crowdstrike.PreventionPolicyMac
Explore with Pulumi AI
This resource allows you to manage CrowdStrike Falcon prevention policies for Mac hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.
API Scopes
The following API scopes are required:
- Prevention policies | Read & Write
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as crowdstrike from "@crowdstrike/pulumi";
const example = new crowdstrike.PreventionPolicyMac("example", {
enabled: false,
description: "Made with Pulumi",
hostGroups: [],
ioaRuleGroups: [],
cloudAdwareAndPup: {
detection: "MODERATE",
prevention: "CAUTIOUS",
},
cloudAntiMalware: {
detection: "MODERATE",
prevention: "CAUTIOUS",
},
sensorAntiMalware: {
detection: "MODERATE",
prevention: "CAUTIOUS",
},
sensorAdwareAndPup: {
detection: "MODERATE",
prevention: "CAUTIOUS",
},
notifyEndUsers: true,
customBlocking: true,
detectOnWrite: true,
intelligenceSourcedThreats: true,
preventSuspiciousProcesses: true,
quarantine: true,
quarantineOnWrite: true,
scriptBasedExecutionMonitoring: true,
sensorTamperingProtection: true,
uploadUnknownExecutables: true,
uploadUnknownDetectionRelatedExecutables: true,
xpcomShell: true,
kcPasswordDecoded: true,
hashCollector: true,
empyreBackdoor: true,
chopperWebshell: true,
});
export const preventionPolicyMac = example;
import pulumi
import crowdstrike_pulumi as crowdstrike
example = crowdstrike.PreventionPolicyMac("example",
enabled=False,
description="Made with Pulumi",
host_groups=[],
ioa_rule_groups=[],
cloud_adware_and_pup={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
},
cloud_anti_malware={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
},
sensor_anti_malware={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
},
sensor_adware_and_pup={
"detection": "MODERATE",
"prevention": "CAUTIOUS",
},
notify_end_users=True,
custom_blocking=True,
detect_on_write=True,
intelligence_sourced_threats=True,
prevent_suspicious_processes=True,
quarantine=True,
quarantine_on_write=True,
script_based_execution_monitoring=True,
sensor_tampering_protection=True,
upload_unknown_executables=True,
upload_unknown_detection_related_executables=True,
xpcom_shell=True,
kc_password_decoded=True,
hash_collector=True,
empyre_backdoor=True,
chopper_webshell=True)
pulumi.export("preventionPolicyMac", example)
package main
import (
"github.com/crowdstrike/pulumi-crowdstrike/sdk/go/crowdstrike"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
example, err := crowdstrike.NewPreventionPolicyMac(ctx, "example", &crowdstrike.PreventionPolicyMacArgs{
Enabled: pulumi.Bool(false),
Description: pulumi.String("Made with Pulumi"),
HostGroups: pulumi.StringArray{},
IoaRuleGroups: pulumi.StringArray{},
CloudAdwareAndPup: &crowdstrike.PreventionPolicyMacCloudAdwareAndPupArgs{
Detection: pulumi.String("MODERATE"),
Prevention: pulumi.String("CAUTIOUS"),
},
CloudAntiMalware: &crowdstrike.PreventionPolicyMacCloudAntiMalwareArgs{
Detection: pulumi.String("MODERATE"),
Prevention: pulumi.String("CAUTIOUS"),
},
SensorAntiMalware: &crowdstrike.PreventionPolicyMacSensorAntiMalwareArgs{
Detection: pulumi.String("MODERATE"),
Prevention: pulumi.String("CAUTIOUS"),
},
SensorAdwareAndPup: &crowdstrike.PreventionPolicyMacSensorAdwareAndPupArgs{
Detection: pulumi.String("MODERATE"),
Prevention: pulumi.String("CAUTIOUS"),
},
NotifyEndUsers: pulumi.Bool(true),
CustomBlocking: pulumi.Bool(true),
DetectOnWrite: pulumi.Bool(true),
IntelligenceSourcedThreats: pulumi.Bool(true),
PreventSuspiciousProcesses: pulumi.Bool(true),
Quarantine: pulumi.Bool(true),
QuarantineOnWrite: pulumi.Bool(true),
ScriptBasedExecutionMonitoring: pulumi.Bool(true),
SensorTamperingProtection: pulumi.Bool(true),
UploadUnknownExecutables: pulumi.Bool(true),
UploadUnknownDetectionRelatedExecutables: pulumi.Bool(true),
XpcomShell: pulumi.Bool(true),
KcPasswordDecoded: pulumi.Bool(true),
HashCollector: pulumi.Bool(true),
EmpyreBackdoor: pulumi.Bool(true),
ChopperWebshell: pulumi.Bool(true),
})
if err != nil {
return err
}
ctx.Export("preventionPolicyMac", example)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Crowdstrike = CrowdStrike.Crowdstrike;
return await Deployment.RunAsync(() =>
{
var example = new Crowdstrike.PreventionPolicyMac("example", new()
{
Enabled = false,
Description = "Made with Pulumi",
HostGroups = new[] {},
IoaRuleGroups = new[] {},
CloudAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacCloudAdwareAndPupArgs
{
Detection = "MODERATE",
Prevention = "CAUTIOUS",
},
CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacCloudAntiMalwareArgs
