
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 11:42:59 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Integrating CrowdStrike Falcon Fusion SOAR with Cloudflare’s SASE platform]]></title>
            <link>https://blog.cloudflare.com/integrating-crowdstrike-falcon-fusion-soar-with-cloudflares-sase-platform/</link>
            <pubDate>Mon, 15 Sep 2025 16:17:51 GMT</pubDate>
            <description><![CDATA[ Cloudflare and CrowdStrike have partnered to help SOC teams minimize manual bottlenecks. By combining Cloudflare’s SASE platform with CrowdStrike’s Falcon® Fusion SOAR, security teams can now detect  ]]></description>
            <content:encoded><![CDATA[ 
    <div>
      <h2>The challenge of manual response</h2>
      <a href="#the-challenge-of-manual-response">
        
      </a>
    </div>
    <p>Security teams know all too well the grind of manual investigations and remediation. With the mass adoption of AI and increasingly automated attacks, defenders cannot afford to rely on overly manual, low priority, and complex workflows.</p><p>Heavily burdensome manual response introduces delays as analysts bounce between consoles and high alert volumes, contributing to alert fatigue. Even worse, it prevents security teams from dedicating time to high-priority threats and strategic, innovative work. To keep pace, <a href="https://www.cloudflare.com/learning/security/glossary/what-is-a-security-operations-center-soc/"><u>SOCs</u></a> need automated responses that contain and remediate common threats at machine speed before they become business-impacting incidents.</p>
    <div>
      <h2>Expanding our capabilities with CrowdStrike Falcon® Fusion’ SOAR</h2>
      <a href="#expanding-our-capabilities-with-crowdstrike-falcon-r-fusion-soar">
        
      </a>
    </div>
    <p>That’s why today, we’re excited to announce a new integration between the Cloudflare One platform and CrowdStrike's Falcon® Fusion SOAR.</p><p>As part of our ongoing partnership with CrowdStrike, this integration introduces two out-of-the-box integrations for Zero Trust and <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> designed for organizations already leveraging CrowdStrike Falcon® Insight XDR or CrowdStrike Falcon® Next-Gen SIEM.</p><p>This allows SOC teams to gain powerful new capabilities to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/"><u>stop phishing</u></a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/"><u>malware</u></a>, and suspicious behavior faster, with less manual effort.</p>
    <div>
      <h2>Out-of-the-box integrations</h2>
      <a href="#out-of-the-box-integrations">
        
      </a>
    </div>
    <p>Although teams can always create custom automations, we’ve made it simple to get started with two pre-built integrations focused on Zero Trust Access and Email Security. Both follow the same general structure and are available directly in the CrowdStrike Content Library.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3laW9PA2y85HzMIo8n9azl/188a3c5286816e63f99c05c553493b95/Screenshot_2025-09-15_at_10.32.51.png" />
          </figure><p><b>Cloudflare within CrowdStrike Content Library</b></p><p>The actions you can take within CrowdStrike from these integrations are the following:</p><table><tr><td><p><b>Email Security</b></p><p>- Update Allow Policy </p><p>- Search Email Messages</p><p>- List Trusted Domains</p><p>- List Protected Domains</p><p>- List Blocked Senders</p><p>- List Allow Policies </p><p>- Get Trusted Domain</p><p>- Get Message Details</p><p>- Get Detection Details</p><p>- Get Allow Policy </p><p>- Delete Trusted Domain</p><p>- Delete Allow Policy</p><p>       Delete Blocked Sender</p><p>       Create Trusted Domain</p><p>       Create Blocked Sender</p><p>       Create Allow Policy</p><p>       Get Blocked Sender</p></td><td><p><b>Zero Trust Access </b></p><p>- Update Reusable Policy</p><p>- Update Access Group</p><p>- Revoke Application Tokens</p><p>- Read Metadata For A Key</p><p>- List Reusable Policies</p><p>- List Access Groups</p><p>- List Access Applications </p><p>- List Access App Policies </p><p>- Get Access Reusable Policy </p><p>- Get Access Group</p><p>- Get Access Application </p><p>- Get Access App Policy </p><p>- Delete Reusable Policy </p><p>- Delete Access Group </p><p>- Delete Access Application </p><p>- Delete Access App Policy </p><p>- Create Reusable Policy </p><p>- Create Access Group</p><p>- Create Access App Policy </p></td></tr></table><p>Using these signals, customers can create automated workflows that run with minimal to no human intervention. Falcon Fusion SOAR’s drag-and-drop editor makes it easy to chain together Cloudflare actions with other signals (from CrowdStrike or even third-party vendors) to automate large portions of the SOC workflow.</p><p>An example flow that you could create is: </p><ol><li><p>A phishing email is detected by Cloudflare Email Security.</p></li><li><p>Falcon Fusion SOAR automatically retrieves detection details, blocks the sender, and updates allow/deny lists.</p></li><li><p>Cloudflare Zero Trust revokes active session tokens for the impacted account.</p></li><li><p>If Falcon confirms the endpoint is compromised, the device is automatically isolated.</p></li></ol><p>Another example of how a workflow like above would show in the UI is the following:  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3VAhAcZlZ6UlY7m8akijP6/b723b59a1f7099c2dd41e3c195cbf2ad/image_-_2025-09-15T103707.530.png" />
          </figure><p><b>An example automated flow using Cloudflare</b></p><p>From the Cloudflare UI, customers can navigate to the Logpush section where they can set up a job with CrowdStrike. To do this customers need to create a job with “HTTP destination”: </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fb3bijbYCmZNVx1x3xNHI/d6c3e7bd28aca05514a3c704058cf1ab/image_-_2025-09-15T103911.429.png" />
          </figure><p>From here, customers can input the HTTP endpoint provided by CrowdStrike in the data connector setup to start sending logs over to Falcon Fusion SOAR. This URL will show up in the following way: <i>ingest.us-2.crowdstrike.com/api/ingest/hec/&lt;CRWDconnectionID&gt;/v1/services/collector/raw</i></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dNB9yDkmzsNQhd9vKnZEI/43267cdfec074608410bf316478ca40b/image_-_2025-09-15T104010.825.png" />
          </figure><p><b>CrowdStrike URL Location</b></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7I9DtSd5yDgcWC9ko7ygNK/1af7ecc2459796284ca354ebb290d25e/image_-_2025-09-15T104048.857.png" />
          </figure><p><b>Working Logpush to CrowdStrike</b></p><p>This end-to-end automation allows teams to reduce mean time-to-response from minutes to seconds.</p>
    <div>
      <h2>How detection and remediation are made possible</h2>
      <a href="#how-detection-and-remediation-are-made-possible">
        
