CrowdStrike Falcon

Integration version: 35.0

Prerequisites

Before you proceed to configuring the integration in Google Security Operations SOAR, make sure to complete the following prerequisite steps:

  1. Configure the API client.

  2. Configure action permissions.

  3. Configure connector permissions.

Configure the API client

To define a CrowdStrike API client and view, create, or modify API clients or keys, you need to have a Falcon Administrator role.

  1. In the Falcon UI, navigate to Support > API Clients and Keys. On this page, you can find existing clients, add new API clients, or view the audit log.
  2. Click Add new API Client.
  3. Provide a name for your new API client.
  4. Select appropriate API scopes.
  5. Click Save. The Client ID and Client Secret appear.
    This is the only time when you see the client secret value. Make sure to store it securely.

For more details regarding access to the CrowdStrike API, see the Getting Access to the CrowdStrike API guide at the CrowdStrike blog.

Configure action permissions

Refer to the minimal permissions for actions, as listed in the following table:

Action Required permissions
Add Comment to Detection Detections.Read
Detection.Write
Add Identity Protection Detection Comment Alerts.Read
Alerts.Write
Add Incident Comment Incidents.Write
Close Detection Detections.Read
Detection.Write
Contain Endpoint Hosts.Read
Hosts.Write
Delete IOC IOC Management.Read
IOC Management.Write
Download File Hosts.Read
Real time response.Read
Real time response.Write
Execute Command Hosts.Read
Real time response.Read
Real time response.Write
Real time response (admin).Write* for full privilege commands.
Get Event Offset Event streams.Read
Get Hosts by IOC N/A: Deprecated
Get Host Information Hosts.Read
Get Process Name By IOC N/A: Deprecated
Lift Contained Endpoint Hosts.Read
Hosts.Write
List Hosts Hosts.Read
List Host Vulnerabilities Hosts.Read
Spotlight vulnerabilities.Read
List Uploaded IOCs IOC Management.Read
Ping Hosts.Read
Submit File Reports (Falcon Intelligence).Read
Sandbox (Falcon Intelligence).Read
Sandbox (Falcon Intelligence).Write
Submit URL Reports (Falcon Intelligence).Read
Sandbox (Falcon Intelligence).Read
Sandbox (Falcon Intelligence).Write
Update Detection Detections.Read
Detection.Write
User management.Read
Update Identity Protection Detection Alerts.Read
Alerts.Write
Update Incident Incidents.Write
Update IOC Information IOC Management.Read
IOC Management.Write
Upload IOCs IOC Management.Read
IOC Management.Write

Configure connector permissions

Refer to the minimal permissions for connectors, as listed in the following table:

Connector Required permissions
CrowdStrike Detections Connector Detection.Read
CrowdStrike Falcon Streaming Events Connector Event streams.Read
CrowdStrike Identity Protection Detections Connector Alerts.Read
CrowdStrike Incidents Connector Incidents.Read

Integrate CrowdStrike Falcon with Google Security Operations SOAR

For detailed instructions on how to configure an integration in Google Security Operations SOAR, see Configure integrations.

Integration inputs

To configure the integration, use the following parameters:

Parameters
API Root

API root of the CrowdStrike instance.

Default value is https://api.crowdstrike.com

Client API ID Required

Client ID for CrowdStrike API.

Client API Secret Required

Client Secret for CrowdStrike API.

Verify SSL

Check if your CrowdStrike Falcon connection requires an SSL verification.

Unchecked by default.

Actions

Before proceeding with the integration configuration, make sure that you've configured the minimal permissions for every integration item. For more details, refer to the Action permissions section of this document.

Add Comment to Detection

Add a comment to the detection in CrowdStrike Falcon.

Entities

This action runs on all entities.

Action inputs

To configure the action, use the following parameters:

Parameters
Detection ID Required

ID of the detection to add a comment to.

Comment Required

The comment to add to the detection.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False

Add Identity Protection Detection Comment

Add a comment to the identity protection detection in CrowdStrike.

Entities

The action doesn't run on entities.

Action inputs

To configure the action, use the following parameters:

Parameters
Detection ID Required

ID of the detection to update.

Comment Required

The comment to add to the detection.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False
Case wall

The action provides the following output messages:

Output message Message description
Successfully added comment to the identity protection detection with ID DETECTION_ID in CrowdStrike Action succeeded.
Error executing action "Add Identity Protection Detection Comment". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "Add Identity Protection Detection Comment". Reason: identity protection detection with ID DETECTION_ID wasn't found in CrowdStrike. Please check the spelling.

Action failed.

Check the spelling.

Add Incident Comment

Add comment to an incident in CrowdStrike.

Entities

The action doesn't run on entities.

Action inputs

To configure the action, use the following parameters:

Parameters
Incident ID Required

ID of the incident to update.

Comment Required

The comment to add to the incident.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False
Case wall

The action provides the following output messages:

Output message Message description
Successfully added comment to the incident INCIDENT_ID in CrowdStrike Action succeeded.
Error executing action "Add Incident Comment". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "Add Incident Comment". Reason: incident with ID INCIDENT_ID wasn't found in CrowdStrike. Please check the spelling.

Action failed.

Check the spelling.

Close Detection

Close a CrowdStrike Falcon detection.

Entities

This action runs on all entities.

Action inputs

To configure the action, use the following parameters:

Parameters
Detection ID Required

ID of the detection to close.

Hide Detection Optional

If enabled, the action hides the detection in the UI.

Enabled by default.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False

Contain Endpoint

Contain endpoint in CrowdStrike Falcon.

Entities

This action runs on the following entities:

  • IP address
  • Hostname

Action inputs

To configure the action, use the following parameters:

Parameters
Fail If Timeout Required

If enabled and not all of the endpoints are contained, the action fails.

Enabled by default.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Entity enrichment table Available
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
{
  "EntityResult":
    {
      "status": "contained",
      "modified_timestamp": "2019-06-24T07:47:37Z",
      "major_version": "6",
      "policies":
        [{
           "applied": "True",
           "applied_date": "2019-04-29T07:40:06.876850888Z",
           "settings_hash": "ce17279e",
           "policy_type": "prevention",
           "assigned_date": "2019-04-29T07:39:55.218651583Z",
           "policy_id": ""
         }],
      "config_id_platform": "3",
      "bios_manufacturer": "Example Inc.",
      "system_manufacturer": "Example Corporation",
      "device_policies":
         {
            "global_config":
               {
                 "applied": "True",
                 "applied_date": "2019-06-03T23:24:04.893780991Z",
                 "settings_hash": "a75911b0",
                 "policy_type": "globalconfig",
                 "assigned_date": "2019-06-03T23:23:17.184432743Z",
                 "policy_id": ""
                },
            "Sensor_update":
               {
                 "applied": "True",
                 "applied_date": "2019-05-30T23:13:55.23597658Z",
                 "settings_hash": "65994753|3|2|automatic;101",
                 "uninstall_protection": "ENABLED",
                 "policy_type": "sensor-update",
                 "assigned_date": "2019-05-30T23:04:31.485311459Z",
                 "policy_id": ""
                },
            "prevention":
               {
                 "applied": "True",
                 "applied_date": "2019-04-29T07:40:06.876850888Z",
                 "settings_hash": "ce17279e",
                 "policy_type": "prevention",
                 "assigned_date": "2019-04-29T07:39:55.218651583Z",
                 "policy_id": ""
                },
            "device_control":
                {
                  "applied": "True",
                  "applied_date": "2019-06-03T23:14:29.800434222Z",
                  "policy_type": "device-control",
                  "assigned_date": "2019-06-03T23:05:17.425127539Z",
                  "policy_id": ""
                 },
            "remote_response":
                {
                  "applied": "True",
                  "applied_date": "2019-04-29T07:40:04.469808388Z",
                  "settings_hash": "f472bd8e",
                  "policy_type": "remote-response",
                  "assigned_date": "2019-04-29T07:39:55.218642441Z",
                  "policy_id": ""
                 }
          },
       "meta":
          {
            "Version":"12765"
          },
       "pointer_size": "8",
       "last_seen": "2019-06-24T07:45:34Z",
       "agent_local_time": "2019-06-18T12:17:06.259Z",
       "first_seen": "2019-04-29T07:39:45Z",
       "service_pack_major": "0",
       "slow_changing_modified_timestamp": "2019-06-23T11:20:42Z",
       "service_pack_minor": "0",
       "system_product_name": "Virtual Machine",
       "product_type_desc": "Server",
       "build_number": "9600",
       "cid": "27fe4e476ca3490b8476b2b6650e5a74",
       "local_ip": "192.0.2.1",
       "external_ip": "203.0.113.1",
       "hostname": "",
       "config_id_build": "example-id",
       "minor_version": "3",
       "platform_id": "x",
       "os_version": "Windows Server 2012 R2",
       "config_id_base": "example-config",
       "provision_status": "Provisioned",
       "mac_address": "01:23:45:ab:cd:ef",
       "bios_version": "090007 ",
       "platform_name": "Windows",
       "Agent_load_flags":"1",
       "device_id": "",
       "product_type": "3",
       "agent_version": "5.10.9106.0"
     },
   "Entity": "198.51.100.255"
}
Entity enrichment
Enrichment field Logic
status Returns if it exists in the JSON result
modified_timestamp Returns if it exists in the JSON result
major_version Returns if it exists in the JSON result
policies Returns if it exists in the JSON result
config_id_platform Returns if it exists in the JSON result
bios_manufacturer Returns if it exists in the JSON result
system_manufacturer Returns if it exists in the JSON result
device_policies Returns if it exists in the JSON result
meta Returns if it exists in the JSON result
pointer_size Returns if it exists in the JSON result
last_seen Returns if it exists in the JSON result
agent_local_time Returns if it exists in the JSON result
first_seen Returns if it exists in the JSON result
service_pack_major Returns if it exists in the JSON result
slow_changing_modified_timestamp Returns if it exists in the JSON result
service_pack_minor Returns if it exists in the JSON result
system_product_name Returns if it exists in the JSON result
product_type_desc Returns if it exists in the JSON result
build_number Returns if it exists in the JSON result
cid Returns if it exists in the JSON result
local_ip Returns if it exists in the JSON result
external_ip Returns if it exists in the JSON result
hostname Returns if it exists in the JSON result
config_id_build Returns if it exists in the JSON result
minor_version Returns if it exists in the JSON result
platform_id Returns if it exists in the JSON result
os_version Returns if it exists in the JSON result
config_id_base Returns if it exists in the JSON result
provision_status Returns if it exists in the JSON result
mac_address Returns if it exists in the JSON result
bios_version Returns if it exists in the JSON result
platform_name Returns if it exists in the JSON result
agent_load_flags Returns if it exists in the JSON result
device_id Returns if it exists in the JSON result
product_type Returns if it exists in the JSON result
agent_version Returns if it exists in the JSON result
Case wall

