Thanks to visit codestin.com
Credit goes to docs.axonius.com

CrowdStrike Falcon Identity Protection (Preempt)

CrowdStrike Falcon Identity Protection (formerly Preempt) lets organizations reduce user risk on their attack surface and preempt threats in real-time with conditional access. It continuously analyzes, adapts and responds to threats based on identity, behavior, and risk to resolve insider threats and targeted attacks.

📘

Note

It is possible to connect using either CrowdStrike or Preempt credentials.

Asset Types Fetched

This adapter fetches the following types of assets:

  • Devices, Users

Before You Begin

Authentication Methods

You can connect the adapter using either a Preempt API Key OR Client ID and Client Secret (CrowdStrike OAuth2).

Required Permissions

If you authenticate with an API Key, the supplied value must be associated with the following credentials:

CredentialPermission
Identity Protection AssessmentRead
Identity Protection DetectionsRead
Identity Protection EnforcementRead
Identity Protection EntitiesRead
Identity Protection GraphQLWrite
Identity Protection HealthRead
Identity Protection on-premise enablementRead
Identity Protection TimelineRead

Connecting the Adapter in Axonius

Required Parameters

  1. Preempt Domain - The hostname of the Preempt server.

When authenticating with an API Key:

  1. Preempt API Key - An API Key created in the Preempt console. In the Administration page, select Connectors > API Keys tab. Select API Token and then generate and copy an API key.

When authenticating with CrowdStrike OAuth2:

  1. Use CrowdStrike OAuth2 - Select to authenticate using CrowdStrike OAuth2, in this case use the CrowdStrike Client ID and Secret.
  2. CrowdStrike Client ID and CrowdStrike Client Secret - Credentials for a CrowdStrike account. For more information, see CrowdStrike Falcon Required Permissions.

Optional Parameters

  1. HTTPS Proxy - Connect the adapter to a proxy instead of directly connecting it to the domain.

To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.

Advanced Settings

📘

Note

Advanced settings can either apply to all connections for this adapter, or to a specific connection. Refer to Advanced Configuration for Adapters.

  1. Do not fetch devices without 'Last Seen (default: true) - Select whether to exclude devices that do not have `last seen' indication.
  2. Do not fetch devices without hostname (default: true) - Select whether to exclude devices that do not have a hostname.
  3. Do not fetch devices with IP as hostname - Select this option to exclude devices that have IPs as Hostname.
  4. Only fetch active Users - Select this option to only fetch users who aren't archived.
  5. Ignore Programmatic users for device ownership - Select this option to ignore the owner listed as device owner if it is a service account.
  6. Filter by Domain - Toggle on filter by domain.
  7. Domain list - Enter a comma-separated list of domains to filter by.
  8. Rename risk factors - Select this option to rename risk factors.
  9. Exclude devices with UNMANAGED_HOST risk status - Select this option to exclude devices with the risk factor type of 'UNMANAGED_HOST'.
  10. Fetch user authorizees - Select this option to fetch user authorizees.
  11. Fetch duplicate password accounts - Select this option to fetch duplicate password accounts.