Skip to content

Commit bf7f505

Browse files
committed
updates
1 parent 56a987e commit bf7f505

File tree

2 files changed

+1
-14
lines changed

2 files changed

+1
-14
lines changed

exposure-management/crowdstrike-data-connector.md

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,18 +17,6 @@ This article describes how to configure the CrowdStrike Falcon data connector fo
1717

1818
Before you configure the CrowdStrike data connector, ensure you have:
1919

20-
### Environmental Requirements
21-
22-
- Make sure your tenant has access to Microsoft Security Exposure Management
23-
- Make sure the user with which you logged in to Microsoft portal has one of the following roles on the provided tenant:
24-
- Global Administrator
25-
- Security Administrator
26-
- Security Operator
27-
- Or alternatively, you can use [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac) with the following permissions:
28-
- **Exposure Management (read)** for read-only access to Exposure Management experiences
29-
- **Exposure Management (manage)** for full access to manage Exposure Management experiences
30-
- **Core security settings (manage)** for connecting or changing vendor configurations (located under Authorization and settings category)
31-
3220
### CrowdStrike Requirements
3321

3422
- A CrowdStrike Falcon environment

exposure-management/sentinel-one-data-connector.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,15 +51,14 @@ To establish a connection with SentinelOne in Exposure Management, follow these
5151

5252
## Retrieved data
5353

54-
SentinelOne connector retrieves data on compute devices, including endpoints, servers, and other managed assets, along with security findings and threat detection data from SentinelOne on those assets. It also retrieves network and configuration information to identify those devices.
54+
SentinelOne connector retrieves data on compute devices, including endpoints, servers, and other managed assets, along with security findings and threat detection data from SentinelOne on those assets. It also retrieves network information to identify those devices.
5555

5656
Only devices that were active in the last 90 days are retrieved, based on the last activity timestamp in SentinelOne.
5757

5858
| **Category** | **Properties** |
5959
|-------------------------|--------------------------------------------------------------------------------|
6060
| **Assets/devices** | - Endpoint information<br>- Operating system details<br>- Network interfaces<br>- Agent status<br>- Device classification<br>- SentinelOne criticality data |
6161
| **Security findings** | SentinelOne retrieves CVE findings on the assets that it ingests. |
62-
| **Configuration data** | - Agent configurations<br>- Policy assignments<br>- Compliance status<br>- Protection status |
6362

6463
## Troubleshooting the SentinelOne data connector
6564

0 commit comments

Comments
 (0)