crowdstrike.PreventionPolicyLinux
Explore with Pulumi AI
This resource allows you to manage CrowdStrike Falcon prevention policies for Linux hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.
API Scopes
The following API scopes are required:
- Prevention policies | Read & Write
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as crowdstrike from "@crowdstrike/pulumi";
const example = new crowdstrike.PreventionPolicyLinux("example", {
enabled: true,
description: "Made with Pulumi",
hostGroups: [],
ioaRuleGroups: [],
cloudAntiMalware: {
detection: "MODERATE",
prevention: "CAUTIOUS",
},
sensorAntiMalware: {
detection: "MODERATE",
prevention: "CAUTIOUS",
},
quarantine: true,
customBlocking: true,
preventSuspiciousProcesses: true,
scriptBasedExecutionMonitoring: true,
uploadUnknownExecutables: true,
uploadUnknownDetectionRelatedExecutables: true,
driftPrevention: true,
emailProtocolVisibility: true,
filesystemVisibility: true,
ftpVisibility: true,
httpVisibility: true,
networkVisibility: true,
tlsVisibility: true,
sensorTamperingProtection: true,
onWriteScriptFileVisibility: true,
memoryVisibility: true,
});
export const preventionPolicyLinux = example;
import pulumi
import crowdstrike_pulumi as crowdstrike
example = crowdstrike.PreventionPolicyLinux("example",
enabled=True,
description="Made with Pulumi",
host_groups=[],
ioa_rule_groups=[],
cloud_anti_malware={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
},
sensor_anti_malware={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
},
quarantine=True,
custom_blocking=True,
prevent_suspicious_processes=True,
script_based_execution_monitoring=True,
upload_unknown_executables=True,
upload_unknown_detection_related_executables=True,
drift_prevention=True,
email_protocol_visibility=True,
filesystem_visibility=True,
ftp_visibility=True,
http_visibility=True,
network_visibility=True,
tls_visibility=True,
sensor_tampering_protection=True,
on_write_script_file_visibility=True,
memory_visibility=True)
pulumi.export("preventionPolicyLinux", example)
package main
import (
"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
example, err := crowdstrike.NewPreventionPolicyLinux(ctx, "example", &crowdstrike.PreventionPolicyLinuxArgs{
Enabled: pulumi.Bool(true),
Description: pulumi.String("Made with Pulumi"),
HostGroups: pulumi.StringArray{},
IoaRuleGroups: pulumi.StringArray{},
CloudAntiMalware: &crowdstrike.PreventionPolicyLinuxCloudAntiMalwareArgs{
Detection: pulumi.String("MODERATE"),
Prevention: pulumi.String("CAUTIOUS"),
},
SensorAntiMalware: &crowdstrike.PreventionPolicyLinuxSensorAntiMalwareArgs{
Detection: pulumi.String("MODERATE"),
Prevention: pulumi.String("CAUTIOUS"),
},
Quarantine: pulumi.Bool(true),
CustomBlocking: pulumi.Bool(true),
PreventSuspiciousProcesses: pulumi.Bool(true),
ScriptBasedExecutionMonitoring: pulumi.Bool(true),
UploadUnknownExecutables: pulumi.Bool(true),
UploadUnknownDetectionRelatedExecutables: pulumi.Bool(true),
DriftPrevention: pulumi.Bool(true),
EmailProtocolVisibility: pulumi.Bool(true),
FilesystemVisibility: pulumi.Bool(true),
FtpVisibility: pulumi.Bool(true),
HttpVisibility: pulumi.Bool(true),
NetworkVisibility: pulumi.Bool(true),
TlsVisibility: pulumi.Bool(true),
SensorTamperingProtection: pulumi.Bool(true),
OnWriteScriptFileVisibility: pulumi.Bool(true),
MemoryVisibility: pulumi.Bool(true),
})
if err != nil {
return err
}
ctx.Export("preventionPolicyLinux", example)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Crowdstrike = CrowdStrike.Crowdstrike;
return await Deployment.RunAsync(() =>
{
var example = new Crowdstrike.PreventionPolicyLinux("example", new()
{
Enabled = true,
Description = "Made with Pulumi",
HostGroups = new[] {},
IoaRuleGroups = new[] {},
CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxCloudAntiMalwareArgs
{
Detection = "MODERATE",
Prevention = "CAUTIOUS",
},
SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxSensorAntiMalwareArgs
{
Detection = "MODERATE",
Prevention = "CAUTIOUS",
},
Quarantine = true,
CustomBlocking = true,
PreventSuspiciousProcesses = true,
ScriptBasedExecutionMonitoring = true,
UploadUnknownExecutables = true,
UploadUnknownDetectionRelatedExecutables = true,
DriftPrevention = true,
EmailProtocolVisibility = true,
FilesystemVisibility = true,
FtpVisibility = true,
HttpVisibility = true,
NetworkVisibility = true,
TlsVisibility = true,
SensorTamperingProtection = true,
OnWriteScriptFileVisibility = true,
MemoryVisibility = true,
});
return new Dictionary<string, object?>
{
["preventionPolicyLinux"] = example,
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.crowdstrike.PreventionPolicyLinux;
import com.pulumi.crowdstrike.PreventionPolicyLinuxArgs;
import com.pulumi.crowdstrike.inputs.PreventionPolicyLinuxCloudAntiMalwareArgs;
import com.pulumi.crowdstrike.inputs.PreventionPolicyLinuxSensorAntiMalwareArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new PreventionPolicyLinux("example", PreventionPolicyLinuxArgs.builder()
.enabled(true)
.description("Made with Pulumi")
.hostGroups()
.ioaRuleGroups()
.cloudAntiMalware(PreventionPolicyLinuxCloudAntiMalwareArgs.builder()
%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))
.sensorAntiMalware(PreventionPolicyLinuxSensorAntiMalwareArgs.builder()
%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))
.quarantine(true)
.customBlocking(true)
.preventSuspiciousProcesses(true)
.scriptBasedExecutionMonitoring(true)
.uploadUnknownExecutables(true)
.uploadUnknownDetectionRelatedExecutables(true)
.driftPrevention(true)
.emailProtocolVisibility(true)
.filesystemVisibility(true)
.ftpVisibility(true)
.httpVisibility(true)
.networkVisibility(true)
.tlsVisibility(true)
.sensorTamperingProtection(true)
.onWriteScriptFileVisibility(true)
.memoryVisibility(true)
.build());
ctx.export("preventionPolicyLinux", example);
}
}
resources:
example:
type: crowdstrike:PreventionPolicyLinux
properties:
enabled: true
description: Made with Pulumi
hostGroups: []
ioaRuleGroups: []
cloudAntiMalware:
detection: MODERATE
prevention: CAUTIOUS
sensorAntiMalware:
detection: MODERATE
prevention: CAUTIOUS
quarantine: true
customBlocking: true
preventSuspiciousProcesses: true
scriptBasedExecutionMonitoring: true
uploadUnknownExecutables: true
uploadUnknownDetectionRelatedExecutables: true
driftPrevention: true
emailProtocolVisibility: true
filesystemVisibility: true
ftpVisibility: true
httpVisibility: true
networkVisibility: true
tlsVisibility: true
sensorTamperingProtection: true
onWriteScriptFileVisibility: true
memoryVisibility: true
outputs:
preventionPolicyLinux: ${example}
Create PreventionPolicyLinux Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new PreventionPolicyLinux(name: string, args: PreventionPolicyLinuxArgs, opts?: CustomResourceOptions);
@overload
def PreventionPolicyLinux(resource_name: str,
args: PreventionPolicyLinuxArgs,
opts: Optional[ResourceOptions] = None)
@overload
def PreventionPolicyLinux(resource_name: str,
opts: Optional[ResourceOptions] = None,
host_groups: Optional[Sequence[str]] = None,
ioa_rule_groups: Optional[Sequence[str]] = None,
enabled: Optional[bool] = None,
network_visibility: Optional[bool] = None,
email_protocol_visibility: Optional[bool] = None,
cloud_anti_malware: Optional[PreventionPolicyLinuxCloudAntiMalwareArgs] = None,
filesystem_visibility: Optional[bool] = None,
ftp_visibility: Optional[bool] = None,
description: Optional[str] = None,
http_visibility: Optional[bool] = None,
