Videos
We're about to start using Crowdstrike IDP and looking at all the tasty possibilities around Policy rules. Anyone care to list their favourite enforcements / alerts?
We've been paying for Identity protection for a while, but we haven't enabled the different policy rules inside the console yet. I'm trying to wrap my head around the concept of MFAing into DC's or other servers using the policies inside CrowdStrike's identity protection platform.
We are deep in the Microsoft ecosystem and use conditional access policies to MFA anything we can. We do not sync our domain admin accounts to the cloud, and these are the accounts we use to remote into our servers. I don't want to sync our DA accounts to the cloud. We don't really have an MFA vehicle for the policy to take advantage of. Whats the best way for us to utilize the crowdstrike policy with accounts that are not synced to the cloud?
I have searched and can't find anything on IDP rules other than basic info on how to create and edit. I have a rule set up that sends me an email alert when it detects a compromised password has been set on an elevated account. This is very simplistic but I don't see how to apply more advanced actions to take. For example, I would like to build some sort of workflow around this event that would send a custom email to the user and then disable the account after a period of time. Is this even possible?
We have IDP, and it is seeing all of the domain logins and I have rules in place to enforce MFA on certain logins. That works fine, the issue is it is not seeing any logins when the admins login directly to a domain controller, so I can not enforce MFA there. Anyone else having issues with DCs?