AEGIBIT VoiceCore + CrowdStrike Falcon
Isolate hosts, pull detection reports, and manage CrowdStrike responses through authenticated voice commands during active security incidents.
Voice Commands
examples
❯Isolate endpoint CS-WS-044 from network
❯Pull CrowdStrike detections for last 24 hours
❯Run on-demand scan on finance-laptop-12
❯Generate IOC report for incident INC-882
Setup Steps
- 01Generate CrowdStrike Falcon API credentials
- 02Configure VoiceCore CrowdStrike connector
- 03Map high-risk commands to Sudo Mode with dual-approval
- 04Test with 'Show active detections'