custom_blocking: Optional[bool] = None,
memory_visibility: Optional[bool] = None,
name: Optional[str] = None,
drift_prevention: Optional[bool] = None,
on_write_script_file_visibility: Optional[bool] = None,
prevent_suspicious_processes: Optional[bool] = None,
quarantine: Optional[bool] = None,
script_based_execution_monitoring: Optional[bool] = None,
sensor_anti_malware: Optional[PreventionPolicyLinuxSensorAntiMalwareArgs] = None,
sensor_tampering_protection: Optional[bool] = None,
tls_visibility: Optional[bool] = None,
upload_unknown_detection_related_executables: Optional[bool] = None,
upload_unknown_executables: Optional[bool] = None)
func NewPreventionPolicyLinux(ctx *Context, name string, args PreventionPolicyLinuxArgs, opts ...ResourceOption) (*PreventionPolicyLinux, error)
public PreventionPolicyLinux(string name, PreventionPolicyLinuxArgs args, CustomResourceOptions? opts = null)
public PreventionPolicyLinux(String name, PreventionPolicyLinuxArgs args)
public PreventionPolicyLinux(String name, PreventionPolicyLinuxArgs args, CustomResourceOptions options)
type: crowdstrike:PreventionPolicyLinux
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args PreventionPolicyLinuxArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args PreventionPolicyLinuxArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args PreventionPolicyLinuxArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args PreventionPolicyLinuxArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args PreventionPolicyLinuxArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var preventionPolicyLinuxResource = new Crowdstrike.PreventionPolicyLinux("preventionPolicyLinuxResource", new()
{
HostGroups = new[]
{
"string",
},
IoaRuleGroups = new[]
{
"string",
},
Enabled = false,
NetworkVisibility = false,
EmailProtocolVisibility = false,
CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxCloudAntiMalwareArgs
{
Detection = "string",
Prevention = "string",
},
FilesystemVisibility = false,
FtpVisibility = false,
Description = "string",
HttpVisibility = false,
CustomBlocking = false,
MemoryVisibility = false,
Name = "string",
DriftPrevention = false,
OnWriteScriptFileVisibility = false,
PreventSuspiciousProcesses = false,
Quarantine = false,
ScriptBasedExecutionMonitoring = false,
SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyLinuxSensorAntiMalwareArgs
{
Detection = "string",
Prevention = "string",
},
SensorTamperingProtection = false,
TlsVisibility = false,
UploadUnknownDetectionRelatedExecutables = false,
UploadUnknownExecutables = false,
});
example, err := crowdstrike.NewPreventionPolicyLinux(ctx, "preventionPolicyLinuxResource", &crowdstrike.PreventionPolicyLinuxArgs{
HostGroups: pulumi.StringArray{
pulumi.String("string"),
},
IoaRuleGroups: pulumi.StringArray{
pulumi.String("string"),
},
Enabled: pulumi.Bool(false),
NetworkVisibility: pulumi.Bool(false),
EmailProtocolVisibility: pulumi.Bool(false),
CloudAntiMalware: &crowdstrike.PreventionPolicyLinuxCloudAntiMalwareArgs{
Detection: pulumi.String("string"),
Prevention: pulumi.String("string"),
},
FilesystemVisibility: pulumi.Bool(false),
FtpVisibility: pulumi.Bool(false),
Description: pulumi.String("string"),
HttpVisibility: pulumi.Bool(false),
CustomBlocking: pulumi.Bool(false),
MemoryVisibility: pulumi.Bool(false),
Name: pulumi.String("string"),
DriftPrevention: pulumi.Bool(false),
OnWriteScriptFileVisibility: pulumi.Bool(false),
PreventSuspiciousProcesses: pulumi.Bool(false),
Quarantine: pulumi.Bool(false),
ScriptBasedExecutionMonitoring: pulumi.Bool(false),
SensorAntiMalware: &crowdstrike.PreventionPolicyLinuxSensorAntiMalwareArgs{
Detection: pulumi.String("string"),
Prevention: pulumi.String("string"),
},
SensorTamperingProtection: pulumi.Bool(false),