{
Detection = "MODERATE",
Prevention = "CAUTIOUS",
},
SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacSensorAntiMalwareArgs
{
Detection = "MODERATE",
Prevention = "CAUTIOUS",
},
SensorAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacSensorAdwareAndPupArgs
{
Detection = "MODERATE",
Prevention = "CAUTIOUS",
},
NotifyEndUsers = true,
CustomBlocking = true,
DetectOnWrite = true,
IntelligenceSourcedThreats = true,
PreventSuspiciousProcesses = true,
Quarantine = true,
QuarantineOnWrite = true,
ScriptBasedExecutionMonitoring = true,
SensorTamperingProtection = true,
UploadUnknownExecutables = true,
UploadUnknownDetectionRelatedExecutables = true,
XpcomShell = true,
KcPasswordDecoded = true,
HashCollector = true,
EmpyreBackdoor = true,
ChopperWebshell = true,
});
return new Dictionary<string, object?>
{
["preventionPolicyMac"] = example,
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.crowdstrike.PreventionPolicyMac;
import com.pulumi.crowdstrike.PreventionPolicyMacArgs;
import com.pulumi.crowdstrike.inputs.PreventionPolicyMacCloudAdwareAndPupArgs;
import com.pulumi.crowdstrike.inputs.PreventionPolicyMacCloudAntiMalwareArgs;
import com.pulumi.crowdstrike.inputs.PreventionPolicyMacSensorAntiMalwareArgs;
import com.pulumi.crowdstrike.inputs.PreventionPolicyMacSensorAdwareAndPupArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new PreventionPolicyMac("example", PreventionPolicyMacArgs.builder()
.enabled(false)
.description("Made with Pulumi")
.hostGroups()
.ioaRuleGroups()
.cloudAdwareAndPup(PreventionPolicyMacCloudAdwareAndPupArgs.builder()
%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))
.cloudAntiMalware(PreventionPolicyMacCloudAntiMalwareArgs.builder()
%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))
.sensorAntiMalware(PreventionPolicyMacSensorAntiMalwareArgs.builder()
%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))
.sensorAdwareAndPup(PreventionPolicyMacSensorAdwareAndPupArgs.builder()
%!v(PANIC=Format method: interface conversion: model.Expression is *model.TemplateExpression, not *model.LiteralValueExpression))
.notifyEndUsers(true)
.customBlocking(true)
.detectOnWrite(true)
.intelligenceSourcedThreats(true)
.preventSuspiciousProcesses(true)
.quarantine(true)
.quarantineOnWrite(true)
.scriptBasedExecutionMonitoring(true)
.sensorTamperingProtection(true)
.uploadUnknownExecutables(true)
.uploadUnknownDetectionRelatedExecutables(true)
.xpcomShell(true)
.kcPasswordDecoded(true)
.hashCollector(true)
.empyreBackdoor(true)
.chopperWebshell(true)
.build());
ctx.export("preventionPolicyMac", example);
}
}
resources:
example:
type: crowdstrike:PreventionPolicyMac
properties:
enabled: false
description: Made with Pulumi
hostGroups: []
ioaRuleGroups: []
cloudAdwareAndPup:
detection: MODERATE
prevention: CAUTIOUS
cloudAntiMalware:
detection: MODERATE
prevention: CAUTIOUS
sensorAntiMalware:
detection: MODERATE
prevention: CAUTIOUS
sensorAdwareAndPup:
detection: MODERATE
prevention: CAUTIOUS
notifyEndUsers: true
customBlocking: true
detectOnWrite: true
intelligenceSourcedThreats: true
preventSuspiciousProcesses: true
quarantine: true
quarantineOnWrite: true
scriptBasedExecutionMonitoring: true
sensorTamperingProtection: true
uploadUnknownExecutables: true
uploadUnknownDetectionRelatedExecutables: true
xpcomShell: true
kcPasswordDecoded: true
hashCollector: true
empyreBackdoor: true
chopperWebshell: true
outputs:
preventionPolicyMac: ${example}
Create PreventionPolicyMac Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new PreventionPolicyMac(name: string, args: PreventionPolicyMacArgs, opts?: CustomResourceOptions);
@overload
def PreventionPolicyMac(resource_name: str,
args: PreventionPolicyMacArgs,
opts: Optional[ResourceOptions] = None)
@overload
def PreventionPolicyMac(resource_name: str,
opts: Optional[ResourceOptions] = None,
host_groups: Optional[Sequence[str]] = None,
ioa_rule_groups: Optional[Sequence[str]] = None,
kc_password_decoded: Optional[bool] = None,
xpcom_shell: Optional[bool] = None,
chopper_webshell: Optional[bool] = None,
detect_on_write: Optional[bool] = None,
empyre_backdoor: Optional[bool] = None,
enabled: Optional[bool] = None,
hash_collector: Optional[bool] = None,
cloud_anti_malware: Optional[PreventionPolicyMacCloudAntiMalwareArgs] = None,
intelligence_sourced_threats: Optional[bool] = None,
notify_end_users: Optional[bool] = None,
description: Optional[str] = None,
custom_blocking: Optional[bool] = None,
