Actions
Perform Sensor Update Policies Action
Integrations
- Integrations
- 1Password
- Abnormal
- Absolute
- AbuseIPDB
- Acronis
- Active Directory On-Prem
- Adaptive Shield
- Adobe Cloud
- ADP
- Agari Phishing Response
- Airlock
- Airlock Digital
- Akamai Identity Cloud Social
- Alert Logic
- AlgoSec Firewall Analyzer
- Alienvault OTX
- Alienvault USM
- Anthropic
- Anodot
- Any Run
- Ansible
- Anvilogic
- Apex One
- ArcSight ESM
- Area 1
- Asana
- Asset Panda
- Astrix
- Atlassian Crowd
- Atlassian User Management
- Atlassian User Provisioning
- AuditBoard
- auth0
- Authentik
- Authomize
- Automox
- AWS
- AWS IAM Identity Center
- Axonius
- Azure
- Azure Data Explorer
- Azure DevOps
- Azure Log Analytics
- Azure Storage
- BambooHR
- Big Fix
- BigPanda
- Bitbucket
- Bitdefender
- Bitsight
- Bitwarden
- Black Duck
- Black Kite
- Blink
- BMC Remedy
- Box
- Brinqa
- Cato Networks
- Censys
- Chorus
- Cisco Advanced Phishing Protection
- Cisco Domain Protection
- Cisco Meraki
- Cisco Talos
- Cisco Umbrella
- Cisco Webex
- Claroty xDome
- ClearPass
- ClickHouse
- ClickUp
- Cloud Custodian
- Cloudflare
- Cloudflare R2
- Cobalt.io
- Check Point Harmony
- Check Point Infinity Events
- Check Point Management
- Check Point XDR/XPR
- Checkmarx SAST
- Checkmarx One
- Chronicle
- Compass
- Confluence
- Confluence Data Center
- Coralogix
- Coralogix Incident Management
- Cortex XDR
- Cortex Xpanse
- Coupa Compass
- CredStash
- Cribl
- CrowdStrike
- CrowdStrike
- Actions
- Overview
- Check Analysis Progress
- Check MalQuery Operation Status
- Check Submission Quota
- CrowdStrike Cloud Query
- Configure Host Groups To File Integrity Policy
- Configure Rule Groups To File Integrity Policy
- Create Batch Session
- Create File Integrity Policy
- Create Indicator
- Create Prevention Policy
- Create Sensor Update Policy
- CrowdStrike Custom Action
- Delete Action
- Delete CSPM AWS Account
- Delete CSPM Azure Account
- Delete Custom Script
- Delete Device
- Delete Host Groups
- Delete Indicator
- Delete Report
- Delete Rule Groups
- Delete Rules
- Download Execution Report
- Find Hosts That Observed IOC
- Find Malicious Domains
- Find Malicious IPAddresses
- Get Adversaries
- Get Adversary Report
- Get Alert Details
- Get Analysis Report
- Get Analysis Report Summary
- Get Application
- Get Detection
- Get Devices By IDs
- Get Devices Count For IOC
- Get File Integrity Policies Details
- Get FileVantage Rule Group Details
- Get Host
- Get Indicator Details
- Get Installed Devices
- Get Prevention Policy
- Get Processes By IOC
- Get Remediations
- Get RTR Extracted File Contents
- Get RTR Sessions Details
- Get Scheduled Report
- Get Sensor Update Policy
- Get Vulnerabilities
- Get Vulnerability Remediation
- Isolate Endpoint
- Launch Scheduled Report
- Lift Endpoint Isolation
- List Adversary IDs
- List Alerts
- List Applications
- List Available Streams
- List Custom Scripts IDs
- List Detections
- List Devices
- List File Integrity Policies IDs
- List FileVantage Rule Group IDs
- List Host Groups
- List Hosts
- List Incidents
- List Indicators
- List IOC Actions
- List IOC Platforms
- List IOC Severities
- List IOC Types
- List Parent Rule Groups
- List Prevention Policies
- List Report Executions
- List RTR Session Files
- List RTR Sessions
- List Scheduled Reports
- List Sensor Update Policies
- List Vulnerabilities
- MalQuery Exact Search