TlsVisibility: pulumi.Bool(false),
UploadUnknownDetectionRelatedExecutables: pulumi.Bool(false),
UploadUnknownExecutables: pulumi.Bool(false),
})
var preventionPolicyLinuxResource = new PreventionPolicyLinux("preventionPolicyLinuxResource", PreventionPolicyLinuxArgs.builder()
.hostGroups("string")
.ioaRuleGroups("string")
.enabled(false)
.networkVisibility(false)
.emailProtocolVisibility(false)
.cloudAntiMalware(PreventionPolicyLinuxCloudAntiMalwareArgs.builder()
.detection("string")
.prevention("string")
.build())
.filesystemVisibility(false)
.ftpVisibility(false)
.description("string")
.httpVisibility(false)
.customBlocking(false)
.memoryVisibility(false)
.name("string")
.driftPrevention(false)
.onWriteScriptFileVisibility(false)
.preventSuspiciousProcesses(false)
.quarantine(false)
.scriptBasedExecutionMonitoring(false)
.sensorAntiMalware(PreventionPolicyLinuxSensorAntiMalwareArgs.builder()
.detection("string")
.prevention("string")
.build())
.sensorTamperingProtection(false)
.tlsVisibility(false)
.uploadUnknownDetectionRelatedExecutables(false)
.uploadUnknownExecutables(false)
.build());
prevention_policy_linux_resource = crowdstrike.PreventionPolicyLinux("preventionPolicyLinuxResource",
host_groups=["string"],
ioa_rule_groups=["string"],
enabled=False,
network_visibility=False,
email_protocol_visibility=False,
cloud_anti_malware={
"detection": "string",
"prevention": "string",
},
filesystem_visibility=False,
ftp_visibility=False,
description="string",
http_visibility=False,
custom_blocking=False,
memory_visibility=False,
name="string",
drift_prevention=False,
on_write_script_file_visibility=False,
prevent_suspicious_processes=False,
quarantine=False,
script_based_execution_monitoring=False,
sensor_anti_malware={
"detection": "string",
"prevention": "string",
},
sensor_tampering_protection=False,
tls_visibility=False,
upload_unknown_detection_related_executables=False,
upload_unknown_executables=False)
const preventionPolicyLinuxResource = new crowdstrike.PreventionPolicyLinux("preventionPolicyLinuxResource", {
hostGroups: ["string"],
ioaRuleGroups: ["string"],
enabled: false,
networkVisibility: false,
emailProtocolVisibility: false,
cloudAntiMalware: {
detection: "string",
prevention: "string",
},
filesystemVisibility: false,
ftpVisibility: false,
description: "string",
httpVisibility: false,
customBlocking: false,
memoryVisibility: false,
name: "string",
driftPrevention: false,
onWriteScriptFileVisibility: false,
preventSuspiciousProcesses: false,
quarantine: false,
scriptBasedExecutionMonitoring: false,
sensorAntiMalware: {
detection: "string",
prevention: "string",
},
sensorTamperingProtection: false,
tlsVisibility: false,
uploadUnknownDetectionRelatedExecutables: false,
uploadUnknownExecutables: false,
});
type: crowdstrike:PreventionPolicyLinux
properties:
cloudAntiMalware:
detection: string
prevention: string
customBlocking: false
description: string
driftPrevention: false
emailProtocolVisibility: false
enabled: false
filesystemVisibility: false
ftpVisibility: false
hostGroups:
- string
httpVisibility: false
ioaRuleGroups:
- string
memoryVisibility: false
name: string
networkVisibility: false
onWriteScriptFileVisibility: false
preventSuspiciousProcesses: false
quarantine: false
scriptBasedExecutionMonitoring: false
sensorAntiMalware:
detection: string
prevention: string
sensorTamperingProtection: false
tlsVisibility: false
uploadUnknownDetectionRelatedExecutables: false
uploadUnknownExecutables: false
PreventionPolicyLinux Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The PreventionPolicyLinux resource accepts the following input properties:
- Host
Groups List<string> - Host Group ids to attach to the prevention policy.
