diff --git a/public/docs-static/img/how-to-guides/crowdstrike-groups-zta.png b/public/docs-static/img/how-to-guides/crowdstrike-groups-zta.png
new file mode 100644
index 00000000..69423997
Binary files /dev/null and b/public/docs-static/img/how-to-guides/crowdstrike-groups-zta.png differ
diff --git a/public/docs-static/img/how-to-guides/crowdstrike-groups.png b/public/docs-static/img/how-to-guides/crowdstrike-groups.png
deleted file mode 100644
index b61d3aff..00000000
Binary files a/public/docs-static/img/how-to-guides/crowdstrike-groups.png and /dev/null differ
diff --git a/src/components/NavigationDocs.jsx b/src/components/NavigationDocs.jsx
index c2e1a901..a5cc352a 100644
--- a/src/components/NavigationDocs.jsx
+++ b/src/components/NavigationDocs.jsx
@@ -105,7 +105,7 @@ export const docsNavigation = [
{title: 'Activity event streaming', href: '/how-to/activity-event-streaming-to-siem-systems' },
{title: 'Identity provider sync', href: '/how-to/idp-sync' },
{title: 'Enable post quantum cryptography', href: '/how-to/enable-post-quantum-cryptography' },
- {title: 'Endpoint Detection and Response (EDR)', href: '/how-to/endpoint-detection-and-response' },
+ {title: 'Endpoint detection and response (EDR)', href: '/how-to/endpoint-detection-and-response' },
]
},
diff --git a/src/pages/how-to/approve-peers.mdx b/src/pages/how-to/approve-peers.mdx
index 543ecfa5..ce7eba07 100644
--- a/src/pages/how-to/approve-peers.mdx
+++ b/src/pages/how-to/approve-peers.mdx
@@ -29,6 +29,11 @@ To approve a peer, navigate to the [peers tab](https://app.netbird.io/peers) and
diff --git a/src/pages/how-to/endpoint-detection-and-response.mdx b/src/pages/how-to/endpoint-detection-and-response.mdx index bc58995b..de99ea16 100644 --- a/src/pages/how-to/endpoint-detection-and-response.mdx +++ b/src/pages/how-to/endpoint-detection-and-response.mdx @@ -1,4 +1,4 @@ -# Endpoint Detection and Response (EDR) +# Endpoint detection and response (EDR) Endpoint Detection and Response (EDR) is a cybersecurity technology designed to help organizations detect, investigate, and respond to threats on endpoint devices. An endpoint is any device that is connected to a network, such as laptops, @@ -12,6 +12,9 @@ NetBird integrates with major EDR platforms to restrict network access only to d With the integration enabled, NetBird synchronizes the list of devices managed by the EDR platform via the API and checks the presence of the EDR agent on the device, blocking access to the network if the agent is not installed. +In addition to the aforementioned features, the system also has the capability to check the Zero Trust Assessment (ZTA) score of the hosts. +The system can limit network access based on this ZTA score. For instance, if a device has a ZTA score below the set threshold, it may be deemed too risky and thus, denied access to the network. + NetBird doesn't apply the EDR checks to all devices in the network. Instead, you can select specific groups of devices for the checks to apply. @@ -31,6 +34,7 @@ Before you start creating and configuring a CrowdStrike integration, ensure that - Navigate to the [API clients and keys](https://falcon.eu-1.crowdstrike.com/api-clients-and-keys/) page - Click `Create API client` at the top, right corner - Set Hosts - Read permission +- Set Zero Trust Assessment - Read permission - Click `Create` - Copy the credentials. You will need these credentials when configuring an integration in NetBird. @@ -50,13 +54,14 @@ Before you start creating and configuring a CrowdStrike integration, ensure that
-
+