The action provides the following output messages:

Output message Message description

Successfully contained the following endpoints in CrowdStrike Falcon: ENTITY_ID

The following endpoints were already contained in CrowdStrike Falcon: ENTITY_ID

The following endpoints were not found in CrowdStrike Falcon: ENTITY_ID

Action succeeded.
Error executing action "Contain Endpoint". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "Contain Endpoint". Reason: the following endpoints initiated containment, but were not able to finish it during action execution: ENTITY_ID

Action failed.

Check the endpoint status and the Fail If Timeout parameter value.

Delete IOC

Delete custom IOCs in CrowdStrike Falcon.

Entities

This action runs on the following entities:

  • IP Address
  • Hostname
  • URL
  • Hash

Action inputs

N/A

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False
Case wall

The action provides the following output messages:

Output message Message description

Successfully deleted the following custom IOCs in CrowdStrike Falcon: ENTITY_ID

The following custom IOCs were not a part of CrowdStrike Falcon instance: ENTITY_ID

All of the provided IOCs were not a part of CrowdStrike Falcon instance.

Action succeeded.
Error executing action "Delete IOC". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Download File

Download files from the hosts in CrowdStrike Falcon.

You can find the downloaded file in a password-protected zip package. To access the file, provide the following password: infected.

Entities

This action runs on the following entities:

  • Filename
  • IP address
  • Host

Action inputs

To configure the action, use the following parameters:

Parameters
Download Folder Path Required

Path to the folder that stores the threat file.

Overwrite Required

If enabled, the action overwrites the file with the same name.

Disabled by default.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Entity table Available
Enrichment table Available
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
Entity table
Entity
filepath Absolute path to the file.
JSON result
{

"absolute_paths": ["/opt/file_1", "opt_file_2"]

}
Case wall

The action provides the following output messages:

Output message Message description

Successfully downloaded file "FILENAME" from the following endpoints in CrowdStrike Falcon: ENTITY_ID

Action wasn't able to download file from the following endpoints in CrowdStrike Falcon: ENTITY_ID

Action succeeded.
Error executing action "Download File". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "Download File". Reason: file with path PATH already exists. Please delete the file or set "Overwrite" to true.

Action failed.

Check the Overwrite parameter value or delete the file.

Waiting for results for the following entities: ENTITY_ID Asynchronous message.

Execute Command

Execute commands on the hosts in CrowdStrike Falcon.

Entities

This action runs on the following entities:

  • IP address
  • Hostname

Parameters

To configure the action, use the following parameters:

Parameters
Command Required

Command to execute on hosts.

Admin Command Optional

If True, the action executes commands with the administrator level permissions which is necessary for certain commands like put.

False by default.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False
Case wall

The action provides the following output messages:

Output message Message description
Successfully executed command "COMMAND" on the following endpoints in CrowdStrike Falcon: ENTITY_ID Action succeeded.
Error executing action "Execute Command". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Waiting for results for the following entities: ENTITY_ID Asynchronous message.

Get Event Offset

Action retrieves the event offset used by the Event Streaming Connector.

Entities

This action doesn't run on entities.

Action inputs

To configure the action, use the following parameters:

Parameters
Max Events To Process Required

Number of events the action needs to process starting from 30 days ago.

Default value is 10000.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
{
"offset": 100000
"timestamp": "<code><var>EVENT_TIMESTAMP</var></code>"
}
Case wall

The action provides the following output messages:

Output message Message description
Successfully retrieved event offset in CrowdStrike Falcon. Action succeeded.
Error executing action "Get Event Offset". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Get Host Information

Retrieve information about the hostname from CrowdStrike Falcon.

Entities

This action runs on the following entities:

  • Hostname
  • IP address

Action inputs

To configure the action, use the following parameters:

Parameters
Create Insight Optional

If enabled, the action creates insights containing information about entities.

Enabled by default.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Entity enrichment table Available
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
[
  {
    "EntityResult": [
      {
        "modified_timestamp": "2019-01-17T13: 44: 57Z",
        "major_version": "10",
        "site_name": "Default-First-Site-Name",
        "platform_id": "0",
        "config_id_platform": "3",
        "system_manufacturer": "ExampleInc.",
        "meta": {
          "version": "1111"
        },
        "first_seen": "2018-04-22T13: 06: 53Z",
        "service_pack_minor": "0",
        "product_type_desc": "Workstation",
        "build_number": "111",
        "hostname": "name",
        "config_id_build": "8104",
        "minor_version": "0",
        "os_version": "Windows10",
        "provision_status": "Provisioned",
        "mac_address": "64-00-6a-2a-43-3f",
        "bios_version": "1.2.1",
        "agent_load_flags": "1",
        "status": "normal",
        "bios_manufacturer": "ExampleInc.",
        "machine_domain": "Domain name",
        "agent_local_time": "2019-01-14T19: 41: 09.738Z",
        "slow_changing_modified_timestamp": "2019-01-14T17: 44: 40Z",
        "service_pack_major": "0",
        "device_id": "example-id",
        "system_product_name": "OptiPlex7040",
        "product_type": "1",
        "local_ip": "192.0.2.1",
        "external_ip": "203.0.113.1",
        "cid": "example-cid",
        "platform_name": "Windows",
        "config_id_base": "65994753",
        "last_seen": "2019-01-17T13: 44: 46Z",
        "pointer_size": "8",
        "agent_version": "4.18.8104.0",
        "recent_logins": [
          {
            "user_name": "test",
            "login_time": "2022-08-10T07:36:38Z"
          },
          {
            "user_name": "test",
            "login_time": "2022-08-10T07:36:35Z"
          }
        ],
        "online_status": "offline"
      }
    ],
    "Entity": "198.51.100.255"
  }
]
Entity enrichment
Enrichment field Logic
modified_timestamp Returns if it exists in the JSON result
major_version Returns if it exists in the JSON result
site_name Returns if it exists in the JSON result
platform_id Returns if it exists in the JSON result
config_id_platform Returns if it exists in the JSON result
system_manufacturer Returns if it exists in the JSON result
meta Returns if it exists in the JSON result
first_seen Returns if it exists in the JSON result
service_pack_minor Returns if it exists in the JSON result
product_type_desc Returns if it exists in the JSON result
build_number Returns if it exists in the JSON result
hostname Returns if it exists in the JSON result
config_id_build Returns if it exists in the JSON result
minor_version Returns if it exists in the JSON result
os_version Returns if it exists in the JSON result
provision_status Returns if it exists in the JSON result
mac_address Returns if it exists in the JSON result
bios_version Returns if it exists in the JSON result
agent_load_flags Returns if it exists in the JSON result
status Returns if it exists in the JSON result
bios_manufacturer Returns if it exists in the JSON result
machine_domain Returns if it exists in the JSON result
agent_local_time Returns if it exists in the JSON result
slow_changing_modified_timestamp Returns if it exists in the JSON result
service_pack_major Returns if it exists in the JSON result
device_id Returns if it exists in the JSON result
system_product_name Returns if it exists in the JSON result
product_type Returns if it exists in the JSON result
local_ip Returns if it exists in the JSON result
external_ip Returns if it exists in the JSON result
cid Returns if it exists in the JSON result
platform_name Returns if it exists in the JSON result
config_id_base Returns if it exists in the JSON result
last_seen Returns if it exists in the JSON result
pointer_size Returns if it exists in the JSON result
agent_version Returns if it exists in the JSON result
Case wall

The action provides the following output messages:

Output message Message description

Successfully enriched the following entities using CrowdStrike Falcon: ENTITY_ID

Action wasn't able to enrich the following entities using CrowdStrike Falcon: ENTITY_ID

Action succeeded.
Error executing action "Get Host Information". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Get Hosts by IOC - Deprecated

List hosts related to the IOCs in CrowdStrike Falcon. Supported entities: Hostname, URL, IP Address and Hash.
Note: Hostname entities are treated as domain IOCs. The action extracts the domain part out of URLs. Only the MD5 and SHA-256 hashes are supported.