cloud_adware_and_pup: Optional[PreventionPolicyMacCloudAdwareAndPupArgs] = None,
prevent_suspicious_processes: Optional[bool] = None,
quarantine: Optional[bool] = None,
quarantine_on_write: Optional[bool] = None,
script_based_execution_monitoring: Optional[bool] = None,
sensor_adware_and_pup: Optional[PreventionPolicyMacSensorAdwareAndPupArgs] = None,
sensor_anti_malware: Optional[PreventionPolicyMacSensorAntiMalwareArgs] = None,
sensor_tampering_protection: Optional[bool] = None,
upload_unknown_detection_related_executables: Optional[bool] = None,
upload_unknown_executables: Optional[bool] = None,
name: Optional[str] = None)
func NewPreventionPolicyMac(ctx *Context, name string, args PreventionPolicyMacArgs, opts ...ResourceOption) (*PreventionPolicyMac, error)
public PreventionPolicyMac(string name, PreventionPolicyMacArgs args, CustomResourceOptions? opts = null)
public PreventionPolicyMac(String name, PreventionPolicyMacArgs args)
public PreventionPolicyMac(String name, PreventionPolicyMacArgs args, CustomResourceOptions options)
type: crowdstrike:PreventionPolicyMac
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args PreventionPolicyMacArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args PreventionPolicyMacArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args PreventionPolicyMacArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args PreventionPolicyMacArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args PreventionPolicyMacArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var preventionPolicyMacResource = new Crowdstrike.PreventionPolicyMac("preventionPolicyMacResource", new()
{
HostGroups = new[]
{
"string",
},
IoaRuleGroups = new[]
{
"string",
},
KcPasswordDecoded = false,
XpcomShell = false,
ChopperWebshell = false,
DetectOnWrite = false,
EmpyreBackdoor = false,
Enabled = false,
HashCollector = false,
CloudAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacCloudAntiMalwareArgs
{
Detection = "string",
Prevention = "string",
},
IntelligenceSourcedThreats = false,
NotifyEndUsers = false,
Description = "string",
CustomBlocking = false,
CloudAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacCloudAdwareAndPupArgs
{
Detection = "string",
Prevention = "string",
},
PreventSuspiciousProcesses = false,
Quarantine = false,
QuarantineOnWrite = false,
ScriptBasedExecutionMonitoring = false,
SensorAdwareAndPup = new Crowdstrike.Inputs.PreventionPolicyMacSensorAdwareAndPupArgs
{
Detection = "string",
Prevention = "string",
},
SensorAntiMalware = new Crowdstrike.Inputs.PreventionPolicyMacSensorAntiMalwareArgs
{
Detection = "string",
Prevention = "string",
},
SensorTamperingProtection = false,
UploadUnknownDetectionRelatedExecutables = false,
UploadUnknownExecutables = false,
Name = "string",
});
example, err := crowdstrike.NewPreventionPolicyMac(ctx, "preventionPolicyMacResource", &crowdstrike.PreventionPolicyMacArgs{
HostGroups: pulumi.StringArray{
pulumi.String("string"),
},
IoaRuleGroups: pulumi.StringArray{
pulumi.String("string"),
},
KcPasswordDecoded: pulumi.Bool(false),
XpcomShell: pulumi.Bool(false),
ChopperWebshell: pulumi.Bool(false),
DetectOnWrite: pulumi.Bool(false),
EmpyreBackdoor: pulumi.Bool(false),
Enabled: pulumi.Bool(false),
HashCollector: pulumi.Bool(false),
CloudAntiMalware: &crowdstrike.PreventionPolicyMacCloudAntiMalwareArgs{
Detection: pulumi.String("string"),
Prevention: pulumi.String("string"),
},
IntelligenceSourcedThreats: pulumi.Bool(false),
NotifyEndUsers: pulumi.Bool(false),
Description: pulumi.String("string"),
CustomBlocking: pulumi.Bool(false),
CloudAdwareAndPup: &crowdstrike.PreventionPolicyMacCloudAdwareAndPupArgs{
Detection: pulumi.String("string"),
Prevention: pulumi.String("string"),
},
PreventSuspiciousProcesses: pulumi.Bool(false),
Quarantine: pulumi.Bool(false),
QuarantineOnWrite: pulumi.Bool(false),
ScriptBasedExecutionMonitoring: pulumi.Bool(false),
SensorAdwareAndPup: &crowdstrike.PreventionPolicyMacSensorAdwareAndPupArgs{
Detection: pulumi.String("string"),
Prevention: pulumi.String("string"),
},
SensorAntiMalware: &crowdstrike.PreventionPolicyMacSensorAntiMalwareArgs{
Detection: pulumi.String("string"),
Prevention: pulumi.String("string"),
},
SensorTamperingProtection: pulumi.Bool(false),
UploadUnknownDetectionRelatedExecutables: pulumi.Bool(false),
UploadUnknownExecutables: pulumi.Bool(false),
Name: pulumi.String("string"),
})
var preventionPolicyMacResource = new PreventionPolicyMac("preventionPolicyMacResource", PreventionPolicyMacArgs.builder()
.hostGroups("string")
