Summary and recommendation
CrowdStrike user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.
CrowdStrike Falcon's user management lives under Support & Resources → User Management (https://falcon.crowdstrike.com/user-management/users) and is accessible only to Falcon Administrators. The platform uses a hybrid RBAC model: four built-in roles cover the majority of use cases, and custom roles with granular permission categories are available on the Enterprise tier.
Like every app that gates automation behind a premium tier, Falcon requires Enterprise ($184.99/device/year) for SCIM provisioning. Licensing is per-endpoint, not per-user, so adding or removing console users does not affect your invoice directly.
Quick facts
| Admin console path | Support & Resources → User Management (or navigate via top-right account menu → User Management) |
| Admin console URL | Official docs |
| SCIM available | Yes |
| SCIM tier required | Enterprise ($184.99/device/year) |
| SSO prerequisite | Yes |
User types and roles
| Role | Permissions | Cannot do | Plan required | Seat cost | Watch out for |
|---|---|---|---|---|---|
| Falcon Administrator | Full platform access including user management, policy configuration, sensor deployment, billing visibility, and all module settings. | All plans | No separate seat cost; included in platform license | Only Falcon Administrators can create or modify other users and assign roles. Limit this role to a small number of trusted staff. | |
| Falcon Analyst | Read and investigate detections, incidents, and threat intelligence. Can triage alerts and run queries in Threat Graph/Investigate. | Cannot modify policies, manage users, or change sensor configurations. | All plans | No separate seat cost; included in platform license | Scope of data visible to an Analyst can be restricted by CID (Customer ID) segmentation if multi-tenant is configured. |
| Falcon Responder | All Analyst permissions plus ability to take response actions (contain hosts, run Real Time Response sessions). | Cannot manage users or modify platform-wide policies. | Requires modules that include Real Time Response (Falcon Pro and above) | No separate seat cost; included in platform license | Real Time Response must be enabled at the policy level before Responders can use it, regardless of role assignment. |
| Falcon Read-Only Analyst | View-only access to detections, dashboards, and reports. Cannot take any action on hosts or alerts. | Cannot triage, contain, respond, manage users, or modify any settings. | All plans | No separate seat cost; included in platform license | Useful for auditors or executives who need visibility without operational access. |
| Custom Role (user-defined) | Granular permission sets assembled by an administrator from available permission categories (e.g., Detections, Hosts, Policies, Reports, User Management). | Cannot exceed the permissions of the administrator creating the role. | Enterprise tier required for custom role creation | No separate seat cost; included in Enterprise license | Custom roles are tenant-wide; they cannot be scoped to a subset of endpoints unless combined with CID/Flight Control segmentation. |
Permission model
- Model type: hybrid
- Description: CrowdStrike Falcon uses a role-based access control (RBAC) model with a set of built-in roles and, on Enterprise tiers, the ability to create custom roles by combining granular permission categories. Permissions cover functional areas such as Detections, Hosts, Policies, Threat Intelligence, Reports, and User Management. Multi-tenant environments managed via Falcon Flight Control add an additional layer of CID-level scoping.
- Custom roles: Yes
- Custom roles plan: Enterprise ($184.99/device/year)
- Granularity: Permission categories (e.g., Detections Read, Detections Write, Hosts Read, Hosts Write, Policy Management, User Management, Real Time Response). Each category can be granted independently when building a custom role.
How to add users
- Log in to the Falcon console at https://falcon.crowdstrike.com as a Falcon Administrator.
- Navigate to Support & Resources → User Management, or go directly to https://falcon.crowdstrike.com/user-management/users.
- Click 'Invite User' (or 'Add User' depending on console version).
- Enter the user's email address, first name, and last name.
- Select one or more roles to assign to the user.
- Click 'Send Invitation'. The user receives an email with a link to set their password and activate their account.
- If SSO/SCIM is configured, user provisioning may be handled automatically by the IdP instead of this manual flow.
Required fields: Email address, First name, Last name, Role assignment (at least one role)
Watch out for:
- Invitation emails can land in spam; advise new users to check junk folders.
- Invitation links expire; if a user does not activate within the expiry window, the administrator must resend the invitation.
- If SCIM provisioning is active via an IdP (Okta, Entra ID, OneLogin), manually added users may conflict with or be overwritten by IdP-managed user records.
- Multi-factor authentication (MFA) enforcement is a tenant-wide setting; newly added users will be required to enroll in MFA if it is enforced.
- Users added manually do not automatically inherit SSO; SSO must be configured separately at the tenant level.
| Bulk option | Availability | Notes |
|---|---|---|
| CSV import | No | Not documented |
| Domain whitelisting | No | Automatic domain-based user add |
| IdP provisioning | Yes | Enterprise ($184.99/device/year) - SCIM provisioning requires Enterprise tier and an active SSO configuration |
How to remove or deactivate users
- Can delete users: Yes
- Delete/deactivate behavior: CrowdStrike Falcon supports both deactivation (disabling access while retaining the user record) and deletion (permanently removing the user account). Deactivation is the recommended approach when the user's audit trail or historical activity needs to be preserved. Deletion removes the user record but historical log entries attributed to that user (e.g., audit logs) are retained in the platform audit trail.
- Log in to the Falcon console as a Falcon Administrator.
- Navigate to Support & Resources → User Management → Users.
- Locate the target user using the search or filter.
- Click the user's name to open their profile.
- Select 'Deactivate User' (or toggle the user status to Inactive).
