CrowdStrike API resources collector
Overview
The CrowdStrike Falcon platform is a powerful solution that includes EDR (Endpoint Detection and Response), next-generation anti-virus, and device control for endpoints. It also provides a whole host of other operational capabilities across IT operations and security including Threat Intelligence.
The CrowdStrike API is managed from the CrowdStrike Falcon UI by the Falcon Administrator. From there, multiple API clients can be defined along with their required scope.
Devo Collector Features
Feature | Details |
---|---|
Allow parallel downloading (multipod) |
|
Running environments |
|
Populated Devo events |
|
Flattening pre-processing |
|
Allowed source events obfuscation |
|
Data source description
Available from v1.0.0
Data Source | Subtype | Service | Table |
---|---|---|---|
Hosts | - |
|
|
Description Hosts are endpoints that run the Falcon sensor. You can get information and details about these agents. | |||
End point
Check the | |||
Incidents | - |
|
|
Description Incidents are events that occur in an organization which can represent a cybersecurity threat or an attack. | |||
End point
Check the | |||
Spotlight | - |
|
|
Description Vulnerabilities are known security risks in an operating system, application, hardware, firmware, or other part of a computing stack. | |||
End point
Check the | |||
Behaviors | - |
|
|
Description Behaviors are patterns of data transmissions in a network that are out of the norm, used to detect anomalies before cyber attacks occur. | |||
End point
Check the | |||
File Vantage | - |
|
|
Description Collect data about changes to files, folders, and registries with Falcon FileVantage APIs. Store this data to help you meet certain compliance recommendations and requirements as listed in the Sarbanes-Oxley Act, National Institute for Standards and Technology (NIST), Health Insurance Portability and Accountability Act (HIPAA), and others. | |||
End point
Check the |
For more information on how the events are parsed, visit our page.
Available from v1.3.0
Data Source | Subtype | Service | Table |
---|---|---|---|
Event Stream (eStream) |
|
|
|
|
|
| |
|
|
| |
|
|
| |
|
|
| |
deprecated by crowdstrike |
|
use epp detection summary See v1.11.0 | |
|
| Depending on the event's
| |
Description The Streaming API provides several types of events. | |||
End point The endpoints are dynamically generated by following this (simplified) approach:
|
For more information on how the events are parsed, visit our page.
Available from v1.10.0
Data Source | Subtype | Service | Table |
---|---|---|---|
Alerts | - |
|
|
Description Alerts are events that occur in an organization which can represent a cybersecurity threat or an attack. | |||
End point
|
For more information on how the events are parsed, visit our page.
Available from v1.11.0
Data Source | Subtype | Service | Table |
---|---|---|---|
Event Stream (eStream) |
|
|
|
Description Alerts are events that occur in an organization which can represent a cybersecurity threat or an attack. | |||
End point The endpoints are dynamically generated by following this (simplified) approach:
|
For more information on how the events are parsed, visit our page.
Accepted Authentication Methods
Authentication method | Details |
---|---|
| You will need your |
Treat Your Secret Key Like A Password
The security of your application is tied to the security of your secret key. Secure it as you would any sensitive credential. Don't share it with unauthorized individuals or email it to anyone under any circumstances.
Vendor setup
In order to configure the Devo | CrowdStrike API Resources collector, you need to create an API client that will be used to authenticate API requests.
After getting your CrowdStrike Falcon Cloud credentials, log into the CrowdStrike Falcon Cloud dashboard.
Click the three dots in the left menu bar.
Click API Clients and Keys. This will open a page to create an API client.
Click Add API Client at the top right corner. Enter a CLIENT NAME and DESCRIPTION
Then, enable the API scopes for your new API client. Click the required Read permissions for each scope and click ADD to create the client.
Finally, copy the Client ID and Client Secret shown on the next screen. You will need these values to configure the collector.
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
Collector services detail
This section is intended to explain how to proceed with specific actions for services.
Troubleshooting
Collector operations
This section is intended to explain how to proceed with specific operations of this collector.
Change log
Release | Released on | Release type | Recommendations |
---|---|---|---|
| Oct 28, 2024 | New FEATUREs |
|
| Oct 11, 2024 | New FEATUREs |
|
| Sep 26, 2024 | IMPROVEMENTS |
|
| Sep 16, 2024 | IMPROVEMENTS |
|
| Jul 24, 2024 | IMPROVEMENTS |
|
| May 17, 2024 | IMPROVEMENTS |
|
| Mar 26, 2024 | IMPROVEMENTS |
|
| Nov 27, 2023 | IMPROVEMENTS |
|
| Jan 20, 2023 | IMPROVEMENTS |
|
| Sep 15, 2022 | IMPROVEMENTS |
|
| Sep 15, 2022 | IMPROVEMENTS |
|
| |||
| Sep 9, 2022 | IMPROVEMENTS |
|
| |||
| Jul 7, 2022 | IMPROVEMENTS |
|
| Apr 8, 2022 | IMPROVEMENTS |
|
| Dec 16, 2021 | New FEATUREs |
|