Fusion workflows are automated response sequences triggered by events within Falcon. They allow your organization to:
Respond faster to threats
Standardize incident handling
Reduce manual work for security teams
A trigger is the event that starts the workflow. When Falcon detects a certain condition, it launches the associated automation.
| Trigger Type | Description |
|---|---|
| Detection Triggered | A new detection occurs on a host |
| Detection Reviewed/Unreviewed | A detection is reviewed (or remains unreviewed for X time) |
| Host Joins a Group | A host enters a specific group |
| Policy Assigned | A host receives a new policy |
| Host Tag Updated | A tag is added/removed from a host |
| IOC Match Occurs | A host matches a known IOC |
| Sensor Health Change | Sensor status changes (e.g., becomes unhealthy) |
Each trigger can have conditional logic that refines when the workflow should run. You can filter by:
| Condition | Example |
|---|---|
| Severity Level | Only trigger on detections rated “High” or “Critical” |
| Detection Source | Only trigger on Custom IOA detections |
| Policy Name | Trigger when a host joins a group with "Finance Policy" |
| Host Tags | Trigger only on hosts tagged “VIP” or “Executive” |
Conditions help ensure that automation runs only when it’s needed, avoiding noise or overreaction.
Auto-Isolate a Host:
Trigger: Detection with Severity = Critical
Condition: Host tag = “Production”
Action: Contain the host
Create a Ticket in Jira:
Trigger: Detection is unreviewed for 1 hour
Condition: Severity ≥ High
Action: Auto-create a Jira ticket for investigation
| Tip | Why It Helps |
|---|---|
| Start with broad triggers, then refine | Helps observe patterns before over-automating |
| Use tag-based filters for precision | Targets actions to critical assets |
| Log all trigger activity | Enables troubleshooting and tuning later |
| Avoid overlapping triggers | Prevents redundant actions (e.g., multiple isolations) |
Once a trigger fires (such as a detection, tag change, or policy update), Falcon Fusion can automatically perform one or more actions to:
Respond to threats
Escalate alerts
Log or notify teams
Each action is like a step in a playbook, forming the response path.
| Action Type | Description |
|---|---|
| Contain Host | Isolate the endpoint from the network while keeping Falcon connectivity |
| Add Host to Group | Move the host into a dynamic/static group to enforce new policies |
| Send Notification | Alert security teams via: |
| – Slack | |
| – Webhook (to SIEM, SOAR, or internal platforms) | |
| Create a Ticket | Open tickets automatically in systems like: |
| – Jira | |
| – ServiceNow | |
| Tag a Host | Add custom tags (e.g., Under_Investigation) |
| Send to Fusion Queue | Queue the alert for further action via another automation path |
| Send API Command | Call external APIs (e.g., initiate IR workflow in another tool) |
Multiple actions can be chained together. For example:
Detection occurs on a VIP laptop.
Falcon sends a Slack alert to IR team.
Falcon adds the host to “High Risk” group.
A policy in that group triggers host containment.
You can control this flow using Fusion Playbook logic, including conditions, delays, and branching.
Some actions are instantaneous (e.g., tag a host).
Others allow delays (e.g., wait 10 minutes before containing).
Conditional logic can stop an action if a specific check fails (e.g., if the host already has a “Contained” tag).
| Step | Trigger/Action |
|---|---|
| 1 | Trigger: Detection from Office.exe with Severity = High |
| 2 | Action: Send email to security analyst |
| 3 | Action: Create Jira ticket |
| 4 | Action: Add tag Under_Review to host |
| 5 | Action: Delay 15 minutes |
| 6 | Conditional Action: If no review tag is removed, then contain the host |
| Tip | Why It Matters |
|---|---|
| Use conditional branching to avoid overreaction | Prevents false containment or alert spam |
| Include manual steps where needed | Gives analysts a chance to intervene before automation escalates |
| Document each action in your playbook | Improves visibility and post-incident reviews |
| Start with alerting-only workflows | Validate logic before deploying aggressive actions |
A Fusion Playbook is the visual design interface for creating and managing workflows in Falcon Fusion. It allows you to build complex automated responses using:
Triggers
Conditions
Actions
Delays
Branches
Fusion Playbooks are highly flexible and require no coding—ideal for security teams, analysts, and response engineers.