Entities

This action runs on the following entities:

  • IP Address
  • Hostname
  • URL
  • Hash

Action inputs

N/A

Action outputs

Script Result
Script Result Name Value Options Example
is_success True/False is_success:False
JSON result

 {
  "hash":
   [{
     "modified_timestamp": "2019-01-17T13: 44: 57Z",
     "major_version": "10",
     "site_name": "Example-Name",
     "platform_id": "ExampleID",
     "config_id_platform": "3",
     "system_manufacturer": "ExampleInc.",
     "meta": {"version": "49622"},
     "first_seen": "2018-04-22T13: 06: 53Z",
   "service_pack_minor": "0",
     "product_type_desc": "Workstation",
     "build_number": "14393",
     "hostname": "name",
     "config_id_build": "ExampleID",
     "minor_version": "0",
     "os_version": "Windows10",
     "provision_status": "Provisioned",
     "mac_address": "01:23:45:ab:cd:ef",
     "bios_version": "1.2.1",
     "agent_load_flags": "1",
     "status": "normal",
     "bios_manufacturer": "ExampleInc.",
     "machine_domain": "Example Domain",
     "Device_policies":
         {
           "sensor_update":
              {
                "applied": true,
                "applied_date": "2018-12-11T23: 09: 18.071417837Z",
                "settings_hash": "65994753|3|2|automatic",
                "policy_type": "sensor-update",
                "assigned_date": "2018-12-11T23: 08: 38.16990705Z",
                "policy_id": "Example ID"
               }
          },
      "agent_local_time": "2019-01-14T19: 41: 09.738Z",
      "slow_changing_modified_timestamp": "2019-01-14T17: 44: 40Z",
      "service_pack_major": "0", "device_id": "2653595a063e4566519ef4fc813fcc56",
      "system_product_name": "OptiPlex7040",
      "product_type": "1",
      "local_ip": "192.0.2.1",
      "external_ip": "203.0.113.1",
      "cid": "27fe4e476ca3490b8476b2b6650e5a74",
      "platform_name": "Windows",
      "config_id_base": "ExampleID",
      "policies":
          [{
             "applied": true,
             "applied_date": "2019-01-02T22: 45: 21.315392338Z",
             "settings_hash": "18db1203",
             "policy_type": "prevention",
             "assigned_date": "2019-01-02T22: 45: 11.214774996Z",
             "policy_id": "Example ID"
          }],
      "last_seen": "2019-01-17T13: 44: 46Z",
      "pointer_size": "8",
      "agent_version": "4.18.8104.0"
   }]
 }
  
Entity enrichment
Enrichment field Logic
modified_timestamp Returns if it exists in JSON result
major_version Returns if it exists in JSON result
site_name Returns if it exists in JSON result
platform_id Returns if it exists in JSON result
config_id_platform Returns if it exists in JSON result
system_manufacturer Returns if it exists in JSON result
meta Returns if it exists in JSON result
first_seen Returns if it exists in JSON result
service_pack_minor Returns if it exists in JSON result
product_type_desc Returns if it exists in JSON result
build_number Returns if it exists in JSON result
hostname Returns if it exists in JSON result
config_id_build Returns if it exists in JSON result
minor_version Returns if it exists in JSON result
os_version Returns if it exists in JSON result
provision_status Returns if it exists in JSON result
mac_address Returns if it exists in JSON result
bios_version Returns if it exists in JSON result
agent_load_flags Returns if it exists in JSON result
status Returns if it exists in JSON result
bios_manufacturer Returns if it exists in JSON result
machine_domain Returns if it exists in JSON result
Device_policies Returns if it exists in JSON result
agent_local_time Returns if it exists in JSON result
slow_changing_modified_timestamp Returns if it exists in JSON result
service_pack_major Returns if it exists in JSON result
system_product_name Returns if it exists in JSON result
product_type Returns if it exists in JSON result
local_ip Returns if it exists in JSON result
external_ip Returns if it exists in JSON result
cid Returns if it exists in JSON result
platform_name Returns if it exists in JSON result
config_id_base Returns if it exists in JSON result
policies Returns if it exists in JSON result
last_seen Returns if it exists in JSON result
pointer_size Returns if it exists in JSON result
agent_version Returns if it exists in JSON result
Entity insight

N/A

Case wall
Result Type Value / Description Type
Output message* The action should not fail nor stop a playbook execution:
If successful and at least one host related to the provided IOCs is found (is_success=true): "Successfully retrieved hosts related to the provided IOCs in CrowdStrike Falcon."
If no related hosts are found (is_success=false): "No hosts were related to the provided IOCs in CrowdStrike Falcon."
The action should fail and stop a playbook execution:
If a critical error is reported: "Error executing action "{action name}". Reason: {traceback}."
General

Get Process Name by IOC - Deprecated

Retrieve processes related to the IOCs and provided devices in CrowdStrike Falcon. Supported entities: Hostname, URL, IP Address and Hash.
Note: Hostname entities are treated as domain IOCs. The action extracts the domain part out of URLs. Only the MD5, SHA-1 and SHA-256 hashes are supported. The IP Address entities are treated as IOCs.

Parameters

Parameter Name Type Default Value Is Mandatory Description
Devices Names 11 N/A Yes Specify a comma-separated list of devices for which you want to retrieve processes related to entities.

Run On

This action runs on the following entities:

  • Hostname
  • URL
  • Hash

Action Results

Script Result
Script Result Name Value Options Example
is_success True/False is_success:False
JSON Result

  {
  "EntityResult":
   [{
      "Process Name": "example.exe",
      "Indicator": "986a4715113359b527b15efe1ee09306", "Host Name": "example-name"
     },{
      "Process Name": "example.exe",
      "Indicator": "986a4715113359b527b15efe1ee09306",
      "Host Name": "example-name"
    },{
      "Process Name": "example.exe",
      "Indicator": "986a4715113359b527b15efe1ee09306",
      "Host Name": "example-name"
   }],
   "Entity": "example_entity"
  }
  
Entity Enrichment
Enrichment Field Name Logic - When to apply
Process Name Returns if it exists in JSON result
Indicator Returns if it exists in JSON result
Host Name Returns if it exists in JSON result
Entity Insights

N/A

Case Wall
Result Type Value / Description Type
Output message* The action should not fail nor stop a playbook execution:
If found processes related to entities for at least one endpoint (is_success=true): "Successfully retrieved processes related to the IOCs on the following endpoints in CrowdStrike Falcon: {device name}."
If no processes are found for at least one endpoint or the device is not found (is_success=true): "No related processes were found on the following endpoints in CrowdStrike Falcon: {device name}."
If no processes are found for all endpoints or none of the devices are found (is_success=false): "No related processes were found on the provided endpoints in CrowdStrike Falcon.
The action should fail and stop a playbook execution:
If a critical error is reported: "Error executing "{action name}". Reason: {trace back}."

Get Vertex Details

List all the properties associated with a particular indicator.

Entities

This action runs on the following entities:

  • Hostname
  • URL
  • Hash

Action inputs

N/A

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Entity enrichment table Available
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
[{
  "EntityResult":
   [{
     "vertex_type": "module",
     "timestamp": "2019-01-17T10: 52: 40Z",
     "object_id":"example_id",
     "properties":
        {
          "SHA256HashData": "7afb56dd48565c3c9804f683c80ef47e5333f847f2d3211ec11ed13ad36061e1",
          "MD5HashData": "54cb91395cdaad9d47882533c21fc0e9",
          "SHA1HashData": "3b1333f826e5fe36395042fe0f1b895f4a373f1b"
        },
    "edges":
        {
          "primary_module":
             [{
               "direction": "in",
               "timestamp": "2019-01-13T10: 58: 51Z",
               "object_id": "example-id",
               "id": "pid: cb4493e4af2742b068efd16cb48b7260: 3738513791849",
               "edge_type": "primary_module",
               "path": "example-path",
               "scope": "device",
               "properties": {},
               "device_id": "example-id"
             }]
         },
     "scope": "device",
     "customer_id": "example-id",
     "id": "mod: cb4493e4af2742b068efd16cb48b7260: 7afb56dd48565c3c9804f683c80ef47e5333f847f2d3211ec11ed13ad36061e1",
     "device_id": "example-id"
   }],
  "Entity": "198.51.100.255"
}]
Entity enrichment
Enrichment field Logic
vertex_type Returns if it exists in the JSON result
timestamp Returns if it exists in the JSON result
object_id Returns if it exists in the JSON result
properties Returns if it exists in the JSON result
edges Returns if it exists in the JSON result
scope Returns if it exists in the JSON result
customer_id Returns if it exists in the JSON result
id Returns if it exists in the JSON result
device_id Returns if it exists in the JSON result

Lift Contained Endpoint

Lift endpoint containment in CrowdStrike Falcon.