.ioaRuleGroups("string")
.kcPasswordDecoded(false)
.xpcomShell(false)
.chopperWebshell(false)
.detectOnWrite(false)
.empyreBackdoor(false)
.enabled(false)
.hashCollector(false)
.cloudAntiMalware(PreventionPolicyMacCloudAntiMalwareArgs.builder()
.detection("string")
.prevention("string")
.build())
.intelligenceSourcedThreats(false)
.notifyEndUsers(false)
.description("string")
.customBlocking(false)
.cloudAdwareAndPup(PreventionPolicyMacCloudAdwareAndPupArgs.builder()
.detection("string")
.prevention("string")
.build())
.preventSuspiciousProcesses(false)
.quarantine(false)
.quarantineOnWrite(false)
.scriptBasedExecutionMonitoring(false)
.sensorAdwareAndPup(PreventionPolicyMacSensorAdwareAndPupArgs.builder()
.detection("string")
.prevention("string")
.build())
.sensorAntiMalware(PreventionPolicyMacSensorAntiMalwareArgs.builder()
.detection("string")
.prevention("string")
.build())
.sensorTamperingProtection(false)
.uploadUnknownDetectionRelatedExecutables(false)
.uploadUnknownExecutables(false)
.name("string")
.build());
prevention_policy_mac_resource = crowdstrike.PreventionPolicyMac("preventionPolicyMacResource",
host_groups=["string"],
ioa_rule_groups=["string"],
kc_password_decoded=False,
xpcom_shell=False,
chopper_webshell=False,
detect_on_write=False,
empyre_backdoor=False,
enabled=False,
hash_collector=False,
cloud_anti_malware={
"detection": "string",
"prevention": "string",
},
intelligence_sourced_threats=False,
notify_end_users=False,
description="string",
custom_blocking=False,
cloud_adware_and_pup={
"detection": "string",
"prevention": "string",
},
prevent_suspicious_processes=False,
quarantine=False,
quarantine_on_write=False,
script_based_execution_monitoring=False,
sensor_adware_and_pup={
"detection": "string",
"prevention": "string",
},
sensor_anti_malware={
"detection": "string",
"prevention": "string",
},
sensor_tampering_protection=False,
upload_unknown_detection_related_executables=False,
upload_unknown_executables=False,
name="string")
const preventionPolicyMacResource = new crowdstrike.PreventionPolicyMac("preventionPolicyMacResource", {
hostGroups: ["string"],
ioaRuleGroups: ["string"],
kcPasswordDecoded: false,
xpcomShell: false,
chopperWebshell: false,
detectOnWrite: false,
empyreBackdoor: false,
enabled: false,
hashCollector: false,
cloudAntiMalware: {
detection: "string",
prevention: "string",
},
intelligenceSourcedThreats: false,
notifyEndUsers: false,
description: "string",
customBlocking: false,
cloudAdwareAndPup: {
detection: "string",
prevention: "string",
},
preventSuspiciousProcesses: false,
quarantine: false,
quarantineOnWrite: false,
scriptBasedExecutionMonitoring: false,
sensorAdwareAndPup: {
detection: "string",
prevention: "string",
},
sensorAntiMalware: {
detection: "string",
prevention: "string",
},
sensorTamperingProtection: false,
uploadUnknownDetectionRelatedExecutables: false,
uploadUnknownExecutables: false,
name: "string",
});
type: crowdstrike:PreventionPolicyMac
properties:
chopperWebshell: false
cloudAdwareAndPup:
detection: string
prevention: string
cloudAntiMalware:
detection: string
prevention: string
customBlocking: false
description: string
detectOnWrite: false
empyreBackdoor: false
enabled: false
hashCollector: false
hostGroups:
- string
intelligenceSourcedThreats: false
ioaRuleGroups:
- string
kcPasswordDecoded: false
name: string
notifyEndUsers: false
preventSuspiciousProcesses: false
quarantine: false
quarantineOnWrite: false
scriptBasedExecutionMonitoring: false
sensorAdwareAndPup:
detection: string
prevention: string
sensorAntiMalware:
detection: string
prevention: string
sensorTamperingProtection: false
uploadUnknownDetectionRelatedExecutables: false
uploadUnknownExecutables: false
xpcomShell: false
PreventionPolicyMac Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The PreventionPolicyMac resource accepts the following input properties:
- Host
Groups List<string> - Host Group ids to attach to the prevention policy.
- Ioa
Rule List<string>Groups - IOA Rule Group to attach to the prevention policy.
- Chopper
Webshell bool - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- Cloud
Adware CrowdAnd Pup Strike. Crowdstrike. Inputs. Prevention Policy Mac Cloud Adware And Pup - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- Cloud
Anti CrowdMalware Strike. Crowdstrike. Inputs. Prevention Policy Mac Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- Custom
Blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- Description string
- Description of the prevention policy.