Fusion Playbooks use a drag-and-drop editor:
Each step (trigger, condition, or action) appears as a visual block.
Arrows show the flow of logic.
Branches can be used to direct the flow based on evaluation of conditions.
| Component | Function |
|---|---|
| Trigger Node | Starts the workflow based on detection, host, or tag change |
| Condition Node | Evaluates attributes (e.g., severity, host tag) |
| Action Node | Performs steps like notifications, containment, ticket creation |
| Delay Node | Adds a pause (e.g., 10 minutes before proceeding) |
| Branch Node | Splits workflow into “Yes/No” paths based on conditions |
Goal: Auto-Isolate a Host After Critical Detection (Unless Already Investigated)
Trigger: Detection with Severity = Critical
Condition: Does host tag include Under_Review?
Yes → End playbook (no action)
No → Continue
Action: Send Slack message
Delay: Wait 15 minutes
Condition: Is detection still unreviewed?
Yes → Contain the host
No → End playbook
Playbooks can be saved, duplicated, or edited.
You can assign different playbooks to different detection types or host groups.
Versioning helps manage changes over time.
Not all users can create or modify playbooks.
Roles must have Fusion Playbook permissions to:
Design workflows
Enable/disable automation
View execution logs
| Tip | Why It Helps |
|---|---|
| Start with templates or clones | Reduces setup errors |
| Use short, readable node names | Easier for team handoffs |
| Always simulate before enabling live | Prevents disruptive actions |
| Review and clean up unused branches | Keeps playbooks efficient |
A device generates a detection marked Critical due to suspicious PowerShell activity.
Trigger: Detection with Severity = Critical
Condition: Host group = Production
Action: Send Slack and email alert to SOC
Delay: Wait 10 minutes for analyst review
Condition: If still unreviewed
Action: Contain host from the network
Threats are contained automatically if not reviewed promptly.
SOC gets time to review but fallback containment prevents lateral spread.
Some alerts are being overlooked during overnight shifts.
Trigger: Detection not reviewed within 60 minutes
Condition: Detection source = Custom IOA
Action: Create Jira/ServiceNow ticket
Action: Tag host as Needs_Review
Detections become actionable tickets.
Teams can track alert lifecycle more efficiently.
An analyst tags a host as Compromised manually.
Trigger: Host tag added = Compromised
Action: Move host to Quarantine Group
Action: Notify team lead via email
Action: Disable sensor update for the device (prevent instability during investigation)
Tagging becomes a trigger for deeper automation.
Analysts control escalation without needing to manually move hosts or send emails.
You want to proactively handle failing or outdated sensors.
Trigger: Sensor status changes to Unhealthy
Condition: Host not in Lab group
Action: Send alert to IT admin
Action: Add host to Sensor Repair group
Ensures sensor coverage gaps are quickly addressed.
Supports compliance by reducing blind spots.
Executives’ devices require prioritized monitoring.
Trigger: Detection on host with tag = VIP
Action: Notify CISO directly via SMS or email
Action: Add detection to “High Priority Queue”
Action: Contain if severity = Critical
VIP threats are never missed.
CISO and IR leads are immediately informed.
| Use Case | Primary Benefit |
|---|---|
| Auto-isolation | Prevents spread of malware or ransomware |
| Alert escalation | Ensures alerts don’t get lost |
| Quarantine policy | Standardizes response for high-risk hosts |
| Sensor monitoring | Improves system health and visibility |
| VIP alerting | Enhances protection for key personnel |
Before enabling a new workflow:
You want to ensure the logic works as intended.
You need to prevent false containment, misrouted tickets, or missed alerts.
Testing helps reduce unintended automation outcomes.
CrowdStrike provides a simulation feature within the Fusion Playbook editor.
Open your playbook in the Fusion editor.