Entities

This action runs on the following entities:

  • IP Address
  • Hostname

Action inputs

To configure the action, use the following parameters:

Parameters
Fail If Timeout Required

If enabled and the containment is not lifted on all endpoints, the action fails.

Enabled by default.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Entity enrichment table Available
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
{
  "EntityResult":
   {
     "status": "contained",
     "modified_timestamp": "2019-06-24T07:47:37Z",
     "major_version": "6", "policies":
      [{
        "applied": "True",
        "applied_date": "2019-04-29T07:40:06.876850888Z",
        "settings_hash": "ce17279e",
        "policy_type": "prevention",
        "assigned_date": "2019-04-29T07:39:55.218651583Z",
        "policy_id": ""
       }],
     "config_id_platform": "example-id",
     "bios_manufacturer": "Example Inc.",
     "system_manufacturer": "Example Corporation",
     "Device_policies":
        {
         "global_config":
           {
             "applied": "True",
             "applied_date": "2019-06-03T23:24:04.893780991Z",
             "settings_hash": "a75911b0",
             "policy_type": "globalconfig",
             "assigned_date": "2019-06-03T23:23:17.184432743Z",
             "policy_id": ""
           },
         "Sensor_update":
           {
             "applied": "True",
             "applied_date": "2019-05-30T23:13:55.23597658Z",
             "settings_hash": "65994753|3|2|automatic;101",
             "uninstall_protection": "ENABLED",
             "policy_type": "sensor-update",
             "assigned_date": "2019-05-30T23:04:31.485311459Z",
             "policy_id": "9d1e405846de4ebdb63f674866d390dc"
           },
          "Prevention":
           {
             "applied": "True",
             "applied_date": "2019-04-29T07:40:06.876850888Z",
             "settings_hash": "ce17279e",
             "policy_type": "prevention",
             "assigned_date": "2019-04-29T07:39:55.218651583Z",
             "policy_id": ""
            },
          "device_control":
           {
             "applied": "True",
             "applied_date": "2019-06-03T23:14:29.800434222Z",
             "policy_type": "device-control",
             "assigned_date": "2019-06-03T23:05:17.425127539Z",
             "policy_id": ""
            },
          "Remote_response":
           {
             "applied": "True",
             "applied_date": "2019-04-29T07:40:04.469808388Z",
             "settings_hash": "f472bd8e",
             "policy_type": "remote-response",
             "assigned_date": "2019-04-29T07:39:55.218642441Z",
             "policy_id": ""
            }
        },
     "meta":
        {"version": "12765"},
     "pointer_size": "8",
     "last_seen": "2019-06-24T07:45:34Z",
     "agent_local_time": "2019-06-18T12:17:06.259Z",
     "first_seen": "2019-04-29T07:39:45Z",
     "service_pack_major": "0",
     "slow_changing_modified_timestamp": "2019-06-23T11:20:42Z",
     "service_pack_minor": "0",
     "system_product_name":"Virtual Machine",
     "product_type_desc": "Server",
     "build_number": "9600",
     "cid": "",
     "local_ip": "192.0.2.1",
     "external_ip": "203.0.113.1",
     "hostname": "example-hostname",
     "config_id_build": "9106",
     "minor_version": "3",
     "platform_id": "0",
     "os_version": "Windows Server 2012 R2",
     "config_id_base": "example-id",
     "provision_status": "Provisioned",
     "mac_address": "01-23-45-ab-cd-ef",
     "bios_version": "090007 ",
     "platform_name": "Windows",
     "agent_load_flags": "1",
     "device_id": "",
     "product_type": "3",
     "agent_version": "5.10.9106.0"
   },
 "Entity": "198.51.100.255"
 }
Entity enrichment
Enrichment field Logic
status Returns if it exists in the JSON result
modified_timestamp Returns if it exists in the JSON result
major_version Returns if it exists in the JSON result
config_id_platform Returns if it exists in the JSON result
system_manufacturer Returns if it exists in the JSON result
Device_policies Returns if it exists in the JSON result
meta Returns if it exists in the JSON result
pointer_size Returns if it exists in the JSON result
last_seen Returns if it exists in the JSON result
agent_local_time Returns if it exists in the JSON result
first_seen Returns if it exists in the JSON result
service_pack_major Returns if it exists in the JSON result
slow_changing_modified_timestamp Returns if it exists in the JSON result
service_pack_minor Returns if it exists in the JSON result
system_product_name Returns if it exists in the JSON result
product_type_desc Returns if it exists in the JSON result
build_number Returns if it exists in the JSON result
cid Returns if it exists in the JSON result
local_ip Returns if it exists in the JSON result
external_ip Returns if it exists in the JSON result
hostname Returns if it exists in the JSON result
config_id_build Returns if it exists in the JSON result
minor_version Returns if it exists in the JSON result
platform_id Returns if it exists in the JSON result
os_version Returns if it exists in the JSON result
config_id_base Returns if it exists in the JSON result
provision_status Returns if it exists in the JSON result
mac_address Returns if it exists in the JSON result
bios_version Returns if it exists in the JSON result
platform_name Returns if it exists in the JSON result
agent_load_flags Returns if it exists in the JSON result
device_id Returns if it exists in the JSON result
product_type Returns if it exists in the JSON result
agent_version Returns if it exists in the JSON result
Case wall

The action provides the following output messages:

Output message Message description

Successfully lifted containment on the following endpoints in CrowdStrike Falcon: ENTITY_ID

The following endpoints were not contained in CrowdStrike Falcon: ENTITY_ID

The following endpoints were not found in CrowdStrike Falcon: ENTITY_ID

Action succeeded.
Waiting for containment lift to finish for the following endpoints: ENTITY_ID Asynchronous message.
Error executing action "Lift Contained Endpoint". Reason: the following endpoints initiated containment lift, but were not able to finish it during action execution: ENTITY_ID

Action failed.

Check the endpoint status and the Fail If Timeout parameter value.

Error executing action "Lift Contained Endpoint". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

List Host Vulnerabilities

List vulnerabilities found on the host in CrowdStrike Falcon.

Entities

This action runs on the following entities:

  • IP address
  • Hostname

Action inputs

To configure the action, use the following parameters:

Parameters
Severity Filter Optional

Comma-separated list of vulnerability severities.

If no value is provided, the action ingests all related vulnerabilities.

Possible values are:

  • Critical
  • High
  • Medium
  • Low
  • Unknown
Create Insight Optional

If enabled, the action creates an insight per entity containing statistical information about related vulnerabilities.

Enabled by default.

Max Vulnerabilities To Return Optional

Number of vulnerabilities to return per host.

If nothing is provided, the action processes all of the related vulnerabilities.

Default value is 100.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table Available
Enrichment table N/A
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
{
    "statistics": {
        "total": 123,
        "severity": {
            "critical": 1,
            "high": 1,
            "medium": 1,
            "low": 1,
            "unknown": 1
        },
        "status": {
            "open": 1,
            "reopened": 1
        },
        "has_remediation": 1
    },
    "details": [
        {
            "id": "74089e36ac3a4271ab14abc076ed18eb_fff6de34c1b7352babdf7c7d240749e7",
            "cid": "27fe4e476ca3490b8476b2b6650e5a74",
            "aid": "74089e36ac3a4271ab14abc076ed18eb",
            "created_timestamp": "2021-05-12T22:45:47Z",
            "updated_timestamp": "2021-05-12T22:45:47Z",
            "status": "open",
            "cve": {
                "id": "CVE-2021-28476",
                "base_score": 9.9,
                "severity": "CRITICAL",
                "exploit_status": 0
            },
            "app": {
                "product_name_version": "Example 01"
            },
            "apps": [
                {
                    "product_name_version": "Example 01",
                    "sub_status": "open",
                    "remediation": {
                        "ids": [
                            "acc34cd461023ff8a966420fa8839365"
                        ]
                    }
                }
            ],
            "host_info": {
                "hostname": "example-hostname",
                "local_ip": "192.0.2.1",
                "machine_domain": "",
                "os_version": "Windows 10",
                "ou": "",
                "site_name": "",
                "system_manufacturer": "Example Inc.",
                "groups": [],
                "tags": [],
                "platform": "Windows"
            },
            "remediation": [
                {
                    "id": "acc34cd461023ff8a966420fa8839365",
                    "reference": "KB5003169",
                    "title": "Update Microsoft Windows 10 1909",
                    "action": "Install patch for Microsoft Windows 10 1909 x64 (Workstation): Security Update ABCDEF",
                    "link": "https://example.com/ABCDEF"
                }
            ]
        }
    ]
}
Case wall

The action provides the following output messages:

Output message Message description

Successfully retrieved vulnerabilities for the following hosts: ENTITIES

No vulnerabilities were found for the following hosts: ENTITIES

Action succeeded.
Error executing action "List Host Vulnerabilities". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "List Host Vulnerabilities". Reason: Invalid value provided in the Severity Filter parameter. Possible values: Critical, High, Medium, Low, Unknown.

