Skip to content

Commit 8b7467f

Browse files
joepeeplescolleenmcginnisnastasha-solomon
authored
Known Issues + Access requirements for Crowdstrike Connector (#5848)
* First draft * mdx to asciidoc * Apply suggestions from Nastasha's review Co-authored-by: Nastasha Solomon <[email protected]> --------- Co-authored-by: Colleen McGinnis <[email protected]> Co-authored-by: Nastasha Solomon <[email protected]>
1 parent 4e0ee5f commit 8b7467f

File tree

5 files changed

+35
-4
lines changed

5 files changed

+35
-4
lines changed

docs/management/admin/response-actions-config.asciidoc

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,16 @@ Expand a section below for your endpoint security system:
3838
. **Enable API access in CrowdStrike.** Create an API client in CrowdStrike to allow access to the system. Refer to CrowdStrike's docs for instructions.
3939
+
4040
- Give the API client the minimum privilege required to read CrowdStrike data and perform actions on enrolled hosts. Consider creating separate API clients for reading data and performing actions, to limit privileges allowed by each API client.
41+
* To isolate and release hosts, the API client must have `Read` access for Alerts, and `Read` and `Write` access for Hosts.
42+
4143
- Take note of the client ID, client secret, and base URL; you'll need them in later steps when you configure {elastic-sec} components to access CrowdStrike.
4244
45+
- The base URL varies depending on your CrowdStrike account type:
46+
* US-1: `https://api.crowdstrike.com`
47+
* US-2: `https://api.us-2.crowdstrike.com`
48+
* EU-1: `https://api.eu-1.crowdstrike.com`
49+
* US-GOV-1: `https://api.laggar.gcw.crowdstrike.com`
50+
4351
. **Install the CrowdStrike integration and {agent}.** Elastic's {integrations-docs}/crowdstrike[CrowdStrike integration]
4452
collects and ingests logs into {elastic-sec}.
4553
+

docs/management/admin/third-party-actions.asciidoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ You can perform response actions on hosts enrolled in other third-party endpoint
1616
* Third-party response actions require an https://www.elastic.co/pricing[Enterprise subscription].
1717

1818
* Each response action type has its own user role privilege requirements. Find an action's role requirements at <<response-actions>>.
19+
20+
* Additional <<response-actions-config,configuration>> is required to connect {elastic-sec} with a third-party system.
1921
--
2022

2123
[discrete]

docs/release-notes/8.15.asciidoc

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ On October 17, 2024, this issue was resolved.
157157
==== Bug fixes
158158

159159
* Fixes an {elastic-defend} bug that affected CPU usage for Windows process events where the same executable is repeatedly launched, for example, during compilation workloads. With this fix, CPU usage is improved.
160-
* Fixes an {elastic-defend} bug that sometimes caused malware scan response actions to crash when they attempted to scan an inaccessible directory.
160+
* Fixes an {elastic-defend} bug that sometimes caused malware scan response actions to crash when they attempted to scan an inaccessible directory.
161161
* Fixes an {elastic-defend} bug that sometimes caused {elastic-endpoint} to report an incorrect version if it used an independent {agent} release.
162162
* Fixes an {elastic-defend} bug where the `process.thread.Ext.call_stack_final_user_module.protection_provenance_path` field might be populated with a non-path value. This fix is for Windows endpoints only.
163163
* Fixes an {elastic-defend} bug that can lead to {elastic-endpoint} reporting `STATUS_ACCESS_DENIED` when attempting to open files for `GENERIC_READ`. {elastic-endpoint} almost always recovered from this issue, but with this fix, it succeeds on the first try. This fix is for Windows endpoints only.
@@ -196,7 +196,7 @@ On August 1, 2024, it was discovered that Elastic AI Assistant's responses when
196196
[%collapsible]
197197
====
198198
*Details* +
199-
On August 20, 2024, it was discovered that the bulk actions menu on the Rules page erroneously had the option to manually run multiple rules.
199+
On August 20, 2024, it was discovered that the bulk actions menu on the Rules page erroneously had the option to manually run multiple rules.
200200
201201
*Workaround* +
202202
Upgrade to 8.15.1.
@@ -224,6 +224,20 @@ On September 5, 2024, this issue was resolved.
224224
====
225225
// end::known-issue-14686[]
226226

