Actions security policies

Actions Security Policies control whether different actions can be used, and what limits can be applied to each action. Since each action provides different sets of functionality and interaction, the configurable options for each action are different.

The primary option for each action is whether the action is enabled. Users will not see the actions that aren't allowed in the dialogue when creating new actions.

Change actions security policies

To change the security policies for actions:

  • Select Organization Settings and choose Security policies.

  • Switch to the Actions tab using the buttons at the top of the Security policies display.

    Actions security policies page with tabs for Dashboards, API Tokens, and Actions highlighted at the top, showing the main actions configuration interface.
  • Change the security policies as required, disabling or enabling by selecting the checkbox, and configuring individual policy settings for each action as appropriate.

  • Click Save to save the policies. The effect of enabling the policies is immediate, and may include immediately disabling or removing access, or stopping actions for executing.

Important

When disabling a specific Action type (such as, OpsGenie), existing actions of this type will be disabled and it will not be possible to create new actions of this type.

Email action security policy

The Email Action Security Policies enable or disable the ability to email users in the event of a trigger through automation. You can configure:

  • Allow email actions enables or disables email actions. If disabled, email actions will not appear in the list of available actions.

  • Enforce email allowlist limits the email addresses to which any email action can send email. To limit the range of email addresses, set a glob pattern. For example, the glob pattern:

ini
*@crowdstrike.com

Limits emails to only the crowdstrike.com domain. To add additional glob patterns click the + button. To delete existing glob patterns click the Delete button () next to each pattern.

Email action security policy configuration displaying Allow email actions checkbox and Enforce email allowlist section with glob pattern input field showing *@crowdstrike.com example.

If an email allowlist has been configured, when creating an action, an error message will be generated noting the validation issue for the configured email. For example:

Email validation error dialog showing 'Email address does not match the configured allowlist pattern' message when creating an action with restricted email.

If you enforce an allowlist after an action has been created, and the email address does not match the allowlist configuration, the action will be disabled. This will be flagged on the Actions page:

Actions page displaying a disabled email action with warning indicator showing the action is disabled due to allowlist policy enforcement.
OpsGenie action security policy

The OpsGenie Action Security Policy enables or disables OpsGenie actions. If disabled, the action will not appear in the list of available actions.

OpsGenie action security policy configuration page with Allow OpsGenie actions checkbox for enabling or disabling OpsGenie integration.
PagerDuty action security policy

The PagerDuty Action Security policy enables or disables PagerDuty actions. If disabled, the PagerDuty action will not appear in the list of available actions.

PagerDuty action security policy settings showing Allow PagerDuty actions checkbox for controlling PagerDuty action availability.
Slack action security policy

The Slack Action Security Policy enables or disables specific types of Slack actions. Two settings are available:

  • Triggering an action that affects only a single Slack channel.

  • Triggering an action that affects multiple Slack channels.

These can be configured independently.

Slack action security policy configuration with separate checkboxes for Allow single channel actions and Allow multiple channel actions.

If both types of Slack actions are disabled, the Slack action will not appear in the list of available actions.

Lookup file action security policy

Lookup file enables or disables the Lookup file action. If disabled, the action will not appear in the list of available actions.

Lookup file action security policy page displaying Allow upload file actions checkbox for enabling or disabling file upload functionality.
LogScale repository action security policy

The Falcon LogScale Repository Policy enables or disables LogScale repository actions. If disabled, the LogScale repository action will not appear in the list of available actions

Repository action security policy configuration showing Allow repository actions checkbox for controlling repository action availability.
VictorOps action security policy

The VictorOps Action Security Policy enables or disables actions. If disabled, VictorOps action will not appear as an option in the list of available actions.

VictorOps action security policy settings page with Allow VictorOps actions checkbox for enabling or disabling VictorOps integration.
Custom webhook actions action security policy

Security policies for custom Webhooks actions support the following restrictions:

  • Allow webhook actions disables or enables webhook actions. When disabled, webhooks actions will not be available in the list of available actions.

  • Enforcing a URL allowlist limits the range of URLs to which webhook actions can send requests. The configuration supports wildcards, for example:

    ini
    *crowdstrike.com

    is a pattern that allows webhooks to any domain ending in crowdstrike.com.

    Additional glob patterns can be added by clicking the + button. Existing glob patterns can be deleted by clicking the Delete button () next to each pattern.

Custom webhook action security policy configuration showing Allow webhook actions checkbox and Enforce URL allowlist section with glob pattern field for *crowdstrike.com.

If you try to create a webhook action that is not compatible with the allowlist, a message will be displayed:

Webhook validation error message displaying 'URL does not match the configured allowlist pattern' when attempting to create a webhook action with restricted URL.

If an allowlist is added after an incompatible webhook action has been added with an address not in the allowlist, the action will be disabled. This will be flagged on the Actions page:

Actions page showing disabled webhook action with warning indicator due to URL allowlist policy violation.