- Detect
On boolWrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- Empyre
Backdoor bool - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- Enabled bool
- Enable the prevention policy.
- Hash
Collector bool - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- Intelligence
Sourced boolThreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- Kc
Password boolDecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- Name string
- Name of the prevention policy.
- Notify
End boolUsers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- Prevent
Suspicious boolProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- Quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- Quarantine
On boolWrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- Script
Based boolExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- Sensor
Adware CrowdAnd Pup Strike. Crowdstrike. Inputs. Prevention Policy Mac Sensor Adware And Pup - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- Sensor
Anti CrowdMalware Strike. Crowdstrike. Inputs. Prevention Policy Mac Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- Sensor
Tampering boolProtection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- Upload
Unknown boolExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- Xpcom
Shell bool - Whether to enable the setting. The execution of an XPCOM shell was blocked.
- Host
Groups []string - Host Group ids to attach to the prevention policy.
- Ioa
Rule []stringGroups - IOA Rule Group to attach to the prevention policy.
- Chopper
Webshell bool - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- Cloud
Adware PreventionAnd Pup Policy Mac Cloud Adware And Pup Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- Cloud
Anti PreventionMalware Policy Mac Cloud Anti Malware Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- Custom
Blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- Description string
- Description of the prevention policy.
- Detect
On boolWrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- Empyre
Backdoor bool - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- Enabled bool
- Enable the prevention policy.
- Hash
Collector bool - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- Intelligence
Sourced boolThreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- Kc
Password boolDecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- Name string
- Name of the prevention policy.
- Notify
End boolUsers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- Prevent
Suspicious boolProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- Quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- Quarantine
On boolWrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- Script
Based boolExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- Sensor
Adware PreventionAnd Pup Policy Mac Sensor Adware And Pup Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- Sensor
Anti PreventionMalware Policy Mac Sensor Anti Malware Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- Sensor
Tampering boolProtection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- Upload
Unknown boolExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- Xpcom
Shell bool - Whether to enable the setting. The execution of an XPCOM shell was blocked.
- host
Groups List<String> - Host Group ids to attach to the prevention policy.
- ioa
Rule List<String>Groups - IOA Rule Group to attach to the prevention policy.
- chopper
Webshell Boolean - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- cloud
Adware PreventionAnd Pup Policy Mac Cloud Adware And Pup - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- cloud
Anti PreventionMalware Policy Mac Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking Boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description String
- Description of the prevention policy.
- detect
On BooleanWrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- empyre
Backdoor Boolean - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- enabled Boolean
- Enable the prevention policy.
- hash
Collector Boolean - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- intelligence
Sourced BooleanThreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- kc
Password BooleanDecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- name String
- Name of the prevention policy.
- notify
End BooleanUsers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- prevent
Suspicious BooleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine Boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- quarantine
On BooleanWrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- script
Based BooleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Adware PreventionAnd Pup Policy Mac Sensor Adware And Pup - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- sensor
Anti PreventionMalware Policy Mac Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering BooleanProtection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- Boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown BooleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- xpcom
Shell Boolean - Whether to enable the setting. The execution of an XPCOM shell was blocked.
- host
Groups string[] - Host Group ids to attach to the prevention policy.
- ioa
Rule string[]Groups - IOA Rule Group to attach to the prevention policy.
- chopper
Webshell boolean - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- cloud
Adware PreventionAnd Pup Policy Mac Cloud Adware And Pup - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- cloud
Anti PreventionMalware Policy Mac Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description string
- Description of the prevention policy.
- detect
On booleanWrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- empyre
Backdoor boolean - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- enabled boolean
- Enable the prevention policy.
- hash
Collector boolean - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- intelligence
Sourced booleanThreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- kc
Password booleanDecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- name string
- Name of the prevention policy.
- notify
End booleanUsers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- prevent
Suspicious booleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- quarantine
On booleanWrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- script
Based booleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Adware PreventionAnd Pup Policy Mac Sensor Adware And Pup - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- sensor
Anti PreventionMalware Policy Mac Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering booleanProtection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown booleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- xpcom
Shell boolean - Whether to enable the setting. The execution of an XPCOM shell was blocked.
- host_
groups Sequence[str] - Host Group ids to attach to the prevention policy.
- ioa_
rule_ Sequence[str]groups - IOA Rule Group to attach to the prevention policy.
- chopper_
webshell bool - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- cloud_
adware_ Preventionand_ pup Policy Mac Cloud Adware And Pup Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- cloud_
anti_ Preventionmalware Policy Mac Cloud Anti Malware Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom_
blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description str
- Description of the prevention policy.
- detect_
on_ boolwrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- empyre_
backdoor bool - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- enabled bool
- Enable the prevention policy.
- hash_
collector bool - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- intelligence_
sourced_ boolthreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- kc_
password_ booldecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- name str
- Name of the prevention policy.