- Ioa
Rule List<string>Groups - IOA Rule Group to attach to the prevention policy.
- Cloud
Anti CrowdMalware Strike. Crowdstrike. Inputs. Prevention Policy Linux Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- Custom
Blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- Description string
- Description of the prevention policy.
- Drift
Prevention bool - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- Email
Protocol boolVisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- Enabled bool
- Enable the prevention policy.
- Filesystem
Visibility bool - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- Ftp
Visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- Http
Visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- Memory
Visibility bool - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- Name string
- Name of the prevention policy.
- Network
Visibility bool - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- On
Write boolScript File Visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- Prevent
Suspicious boolProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- Quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- Script
Based boolExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- Sensor
Anti CrowdMalware Strike. Crowdstrike. Inputs. Prevention Policy Linux Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- Sensor
Tampering boolProtection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- Tls
Visibility bool - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- Upload
Unknown boolExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- Host
Groups []string - Host Group ids to attach to the prevention policy.
- Ioa
Rule []stringGroups - IOA Rule Group to attach to the prevention policy.
- Cloud
Anti PreventionMalware Policy Linux Cloud Anti Malware Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- Custom
Blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- Description string
- Description of the prevention policy.
- Drift
Prevention bool - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- Email
Protocol boolVisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- Enabled bool
- Enable the prevention policy.
- Filesystem
Visibility bool - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- Ftp
Visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- Http
Visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- Memory
Visibility bool - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- Name string
- Name of the prevention policy.
- Network
Visibility bool - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- On
Write boolScript File Visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- Prevent
Suspicious boolProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- Quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- Script
Based boolExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- Sensor
Anti PreventionMalware Policy Linux Sensor Anti Malware Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- Sensor
Tampering boolProtection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- Tls
Visibility bool - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- Upload
Unknown boolExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- host
Groups List<String> - Host Group ids to attach to the prevention policy.
- ioa
Rule List<String>Groups - IOA Rule Group to attach to the prevention policy.
- cloud
Anti PreventionMalware Policy Linux Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking Boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description String
- Description of the prevention policy.
- drift
Prevention Boolean - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- email
Protocol BooleanVisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- enabled Boolean
- Enable the prevention policy.
- filesystem
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- ftp
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- http
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- memory
Visibility Boolean - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- name String
- Name of the prevention policy.
- network
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- on
Write BooleanScript File Visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- prevent
Suspicious BooleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine Boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- script
Based BooleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Anti PreventionMalware Policy Linux Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering BooleanProtection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- tls
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- Boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown BooleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- host
Groups string[] - Host Group ids to attach to the prevention policy.
- ioa
Rule string[]Groups - IOA Rule Group to attach to the prevention policy.
- cloud
Anti PreventionMalware Policy Linux Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description string
- Description of the prevention policy.
- drift
Prevention boolean - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- email
Protocol booleanVisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- enabled boolean
- Enable the prevention policy.
