Skip to main content

Overview


Cloud Exchange CRE’s integration with CrowdStrike gives you the ability to change a device’s status from Managed to Unmanaged (or vice versa) based off of the CrowdStrike Zero Trust Assessment (ZTA) score. This is helpful to give devices real time policy changes to protect your network when a device is seen as risky from the CrowdStrike sensor running on the device.


 


Requirements



  • CloudExchange 4.2 or newer

  • Basic Cloud Exchange setup (Netskope tenant API v1 and v2 setup)

  • Netskope plug - Netskope CRE

  • CrowdStrike CRE plugin version 1.1.0 or greater

  • CrowdStrike agent


Setup Steps


CrowdStrike



  1. Deploy CrowdStrike Falcon Sensors to your end devices

  2. Setup API clients and keys


 


Netskope Cloud Exchange



  1. Setup Netskope Plugins


    1. Netskope CRE Plugin

    2. CrowdStrike CRE v1.1.0 or greater


  2. Create Business Rules

  3. Create Action


Netskope Policy



  1. Create Device Classification Rule


Verify


CrowdStrike Setup Steps


Deploy CrowdStrike Falcon Sensors to your end devices


Please follow the instructions in the CrowdStrike documentation. Basically you just need to grab your Customer ID and download the appropriate OS version of the installer. During the setup of the installer, you will be asked for your Customer ID.


https://falcon.crowdstrike.com/documentation


 



 


 


Setup API clients and keys


In your CrowdStrike portal go to Support and resources > API clients and keys



 


 


Note down your Base URL and then select Add new API Client



 


 


Give your API client a name and select the following Read API scopes


 


Scopes- Read


Alerts


Detections


Device control policies


Host


Host groups


Incidents


IOC Manage APIs


IOC (Indicators of Compromise)


User management


Zero Trust Assessment


 


Scopers Read - Write


Real time response


 


Netskope Cloud Exchange setup steps


Cloud Exchange Plugins


On your Netskope Cloud Exchange go to Settings > Plugins


You will need two plugins configured for this solution. The Netskope CRE plugin and the CrowdStrike v1.1.0 CRE plugin. If you need to update your plugins go to the Plugin Repository tab and select ‘check for updates’.


 



 


 


Configure Netskope CRE plugin


Select Netskope CRE


Name our plugin and select your Tenant



 


 


Since we will be making a call to the Netskope tenant about users, we will need a SCIM token setup on your tenant.


 


On your Netskope Tenant go to Settings > Tools > Directory Tools > SCIM integration.


Copy your SCIM Server URL


Create a New Oauth Token and copy the token.



 


 


 


Back on Cloud Exchange, paste the SCIM URL and Key into your plugin.



 


 


Configure CrowdStrike CRE plugin


From the plugin page select CrowdStrike CRE v1.1.0 or greater.



 


Give it a Configuration Name



 


Fill in the information you obtained while configuring the above step on the CrowdStrike API Client.


 



 


 


You can adjust the ranges for what the different risk scores are. Leave this default. You can see device risk scores under Plugin Activity.


Save your plugin.



 


 


Create a Cloud Exchange Business Rule


On your Cloud Exchange go to Risk Exchange > Business Rules and Create New Rule



 


 


A basic rule can be that anytime a user/device’s score reaches an aggregated high risk to map to ‘CrowdStrike High Score’



 


 


Create an Action


In this example the action will be used to trigger the CrowdStrike Real Time Response (RTR) script for any user that has a high score.


Business Rule: select the business rule you just created


Configuration: select your CrowdStrike plugin


Actions: Put RTR Script



 


 


Netskope Policy Setup Steps


Device Classification Rule


In your Netskope Tenant go to Settings > Manage > Device Classification > New Device Classification Rule


When matched with the score from the CrowdStrike client the device will be marked as Managed and policy will be applied.



 


Give your policy a rule name and select file. In the box put the following available values.


See note below on what these scores equal.


 


"c:crwd_zta_1_25",


"c:crwd_zta_26_50",


"c:crwd_zta_51_75",


"c:crwd_zta_76_100"


 



 


 


Note on scores


Netskope uses scores from 0 to 1000 as shown in the below table. These scores map to CrowdStrike’s user scores but are different by one decimal place. When creating the device classification rule using my example of c:crwd_zta_76_100.txt. I am that any user that is considered as a low risk user should be placed in the managed device category.


 



 


 


Verify


In Cloud Exchange go to Risk Exchange > Plugin Activity. You will see the feed coming in from CrowdStrike of your deployed sensors. I went into CrowdStrike and found my test device by the sensor id. To test I change my Action Rule to match the score of my test device and have it move the user based off of the score I already have. This is easier than doing bad things on your devices and changing the score.



 


Here is a closer view of Cloud Exchange. The Configuration column is the name of the plugin that the information came from.



 


 


To view which devices have triggered the RTR script to fire go to Action Logs



 


 


On the client you will see the text file get placed on the c: drive and your client will be marked as managed if it matches the Netskope Device Classification Rule, and Unmanaged if it doesn’t match the rule.


 



 


 

Be the first to reply!

Reply