Docy

Crowdstrike Plugin for User Risk Exchange

Crowdstrike Plugin for User Risk Exchange

This document explains how to configure the CrowdStrike v1.2.0 plugin integration with the User Risk Exchange module of the Netskope Cloud Exchange platform. This integration collects Host IDs and their scores from CrowdStrike’s platform to Netskope and performs actions based on the Host scores.

Prerequisites

  • Netskope Tenant (or multiple, for example, production and development/test instances).
  • A Netskope Cloud Exchange tenant with the User Risk Exchange module already configured.
  • Your CrowdStrike instance credentials (Client ID, Client Secret) for API Token.
  • A CrowdStrike Real-Time Response Administrator role for Put RTR Script action.
  • For each platform (Windows, Mac), there should be a response policy with Real Time Response (High-Risk Commands) enabled.
  • Connectivity to the following host: https://api.crowdstrike.com
Compatibility

Netskope CE: v4.1.0, v4.2.0

Performance Matrix

Below is the performance matrix calculated based on the stack size. With a Large Stack of CE, you can pull and store host scores for 500K records in ~40 minutes

Stack Size

Large

RAM: 32 GB

Core: 16

No. of Records

500K hosts

Time taken to ingest records with scores

~40 mins

Fetched record types

Hosts

Permissions
API Scopes Permissions

Refer to the Get Client ID and Client Secret section for obtaining and providing API scopes permissions.

Scope

Read

Write

Hosts

Yes

No

Real time response (admin)

Yes

Real time response

Yes

No

Zero Trust Assessment

Yes

Response Policy Permissions

Refer to Add Permission for Response Policy (RTR script Permission) sections for obtaining and providing Response Policy permissions.

Category

Type

Permission

Status

Real Time Response

High risk commands

put

Enable

Note: Response policy permissions are only needed when you want to use the Put RTR Script action.

API Details

API Detail

Method

Endpoint

API Scope

Get auth token

GET

/oauth2/token

None

Fetch Records

GET

/devices​/queries​/devices-scroll​/v1

Hosts (Read)

Fetch Scores

GET

/zero-trust-assessment​/entities​/assessments​/v1

Zero Trust Assessment (Read)

Get session ID

POST

/real-time-response/entities/sessions/v1

Readl time response (Read)

Get platform name

POST

/devices/entities/devices/v2

Hosts (Read)

Remove file from device

POST

/real-time-response/entities/admin-command/v1

Real time response admin (Write)

Get status of command

GET

/real-time-response/entities/admin-command/v1

Real time response admin (Write)

Put file on device

POST

/real-time-response/entities/admin-command/v1

Real time response admin (Write)

Delete the session

DELETE

/real-time-response/entities/sessions/v1

Real time response (Read)

User Agent

The user agent added for this plugin is in the following format: / which will be: netskope-ce-4.2.0-ure-crowdstrike/1.2.0

Workflow

  1. Get your CrowdStrike credentials.
  2. Configure the Crowdstrike Plugin for User Risk Exchange.
  3. Add Permissions for your Response Policy.
  4. Configure a Business Rull for the CrowdStrike plugin.
  5. Configure Actions for the CrowdStrike Plugin.
  6. Validate the CrowdStrike plugin.

Click play to watch a video.

 

Get your Crowdstrike Client ID and Client Secret

  1. Log in into your Crowdstrike platform. Go to the menu Icon >> Support and resources >> API clients and Keys.
  2. Click Add new API Client.
  3. Add the following scopes for using Crowdstrike URE plugin:

    Scope

    Read

    Write

    Hosts

    Yes

    No

    Real time response (admin)

    Yes

    Real time response

    Yes

    No

    Zero Trust Assessment

    Yes

  4. Copy the Client ID and Secret.

Add Permission for your Response Policy (RTR script Permission)

  1. Log in to the Falcon Crowdstrike UI.
  2. Click on the menu button in the top left corner. Go to Host Setup and management > Response Policies.
  3. For Windows, go to the policy that is to be used and click on the edit policy button on the right corner of the policy.
  4. Enable the below-mentioned permissions:

    Response Policy Permissions

    Category

    Type

    Permission

    Status

    Real Time Response

    High risk commands

    put

    Enable

    Also, refer to the below screenshot.

Configure the Crowdstrike Plugin

  1. In Cloud Exchange, go to Settings > Plugins. Search for and click on the Crowdstrike v1.2.0 (URE) plugin box.
  2. Add Configuration Name, Sync Interval, and enable the Use System Proxy if you are using a proxy for configuring the plugin.
  3. Click Next and enter the Base URL, Client ID, Client Secret, and Maximum Score (Maximum Score is the configuration parameter through which the plugin fetched scores of Hosts less than or equal to a given value).
  4. Click Next and set the score range from the Select Range page. When finished, click Save.

Create a User Risk Exchange Business Rule for CrowdStrike

  1. Go to Risk Exchange Module > User Risk Exchange > Business Rules and click Create New Rule.
  2. Enter the Rule Name and configure a query for business rules based on your requirement, and click Save.

Configure Netskope User Risk Exchange Actions for CrowdStrike

URE Crowdstrike supports the following two action types:

  • No Action
  • No action will be performed for this action. Users can generate UBA alerts in CTO by using this action and enabling the generate alerts toggle button.

Put RTR Script

Put RTR Script action will put a file on the host depending on their respective score. Below is score-file mapping(for putting files on the host machine based on their score) and steps on how to configure this action.

Score to file mapping

Score

File

Less than 260

crwd_zta_1_25.txt

260 to 510

crwd_zta_26_50.txt

510 to 760

crwd_zta_51_75.txt

760 to 100

crwd_zta_76_100.txt

Steps to configure the Action:

  1. Go to User Risk Exchange > Actions and click Add Action Configuration.
  2. Select the required Business Rule, Configuration, and Action from their respective dropdown.
  3. Click Save button.

Validate the CrowdStrike Plugin

Validate in Cloud Exchange

  1. Go to User Risk Exchange > Hosts. You will be able to see all the host and their scores pulled.
  2. When a user matches one of the configured business rules, the configured action would be performed on the user. This can be seen in the Risk Exchange > Action Logs.

Validate in Crowdstrike

  1. Log in to the Crowdstrike platform. Click on the menu option on the top left corner > Host Setup and management.
  2. You’ll see the number of hosts that are pulled from the platform as shown in the below snapshot.
Share this Doc
In this topic ...