227+
// tag::known-issue-crowdstrike-response-actions[]
228+
[discrete]
229+
.CrowdStrike response actions (isolate and release host) not working
230+
[%collapsible]
231+
====
232+
*Details* +
233+
A bug prevented third-party response actions with CrowdStrike from working.
234+
235+
*Workaround* +
236+
Upgrade to 8.15.1 or later.
237+
238+
====
239+
// end::known-issue-crowdstrike-response-actions[]
240+
227241
// tag::known-issue-192084[]
228242
[discrete]
229243
.Alerts wrongfully inherit previously-selected tags
@@ -267,7 +281,7 @@ On October 17, 2024, this issue was resolved.
267281
* Adds an API that allows you to perform paginated KQL searches through asset criticality records ({kibana-pull}186568[#186568]).
268282
* Adds public APIs for managing asset criticality ({kibana-pull}186169[#186169]).
269283
* Allows you to edit the `max_signals`, `related_integrations`, and `required_fields` fields for custom rules ({kibana-pull}179680[#179680], {kibana-pull}178295[#178295], {kibana-pull}180682[#180682]).
270-
* Provides help from AI Assistant when you're correcting rule query errors ({kibana-pull}179091[#179091]).
284+
* Provides help from AI Assistant when you're correcting rule query errors ({kibana-pull}179091[#179091]).
271285
* Allows you to bulk update custom highlighted fields for rules ({kibana-pull}179312[#179312]).
272286
* Adds alert suppression for {ml} and {esql} rules ({kibana-pull}181926[#181926], {kibana-pull}180927[#180927]).
273287
* Provides previews of hosts, users, and alerts that you're examining in the alert details flyout ({kibana-pull}186850[#186850], {kibana-pull}186857[#186857]).
@@ -293,7 +307,7 @@ On October 17, 2024, this issue was resolved.
293307
* Updates the copy for bulk assigning asset criticality to multiple entities ({kibana-pull}181390[#181390]).
294308
* Improves visual and logic issues in the Findings table ({kibana-pull}184185[#184185]).
295309
* Enables the expandable alert details flyout by default and replaces the `securitySolution:enableExpandableFlyout` advanced setting with a feature flag that allows you to revert to the old flyout version ({kibana-pull}184169[#184169]).
296-
* Improves the UI design and copy of various places in the alert details flyout ({kibana-pull}187430[#187430], {kibana-pull}187920[#187920]).
310+
* Improves the UI design and copy of various places in the alert details flyout ({kibana-pull}187430[#187430], {kibana-pull}187920[#187920]).
297311
* Updates the MITRE ATT&CK framework to version 15.1 ({kibana-pull}183463[#183463]).
298312
* Improves the warning message about rule actions being unavailable after a rule ran ({kibana-pull}182741[#182741]).
299313
* Enables the `xMatters` and `Server Log connectors` rule actions ({kibana-pull}172933[#172933]).

docs/serverless/endpoint-response-actions/response-actions-config.asciidoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,13 @@ To configure response actions for CrowdStrike-enrolled hosts:
4747
. **Enable API access in CrowdStrike.** Create an API client in CrowdStrike to allow access to the system. Refer to CrowdStrike's docs for instructions.
4848
+
4949
** Give the API client the minimum privilege required to read CrowdStrike data and perform actions on enrolled hosts. Consider creating separate API clients for reading data and performing actions, to limit privileges allowed by each API client.
50+
*** To isolate and release hosts, the API client must have `Read` access for Alerts, and `Read` and `Write` access for Hosts.
5051
** Take note of the client ID, client secret, and base URL; you'll need them in later steps when you configure {elastic-sec} components to access CrowdStrike.
52+
** The base URL varies depending on your CrowdStrike account type:
53+
*** US-1: `https://api.crowdstrike.com`
54+
*** US-2: `https://api.us-2.crowdstrike.com`
55+
*** EU-1: `https://api.eu-1.crowdstrike.com`
56+
*** US-GOV-1: `https://api.laggar.gcw.crowdstrike.com`
5157
. **Install the CrowdStrike integration and {agent}.** Elastic's {integrations-docs}/crowdstrike[CrowdStrike integration] collects and ingests logs into {elastic-sec}.
5258
+
5359
.. Go to **Project Settings** → **Integrations**, search for and select **CrowdStrike**, then select **Add CrowdStrike**.

docs/serverless/endpoint-response-actions/third-party-actions.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ You can perform response actions on hosts enrolled in other third-party endpoint
1515
====
1616
* Third-party response actions require the Endpoint Protection Complete <<elasticsearch-manage-project,project feature>>.
1717
* Each response action type has its own user role privilege requirements. Find an action's role requirements at <<security-response-actions>>.
18+
* Additional <<security-response-actions-config,configuration>> is required to connect {elastic-sec} with a third-party system.
1819
====
1920

2021
[discrete]

0 commit comments

Comments
 (0)