mirror of
https://github.com/netbirdio/docs.git
synced 2026-04-20 01:16:36 +00:00
89 lines
5.1 KiB
Plaintext
89 lines
5.1 KiB
Plaintext
# Restrict Network Access with CrowdStrike Falcon®
|
|
|
|
[CrowdStrike Falcon](https://www.crowdstrike.com/platform/) is a cloud-based endpoint protection platform that provides
|
|
comprehensive visibility and threat detection capabilities. CrowdStrike Falcon agent runs on your devices (endpoints),
|
|
collects, and analyzes endpoint data to detect and respond to threats in real-time. The agent's presence on endpoints and data
|
|
it collects can be utilized to enforce access policies and limit network access according to the "health" status of the
|
|
endpoints.
|
|
|
|
The integration of NetBird with CrowdStrike Falcon provides organizations with network security controls that allow
|
|
only IT-managed devices running CrowdStrike to access the network. Additionally, the integration uses [CrowdStrike's Zero Trust Assessment (ZTA) score](https://www.crowdstrike.com/press-releases/crowdstrike-extends-zero-trust-to-endpoint-devices/),
|
|
enabling administrators to further limit network access based on the security posture of each device.
|
|
|
|
CrowdStrike's Zero Trust Assessment (ZTA) score is a numerical representation of the security posture of a device with
|
|
a value ranging from 0 to 100. The score is calculated based on various factors, including the device's security configuration,
|
|
software vulnerabilities, and CrowdStrike's threat intelligence data. By integrating with CrowdStrike Falcon,
|
|
NetBird can ensure that only devices with a high security posture can access the network.
|
|
|
|
In this guide, we will walk you through the configuration steps to integrate CrowdStrike Falcon with NetBird and use ZTA score
|
|
to allow network access to devices that meet a specified ZTA threshold.
|
|
|
|
## Prerequisites
|
|
|
|
Before you start creating and configuring a CrowdStrike integration, ensure that you have the following:
|
|
- A CrowdStrike account with the permissions to create and manage API keys.
|
|
If you don't have the required permissions, ask your CrowdStrike administrator to grant them to you.
|
|
|
|
## Create a CrowdStrike API Key
|
|
|
|
- Navigate to the [API clients and keys](https://falcon.eu-1.crowdstrike.com/api-clients-and-keys/) page
|
|
- Click `Create API client` at the top, right corner
|
|
- Set Hosts - Read permission
|
|
- Set Zero Trust Assessment - Read permission
|
|
- Click `Create`
|
|
- Copy the credentials. You will need these credentials when configuring an integration in NetBird.
|
|
|
|
## Configure a CrowdStrike Integration in NetBird
|
|
|
|
- Navigate to the [Integrations » EDR](https://app.netbird.io/integrations?tab=edr) tab in the NetBird dashboard
|
|
- Click `Connect CrowdStrike` to start the configuration wizard
|
|
<p>
|
|
<img src="/docs-static/img/how-to-guides/crowdstrike-integration.png" alt="event-streaming-integration" className="imagewrapper-big"/>
|
|
</p>
|
|
|
|
- First, select the region of your CrowdStrike account
|
|
<p>
|
|
<img src="/docs-static/img/how-to-guides/crowdstrike-region.png" alt="crowdstrike-region" className="imagewrapper"/>
|
|
</p>
|
|
- Then enter the client ID and secret key you created in [Step 1](#step-1-create-a-crowd-strike-api-key) and click `Continue`
|
|
<p>
|
|
<img src="/docs-static/img/how-to-guides/crowdstrike-credentials.png" alt="crowdstrike-credentials" className="imagewrapper"/>
|
|
</p>
|
|
- Select groups you want to apply the integration to
|
|
- If you would like to apply a ZTA threshold, then enable the [Zero Trust Assessment Score](https://www.crowdstrike.com/blog/tech-center/securing-private-applications-with-crowdstrike-zero-trust-assessment-and-aws-verified-access/) and set the desired limit, and click `Connect`.
|
|
<p>
|
|
<img src="/docs-static/img/how-to-guides/crowdstrike-groups-zta.png" alt="crowdstrike-groups-zta" className="imagewrapper"/>
|
|
</p>
|
|
|
|
<Note>
|
|
The EDR check will apply only to machines in the selected groups and will require a running CrowdStrike agent.
|
|
</Note>
|
|
<Note>
|
|
You can also use groups [synchronized from your Identity Provider (IdP)](/how-to/idp-sync).
|
|
</Note>
|
|
|
|
- Peers that have the CrowdStrike agent installed will be granted access to the network. Peers without the agent will appear
|
|
with a `Approval required` mark in the peers list and won't be able to access the network until the agent is installed.
|
|
|
|
<p>
|
|
<img src="/docs-static/img/how-to-guides/edr-approval-required.png" alt="edr-approval-required" className="imagewrapper-big"/>
|
|
</p>
|
|
|
|
- Optional. You can experiment and see how the integration works by hiding hosts in the CrowdStrike Host management console:
|
|
- Navigate to the [Host management](https://falcon.crowdstrike.com/host-management/hosts) page in the CrowdStrike console
|
|
- Select a host you want to hide
|
|
- Click `Actions` and then `Hide`
|
|
- The host will be moved to Trash (you can restore it later)
|
|
- After about a minute, the peer will be disconnected from the network and marked as `Approval required` in the NetBird dashboard.
|
|
- To restore the host in CrowdStrike, navigate to the Trash and click `Restore`
|
|
|
|
<Note>
|
|
NetBird synchronizes the list of devices managed by the EDR platform via the API about every minute.
|
|
The changes might not be visible immediately.
|
|
</Note>
|
|
|
|
<Note>
|
|
If you install the CrowdStrike agent on a peer after it joined the network, you will need to disconnect and reconnect
|
|
this peer for the `Approval required` mark to disappear.
|
|
</Note>
|