Action failed.

Check the Severity Filter parameter value.

Case wall table

Type: Entity

Columns:

  • Name
  • Score
  • Severity
  • Status
  • App
  • Has Remediation

List Hosts

List available hosts in CrowdStrike Falcon.

Entities

This action runs on all entities.

Action inputs

To configure the action, use the following parameters:

Parameters
Filter Logic Optional

Logic to use when searching for hosts.

Default value is Equals.

Possible values are:
  • Equals
  • Contains
Filter Value Optional

Value to use for host filtering.

Max Hosts To Return Optional

Number of hosts to return.

Default value is 50.

Max value is 1000.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
[{
   "modified_timestamp": "2019-05-15T15:03:12Z",
   "platform_id": "0",
   "config_id_platform": "3",
   "system_manufacturer": "Example Corporation",
   "meta": {"version": "4067"},
   "first_seen": "2019-04-29T07:39:45Z",
   "service_pack_minor": "0",
   "product_type_desc": "Server",
   "build_number": "9600",
   "hostname": "example-hostname",
   "config_id_build": "8904",
   "minor_version": "3",
   "os_version": "Windows Server 2012 R2",
   "provision_status": "Provisioned",
   "mac_address": "01:23:45:ab:cd:ef",
   "bios_version": "090007 ",
   "agent_load_flags": "0",
   "status": "normal",
   "bios_manufacturer": "Example Inc.",
   "device_policies":
     {
      "Sensor_update":
         {
           "applied": true,
           "applied_date": "2019-05-02T22:05:09.577000651Z",
           "settings_hash": "65994753|3|2|automatic",
           "policy_type": "sensor-update",
           "assigned_date": "2019-05-02T22:03:36.804382667Z",
           "policy_id": "9d1e405846de4ebdb63f674866d390dc"
          },
      "remote_response":
          {
            "applied": true,
            "applied_date": "2019-04-29T07:40:04.469808388Z",
            "settings_hash": "f472bd8e",
            "policy_type": "remote-response",
            "assigned_date": "2019-04-29T07:39:55.218642441Z",
            "policy_id": "21e4fb4dedd74c6fb0bcd6a348aa046c"
           },
     "device_control":
          {
            "applied": true,
            "applied_date": "2019-04-29T07:40:06.896362608Z",
            "assigned_date": "2019-04-29T07:39:55.218637999Z",
            "policy_type": "device-control",
            "policy_id": "c360df7193364b23aa4fc47f0238c899"
           },
     "prevention":
           {
            "applied": true,
            "applied_date": "2019-04-29T07:40:06.876850888Z",
            "settings_hash": "ce17279e",
            "policy_type": "prevention",
            "assigned_date": "2019-04-29T07:39:55.218651583Z",
            "policy_id": "7efdf97d7805402186b61151e8abd745"
           },
     "global_config":
          {
            "applied": true,
            "applied_date": "2019-04-29T07:45:18.94807838Z",
            "settings_hash": "3d78f9ab",
            "policy_type": "globalconfig",
            "assigned_date": "2019-04-29T07:45:08.165941325Z",
            "policy_id": "985b1a25afcb489ea442d2d1430b1679"
           }
      },
   "cid": "27fe4e476ca3490b8476b2b6650e5a74",
   "agent_local_time": "2019-05-02T22:05:00.015Z",
   "slow_changing_modified_timestamp": "2019-05-02T22:05:09Z",
   "service_pack_major": "0",
   "device_id": "0ab8bc6d968b473b72a5d11a41a24c21",
   "system_product_name": "Virtual Machine",
   "product_type": "3",
   "local_ip": "192.0.2.1",
   "external_ip": "203.0.113.1",
   "major_version": "6",
   "platform_name": "Windows",
   "config_id_base": "65994753",
   "policies":
     [{
        "applied": true,
        "applied_date": "2019-04-29T07:40:06.876850888Z",
        "settings_hash": "ce17279e",
        "policy_type": "prevention",
        "assigned_date": "2019-04-29T07:39:55.218651583Z",
        "policy_id": "7efdf97d7805402186b61151e8abd745"
      }],
   "agent_version": "4.26.8904.0",
   "pointer_size": "8",
   "last_seen": "2019-05-15T15:01:23Z"
 },
 {
  "modified_timestamp": "2019-05-13T07:24:36Z",
  "site_name": "Example-Site-Name",
  "config_id_platform": "3",
  "system_manufacturer": "Example Inc.",
  "meta": {"version": "14706"},
  "first_seen": "2018-04-17T11:02:20Z",
  "platform_name": "Windows",
  "service_pack_minor": "0",
  "product_type_desc": "Workstation",
  "build_number": "17134",
  "hostname": "example-hostname",
  "config_id_build": "8904",
  "minor_version": "0",
  "os_version": "Windows 10",
  "provision_status": "Provisioned",
  "mac_address": "01:23:45:ab:cd:ef",
  "bios_version": "1.6.5",
  "agent_load_flags": "0",
  "status": "normal",
  "bios_manufacturer": "Example Inc.",
  "machine_domain": "example.com",
  "device_policies":
     {
       "sensor_update":
         {
          "applied": true,
          "applied_date": "2019-05-05T12:52:23.121596885Z",
          "settings_hash": "65994753|3|2|automatic",
          "policy_type": "sensor-update",
          "assigned_date": "2019-05-05T12:51:37.544605747Z",
          "policy_id": "9d1e405846de4ebdb63f674866d390dc"
         },
       "Remote_response":
         {
          "applied": true,
          "applied_date": "2019-02-10T07:57:59.064362539Z",
          "settings_hash": "f472bd8e",
          "policy_type": "remote-response",
          "assigned_date": "2019-02-10T07:57:50.610924385Z",
          "policy_id": "21e4fb4dedd74c6fb0bcd6a348aa046c"
         },
      "device_control":
          {
            "applied": true,
            "applied_date": "2019-03-25T15:01:28.51681072Z",
            "assigned_date": "2019-03-25T15:00:22.442519168Z",
            "policy_type": "device-control",
            "policy_id": "c360df7193364b23aa4fc47f0238c899"
          },
      "Prevention":
          {
            "applied": true,
            "applied_date": "2019-04-04T06:54:06.909774295Z",
            "settings_hash": "ce17279e",
            "policy_type": "prevention",
            "assigned_date": "2019-04-04T06:53:57.135897343Z",
            "policy_id": "7efdf97d7805402186b61151e8abd745"
          },
      "global_config":
          {
            "applied": true,
            "applied_date": "2019-02-10T07:57:53.70275875Z",
            "settings_hash": "3d78f9ab",
            "policy_type": "globalconfig",
            "assigned_date": "2019-02-10T07:57:50.610917888Z",
            "policy_id": "985b1a25afcb489ea442d2d1430b1679"
           }
     },
 "cid": "27fe4e476ca3490b8476b2b6650e5a74",
 "agent_local_time": "2019-05-05T15:52:08.172Z",
 "slow_changing_modified_timestamp": "2019-05-12T12:37:35Z",
 "service_pack_major": "0",
 "device_id": "cb4493e4af2742b068efd16cb48b7260",
 "system_product_name": "example-name",
 "product_type": "1",
 "local_ip": "192.0.2.1",
 "external_ip": "203.0.113.1",
 "major_version": "10",
 "platform_id": "0",
 "config_id_base": "65994753",
 "policies":
    [{
       "applied": true,
       "applied_date": "2019-04-04T06:54:06.909774295Z",
       "settings_hash": "ce17279e",
       "policy_type": "prevention",
       "assigned_date": "2019-04-04T06:53:57.135897343Z",
       "policy_id": "7efdf97d7805402186b61151e8abd745"
     }],
 "agent_version": "4.26.8904.0",
 "pointer_size": "8",
 "last_seen": "2019-05-13T07:21:30Z"
},
{
  "modified_timestamp": "2019-05-09T14:22:50Z",
  "site_name": "Example-Site-Name",
  "config_id_platform": "3",
  "system_manufacturer": "Dell Inc.",
  "meta": {"version": "77747"},
  "first_seen": "2018-07-01T12:19:23Z",
  "platform_name": "Windows",
 "service_pack_minor": "0",
 "product_type_desc": "Workstation",
 "build_number": "17134",
 "hostname":"example-hostname",
 "config_id_build": "8904",
 "minor_version": "0",
 "os_version": "Windows 10",
 "provision_status": "Provisioned",
 "mac_address": "01:23:45:ab:cd:ef",
 "bios_version": "1.2.1",
 "agent_load_flags": "0",
 "status": "normal",
 "bios_manufacturer": "Example Inc.",
 "machine_domain": "example.com",
 "device_policies":
    {
      "sensor_update":
       {
         "applied": true,
         "applied_date": "2019-05-02T22:10:50.336101107Z",
         "settings_hash": "65994753|3|2|automatic",
         "policy_type": "sensor-update",
         "assigned_date": "2019-05-02T22:10:50.336100731Z",
         "policy_id": "9d1e405846de4ebdb63f674866d390dc"
        },
      "remote_response":
       {
         "applied": true,
         "applied_date": "2019-02-08T02:46:31.919442939Z",
         "settings_hash": "f472bd8e",
         "policy_type": "remote-response",
         "assigned_date": "2019-02-08T02:46:22.219718098Z",
         "policy_id": "21e4fb4dedd74c6fb0bcd6a348aa046c"
        },
 "device_control":
     {
       "applied": true,
       "applied_date": "2019-03-24T16:43:31.777981725Z",
       "assigned_date": "2019-03-24T16:42:21.395540493Z",
       "policy_type": "device-control",
       "policy_id": "c360df7193364b23aa4fc47f0238c899"
     },
 "prevention":
     {
      "applied": true,
      "applied_date": "2019-04-03T23:58:50.870694195Z",
      "settings_hash": "ce17279e",
      "policy_type": "prevention",
      "assigned_date": "2019-04-03T23:57:22.534513932Z",
      "policy_id": "7efdf97d7805402186b61151e8abd745"
     },
 "global_config":
     {
      "applied": true,
      "applied_date": "2019-02-08T01:14:14.810607774Z",
      "settings_hash": "3d78f9ab",
      "policy_type": "globalconfig",
      "assigned_date": "2019-02-08T01:14:05.585922067Z",
      "policy_id": "985b1a25afcb489ea442d2d1430b1679"
      }
 },
  "cid": "27fe4e476ca3490b8476b2b6650e5a74",
  "agent_local_time": "2019-05-03T01:10:29.340Z",
  "slow_changing_modified_timestamp": "2019-05-02T22:10:46Z",
  "service_pack_major": "0",
  "device_id": "1c2f1a7f88f8457f532f1c615f07617b",
  "system_product_name": "Example Name",
  "product_type": "1",
  "local_ip": "192.0.2.1",
  "external_ip": "203.0.113.1",
  "major_version": "10",
  "platform_id": "0",
  "config_id_base": "65994753",
  "policies":
     [{
       "applied": true,
       "applied_date": "2019-04-03T23:58:50.870694195Z",
       "settings_hash": "ce17279e",
       "policy_type": "prevention",
       "assigned_date": "2019-04-03T23:57:22.534513932Z",
       "policy_id": "7efdf97d7805402186b61151e8abd745"
     }],
 "agent_version": "4.26.8904.0",
 "pointer_size": "8",
 "last_seen": "2019-05-09T14:20:53Z"
}]
Case wall