- notify_
end_ boolusers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- prevent_
suspicious_ boolprocesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- quarantine_
on_ boolwrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- script_
based_ boolexecution_ monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor_
adware_ Preventionand_ pup Policy Mac Sensor Adware And Pup Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- sensor_
anti_ Preventionmalware Policy Mac Sensor Anti Malware Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor_
tampering_ boolprotection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload_
unknown_ boolexecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- xpcom_
shell bool - Whether to enable the setting. The execution of an XPCOM shell was blocked.
- host
Groups List<String> - Host Group ids to attach to the prevention policy.
- ioa
Rule List<String>Groups - IOA Rule Group to attach to the prevention policy.
- chopper
Webshell Boolean - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- cloud
Adware Property MapAnd Pup - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- cloud
Anti Property MapMalware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking Boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description String
- Description of the prevention policy.
- detect
On BooleanWrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- empyre
Backdoor Boolean - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- enabled Boolean
- Enable the prevention policy.
- hash
Collector Boolean - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- intelligence
Sourced BooleanThreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- kc
Password BooleanDecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- name String
- Name of the prevention policy.
- notify
End BooleanUsers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- prevent
Suspicious BooleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine Boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- quarantine
On BooleanWrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- script
Based BooleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Adware Property MapAnd Pup - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- sensor
Anti Property MapMalware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering BooleanProtection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- Boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown BooleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- xpcom
Shell Boolean - Whether to enable the setting. The execution of an XPCOM shell was blocked.
Outputs
All input properties are implicitly available as output properties. Additionally, the PreventionPolicyMac resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Last
Updated string
- Id string
- The provider-assigned unique ID for this managed resource.
- Last
Updated string
- id String
- The provider-assigned unique ID for this managed resource.
- last
Updated String
- id string
- The provider-assigned unique ID for this managed resource.
- last
Updated string
- id str
- The provider-assigned unique ID for this managed resource.
- last_
updated str
- id String
- The provider-assigned unique ID for this managed resource.
- last
Updated String
Look up Existing PreventionPolicyMac Resource
Get an existing PreventionPolicyMac resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: PreventionPolicyMacState, opts?: CustomResourceOptions): PreventionPolicyMac
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
chopper_webshell: Optional[bool] = None,
cloud_adware_and_pup: Optional[PreventionPolicyMacCloudAdwareAndPupArgs] = None,
cloud_anti_malware: Optional[PreventionPolicyMacCloudAntiMalwareArgs] = None,
custom_blocking: Optional[bool] = None,
description: Optional[str] = None,
detect_on_write: Optional[bool] = None,
empyre_backdoor: Optional[bool] = None,
enabled: Optional[bool] = None,
hash_collector: Optional[bool] = None,
host_groups: Optional[Sequence[str]] = None,
intelligence_sourced_threats: Optional[bool] = None,
ioa_rule_groups: Optional[Sequence[str]] = None,
kc_password_decoded: Optional[bool] = None,
last_updated: Optional[str] = None,
name: Optional[str] = None,
notify_end_users: Optional[bool] = None,
prevent_suspicious_processes: Optional[bool] = None,
quarantine: Optional[bool] = None,
quarantine_on_write: Optional[bool] = None,
script_based_execution_monitoring: Optional[bool] = None,
sensor_adware_and_pup: Optional[PreventionPolicyMacSensorAdwareAndPupArgs] = None,
sensor_anti_malware: Optional[PreventionPolicyMacSensorAntiMalwareArgs] = None,
sensor_tampering_protection: Optional[bool] = None,
upload_unknown_detection_related_executables: Optional[bool] = None,
upload_unknown_executables: Optional[bool] = None,
xpcom_shell: Optional[bool] = None) -> PreventionPolicyMac
func GetPreventionPolicyMac(ctx *Context, name string, id IDInput, state *PreventionPolicyMacState, opts ...ResourceOption) (*PreventionPolicyMac, error)
public static PreventionPolicyMac Get(string name, Input<string> id, PreventionPolicyMacState? state, CustomResourceOptions? opts = null)
public static PreventionPolicyMac get(String name, Output<String> id, PreventionPolicyMacState state, CustomResourceOptions options)
resources: _: type: crowdstrike:PreventionPolicyMac get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Chopper
Webshell bool - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- Cloud
Adware CrowdAnd Pup Strike. Crowdstrike. Inputs. Prevention Policy Mac Cloud Adware And Pup - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- Cloud
Anti CrowdMalware Strike. Crowdstrike. Inputs. Prevention Policy Mac Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- Custom
Blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- Description string
- Description of the prevention policy.
- Detect
On boolWrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- Empyre
Backdoor bool - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- Enabled bool
- Enable the prevention policy.
- Hash
Collector bool - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- Host
Groups List<string> - Host Group ids to attach to the prevention policy.
- Intelligence
Sourced boolThreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- Ioa
Rule List<string>Groups - IOA Rule Group to attach to the prevention policy.
- Kc
Password boolDecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- Last
Updated string - Name string
- Name of the prevention policy.
