Using CrowdStrike Falcon Insight integration in Analyst Workspace
Use the CrowdStrike Falcon Insight integration to leverage the CrowdStrike Falcon Insight capabilities on the SIR Analyst workspace.
Before you begin
Role required: sn_si.admin
Before you use CrowdStrike Falcon Insight integration on the Security Incident Response workspace, you must download it from the ServiceNow Store and configure it. For more information, see Getting started with the CrowdStrike Falcon Insight integration.
About this task
You can use the CrowdStrike Falcon Insight integration to make remediation actions on the endpoints in real time, use profiles to gather details about the host, and make specific queries or actions on the endpoint using the Security Incident Response workspace.
The CrowdStrike Falcon Insight integration enables analysts to use the following CrowdStrike Falcon Insight capabilities on the Security Incident Response Analyst workspace:
- Get Host Details
- Get Logged On Users
- Get Network Statistics
- Get Running Processes
- Get Running Services
- Isolate Host
- Remove Isolation
- Get File
Procedure
- In the SIR workspace, open the required security incident and select the Related Records tab.
-
You can use the CrowdStrike Falcon Insight capabilities on the Business Impact related list for analysis.
-
You can use the CrowdStrike Falcon Insight capabilities on the Endpoint Detection and Reponse (EDR) related list for analysis.
-
You can use the CrowdStrike Falcon Insight capabilities on the Threat Intel for analysis.