- filesystem
Visibility boolean - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- ftp
Visibility boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- http
Visibility boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- memory
Visibility boolean - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- name string
- Name of the prevention policy.
- network
Visibility boolean - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- on
Write booleanScript File Visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- prevent
Suspicious booleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- script
Based booleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Anti PreventionMalware Policy Linux Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering booleanProtection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- tls
Visibility boolean - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown booleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- host_
groups Sequence[str] - Host Group ids to attach to the prevention policy.
- ioa_
rule_ Sequence[str]groups - IOA Rule Group to attach to the prevention policy.
- cloud_
anti_ Preventionmalware Policy Linux Cloud Anti Malware Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom_
blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description str
- Description of the prevention policy.
- drift_
prevention bool - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- email_
protocol_ boolvisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- enabled bool
- Enable the prevention policy.
- filesystem_
visibility bool - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- ftp_
visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- http_
visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- memory_
visibility bool - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- name str
- Name of the prevention policy.
- network_
visibility bool - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- on_
write_ boolscript_ file_ visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- prevent_
suspicious_ boolprocesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- script_
based_ boolexecution_ monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor_
anti_ Preventionmalware Policy Linux Sensor Anti Malware Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor_
tampering_ boolprotection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- tls_
visibility bool - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload_
unknown_ boolexecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- host
Groups List<String> - Host Group ids to attach to the prevention policy.
- ioa
Rule List<String>Groups - IOA Rule Group to attach to the prevention policy.
- cloud
Anti Property MapMalware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking Boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description String
- Description of the prevention policy.
- drift
Prevention Boolean - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- email
Protocol BooleanVisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- enabled Boolean
- Enable the prevention policy.
- filesystem
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- ftp
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- http
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- memory
Visibility Boolean - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- name String
- Name of the prevention policy.
- network
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- on
Write BooleanScript File Visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- prevent
Suspicious BooleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine Boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- script
Based BooleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Anti Property MapMalware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering BooleanProtection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- tls
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- Boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown BooleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
Outputs
All input properties are implicitly available as output properties. Additionally, the PreventionPolicyLinux resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Last
Updated string
- Id string
- The provider-assigned unique ID for this managed resource.
- Last
Updated string
- id String
- The provider-assigned unique ID for this managed resource.
- last
Updated String
- id string
- The provider-assigned unique ID for this managed resource.
- last
Updated string
- id str
- The provider-assigned unique ID for this managed resource.
- last_
updated str
- id String
- The provider-assigned unique ID for this managed resource.
- last
Updated String
Look up Existing PreventionPolicyLinux Resource
Get an existing PreventionPolicyLinux resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: PreventionPolicyLinuxState, opts?: CustomResourceOptions): PreventionPolicyLinux
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
cloud_anti_malware: Optional[PreventionPolicyLinuxCloudAntiMalwareArgs] = None,
custom_blocking: Optional[bool] = None,
description: Optional[str] = None,
drift_prevention: Optional[bool] = None,
email_protocol_visibility: Optional[bool] = None,
enabled: Optional[bool] = None,
filesystem_visibility: Optional[bool] = None,
ftp_visibility: Optional[bool] = None,
host_groups: Optional[Sequence[str]] = None,
http_visibility: Optional[bool] = None,
ioa_rule_groups: Optional[Sequence[str]] = None,
last_updated: Optional[str] = None,
memory_visibility: Optional[bool] = None,
name: Optional[str] = None,
network_visibility: Optional[bool] = None,
on_write_script_file_visibility: Optional[bool] = None,
prevent_suspicious_processes: Optional[bool] = None,
quarantine: Optional[bool] = None,
script_based_execution_monitoring: Optional[bool] = None,
sensor_anti_malware: Optional[PreventionPolicyLinuxSensorAntiMalwareArgs] = None,
sensor_tampering_protection: Optional[bool] = None,
tls_visibility: Optional[bool] = None,
upload_unknown_detection_related_executables: Optional[bool] = None,
upload_unknown_executables: Optional[bool] = None) -> PreventionPolicyLinux
func GetPreventionPolicyLinux(ctx *Context, name string, id IDInput, state *PreventionPolicyLinuxState, opts ...ResourceOption) (*PreventionPolicyLinux, error)
public static PreventionPolicyLinux Get(string name, Input<string> id, PreventionPolicyLinuxState? state, CustomResourceOptions? opts = null)
public static PreventionPolicyLinux get(String name, Output<String> id, PreventionPolicyLinuxState state, CustomResourceOptions options)
resources: _: type: crowdstrike:PreventionPolicyLinux get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Cloud
Anti CrowdMalware Strike. Crowdstrike. Inputs. Prevention Policy Linux Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- Custom
Blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- Description string
- Description of the prevention policy.
