CrowdStrike Required Permissions

General

The user account used to connect the adapter must have the Assets:Read API scope permission.

Advanced Configuration

The following permissions are required for various Advanced Configurations:

Users

ScopePermission
User ManagementRead

Vulnerabilities

ScopePermission
vulnerabilities:readRead

Configuration Assessments

ScopePermission
Falcon Configuration Assessment:readRead

Axonius SaaS Applications Data

To fetch SaaS Applications data the following permissions are required:

ScopePermissionNotes
HostsRead
Host groupsRead
IOC ManagementRead
Prevention policiesRead
DetectionsRead
User ManagementRead
Sensor Update PoliciesRead
IndicatorsReadRequires CrowdStrike Falcon Intelligence Add-on to be deployed. Required to discover shadow SaaS applications.
VulnerabilitiesReadRequires an active subscription to the CrowdStrike Falcon Vulnerability module. It may assist to discover shadow SaaS applications.

Application Settings

To fetch Application Settings:

Create a user with permissions to fetch Axonius SaaS Applications data.

The credentials supplied must be associated with the following permissions:

  • View Quarantine File settings
  • View Response policies
  • The following scopes:
ScopePermission
HostsRead
Host groupsRead
IOC ManagementRead
Prevention policiesRead
Sensor update policiesWrite
Device Control PoliciesRead

Enforcement Actions

The following permissions are required to run CrowdStrike Enforcement Actions:

ScopePermission
HostsWrite