Click “Simulate Workflow” or “Test Playbook”.
Choose a sample event or define custom test parameters:
Severity: Critical
Host Group: Finance
Detection Source: Custom IOA
Run the test and observe:
Which branches are triggered
What actions are executed
Whether all conditions are met as expected
Simulations do not perform real actions (no host isolation, no emails sent). They show a preview of behavior.
Falcon automatically logs each workflow execution instance, including:
Trigger time
Input data
Step-by-step status
Failures or skipped actions
To view logs:
Go to Fusion → Workflow Logs
Filter by:
Playbook name
Time
Status (Success, Failure, Skipped)
Logs show:
Which conditions passed or failed
Which actions executed successfully
API call results (success/failure with error codes)
This helps you:
Identify logic errors (e.g., conditions that never pass)
Verify delays and branching logic
Monitor how often workflows run
Common issues and fixes:
| Issue | Fix |
|---|---|
| Actions skipped unexpectedly | Adjust condition logic or input data |
| Workflow runs too often | Add additional filters (e.g., severity, host group) |
| Emails sent to wrong users | Confirm notification settings |
| Containment delayed or missed | Review branching and delay placement |
Clone playbooks before major changes.
Label versions clearly (e.g., “PhishingResponse-v1.3-Test”).
Roll out to test groups first, then expand to production.
| Practice | Benefit |
|---|---|
| Simulate all new workflows | Avoid production disruptions |
| Use logs for audit and debugging | Increases visibility and safety |
| Regularly review active workflows | Prevents outdated logic from running |
| Document playbook logic and purpose | Supports handoffs and audits |
Workflow questions often hide a safety test: can you automate response without creating a “runaway automation” that floods tickets, spams channels, or triggers disruptive actions broadly? Strong answers show staged automation: notify → create case → enrich → (optionally) gated response.
Use a four-layer structure:
Trigger: define exactly what event starts the workflow (detection, health state change, policy change event).
Scope gates: constrain by environment/host group, severity, and asset criticality.
Action chain: order actions from low-risk to higher-risk (notify first, then ticket/case, then enrichment).
Proof + rollback: define how you confirm it ran correctly and how you disable/adjust if it misfires.
Common safe first actions:
Create a case/ticket with key fields populated (host, severity, timestamp, link/reference).
Notify a team channel with a short summary and the ticket ID.
Add enrichment fields (owner group, environment tag, last seen, current policy posture).
Trap pattern: building a workflow that runs for “all detections” with no gating. Better: severity + host group + environment gates.
Trap pattern: automating disruptive actions immediately. Better: notify + ticket first, then add stronger steps with explicit approval gating.
What is the primary purpose of workflows in the Falcon platform?
To automate responses to predefined security events.
Workflows allow administrators to define automated actions triggered by specific events within the Falcon platform. These events may include detection alerts, policy changes, or other system activities. By automating responses, workflows help organizations respond faster to potential threats and reduce the need for manual intervention. Automated responses can include actions such as notifications, ticket creation, or other predefined processes that support incident response operations.
Demand Score: 63
Exam Relevance Score: 75
What type of condition typically triggers a Falcon workflow?
A defined event such as a detection alert or system activity.
Workflows rely on triggers that represent specific events occurring in the Falcon environment. These triggers can include security detections, configuration changes, or other operational events. Once the trigger condition occurs, the workflow automatically executes predefined actions. Proper configuration of triggers ensures that workflows activate only when relevant events occur, preventing unnecessary automation and ensuring efficient response operations.
Demand Score: 60
Exam Relevance Score: 72
Why do organizations use workflow automation in security operations?
To reduce manual workload and accelerate response to security events.
Security teams often handle large volumes of alerts and operational tasks. Workflow automation helps streamline repetitive processes by automatically executing predefined actions when specific conditions are met. This allows analysts to focus on complex investigations rather than routine operational tasks. Automation improves response speed and operational efficiency while ensuring consistent handling of security events across the environment.
Demand Score: 58
Exam Relevance Score: 70