The action provides the following output messages:

Output message Message description

Successfully retrieved available hosts based on the provided criteria.

No hosts were found for the provided criteria.

Action succeeded.
Error executing action "List Hosts". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

List Uploaded IOCs

List available custom IOCs in CrowdStrike Falcon.

Entities

This action runs on all entities.

Action inputs

To configure the action, use the following parameters:

Parameters
IOC Type Filter Optional

A comma-separated list of IOC types to return.

Default value is ipv4,ipv6,md5,sha1,sha256,domain.

Possible values are:
  • ipv4
  • ipv6
  • md5
  • sha1
  • sha256
  • domain
Value Filter Logic Optional

Value of the filter logic.

Default is Equal.

Possible values are:
  • Equal
  • Contains

If Equal is set, the action attempts to find the exact match among IOCs.
If Contains is set, the action attempts to find IOCs containing the selected substring.

Value Filter String Optional

String to search among IOCs.

Max IOCs To Return Optional

Number of IOCs to return.

Default value is 50.

Max value is 500.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table Available
Enrichment table N/A
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
{
            "id": "fbe8c2739f3c6df95e62e0ae54569974437b2d9306eaf6740134ccf1a05e23d3",
            "type": "sha256",
            "value": "8a86c4eecf12446ff273afc03e1b3a09a911d0b7981db1af58cb45c439161295",
            "action": "no_action",
            "severity": "",
            "metadata": {
                "signed": false,
                "av_hits": -1
            },
            "platforms": [
                "windows"
            ],
            "tags": [
                "Hashes 22.Nov.20 15:29 (Windows)"
            ],
            "expired": false,
            "deleted": false,
            "applied_globally": true,
            "from_parent": false,
            "created_on": "2021-04-22T03:54:09.235120463Z",
            "created_by": "internal@example.com",
            "modified_on": "2021-04-22T03:54:09.235120463Z",
            "modified_by": "internal@example.com"
        }
Case wall

The action provides the following output messages:

Output message Message description
Successfully found custom IOCs for the provided criteria in CrowdStrike Falcon. Action succeeded.
Error executing action "List Uploaded IOCs". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "List Uploaded IOCs". Reason: "IOC Type Filter" contains an invalid value. Please check the spelling. Possible values: ipv4, ipv6, md5, sha1, sha256, domain.

Action failed.

Check the spelling and the IOC Type Filter parameter value.

Case wall table

Columns:

  • Action
  • Severity
  • Signed
  • AV Hits
  • Platforms
  • Tags
  • Created At
  • Created By

Ping

Test connectivity to the CrowdStrike Falcon with parameters provided at the integration configuration page in the Google Security Operations Marketplace tab.

Entities

This action runs on all entities.

Action inputs

N/A

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False

Submit File

Submit files to a sandbox in CrowdStrike.

Supported file and archive formats

According to the CrowdStrike portal, the sandbox supports the following file formats:

Supported file formats
.exe, .scr, .pif, .dll, .com, .cpl Portable executables
.doc, .docx, .ppt, .pps, .pptx, .ppsx, .xls, .xlsx, .rtf, .pub Office documents
.pdf PDF
.apk APK
.jar Executable JAR
.sct Windows script component
.lnk Windows shortcut
.chm Windows help
.hta HTML application
.wsf Windows script file
.js JavaScript
.vbs, .vbe Visual Basic
.swf Shockwave Flash
.pl Perl
.ps1, .psd1, .psm1 Powershell
.svg Scalable vector graphics
.py Python
.elf Linux ELF executables
.eml Email files: MIME RFC 822
.msg Email files: Outlook

According to the CrowdStrike portal, the sandbox supports the following archive formats:

  • .zip
  • .7z

Entities

This action doesn't run on entities.

Action inputs

To configure the action, use the following parameters:

Parameters
File Paths Required

Specified paths to files that should be submitted. For a list of the supported file formats, refer to the Supported file and archive formats section of this document.

Sandbox Environment Optional

Sandbox environment to analyze.

Default value is Windows 10, 64-bit.

Possible values are:
  • Linux Ubuntu 16.04, 64-bit
  • Android (static analysis)
  • Windows 10, 64-bit
  • Windows 7, 64-bit
  • Windows 7, 32-bit
Network Environment Optional

Network environment to analyze.

Default value is Default.

Possible values are:
  • Default
  • TOR
  • Offline
  • Simulated
Archive Password Optional

Password to use when working with archive files.

Document Password Optional

Password to use when working with Adobe or Office files.

Max password length is 32 characters.

Check Duplicate Optional

If enabled, the action checks if the file was already submitted previously and returns the available report.

Enabled by default.

Comment Optional

Comment to submit.

Confidential Submission Optional

If enabled, the file is only shown to users within your customer account.

Disabled by default.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table Available
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False
Case wall

The action provides the following output messages:

Output message Message description

Successfully returned details about the following files using CrowdStrike: PATHS

Action wasn't able to return details about the following files using CrowdStrike: PATHS

Action succeeded.

Action wasn't able to submit the following samples, because file type is not supported: NOT_SUPPORTED_FILES. Please refer to the doc portal for a list of supported files.

None of the samples were submitted, because file type is not supported. Please refer to the doc portal for a list of supported files.

None of the samples in the archive were submitted, because file type is not supported. Please refer to the doc portal for a list of supported files.

The action returned an error.

Check the supported file formats for this action.

Waiting for results for the following files: PATHS Asynchronous message.
Error executing action "Submit File". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "Submit File". Reason: action ran into a timeout during execution. Pending files: FILES_IN_PROGRESS. Please increase the timeout in IDE.