- MalQuery Fuzzy Search
- Next Gen SIEM Advanced Search
- Perform Host Action
- Perform Host Group Action
- Perform Incident Action
- Perform Prevention Policies Action
- Perform Sensor Update Policies Action
- Query Adversaries Intel Reports IDs
- Query Adversary Reports
- Query Submitted Samples
- Retrieve Process Details By ID
- Run Command On A Single Host
- Run Command On Batch Session
- Schedule YARA Hunt
- Search Indicators
- Search Query By ID
- Search Vulnerabilities
- Submit File For Analysis
- Update Alerts
- Update File Integrity Policy
- Update Indicators
- Upload Custom Script
- Triggers
- CyberArk
- Cybersixgill
- CyCognito
- Cyera
- Cylance
- Cyware CTIX
- Darktrace
- Dasera
- Databricks
- Datadog
- DataSet
- Discord
- Docusign
- Delighted
- Delinea
- Devo
- Domo
- Drata
- Dropbox
- Dropbox Business
- druva
- Duo
- Duo Auth
- Dynatrace
- EasyVista
- EchoTrail
- Egnyte
- Egnyte Secure Govern
- Elasticsearch
- Entro
- Entrust Certificate Services
- Ermetic
- Exabeam
- Exchange Online
- Expel
- F5
- Falcon LogScale
- Falcon Surface
- Flare.io
- Forcepoint DLP
- Forescout
- FortiGate
- Freshservice
- GCP
- Gemini
- Ghostwriter
- Git
- GitHub
- GitLab
- Glean
- Gmail
- Google Calendar
- Google Chat
- Google Docs
- Google Drive
- Google Forms
- Google Meet
- Google Looker
- Google Sheets
- Google Workspace
- Grafana
- Greenhouse
- GreyNoise
- Grip Security
- GYTPOL
- Have I Been Pwned
- HackerOne
- Halo Service Desk
- HackNotice
- HiBob
- HubSpot
- Hunters
- Hybrid Analysis
- Hyperproof
- IBM CLoud
- IBM NS1 Connect
- IBM X Force
- Imperva
- Incident.io
- Infobip
- Infoblox Cloud Services Portal
- Intercom
- Intezer
- IP API
- IPinfo
- IPWHOIS
- Ivanti RiskSense
- Ironscales
- Jamf
- JetBrains
- JFrog
- Jira
- Jira Data Center
- Joe Sandbox
- JumpCloud
- Kandji
- Keeper Secrets Manager
- Kenna Security
- KnowBe4
- KnowBe4 Events
- Kubernetes
- Lacework
- LaunchDarkly
- Linear
- Litmos
- LogicMonitor
- LogRhythm
- Manage Engine ServiceDesk Plus
- Mattermost
- Maven
- Microsoft Defender For Cloud
- Microsoft Defender For Cloud Apps
- Microsoft Defender For Endpoints
- Microsoft Defender XDR
- Microsoft E-Discovery
- Microsoft Entra ID
- Microsoft Graph
- Microsoft Intune
- Microsoft Office 365 Management Activity
- Microsoft Outlook
- Microsoft Purview
- Microsoft Sentinel
- Microsoft SQL Server
- Microsoft Teams
- Mimecast
- MISP
- Monday
- MongoDB Atlas
- MxToolbox
- Neo4j
- NetBox
- Netography
- Netskope
- New Relic
- Nightfall AI
- NinjaOne
- Notion
- Nozomi Networks
- Nuclei
- Nucleus
- Nutanix Hypervisor
- Obsidian
- Okta
- OneDrive
- OneLogin
- OneTrust
- Oort
- OpenAI
- OpenCTI
- Opsgenie
- OPSWAT
- Oracle Cloud
- Oracle HCM
- Orca Security
- OWASP ZAP
- PagerDuty
- Palo Alto NGFW
- Palo Alto Firewall
- Panther
- Pentera
- Perception Point
- PhishLabs
- PhishLabs Incident Data
- PhishLabs Open Web Monitoring
- Pingdom
- PingID
- PingOne
- PlexTrac
- PortSwigger
- Power BI
- PowerShell
- Postman
- Postman SCIM
- Prisma Access
- Prisma Cloud
- Prisma Cloud CWP
- Prometheus
- Proofpoint
- Proofpoint ITM
- Proofpoint Protection Server
- Proofpoint Security Awareness Training
- Proofpoint TAP
- Proofpoint TRAP
- Pub-Sub
- QRadar
- Qualys
- Rapid7
- Rapid7 InsightIDR
- Rapid7 InsightVM Cloud
- Rapid7 Threat Command
- Reco
- Recorded Future
- Recorded Future Triage Cloud
- Red Hat IDM
- Rippling
- runZero
- SafeBase
- Sage HR
