mirror of
https://github.com/netbirdio/docs.git
synced 2026-04-18 00:16:36 +00:00
CrowdStrike integration (#177)
This commit is contained in:
BIN
public/docs-static/img/how-to-guides/crowdstrike-credentials.png
Normal file
BIN
public/docs-static/img/how-to-guides/crowdstrike-credentials.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 87 KiB |
BIN
public/docs-static/img/how-to-guides/crowdstrike-groups.png
Normal file
BIN
public/docs-static/img/how-to-guides/crowdstrike-groups.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 49 KiB |
BIN
public/docs-static/img/how-to-guides/crowdstrike-integration.png
Normal file
BIN
public/docs-static/img/how-to-guides/crowdstrike-integration.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 86 KiB |
BIN
public/docs-static/img/how-to-guides/crowdstrike-region.png
Normal file
BIN
public/docs-static/img/how-to-guides/crowdstrike-region.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 61 KiB |
BIN
public/docs-static/img/how-to-guides/edr-approval-required.png
Normal file
BIN
public/docs-static/img/how-to-guides/edr-approval-required.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 71 KiB |
@@ -105,7 +105,7 @@ export const docsNavigation = [
|
|||||||
{title: 'Activity event streaming', href: '/how-to/activity-event-streaming' },
|
{title: 'Activity event streaming', href: '/how-to/activity-event-streaming' },
|
||||||
{title: 'Identity provider sync', href: '/how-to/idp-sync' },
|
{title: 'Identity provider sync', href: '/how-to/idp-sync' },
|
||||||
{title: 'Enable post quantum cryptography', href: '/how-to/enable-post-quantum-cryptography' },
|
{title: 'Enable post quantum cryptography', href: '/how-to/enable-post-quantum-cryptography' },
|
||||||
|
{title: 'Endpoint Detection and Response (EDR)', href: '/how-to/endpoint-detection-and-response' },
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
|
||||||
|
|||||||
88
src/pages/how-to/endpoint-detection-and-response.mdx
Normal file
88
src/pages/how-to/endpoint-detection-and-response.mdx
Normal file
@@ -0,0 +1,88 @@
|
|||||||
|
# Endpoint Detection and Response (EDR)
|
||||||
|
|
||||||
|
Endpoint Detection and Response (EDR) is a cybersecurity technology designed to help organizations detect, investigate,
|
||||||
|
and respond to threats on endpoint devices. An endpoint is any device that is connected to a network, such as laptops,
|
||||||
|
desktops, smartphones, tablets, servers, and even some IoT (Internet of Things) devices.
|
||||||
|
|
||||||
|
With the rise of remote work, endpoints often operate outside the traditional corporate network perimeter,
|
||||||
|
making them more vulnerable to attacks. EDR provides a layer of security that is not dependent on the physical location
|
||||||
|
of the endpoint, thus extending protection to remote workers and their devices.
|
||||||
|
|
||||||
|
NetBird integrates with major EDR platforms to restrict network access to only those devices managed by the company's IT department.
|
||||||
|
With the integration enabled, NetBird synchronizes the list of devices managed by the EDR platform via the API and
|
||||||
|
checks the presence of the EDR agent on the device, blocking access to the network if the agent is not installed.
|
||||||
|
|
||||||
|
NetBird doesn't apply the EDR checks to all devices in the network. Instead, you can select specific groups of devices for
|
||||||
|
the checks to apply.
|
||||||
|
|
||||||
|
This document offers instructions and best practices for setting up NetBird with different EDR platforms.
|
||||||
|
|
||||||
|
<Note>
|
||||||
|
This feature is only available in the cloud version of NetBird.
|
||||||
|
</Note>
|
||||||
|
|
||||||
|
## CrowdStrike
|
||||||
|
|
||||||
|
Before you start creating and configuring a CrowdStrike integration, ensure that you have the following:
|
||||||
|
- A CrowdStrike account with the permissions to create and manage API keys. If you don't have the required permissions, ask your CrowdStrike administrator to grant them to you.
|
||||||
|
|
||||||
|
### Step 1: Create a CrowdStrike API key
|
||||||
|
|
||||||
|
- Navigate to the [API clients and keys](https://falcon.eu-1.crowdstrike.com/api-clients-and-keys/) page
|
||||||
|
- Click `Create API client` at the top, right corner
|
||||||
|
- Set Hosts - Read permission
|
||||||
|
- Click `Create`
|
||||||
|
- Copy the credentials. You will need these credentials when configuring an integration in NetBird.