Action failed.

Increase the timeout in IDE.

Case wall table

Columns:

  • Results
  • Name
  • Threat Score
  • Verdict
  • Tags

Submit URL

Submit URLs to a sandbox in CrowdStrike.

Entities

This action doesn't run on entities.

Action inputs

To configure the action, use the following parameters:

Parameters
URLs Required

URLs to submit.

Sandbox Environment Optional

Sandbox environment to analyze.

Default value is Windows 10, 64-bit.

Possible values are:
  • Linux Ubuntu 16.04, 64-bit
  • Android (static analysis)
  • Windows 10, 64-bit
  • Windows 7, 64-bit
  • Windows 7, 32-bit
Network Environment Optional

Network environment to analyze.

Default value is Default.

Possible values are:
  • Default
  • TOR
  • Offline
  • Simulated
Check Duplicate Optional

If enabled, the action checks if the URL was already submitted previously and returns the available report.

Enabled by default.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False
Case wall

The action provides the following output messages:

Output message Message description

Successfully returned details about the following URLs using CrowdStrike: PATHS

Action wasn't able to return details about the following URLs using CrowdStrike: PATHS

Action succeeded.
Waiting for results for the following URLs: PATHS Asynchronous message.
Error executing action "Submit URL". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "Submit URL". Reason: action ran into a timeout during execution. Pending files: FILES_IN_PROGRESS. Please increase the timeout in IDE.

Action failed.

Increase the timeout in IDE.

Update Detection

Update detection in CrowdStrike Falcon.

Entities

This action runs on all entities.

Action inputs

To configure the action, use the following parameters:

Parameters
Detection ID Required

ID of the detection to update.

Status Required

Specified detection status.

Default value is Select One.

Possible value are:
  • Select One
  • new
  • in_progress
  • true_positive
  • false_positive
  • ignored
  • closed
Assign Detection to Optional

Email address of the CrowdStrike Falcon user who is the assignee of the detection.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False
Case wall

The action provides the following output messages:

Output message Message description
Successfully updated detection DETECTION_ID in CrowdStrike Falcon. Action succeeded.
Error executing action "Update Detection". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "Update Detection". Reason: Either "Status" or "Assign Detection To" should have a proper value.

Action failed.

Check the values of the Status and Assign Detection To parameters.

Update Identity Protection Detection

Update an identity protection detection in CrowdStrike.

Entities

This action doesn't run on entities.

Action inputs

To configure the action, use the following parameters:

Parameters
Detection ID Required

ID of the detection to update.

Status Optional

Specified status of the detection.

Default value is Select One.

Possible values are:

  • Closed
  • Ignored
  • In Progress
  • New
  • Reopened
  • Select One
Assign to Optional

Name of the assigned analyst.

If Unassign is provided, the action removes an assignee from the detection.

If invalid value is provided, the action does not change the current assignee.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
{
    "added_privileges": [
        "DomainAdminsRole"
    ],
    "aggregate_id": "aggind:27fe4e476ca3490b8476b2b6650e5a74:70378936-3A00-400B-8136-4ED8DB047549",
    "assigned_to_uid": "example@example.com",
    "cid": "27fe4e476ca3490b8476b2b6650e5a74",
    "composite_id": "27fe4e476ca3490b8476b2b6650e5a74:ind:27fe4e476ca3490b8476b2b6650e5a74:70378936-3A00-400B-8136-4ED8DB047549",
    "confidence": 20,
    "context_timestamp": "2022-11-15T12:58:15.629Z",
    "crawl_edge_ids": {
        "Sensor": [
            "N6KIZ`%V`&d#&#sRaHNV[f3[CA4lr/C_N;.JnbglJpdg8TCCTqnr!9D\\['ALM&eNbPq?kt$#@]+01Ac[&th0-0]E'J8:]mFV?'g5HZ/$B.%BC29_`4U_?%a)_&#k>,G>:=E>%[7^<aLSVj=`UCMcRUH[a9/*^hO_7Ft(js#P<M<(eG3(B=I8rr",
            "XNXnKK.mi:ckQ^2c7AGRMK^'rd:p[_JkD_5ZM$W:d'J8oN:42nj.Ho1-^E5D16b0VALJ`2cDEEJTVdY\\n.-WQ^_B[7$1pH[Glgm@go]-LB%M1,c#2F)nli-Ge#V<=[!c_jh8e3D8E-S0FheDm*BHh-P/s6q!!*'!",
            "N6L*L\">LGfi/.a$IkpaFlWjT.YU#P@Gu8Qe6'0SK=M]ChI,FQXqo=*M(QR+@6c8@m1pIc)Dqs+WLXjbpom5@$T+oqC5RJk!9atPF/<mG'H`V9P0YII;!>C8YL)XS&ATORi>!U.7<Ds\"<dT/Mkp\\V%!U[RS_YC/Wrn[Z`S(^4NU,lV#X3/#pP7K*>g!<<'"
        ]
    },
    "crawl_vertex_ids": {
        "Sensor": [
            "aggind:27fe4e476ca3490b8476b2b6650e5a74:70378936-3A00-400B-8136-4ED8DB047549",
            "idpind:27fe4e476ca3490b8476b2b6650e5a74:EEFC50A4-2641-3809-9F45-7C308193CD67",
            "ind:27fe4e476ca3490b8476b2b6650e5a74:70378936-3A00-400B-8136-4ED8DB047549",
            "uid:27fe4e476ca3490b8476b2b6650e5a74:S-1-5-21-3479765008-4256118348-3151044947-3595"
        ]
    },
    "crawled_timestamp": "2022-11-15T13:58:17.251061883Z",
    "created_timestamp": "2022-11-15T12:59:17.239585706Z",
    "description": "A user received new privileges",
    "display_name": "Privilege escalation (user)",
    "end_time": "2022-11-15T12:58:15.629Z",
    "falcon_host_link": "https://example.com/",
    "id": "ind:27fe4e476ca3490b8476b2b6650e5a74:70378936-3A00-400B-8136-4ED8DB047549",
    "name": "IdpEntityPrivilegeEscalationUser",
    "objective": "Gain Access",
    "pattern_id": 51113,
    "previous_privileges": "0",
    "privileges": "8321",
    "product": "idp",
    "scenario": "privilege_escalation",
    "severity": 2,
    "show_in_ui": true,
    "source_account_domain": "EXAMPLE.COM",
    "source_account_name": "ExampleName",
    "source_account_object_sid": "S-1-5-21-3479765008-4256118348-3151044947-3595",
    "start_time": "2022-11-15T12:58:15.629Z",
    "status": "new",
    "tactic": "Privilege Escalation",
    "tactic_id": "TA0004",
    "tags": [
        "red_team"
    ],
    "technique": "Valid Accounts",
    "technique_id": "T1078",
    "timestamp": "2022-11-15T12:58:17.239Z",
    "type": "idp-user-endpoint-app-info",
    "updated_timestamp": "2022-11-23T15:22:20.271100181Z"
}
Case wall

The action provides the following output messages:

Output message Message description
Successfully updated identity protection detection with ID DETECTION_ID in CrowdStrike. Action succeeded.
Error executing action "Update Identity Protection Detection". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "Update Identity Protection Detection". Reason: identity protection detection with ID DETECTION_ID wasn't found in CrowdStrike. Please check the spelling.

Action failed.

Check the spelling.

Error executing action "Update Identity Protection Detection". Reason: at least one of the "Status" or "Assign To" parameters should have a value.

Action failed.

Check the values of the Status and Assign to parameters.

Update Incident

Update an incident in CrowdStrike.

Entities

This action doesn't run on entities.

Action inputs

To configure the action, use the following parameters:

Parameters
Incident ID Required

Specifies the ID of the incident to update.

Status Optional

Specifies the status for the incident.

Possible values are:

  • Closed
  • In Progress
  • New
  • Reopened
Assign to Optional

Specifies the name or email of the assigned analyst.