- Confirm the action. The user's session is immediately invalidated and they cannot log in.
| Data impact | Behavior |
|---|---|
| Owned records | Audit log entries, detection assignments, and historical activity attributed to the user are retained in the platform and remain queryable by administrators. |
| Shared content | Dashboards, saved searches, or reports created by the user remain accessible to administrators; ownership transfer is not a documented automated step. |
| Integrations | If the user was associated with API client credentials, those API clients are separate from the user account and are not automatically revoked when the user is deactivated or deleted. API clients must be reviewed and revoked independently. |
| License freed | Deactivating or deleting a user frees the user seat, but CrowdStrike licensing is primarily device/endpoint-based rather than per-user-seat. Removing a user does not directly reduce the endpoint license count or invoice. |
Watch out for:
- API OAuth2 clients created by a user are not tied to that user's account lifecycle; they must be manually reviewed and deleted separately under Support & Resources → API Clients & Keys.
- If SCIM is active, deprovisioning should be performed in the IdP; manually deactivating in Falcon while the IdP still has the user active may result in the account being re-provisioned on the next sync.
- There is no bulk deactivation UI; each user must be deactivated individually through the console unless SCIM deprovisioning is used.
- Deleting the sole Falcon Administrator account is blocked by the platform to prevent lockout.
License and seat management
| Seat type | Includes | Cost |
|---|---|---|
| Falcon Go (entry-level) | Basic endpoint protection (next-gen AV, device control). Limited user/role features. | $59.99/device/year (small business entry price) |
| Falcon Pro | Adds firewall management, USB device control, and expanded threat intelligence. Real Time Response included. | ~$92.49/device/year |
| Falcon Enterprise / Falcon Insight XDR | Full XDR, 24/7 OverWatch threat hunting, SCIM provisioning, custom roles, advanced identity protection integrations. | $184.99/device/year |
| Falcon Complete (MDR) | Fully managed detection and response service on top of Enterprise platform. | Custom pricing |
- Where to check usage: Falcon Console → Support & Resources → Subscriptions (or Billing) - shows active endpoint count against licensed seat count. User count visible under User Management.
- How to identify unused seats: Review last login timestamps under Support & Resources → User Management → Users. Filter or sort by 'Last Login' to identify accounts with no recent activity. For endpoints, review sensor health and last-seen data under Hosts → Host Management.
- Billing notes: CrowdStrike licensing is primarily per-endpoint (device), not per-user. Adding or removing console users does not directly affect the invoice. Billing is annual. Volume discounts apply at thresholds of approximately 500, 1,000, and 5,000+ endpoints. A 30-day refund policy applies to direct purchases. Enterprise agreements are negotiated directly with CrowdStrike sales.
The cost of manual management
There is no bulk CSV import in Falcon, so large onboarding events require either one-by-one console work or a SCIM-connected IdP. SCIM provisioning is gated behind the Enterprise tier, meaning organizations on Falcon Pro have no automated lifecycle option and must manage every user manually through the console.
API OAuth2 clients created by departing users are decoupled from their account lifecycle and require a separate manual audit under Support & Resources → API Clients & Keys - a step that is easy to miss during offboarding.
What IT admins are saying
Practitioners consistently flag three friction points with Falcon's user management. First, SSO setup requires vendor coordination and is not fully self-service for all IdP configurations.
Second, invitation link expiry is not prominently surfaced in the UI, which generates support tickets when new users cannot activate their accounts.
Third, the absence of a bulk deactivation UI means offboarding a cohort of users must be done individually through the console unless SCIM deprovisioning is active.
Custom roles being Enterprise-only is a recurring complaint from Pro-tier customers who need more granularity than the built-in roles provide.
Common complaints:
- SSO setup requires vendor coordination and is not fully self-service for all IdP configurations.
- No bulk user import via CSV; large user onboarding must be done via SCIM/IdP or one-by-one through the console.
- SCIM provisioning is gated behind the Enterprise tier, which is a significant cost jump for organizations that primarily need automated user lifecycle management.
- API client credentials are decoupled from user accounts, requiring a separate manual audit when offboarding users who created API integrations.
- Custom roles are only available on Enterprise, leaving Pro-tier customers limited to built-in roles with no granularity.
- Invitation link expiry is not prominently communicated, leading to support tickets when new users cannot activate their accounts.
- No native bulk deactivation tool in the UI; offboarding multiple users simultaneously requires SCIM or manual one-by-one steps.
The decision
Every app in a mature security stack eventually needs automated user lifecycle management, and Falcon is no exception - but that automation requires Enterprise tier and an active SSO configuration before SCIM can be enabled. Use manual provisioning if your team is small, turnover is low, and you are on Falcon Pro or below.
Move to IdP-driven SCIM provisioning via Okta, Entra ID, or OneLogin as soon as your organization reaches Enterprise tier. If you operate a multi-tenant environment via Falcon Flight Control, factor in CID-level scoping when designing role assignments, since custom roles are tenant-wide and cannot be scoped to a subset of endpoints without Flight Control segmentation.
Bottom line
Falcon's manual user management is functional for small, stable teams but does not scale gracefully.
The lack of bulk operations, the Enterprise-only gate on SCIM and custom roles, and the decoupled lifecycle of API credentials mean that access debt accumulates steadily in organizations relying solely on manual processes.
Teams serious about access hygiene should treat IdP-driven SCIM provisioning as a prerequisite and build a recurring audit of API client credentials into their offboarding checklist regardless of how users are provisioned.
Automate CrowdStrike workflows without one-off scripts
Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.