      </a>
    </div>
    <p>At a technical level, the integration relies on webhook and API integrations between <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare’s SASE platform </u></a>and CrowdStrike Falcon Fusion SOAR. For example:</p><ul><li><p><b>From endpoint to network:</b> When the CrowdStrike Falcon® platform detects an endpoint compromise, it triggers a workflow to Cloudflare’s API, which enforces step-up authentication or session revocation across SaaS, private apps, or email access. This is done via Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Access</u></a> product. </p></li><li><p><b>From network to endpoint:</b> When Cloudflare flags suspicious behavior (e.g., abnormal login patterns, anomalous traffic, or unsafe email activity), it notifies CrowdStrike Falcon Fusion SOAR, which then isolates the device and launches remediation playbooks.</p></li></ul><p>This bidirectional exchange makes sure threats are contained from both sides, endpoint and network, without requiring manual intervention from analysts.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>If your organization already uses CrowdStrike Falcon Fusion SOAR with Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform, you can enable these workflows today directly from the Cloudflare Dashboard and CrowdStrike Falcon console (<a href="https://falcon.us-2.crowdstrike.com/workflow/fusion/content-library/apps/313f46ae74dd42939cbfd7f519986631"><u>Zero Trust</u></a>, <a href="https://falcon.us-2.crowdstrike.com/workflow/fusion/content-library/apps/dbccb19e577f44b49c561fac70518913"><u>Email Security</u></a>). You can also search for Cloudflare within the content library in CrowdStrike to find the integrations. </p><p>For organizations looking to customize further, both platforms allow extensibility through APIs and custom playbooks so SOC teams can tailor response actions to their unique risk posture.</p><p>To learn more about our integrations, feel free to <a href="https://www.cloudflare.com/zero-trust/trial/"><u>reach out to us</u></a> to get started with a consultation.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">4pnRemZNUf37u3e5pPlaAV</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Michael Mcgrory</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
        </item>
        <item>
            <title><![CDATA[Customers get increased integration with Cloudflare Email Security and Zero Trust through expanded partnership with CrowdStrike]]></title>
            <link>https://blog.cloudflare.com/customers-get-increased-integration-with-cloudflare-email-security-and-zero-trust/</link>
            <pubDate>Wed, 11 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ This post explains how our integrations with CrowdStrike Falcon® Next-Gen SIEM allow customers to identify and investigate risky user behavior and analyze data combined with other log sources to uncover hidden threats. ]]></description>
            <content:encoded><![CDATA[ <p>Today, we’re excited to expand <a href="https://blog.cloudflare.com/unified-risk-posture"><u>our recent Unified Risk Posture announcement</u></a> with more information on our latest integrations with <a href="https://www.crowdstrike.com/"><u>CrowdStrike</u></a>. We <a href="https://blog.cloudflare.com/unified-risk-posture"><u>previously shared</u></a> that our CrowdStrike Falcon Next-Gen SIEM integration allows for deeper analysis and further investigations by unifying first- and third-party data, native threat intelligence, AI, and workflow automation to allow your security teams to focus on work that matters.</p><p>This post explains how Falcon Next-Gen SIEM allows customers to identify and investigate risky user behavior and analyze data combined with other log sources to uncover hidden threats. By combining Cloudflare and CrowdStrike, organizations are better equipped to manage risk and decisively take action to stop cyberattacks.</p><p>By leveraging the combined capabilities of Cloudflare and CrowdStrike, organizations combine Cloudflare’s email security and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust </a>logging capabilities with CrowdStrike’s dashboards and custom workflows to get better visibility into their environments and remediate potential threats. <a href="https://www.happycog.com/">Happy Cog</a>, a full-service digital agency, currently leverages the integration. Co-Founder and President Matthew Weinberg said: </p><blockquote><p>'The integration of Cloudflare’s robust Zero Trust capabilities with CrowdStrike Falcon Next-Gen SIEM enables organizations to gain a more comprehensive view of the threat landscape and take action to mitigate both internal and external risks posed by today’s security challenges.'</p></blockquote>
    <div>
      <h3>Cloudflare Email Security with Falcon Next-Gen SIEM</h3>
      <a href="#cloudflare-email-security-with-falcon-next-gen-siem">
        
