Secure artifact transport via Base64 encoding.
Continuous Interrogation
Multi-turn chat protocol. Interrogate technical findings iteratively to refine remediation scripts. Integrated context anchoring ensures 100% protocol stability.