Setting up ATR for CrowdStrike
When ATR detects that a CrowdStrike Falcon-hosted endpoint has been compromised, Barracuda XDR automatically responds by isolating the affected endpoint through the Falcon API. Restricting the host’s network access and triggering device isolation to contain threats in real time, terminating active sessions on the device to shut down common attacker footholds, and reducing time in situations where every second matters.
For more information about Automated Threat Response (ATR), see Setting up ATR.
Requirements
You must have:
An enabled CrowdStrike integration in the Barracuda XDR Dashboard
Access to modify a CrowdStrike Falcon API Client
Host devices with the CrowdStrike Falcon sensor installed
Setting up ATR Requirements in CrowdStrike Falcon
In CrowdStrike Falcon, modify the existing Barracuda API Client.
Open API clients and keys.
In the Hosts area, enable the following permissions checkboxes:
Read
Write
Click Save.
Setting up ATR
To configure ATR in Barracuda XDR Dashboard
In the Barracuda XDR Dashboard, in the left navigation menu, click Administration > Integrations.
On the CrowdStrike integration card, click Update.
NOTE You can search for the CrowdStrike integration card using the search box.Select Enable Auto Remediation.
Click Save.
Contact Us
Barracuda Campus
Barracuda Support