- Notify
End boolUsers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- Prevent
Suspicious boolProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- Quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- Quarantine
On boolWrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- Script
Based boolExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- Sensor
Adware CrowdAnd Pup Strike. Crowdstrike. Inputs. Prevention Policy Mac Sensor Adware And Pup - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- Sensor
Anti CrowdMalware Strike. Crowdstrike. Inputs. Prevention Policy Mac Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- Sensor
Tampering boolProtection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- Upload
Unknown boolExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- Xpcom
Shell bool - Whether to enable the setting. The execution of an XPCOM shell was blocked.
- Chopper
Webshell bool - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- Cloud
Adware PreventionAnd Pup Policy Mac Cloud Adware And Pup Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- Cloud
Anti PreventionMalware Policy Mac Cloud Anti Malware Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- Custom
Blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- Description string
- Description of the prevention policy.
- Detect
On boolWrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- Empyre
Backdoor bool - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- Enabled bool
- Enable the prevention policy.
- Hash
Collector bool - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- Host
Groups []string - Host Group ids to attach to the prevention policy.
- Intelligence
Sourced boolThreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- Ioa
Rule []stringGroups - IOA Rule Group to attach to the prevention policy.
- Kc
Password boolDecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- Last
Updated string - Name string
- Name of the prevention policy.
- Notify
End boolUsers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- Prevent
Suspicious boolProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- Quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- Quarantine
On boolWrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- Script
Based boolExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- Sensor
Adware PreventionAnd Pup Policy Mac Sensor Adware And Pup Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- Sensor
Anti PreventionMalware Policy Mac Sensor Anti Malware Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- Sensor
Tampering boolProtection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- Upload
Unknown boolExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- Xpcom
Shell bool - Whether to enable the setting. The execution of an XPCOM shell was blocked.
- chopper
Webshell Boolean - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- cloud
Adware PreventionAnd Pup Policy Mac Cloud Adware And Pup - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- cloud
Anti PreventionMalware Policy Mac Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking Boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description String
- Description of the prevention policy.
- detect
On BooleanWrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- empyre
Backdoor Boolean - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- enabled Boolean
- Enable the prevention policy.
- hash
Collector Boolean - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- host
Groups List<String> - Host Group ids to attach to the prevention policy.
- intelligence
Sourced BooleanThreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- ioa
Rule List<String>Groups - IOA Rule Group to attach to the prevention policy.
- kc
Password BooleanDecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- last
Updated String - name String
- Name of the prevention policy.
- notify
End BooleanUsers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- prevent
Suspicious BooleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine Boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- quarantine
On BooleanWrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- script
Based BooleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Adware PreventionAnd Pup Policy Mac Sensor Adware And Pup - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- sensor
Anti PreventionMalware Policy Mac Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering BooleanProtection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- Boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown BooleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- xpcom
Shell Boolean - Whether to enable the setting. The execution of an XPCOM shell was blocked.
- chopper
Webshell boolean - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- cloud
Adware PreventionAnd Pup Policy Mac Cloud Adware And Pup - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- cloud
Anti PreventionMalware Policy Mac Cloud Anti Malware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description string
- Description of the prevention policy.
- detect
On booleanWrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- empyre
Backdoor boolean - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- enabled boolean
- Enable the prevention policy.
- hash
Collector boolean - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- host
Groups string[] - Host Group ids to attach to the prevention policy.
- intelligence
Sourced booleanThreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- ioa
Rule string[]Groups - IOA Rule Group to attach to the prevention policy.
- kc
Password booleanDecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- last
Updated string - name string
- Name of the prevention policy.
- notify
End booleanUsers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- prevent
Suspicious booleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- quarantine
On booleanWrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- script
Based booleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Adware PreventionAnd Pup Policy Mac Sensor Adware And Pup - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- sensor
Anti PreventionMalware Policy Mac Sensor Anti Malware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering booleanProtection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown booleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- xpcom
Shell boolean - Whether to enable the setting. The execution of an XPCOM shell was blocked.
- chopper_
webshell bool - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- cloud_
adware_ Preventionand_ pup Policy Mac Cloud Adware And Pup Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- cloud_
anti_ Preventionmalware Policy Mac Cloud Anti Malware Args - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom_
blocking bool - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description str
- Description of the prevention policy.
- detect_
on_ boolwrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- empyre_
backdoor bool - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- enabled bool
- Enable the prevention policy.
- hash_
collector bool - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- host_
groups Sequence[str] - Host Group ids to attach to the prevention policy.
- intelligence_
sourced_ boolthreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- ioa_
rule_ Sequence[str]groups - IOA Rule Group to attach to the prevention policy.
- kc_
password_ booldecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- last_
updated str - name str
- Name of the prevention policy.
- notify_
end_ boolusers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- prevent_
suspicious_ boolprocesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine bool
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- quarantine_
on_ boolwrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- script_
based_ boolexecution_ monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor_
adware_ Preventionand_ pup Policy Mac Sensor Adware And Pup Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- sensor_
anti_ Preventionmalware Policy Mac Sensor Anti Malware Args - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor_
tampering_ boolprotection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- bool
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload_
unknown_ boolexecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- xpcom_
shell bool - Whether to enable the setting. The execution of an XPCOM shell was blocked.