- Drift
Prevention bool - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- Email
Protocol boolVisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- Enabled bool
- Enable the prevention policy.
- Filesystem
Visibility bool - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- Ftp
Visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- Host
Groups List<string> - Host Group ids to attach to the prevention policy.
- Http
Visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- Ioa
Rule List<string>Groups - IOA Rule Group to attach to the prevention policy.
- Last
Updated string - Memory
Visibility bool - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- Name string
- Name of the prevention policy.
- Network
Visibility bool - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- On
Write boolScript File Visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- Prevent
Suspicious boolProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- Quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- Script
Based boolExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- Sensor
Anti CrowdMalware Strike. Crowdstrike. Inputs. Prevention Policy Linux Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- Sensor
Tampering boolProtection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- Tls
Visibility bool - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- Upload
Unknown boolExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- Cloud
Anti PreventionMalware Policy Linux Cloud Anti Malware Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- Custom
Blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- Description string
- Description of the prevention policy.
- Drift
Prevention bool - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- Email
Protocol boolVisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- Enabled bool
- Enable the prevention policy.
- Filesystem
Visibility bool - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- Ftp
Visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- Host
Groups []string - Host Group ids to attach to the prevention policy.
- Http
Visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- Ioa
Rule []stringGroups - IOA Rule Group to attach to the prevention policy.
- Last
Updated string - Memory
Visibility bool - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- Name string
- Name of the prevention policy.
- Network
Visibility bool - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- On
Write boolScript File Visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- Prevent
Suspicious boolProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- Quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- Script
Based boolExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- Sensor
Anti PreventionMalware Policy Linux Sensor Anti Malware Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- Sensor
Tampering boolProtection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- Tls
Visibility bool - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- Upload
Unknown boolExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- cloud
Anti PreventionMalware Policy Linux Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking Boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description String
- Description of the prevention policy.
- drift
Prevention Boolean - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- email
Protocol BooleanVisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- enabled Boolean
- Enable the prevention policy.
- filesystem
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- ftp
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- host
Groups List<String> - Host Group ids to attach to the prevention policy.
- http
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- ioa
Rule List<String>Groups - IOA Rule Group to attach to the prevention policy.
- last
Updated String - memory
Visibility Boolean - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- name String
- Name of the prevention policy.
- network
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- on
Write BooleanScript File Visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- prevent
Suspicious BooleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine Boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- script
Based BooleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Anti PreventionMalware Policy Linux Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering BooleanProtection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- tls
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- Boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown BooleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- cloud
Anti PreventionMalware Policy Linux Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description string
- Description of the prevention policy.
- drift
Prevention boolean - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- email
Protocol booleanVisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- enabled boolean
- Enable the prevention policy.
- filesystem
Visibility boolean - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- ftp
Visibility boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- host
Groups string[] - Host Group ids to attach to the prevention policy.
- http
Visibility boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- ioa
Rule string[]Groups - IOA Rule Group to attach to the prevention policy.
