The Insider Risk Workday sample Foundry app is a community-driven, open source project which serves as an example of an app which can be built using CrowdStrike's Foundry ecosystem.
foundry-sample-insider-risk-workday is an open source project, not a CrowdStrike product. As such, it carries no formal support, expressed or implied.
This app is one of several App Templates included in Foundry that you can use to jumpstart your development. It comes complete with a set of preconfigured capabilities aligned to its business purpose. Deploy this app from the Templates page with a single click in the Foundry UI, or create an app from this template using the CLI.
Important
To view documentation and deploy this sample app, you need access to the Falcon console.
Organizations face critical security challenges when employees leave and have elevated access to sensitive data. The sample Foundry Insider Risk Workday helps automate the process of monitoring leaving employees. This application helps teams:
- Monitor high-risk individuals who may pose insider risk.
- Automatically track employees during their departure process.
- Enhance protection of sensitive data during critical transition periods.
- Maintain security oversight for users with privileged access.
This app illustrates the following functionality amongst other components:
- Fetch Leaving/departing employees data from Workday.
- Add employees to Identity Protection watchlist and Active Directory group using Workflow built-in actions for enhanced monitoring capabilities.
- The Foundry CLI (instructions below)
- Workday Configuration
- Active Directory Configuration
You can install the Foundry CLI with Scoop on Windows or Homebrew on Linux/macOS.
Windows:
Install Scoop. Then, add the Foundry CLI bucket and install the Foundry CLI.
scoop bucket add foundry https://github.com/crowdstrike/scoop-foundry-cli.git
scoop install foundryOr, you can download the latest Windows zip file, expand it, and add the install directory to your PATH environment variable.
Linux and macOS:
Install Homebrew. Then, add the Foundry CLI repository to the list of formulae that Homebrew uses and install the CLI:
brew tap crowdstrike/foundry-cli
brew install crowdstrike/foundry-cli/foundryRun foundry version to verify it's installed correctly.
- Register a new
API Client for integrations - Enable
Non-Expiring Refresh Tokensoption - Add the following scopes
- Staffing
- Contact Information
- Tenant Non-Configurable
- Securely store the generated
Client IDandClient Secret
- Create a new
Integration System User (ISU) - Create a new
Integration System Security Group - Assign
Integration System Usercreated in step #1 toSecurity Groupcreated in a step #2 - Add the following domains to
Integration System Security Group- Worker Data: Current Staffing Information
- Worker Data: Historical Staffing Information
- Worker Data: Public Worker Reports
- Exit Interview
- Person Data: Work Email
- Activate pending security policy changes
- Assign ISU to API Client and generate Refresh Token
Create an Active Directory group (using Microsoft Active Directory) dedicated for departing employees. This group will be selected during the application installation process.
Clone this sample to your local system, or download as a zip file.
git clone https://github.com/CrowdStrike/foundry-sample-insider-risk-workday
cd foundry-sample-insider-risk-workdayLog in to Foundry:
foundry loginSelect the following permissions:
- Create and run RTR scripts
- Create, execute and test workflow templates
- Create, run and view API integrations
- Create, edit, delete, and list queries
Deploy the app:
foundry apps deployTip
If you get an error that the name already exists, change the name to something unique to your CID in manifest.yml.
Re-deploy the app:
foundry apps deployOnce the deployment has finished, you can release the app:
foundry apps releaseNext, go to Foundry > App catalog, find your app, and install. During app install, you will be prompted for app configuration:
-
(API-Integration) Workday generate access token configuration:
-
(Workflow) 'Add leavers to watchlist and AD group' & 'Remove leavers from watchlist and AD group' configuration:
Note
You will notice the same configurations been asked a couple of times. This is because there are two workflows (Add leavers to watchlist and AD group & Remove leavers from watchlist and AD group) using the same configurations.
Tip
Refer Workday Configuration section to generate ClientID ClientSecret and Refresh Token
Refer Active Directory Configuration section to create Active Directory group
- API-Integration. Used to connect to Workday API to get leaving employee data.
- Functions. Used to get a user linked account.
- Logscale Saved Search. Used to query departing employees data
- Workflow templates. Workflow to execute API-Integrations to get leaving employees data from Workday and add/remove employees to/from Identity Protection watchlist.
api-integrationsWorkday_Generate_Access_Token.json: API-Integration to generateaccess_tokenusing pre-generated WorkdayAPI Client for Integrationsthat usesclientId,clientSecret&refresh_token.Workday_Get_Leavers.json: API-Integration to get leaving employees data from Workday using WQL.
functionsidentity-context: Function to get the linked accounts for a user. If a departing user is an admin, they have a regular account with email and an administrative account without the email.
saved-searchesQuery_departing_employeesQuery departing employees data
workflows:Add_leavers_to_watchlist_and_AD_group.yml: This makes a call to Workday APIs to get leaving employees data and add employees to Identity Protection watchlist and AD group using built-in actions. Also creates a lookup file so that this information is available in NGS.Remove_leavers_from_watchlist_and_AD_group.yml: This makes a call to Workday APIs to get employees data who left 30 days ago and removes from Identity Protection watchlist and AD group using built-in actions.
Multi-domain environments without trust relationships are not supported. The application requires established trust relationships between domains to function properly.
Cloud-only users (those without Active Directory accounts) are not supported in the current release. - Support for Entra ID and Okta groups will be available in an upcoming release.
Note
-
The workflow
Add leavers to watchlist and AD groupruns daily and processes both:- Newly identified employees who have given notice of future departure.
- Previously identified employees whose departure dates are still in the future.
The workflow will continue to add/maintain these employees on the Identity Protection watchlist and in Active Directory until their actual departure date. This ensures monitoring of all employees those who are on a notice period.
-
The workflow
Remove leavers from watchlist and AD groupruns daily and automatically removes employees from the watchlist and Active Directory after 30 days of their departure date. This automation helps maintain a clean and up-to-date entries.




