• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Content Security Content
  • Detections
  • Analytic Stories
  • Playbooks
  • Blog
  • About
    • Type
      • Investigation
      • Response
    • Use Case
      • Endpoint
      • Enrichment
      • Phishing
    • D3fend Technique Category
      • Credential Eviction
      • File Analysis
      • File Eviction
      • Identifier Analysis
      • Message Analysis
      • Network Isolation
      • Restore Access
      • Restore Object
    • Soar App
      • AD LDAP
      • AWS IAM
      • Azure AD Graph
      • Carbon Black Response
      • Cisco Umbrella
      • CrowdStrike OAuth API
      • Cylance
      • Falcon Host API
      • G Suite for GMail
      • Jira
      • LDAP
      • MS Graph for Office 365
      • Palo Alto Networks Firewall
      • Panorama
      • Phantom
      • PhishTank
      • Reversing Labs
      • SMTP
      • SSH
      • ServiceNow
      • Splunk
      • Splunk Attack Analyzer Connector for Splunk SOAR
      • Threat Grid
      • TruSTAR
      • VirusTotal
      • VirusTotal v3
      • WildFire
      • Windows Defender ATP
      • Windows Remote Management
      • Zscaler
      • urlscan.io

    CrowdStrike OAuth API

    Name SOAR App D3FEND Use Case
    CrowdStrike OAuth API Device Attribute Lookup CrowdStrike OAuth API   Enrichment, Endpoint
    CrowdStrike OAuth API Dynamic Analysis CrowdStrike OAuth API Dynamic Analysis Enrichment, Phishing, Endpoint
    CrowdStrike OAuth API Identifier Activity Analysis CrowdStrike OAuth API Identifier Activity Analysis Enrichment, Endpoint
    Crowdstrike Malware Triage CrowdStrike OAuth API    
    • Twitter
    • GitHub
    • Feed
    © 2024 Splunk Threat Research Team (STRT). Powered by Jekyll & Minimal Mistakes.