- last
Updated string - memory
Visibility boolean - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- name string
- Name of the prevention policy.
- network
Visibility boolean - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- on
Write booleanScript File Visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- prevent
Suspicious booleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- script
Based booleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Anti PreventionMalware Policy Linux Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering booleanProtection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- tls
Visibility boolean - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown booleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- cloud_
anti_ Preventionmalware Policy Linux Cloud Anti Malware Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom_
blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description str
- Description of the prevention policy.
- drift_
prevention bool - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- email_
protocol_ boolvisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- enabled bool
- Enable the prevention policy.
- filesystem_
visibility bool - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- ftp_
visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- host_
groups Sequence[str] - Host Group ids to attach to the prevention policy.
- http_
visibility bool - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- ioa_
rule_ Sequence[str]groups - IOA Rule Group to attach to the prevention policy.
- last_
updated str - memory_
visibility bool - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- name str
- Name of the prevention policy.
- network_
visibility bool - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- on_
write_ boolscript_ file_ visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- prevent_
suspicious_ boolprocesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- script_
based_ boolexecution_ monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor_
anti_ Preventionmalware Policy Linux Sensor Anti Malware Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor_
tampering_ boolprotection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- tls_
visibility bool - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload_
unknown_ boolexecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- cloud
Anti Property MapMalware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking Boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description String
- Description of the prevention policy.
- drift
Prevention Boolean - Whether to enable the setting. Block new processes originating from files written in a container. This prevents a container from drifting from its immutable runtime state.
- email
Protocol BooleanVisibility - Whether to enable the setting. Allows the sensor to monitor SMTP, IMAP, and POP3 traffic for malicious patterns and improved detections.
- enabled Boolean
- Enable the prevention policy.
- filesystem
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor filesystem activity for additional telemetry and improved detections.
- ftp
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted FTP traffic for malicious patterns and improved detections.
- host
Groups List<String> - Host Group ids to attach to the prevention policy.
- http
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor unencrypted HTTP traffic for malicious patterns and improved detections.
- ioa
Rule List<String>Groups - IOA Rule Group to attach to the prevention policy.
- last
Updated String - memory
Visibility Boolean - Whether to enable the setting. When enabled, the sensor will inspect memory-related operations: mmap, mprotect, ptrace and reading/writing remote process memory and produce events.
- name String
- Name of the prevention policy.
- network
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor network activity for additional telemetry and improved detections.
- on
Write BooleanScript File Visibility - Whether to enable the setting. Provides improved visibility into various script files being written to disk in addition to clouding a portion of their content.
- prevent
Suspicious BooleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine Boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- script
Based BooleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Anti Property MapMalware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering BooleanProtection - Whether to enable the setting. Block attempts to tamper with the sensor by protecting critical components and resources. If disabled, the sensor still creates detections for tampering attempts but will not prevent the activity from occurring. Disabling is not recommended.
- tls
Visibility Boolean - Whether to enable the setting. Allows the sensor to monitor TLS traffic for malicious patterns and improved detections.
- Boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown BooleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
Supporting Types
PreventionPolicyLinuxCloudAntiMalware, PreventionPolicyLinuxCloudAntiMalwareArgs
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
- detection string
- Machine learning level for detection.
- prevention string
- Machine learning level for prevention.
- detection str
- Machine learning level for detection.
- prevention str
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
PreventionPolicyLinuxSensorAntiMalware, PreventionPolicyLinuxSensorAntiMalwareArgs
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
- detection string
- Machine learning level for detection.
- prevention string
- Machine learning level for prevention.
- detection str
- Machine learning level for detection.
- prevention str
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
Import
prevention policy can be imported by specifying the policy id.
$ pulumi import crowdstrike:index/preventionPolicyLinux:PreventionPolicyLinux example 7fb858a949034a0cbca175f660f1e769
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- crowdstrike crowdstrike/pulumi-crowdstrike
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
crowdstrike
Terraform Provider.