- SailPoint
- SailPoint IdentityIQ
- Salesforce
- SAP Ariba
- Sap Concur
- ScienceLogic
- Securin
- Securin VI
- SecurityScorecard
- Securonix
- Seemplicity
- Sekoia.io
- SemGrep
- SentinelOne
- ServiceNow
- SharePoint
- Shodan
- Shopify
- Silverfort
- Slack
- Smartsheet
- Snipe IT
- Snowflake
- Snyk
- SolarWinds Information Service
- SolarWinds Service Desk
- SonarQube
- Sophos
- Split
- Splunk
- Splunk Observability
- Splunk SOAR
- Spur
- StrongDM
- Sumo Logic
- Symantec EDR
- Sysdig
- Tableau
- Tanium
- TeamCity
- TeamViewer
- Telegram
- Tempo
- Tenable
- Tenable Security Center
- Terraform
- Terraform Cloud
- Tessian
- TheHive
- Thinkst Canary
- ThreatQuotient
- Trellix Email Security
- Trello
- Trend Vision One
- Twilio
- UKG HR
- Uptycs
- URLScan
- Vault
- Veracode
- Verkada
- Vertica
- VMware vSphere
- VMware Carbon Black
- VirusTotal
- WeChat
- WhatsApp
- WhoIs
- WildFire
- Wiz
- Workday
- Workspace ONE UEM
- YesWeHack
- Zendesk
- Zero Networks
- Zoom
- Zscaler Internet Access
- Zscaler Private Access
Actions
Perform Sensor Update Policies Action
Perform an action on selected sensor update policies.
Note: Verify operation success by checking the response body. If the resources
property is empty, the action failed. This typically indicates invalid parameters.
The following permissions are required to run this action:
Sensor update policies
: Read and Write.Host groups
: Read.
External Documentation
To learn more, visit the CrowdStrike documentation.
Parameters
Parameter | Description |
---|---|
Action To Perform | Select the required action to perform on the specified sensor update policies. |
Group ID | The unique identifier of the group to perform the action with. |
IDs | A comma-separated list of sensor update policies identifiers to perform this action on. |
Example Output
{
"errors": [
{
"code": 0,
"id": "string",
"message": "string"
}
],
"meta": {
"pagination": {
"limit": 0,
"offset": 0,
"total": 0
},
"powered_by": "string",
"query_time": 0,
"trace_id": "string",
"writes": {
"resources_affected": 0
}
},
"resources": [
{
"created_by": "The email of the user which created the policy",
"created_timestamp": "The time at which the policy was created",
"description": "The description of a policy. Use this field to provide a high level summary of what this policy enforces",
"enabled": false,
"groups": [
{
"assignment_rule": "The assignment rule of a group",
"created_by": "The email of the user which created the policy",
"created_timestamp": "The time at which the policy was created",
"description": "An additional description of the group or the devices it targets",
"group_type": "The method by which this host group is managed",
"id": "The identifier of this host group",
"modified_by": "The email of the user which last modified the policy",
"modified_timestamp": "The time at which the policy was last modified",
"name": "The name of the group"
}
],
"id": "The unique id of the policy",
"modified_by": "The email of the user which last modified the policy",
"modified_timestamp": "The time at which the policy was last modified",
"name": "The human readable name of the policy",
"platform_name": "The name of the platform",
"settings": {
"build": "string"
}
}
]
}
Workflow Library Example
Perform Sensor Update Policies Action with Crowdstrike and Send Results Via Email
Preview this Workflow on desktop
Was this page helpful?
On this page