- chopper
Webshell Boolean - Whether to enable the setting. Execution of a command shell was blocked and is indicative of the system hosting a Chopper web page.
- cloud
Adware Property MapAnd Pup - Use cloud-based machine learning informed by global analysis of executables to detect and prevent adware and potentially unwanted programs (PUP) for your online hosts.
- cloud
Anti Property MapMalware - Use cloud-based machine learning informed by global analysis of executables to detect and prevent known malware for your online hosts.
- custom
Blocking Boolean - Whether to enable the setting. Block processes matching hashes that you add to IOC Management with the action set to "Block" or "Block, hide detection".
- description String
- Description of the prevention policy.
- detect
On BooleanWrite - Whether to enable the setting. Use machine learning to analyze suspicious files when they're written to disk. To adjust detection sensitivity, change Anti-malware Detection levels in Sensor Machine Learning and Cloud Machine Learning.
- empyre
Backdoor Boolean - Whether to enable the setting. A process with behaviors indicative of the Empyre Backdoor was terminated.
- enabled Boolean
- Enable the prevention policy.
- hash
Collector Boolean - Whether to enable the setting. An attempt to dump a user’s hashed password was blocked.
- host
Groups List<String> - Host Group ids to attach to the prevention policy.
- intelligence
Sourced BooleanThreats - Whether to enable the setting. Block processes that CrowdStrike Intelligence analysts classify as malicious. These are focused on static hash-based IOCs.
- ioa
Rule List<String>Groups - IOA Rule Group to attach to the prevention policy.
- kc
Password BooleanDecoded - Whether to enable the setting. An attempt to recover a plaintext password via the kcpassword file was blocked.
- last
Updated String - name String
- Name of the prevention policy.
- notify
End BooleanUsers - Whether to enable the setting. Show a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines. See these messages in Console.app by searching for Process: Falcon Notifications.
- prevent
Suspicious BooleanProcesses - Whether to enable the setting. Block processes that CrowdStrike analysts classify as suspicious. These are focused on dynamic IOAs, such as malware, exploits and other threats.
- quarantine Boolean
- Whether to enable the setting. Quarantine executable files after they’re prevented by NGAV. When this is enabled, we recommend setting anti-malware prevention levels to Moderate or higher and not using other antivirus solutions.
- quarantine
On BooleanWrite - Whether to enable the setting. Use machine learning to quarantine suspicious files when they're written to disk. To adjust quarantine sensitivity, change Anti-malware Prevention levels in Sensor Machine Learning and Cloud Machine Learning.
- script
Based BooleanExecution Monitoring - Whether to enable the setting. Provides visibility into suspicious scripts, including shell and other scripting languages.
- sensor
Adware Property MapAnd Pup - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent adware and potentially unwanted programs (PUP).
- sensor
Anti Property MapMalware - For offline and online hosts, use sensor-based machine learning to identify and analyze unknown executables as they run to detect and prevent malware.
- sensor
Tampering BooleanProtection - Whether to enable the setting. Blocks attempts to tamper with the sensor. If disabled, the sensor still creates detections for tampering attempts but doesn’t block them. Disabling not recommended.
- Boolean
- Whether to enable the setting. Upload all unknown detection-related executables for advanced analysis in the cloud.
- upload
Unknown BooleanExecutables - Whether to enable the setting. Upload all unknown executables for advanced analysis in the cloud.
- xpcom
Shell Boolean - Whether to enable the setting. The execution of an XPCOM shell was blocked.
Supporting Types
PreventionPolicyMacCloudAdwareAndPup, PreventionPolicyMacCloudAdwareAndPupArgs
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
- detection string
- Machine learning level for detection.
- prevention string
- Machine learning level for prevention.
- detection str
- Machine learning level for detection.
- prevention str
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
PreventionPolicyMacCloudAntiMalware, PreventionPolicyMacCloudAntiMalwareArgs
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
- detection string
- Machine learning level for detection.
- prevention string
- Machine learning level for prevention.
- detection str
- Machine learning level for detection.
- prevention str
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
PreventionPolicyMacSensorAdwareAndPup, PreventionPolicyMacSensorAdwareAndPupArgs
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
- detection string
- Machine learning level for detection.
- prevention string
- Machine learning level for prevention.
- detection str
- Machine learning level for detection.
- prevention str
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
PreventionPolicyMacSensorAntiMalware, PreventionPolicyMacSensorAntiMalwareArgs
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- Detection string
- Machine learning level for detection.
- Prevention string
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
- detection string
- Machine learning level for detection.
- prevention string
- Machine learning level for prevention.
- detection str
- Machine learning level for detection.
- prevention str
- Machine learning level for prevention.
- detection String
- Machine learning level for detection.
- prevention String
- Machine learning level for prevention.
Import
prevention policy can be imported by specifying the policy id.
$ pulumi import crowdstrike:index/preventionPolicyMac:PreventionPolicyMac example 7fb858a949034a0cbca175f660f1e769
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- crowdstrike crowdstrike/pulumi-crowdstrike
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
crowdstrike
Terraform Provider.