|
||||||
|
|
||||||
|
### Step 2: Configure a CrowdStrike integration in NetBird
|
||||||
|
|
||||||
|
- Navigate to the [Integrations » EDR](https://app.netbird.io/integrations?tab=edr) tab in the NetBird dashboard
|
||||||
|
- Click `Connect CrowdStrike` to start the configuration wizard
|
||||||
|
<p>
|
||||||
|
<img src="/docs-static/img/how-to-guides/crowdstrike-integration.png" alt="event-streaming-integration" className="imagewrapper-big"/>
|
||||||
|
</p>
|
||||||
|
|
||||||
|
- First, select the region of your CrowdStrike account
|
||||||
|
<p>
|
||||||
|
<img src="/docs-static/img/how-to-guides/crowdstrike-region.png" alt="crowdstrike-region" className="imagewrapper"/>
|
||||||
|
</p>
|
||||||
|
- Then enter the client ID and secret key you created in [Step 1](#step-1-create-a-crowd-strike-api-key) and click `Continue`
|
||||||
|
<p>
|
||||||
|
<img src="/docs-static/img/how-to-guides/crowdstrike-credentials.png" alt="crowdstrike-credentials" className="imagewrapper"/>
|
||||||
|
</p>
|
||||||
|
- Select groups you want to apply the integration to and click `Connect`.
|
||||||
|
<p>
|
||||||
|
<img src="/docs-static/img/how-to-guides/crowdstrike-groups.png" alt="crowdstrike-groups" className="imagewrapper"/>
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<Note>
|
||||||
|
The EDR check will apply only to machines in the selected groups and will require the presence of the CrowdStrike agent.
|
||||||
|
</Note>
|
||||||
|
<Note>
|
||||||
|
You can also use groups [synchronized from your Identity Provider (IdP)](/how-to/idp-sync).
|
||||||
|
</Note>
|
||||||
|
|
||||||
|
- Peers that have the CrowdStrike agent installed will be granted access to the network. Peers without the agent will appear
|
||||||
|
with a `Approval required` mark in the peers list and won't be able to access the network until the agent is installed.
|
||||||
|
|
||||||
|
<p>
|
||||||
|
<img src="/docs-static/img/how-to-guides/edr-approval-required.png" alt="edr-approval-required" className="imagewrapper-big"/>
|
||||||
|
</p>
|
||||||
|
|
||||||
|
- Optional. You can experiment and see how the integration works by hiding hosts in the CrowdStrike Host management console:
|
||||||
|
- Navigate to the [Host management](https://falcon.crowdstrike.com/host-management/hosts) page in the CrowdStrike console
|
||||||
|
- Select a host you want to hide
|
||||||
|
- Click `Actions` and then `Hide`
|
||||||
|
- The host will be moved to Trash (you can restore it later)
|
||||||
|
- After about a minute, the peer will be disconnected from the network and marked as `Approval required` in the NetBird dashboard.
|
||||||
|
- To restore the host in CrowdStrike, navigate to the Trash and click `Restore`
|
||||||
|
|
||||||
|
<Note>
|
||||||
|
NetBird synchronizes the list of devices managed by the EDR platform via the API about every minute.
|
||||||
|
The changes might not be visible immediately.
|
||||||
|
</Note>
|
||||||
|
|
||||||
|
<Note>
|
||||||
|
If you install the CrowdStrike agent on a peer after it joined the network, you will need to disconnect and reconnect
|
||||||
|
this peer for the `Approval required` mark to disappear.
|
||||||
|
</Note>
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
export const title = 'IdP Sync'
|
export const title = 'Identity Provider synchronization'
|
||||||
|
|
||||||
## IdP sync
|
## Identity Provider synchronization
|
||||||
|
|
||||||
Welcome to our comprehensive guide on configuring Identity Provider (IdP) for users and groups synchronization. This document provides step-by-step instructions and best practices for setting up and managing your synchronization processes effectively.
|
Welcome to our comprehensive guide on configuring Identity Provider (IdP) for users and groups synchronization. This document provides step-by-step instructions and best practices for setting up and managing your synchronization processes effectively.
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user