- 16 Mar 2023
- 1 Minute to read
-
Print
-
DarkLight
-
PDF
CrowdStrike Falcon - Isolate and Unisolate
- Updated on 16 Mar 2023
- 1 Minute to read
-
Print
-
DarkLight
-
PDF
CrowdStrike Falcon - Isolate quarantines each of the assets (endpoints) retreived from the saved query supplied as a trigger (or devices that have been selected in the asset table), from the network.
CrowdStrike Falcon -Unisolate restores full network connectivity to each of the assets (endpoints) retreived from the saved query supplied as a trigger.
See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.
General Settings
- Enforcement Set name (required) - The name of the Enforcement Set. A default value is added by Axonious. You can change the name according to your needs.
- Add description (optional) - Click to add a description of the Enforcement Set. It is recommended to describe what the Enforcement Set does.
- Run action on assets matching following query (required) - Select an asset category and a query. The Enforcement Action will be run on the assets that match the query parameters.
- A query only returns results for the asset type it was created for.
- Not all asset categories are supported for all Enforcement Actions.
- See Actions supported for Activity Logs and Adapter Fetch History Modules
- Action name - The name of the Main action. A default value is added by Axonious. You can change the name according to your needs.
- Configure Action Conditions - Toggle on to enter a condition statement. See Configuring Enforcement Action Conditions to learn more about condition statement syntax.
Isolate in CrowdStrike Falcon
To configure CrowdStrike Falcon - Isolate, from the Action Library, click Execute Endpoint Security Agent Action, and then click CrowdStrike Falcon - Isolate.
Connection Settings
- Instance name (required) - The Axonius node to utilize when connecting to the specified host. For more details, see Connecting Additional Axonius Nodes.
Required Permissions
See CrowdStrike Falcon adapter - Required Permissions.
Unisolate in CrowdStrike Falcon
To configure the CrowdStrike Falcon -Unisolate action, from the Action Library, click Execute Endpoint Security Agent Action, and then click CrowdStrike Falcon -Unisolate.
Connection Settings
- Instance name (required) - The Axonius node to utilize when connecting to the specified host. For more details, see Connecting Additional Axonius Nodes.
Required Permissions
See CrowdStrike Falcon adapter - Required Permissions.
For more details about other Enforcement Actions available, see Action Library.