      </a>
    </div>
    <p>With <a href="https://developers.cloudflare.com/email-security/"><u>Cloudflare Email Security’s</u></a> configurable policies, organizations can now push indicators of compromise (IoC) alerts to Falcon Next-Gen SIEM, notifying analysts about suspicious activity, such as a user engaging with a phishing email. By proactively alerting analysts when suspicious activity is detected, Cloudflare and CrowdStrike can provide early detection of account compromises or insider threats.</p>
    <div>
      <h3>Cloudflare Zero Trust Logs with Falcon Next-Gen SIEM</h3>
      <a href="#cloudflare-zero-trust-logs-with-falcon-next-gen-siem">
        
      </a>
    </div>
    <p>We are also integrating <a href="https://developers.cloudflare.com/cloudflare-one/"><u>Cloudflare’s Zero Trust</u></a> platform with Falcon Next-Gen SIEM. This allows our mutual customers to push Cloudflare Zero Trust logs from Cloudflare Access and Cloudflare Gateway to Falcon Next-Gen SIEM for better visualization, analysis, and remediation. This integration allows Cloudflare logs to be used to customize and enhance Falcon Next-Gen SIEM detections and trigger CrowdStrike workflows to automatically configure a response action. An example workflow: based on a new detection of a user’s access request being deemed fraudulent, or if a user is engaging with risky websites, the Falcon platform can trigger Cloudflare to move users to affected user groups and apply adaptive access control policies, such as access isolating or quarantining the user.</p>
    <div>
      <h3>How To Get Started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>To connect Cloudflare Zero Trust logs, start with the Falcon Next-Gen SIEM module. Navigate to the Data Connectors tab of your Falcon Next-Gen SIEM dashboard and select the Cloudflare Data Connector.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68WBQjl9Y4v8FFZQ8GD7gd/9e2bfa370303f1a3ccfe7a858089b195/image3.png" />
          </figure><p>Give the connector a name and select “Save”, and you will receive two pieces of information: an API key and an API URL. Be sure to make note of the key, as it will only be shown once.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6VqTqVgB9mf3CHeYomnfkP/6ae503472ca78969f2a8e26201b5b276/image1.png" />
          </figure><p>Next, in Cloudflare, create an <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/http/"><u>HTTP logpush job via API</u></a>, and format the "destination_conf" field as follows:</p><p><code>"destination_conf": "&lt;API URL&gt;?header_Authorization=Bearer%20&lt;API KEY&gt;&amp;tags=&lt;ZONE&gt;,dataset:&lt;DATASET&gt;"</code></p><p>Note: </p><ul><li><p>&lt;ZONE&gt; is optional for account-level logpush jobs </p></li><li><p>&lt;DATASET&gt; follows a dot delimited syntax, so <code>http_requests</code> becomes <code>http.requests</code></p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hWaxWcelja9tY4q6ZSRwT/659bd80980cba2b5988279209fe6fdff/image2.png" />
          </figure><p>Once the job is created and active, you will start to see events populating in the My Connectors section of your Falcon dashboard. Once Cloudflare data is populated in Falcon Next-Gen SIEM, you can now search events and create Falcon Fusion SOAR automation workflows and correlation rules, all based on Cloudflare log events.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7g7PFWfKkHyT8gtKjROCbB/7a09065ff88e2cae7b905b8cc30f6442/image5.png" />
          </figure>
    <div>
      <h3>In Summary</h3>
      <a href="#in-summary">
        
      </a>
    </div>
    <p>Together, CrowdStrike and Cloudflare’s shared telemetry will further decrease the mean time to containment and expedite any organization’s ability to decisively respond to risks within their environment. The two platforms work together as one, allowing organizations to block suspicious activity and deliver high-fidelity alerts to security analysts for further investigation.</p><p>To learn more about these integrations, feel free to <a href="https://www.cloudflare.com/zero-trust/trial/"><u>reach out to us</u></a> to get started with a consultation. We can discuss your existing environment and ensure that you are best equipped to achieve better visibility and remediation in the face of emerging threats.</p> ]]></content:encoded>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2oxT0UhMM8loVoSuUom7W8</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Michael Mcgrory</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
        </item>
    </channel>
</rss>