Collect CrowdStrike Falcon logs
This document offers guidance for CrowdStrike Falcon logs as follows:
- Describes how to collect CrowdStrike Falcon logs by setting up a Google Security Operations feed.
- Explains how CrowdStrike Falcon log fields map to Google SecOps unified data model (UDM) fields.
- Lists the supported CrowdStrike Falcon log types and event types.
For more information, see the Data ingestion to Google SecOps overview.
Before you begin
- Ensure that you have administrator rights on the CrowdStrike instance to install the CrowdStrike Falcon Host sensor.
- Ensure that all systems in the deployment architecture are configured in the UTC time zone.
- Ensure that the device is running on a supported operating system.
- The OS must be running on a 64-bit server. Microsoft Windows Server 2008 R2 SP1 is supported for CrowdStrike Falcon Host sensor versions 6.51 or later.
- Systems running legacy OS versions (for example, Windows 7 SP1) require SHA-2 code signing support installed on their devices.
- Obtain the Google SecOps service account file and your customer ID from the Google SecOps support team.
Deploy CrowdStrike Falcon with Google SecOps feed integration
A typical deployment consists of CrowdStrike Falcon and the Google SecOps feed configured to send logs to Google SecOps. Your deployment might differ from the typical deployment.
The deployment contains the following components:
- CrowdStrike Falcon Intelligence: The CrowdStrike product you collect logs from.
- CrowdStrike feed. The CrowdStrike feed that fetches logs from CrowdStrike and writes logs to Google SecOps.
- CrowdStrike Intel Bridge: The CrowdStrike product that collects the information from the data source and forwards it to Google SecOps.
- Google SecOps: The platform that retains and analyzes the CrowdStrike Detection logs.
An ingestion label identifies the parser which normalizes the raw log data
to UDM. The information in this document applies to CrowdStrike Falcon parsers with the following ingestion labels:
CS_EDR
CS_DETECTS
CS_IOC
The CrowdStrike IOC parser supports the following indicator types:domain
email_address
file_name
file_path
hash_md5
hash_sha1
hash_sha256
ip_address
mutex_name
url
Configure a Google SecOps feed for CrowdStrike EDR logs
The following procedures are needed to configure the feed.
Configure a Falcon Data Replicator Feed
To set up an Falcon Data Replicator feed, follow these steps:
- Sign in to the CrowdStrike Falcon Console.
- Go to Support Apps > Falcon Data Replicator.
- Click Add to create a new Falcon Data Replicator feed. This will generate S3 identifier, SQS URL, and Client secret.
- Use the generated Feed, S3 identifier, SQS URL, and Client secret values to set up feed in Google SecOps.
For more information, see How to set up Falcon Data replicator feed.
Set up ingestion feeds
You can use Amazon SQS or an Amazon S3 bucket to set up the ingestion feed in Google SecOps. Amazon SQS is preferred, but Amazon S3 is also supported.
Set up an ingestion feed with an S3 bucket
To set up an ingestion feed using an S3 bucket, follow these steps:
- Sign in to your Google SecOps instance.
- From the application menu, select Settings > Feeds.
- Click Add new.
- In Source type, select Amazon S3.
- In Log type, select CrowdStrike Falcon.
- Based on the service account and the Amazon S3 bucket configuration that you
created, specify values for the following fields:
Field Description region
The S3 region associated with URI. S3 uri
The S3 bucket source URI. uri is a
The type of object URI points to. source deletion option
Whether to delete files and directories after transferring. access key id
An account access key that is 20-character alphanumeric string; for example, AKIAOSFOODNN7EXAMPLE
.secret access key
An account access key that is a 40-character alphanumeric string; for example, wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
.oauth client id
A public, client-specific OAuth identifier. oauth client secret
The OAuth 2.0 client secret. oauth secret refresh uri
The OAuth 2.0 client secret refresh URI. asset namespace
The namespace that the feed will be associated with.
Set up an ingestion feed with Amazon SQS
To set up an ingestion feed with Amazon SQS, complete the following:
- From the application menu, select Settings > Feeds.
- Click Add new.
- In Source type, select Amazon SQS.
- In Log type, select CrowdStrike Falcon.
- Based on the service account and the Amazon SQS configuration that you created, specify values for the following fields:
Field Description region
The S3 region associated with URI. QUEUE NAME
The SQS queue name to read from. ACCOUNT NUMBER
The SQS account number. source deletion option
Whether to delete files and directories after transferring. QUEUE ACCESS KEY ID
An account access key that is 20-character alphanumeric string, for example, AKIAOSFOODNN7EXAMPLE
.QUEUE SECRET ACCESS KEY
An account access key that is a 40-character alphanumeric string, for example, wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
.asset namespace
The namespace that the feed will be associated with. submit
The command to submit the feed.
If you encounter issues, contact the Google SecOps support team.
Configure a Google SecOps feed for CrowdStrike logs
To set up an ingestion feed in Google SecOps to ingest CrowdStrike detection monitoring logs, follow these steps:
- Sign in to CrowdStrike Falcon Console.
- Go to Support Apps > API Clients and Keys .
- Create a new API client key pair at CrowdStrike Falcon. This key pair reads events and supplementary information from CrowdStrike Falcon.
- Provide
READ
permission toDetections
andAlerts
while creating the key pair. - Sign in to your Google SecOps instance.
- From the application menu, select Settings > Feeds.
- Click Add new.
- In Source type, select Third Party API.
- In Log type, select CrowdStrike Detection Monitoring.
If you encounter issues, contact the Google SecOps support team.
Ingest CrowdStrike IOC logs into Google SecOps
To configure log ingestion to Google SecOps for CrowdStrike IOC logs, complete the following steps:
- Create a new API client key pair at CrowdStrike Falcon. Google SecOps Intel Bridge uses this key pair to read events and supplementary information from CrowdStrike Falcon. For more information, see CrowdStrike to Google SecOps Intel Bridge.
- Provide
READ
permission toIndicators (Falcon Intelligence)
while creating the key pair. - Set up the Google SecOps Intel Bridge by following the steps in CrowdStrike to Google SecOps Intel Bridge.
Run the following commands to send the logs from CrowdStrike to Google SecOps, where
sa.json
is the Google SecOps service account file:docker build . -t ccib:latest docker run -it --rm \ -e FALCON_CLIENT_ID="$FALCON_CLIENT_ID" \ -e FALCON_CLIENT_SECRET="$FALCON_CLIENT_SECRET" \ -e FALCON_CLOUD_REGION="$FALCON_CLOUD" \ -e CHRONICLE_CUSTOMER_ID="$CHRONICLE_CUSTOMER_ID" \ -e GOOGLE_APPLICATION_CREDENTIALS=/ccib/sa.json \ -v ~/my/path/to/service/account/filer/sa.json:/ccib/sa.json \ ccib:latest
Need more help? Get answers from Community members and Google SecOps professionals.