If Unassign is provided, the action removes an assignee from the incident.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
 {
"data_type": "Incident"
            "incident_id": "inc:fee8a6ef0cb3412e9a781dcae0287c85:9dfa480ae6214309bff0c8dc2ad8af7c",
            "incident_type": 1,
            "cid": "27fe4e476ca3490b8476b2b6650e5a74",
            "host_ids": [
                "fee8a6ef0cb3412e9a781dcae0287c85"
            ],
            "hosts": [
                {
                    "device_id": "fee8a6ef0cb3412e9a781dcae0287c85",
                    "cid": "27fe4e476ca3490b8476b2b6650e5a74",
                    "agent_load_flags": "1",
                    "agent_local_time": "2023-01-09T11:28:59.170Z",
                    "agent_version": "6.48.16207.0",
                    "bios_manufacturer": "Example Inc.",
                    "bios_version": "1.20.0",
                    "config_id_base": "65994753",
                    "config_id_build": "16207",
                    "config_id_platform": "3",
                    "external_ip": "198.51.100.1",
                    "hostname": "DESKTOP-EXAMPLE",
                    "first_seen": "2022-09-26T09:56:42Z",
                    "last_seen": "2023-01-09T12:11:35Z",
                    "local_ip": "192.0.2.1",
                    "mac_address": "00-15-5d-65-39-86",
                    "major_version": "10",
                    "minor_version": "0",
                    "os_version": "Windows 10",
                    "platform_id": "0",
                    "platform_name": "Windows",
                    "product_type": "1",
                    "product_type_desc": "Workstation",
                    "status": "contained",
                    "system_manufacturer": "Example Inc.",
                    "system_product_name": "G5 5500",
                    "modified_timestamp": "2023-01-09T12:11:48Z"
                }
            ],
            "created": "2023-01-09T12:12:51Z",
            "start": "2023-01-09T11:23:27Z",
            "end": "2023-01-09T12:52:01Z",
            "state": "closed",
            "status": 20,
            "tactics": [
                "Defense Evasion",
                "Privilege Escalation",
                "Credential Access"
            ],
            "techniques": [
                "Disable or Modify Tools",
                "Access Token Manipulation",
                "Input Capture",
                "Bypass User Account Control"
            ],
            "objectives": [
                "Keep Access",
                "Gain Access"
            ],
            "users": [
                "DESKTOP-EXAMPLE$",
                "EXAMPLE"
            ],
            "fine_score": 21
        }
Case wall

The action provides the following output messages:

Output message Message description
Successfully Successfully updated incident with ID INCIDENT_ID in CrowdStrike Action succeeded.
Error executing action "Update Incident". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "Update Incident". Reason: incident with ID INCIDENT_ID wasn't found in CrowdStrike. Please check the spelling.

Action failed.

Check the spelling.

Error executing action "Update Incident". Reason: user USER_ID wasn't found in CrowdStrike. Please check the spelling.

Action failed.

Check the spelling.

Error executing action "Update Incident". Reason: at least one of the "Status" or "Assign To" parameters should have a value.

Action failed.

Check input parameters.

Update IOC Information

Update information about custom IOCs in CrowdStrike Falcon.

Entities

This action runs on the following entities:

  • Hostname
  • URL
  • IP address
  • Hash

Action inputs

To configure the action, use the following parameters:

Parameters
Description Optional

New description for custom IOCs.

Source Optional

Source for custom IOCs.

Expiration days Optional

Number of days left until expiration.

Detect policy Optional

If enabled, the notification is sent for the identified IOCs. If disabled, no action is taken.

Enabled by default.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result Available
Script result Available
Script result
Script result name Value
is_success True/False
JSON result
{
    "id": "563df6a812f2e7020a17f77ccd809176ca3209cf7c9447ee36c86b4215860856",
    "type": "md5",
    "value": "7e4b0f81078f27fde4aeb87b78b6214c",
    "source": "testSource",
    "action": "detect",
    "severity": "high",
    "description": "test description update",
    "platforms": [
        "example"
    ],
    "tags": [
        "Hashes 17.Apr.18 12:20 (Example)"
    ],
    "expiration": "2022-05-01T12:00:00Z",
    "expired": false,
    "deleted": false,
    "applied_globally": true,
    "from_parent": false,
    "created_on": "2021-04-22T03:54:09.235120463Z",
    "created_by": "internal@example.com",
    "modified_on": "2021-09-16T10:09:07.755804336Z",
    "modified_by": "c16fd3a055eb46eda81e064fa6dd43de"
}
Case wall

The action provides the following output messages:

Output message Message description

Successfully updated the following entities in CrowdStrike Falcon: ENTITY_ID

Action wasn't able to update the following entities in CrowdStrike Falcon: ENTITY_ID

Action succeeded.
Error executing action "Update IOC Information". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Upload IOCs

Add custom IOCs in CrowdStrike Falcon.

Entities

This action runs on the following entities:

  • IP address
  • Hostname
  • URL
  • Hash

Action inputs

To configure the action, use the following parameters:

Parameters
Platform Required

Comma-separated list of platforms related to the IOC.

Default value is Windows,Linux,Mac.

Possible values are:
  • Windows
  • Linux
  • Mac
Severity Required

Specified severity of the IOC.

Default value is Medium.

Possible values are:
  • Informational
  • Low
  • Medium
  • High
  • Critical
Comment Optional

Comment containing more context related to the IOC.

Host Group Name Required

Name of the host group.

Action Optional

Specified action for uploaded IOCs.

Default value is Detect.

Possible values are:

  • Block
  • Detect

The Block value applies only to MD5 hashes. The action always applies the Detect policy to all other IOC types.

Action outputs

Action output type
Case wall attachment N/A
Case wall link N/A
Case wall table N/A
Enrichment table N/A
JSON result N/A
Script result Available
Script result
Script result name Value
is_success True/False
Case wall

The action provides the following output messages:

Output message Message description

Successfully added the following custom IOCs in CrowdStrike Falcon: ENTITY_ID

The following custom IOCs were already a part of CrowdStrike Falcon instance: ENTITY_ID

Action wasn't able to add the following custom IOCs in CrowdStrike Falcon: ENTITY_ID

Action succeeded.
Error executing action "Upload IOCs". Reason: ERROR_REASON

Action failed.

Check connection to the server, input parameters, or credentials.

Error executing action "Upload IOCs". Reason: Host group "HOST_GROUP_NAME" was not found. Please check the spelling.

Action failed.

Check the Host Group Name parameter value.

Error executing action "Upload IOCs". Invalid value provided for the parameter "Platform". Possible values: Windows, Linux, Mac.

Action failed.

Check the Platform parameter value.

Connectors

Make sure you've configured the minimal permissions for every CrowdStrike connector. For more details, refer to the Connector permissions section of this document.

For detailed instructions on how to configure a connector in Google Security Operations SOAR, see Configuring the connector.

CrowdStrike events

Events are pieces of information gathered by the Falcon sensors on your hosts. There are four types of events in CrowdStrike:

CrowdStrike event types
Auth activity audit events Events generated every time the authorization is requested, allowed, or completed on endpoints.
Detection summary events Events generated when threats are detected on endpoints.
Remote response session end events Events generated from remote sessions on endpoints.
User activity audit events Events generated to monitor activities carried out by active users on endpoints.

Connectors ingest events into Google Security Operations SOAR to create alerts and enrich cases with event data. You can select what events to ingest into Google Security Operations SOAR: all event types or selected ones.

CrowdStrike Detections Connector

Pull detections from CrowdStrike.

Dynamic list works with filters supported by the CrowdStrike API.

How to work with the dynamic list

When working with the dynamic list, adhere to the following recommendations:

  • Use the CrowdStrike FQL language to modify the filter sent by the connector.
  • Provide a separate entry in the dynamic list for each filter.
  • To ingest all detections assigned to a specific analyst, make sure that the analyst provides the following dynamic list entry:

    assigned_to_name:'ANALYST_USER_NAME'
    

Dynamic list supports the following parameters:

Supported parameters
q Full text search across all metadata fields.
date_updated Date of the most recent detection update.
assigned_to_name The human-readable username of the detection assignee.
max_confidence

When a detection has more than one associated behavior with varying confidence levels, this field captures the highest confidence value of all behaviors.

The parameter value can be any integer from 1 to 100.

detection_id Detection ID that can be used in conjunction with other APIs, such as the Detection Details API or Resolve Detection API.
max_severity

When a detection has more than one associated behavior with varying severity levels, this field captures the highest severity value of all behaviors.

The parameter value can be any integer from 1 to 100.

max_severity_displayname

Name used in UI to determine the detection severity.

Possible values are:

  • Critical
  • High
  • Medium
  • Low
seconds_to_triaged Time required for a detection to change its status from new to in_progress.
seconds_to_resolved Time required for a detection to change its status from new to any of the resolved states (true_positive, false_positive, ignored, and closed).
status

Current status of the detection.

Possible values are:

  • new
  • in_progress
  • true_positive
  • false_positive
  • ignored
adversary_ids The adversary tracked by CrowdStrike Falcon Intelligence possesses an ID associated with the attributed behaviors or indicators in a detection. These IDs are located in a detection metadata accessible through the Detection Details API.
cid Customer ID (CID) of your organization.

Connector parameters

To configure the connector, use the following parameters:

Parameters
Product Field Name Required

Enter the source field name to retrieve the Product Field name.

Default value is Product Name.

Event Field Name Required

Enter the source field name to retrieve the Event Field name.

Default value is behaviors_technique.

Environment Field Name Optional

Name of the field where the environment name is stored.

If the environment field isn't found, the default environment is used.

Default value is "".

Environment Regex Pattern Optional

A regular expression pattern to run on the value found in the Environment Field Name field.

The default value .* catches all and returns the value unchanged.

The parameter lets you manipulate the environment field using the regular expression logic.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout (Seconds) Required

Timeout limit for the python process running the current script.

Default value is 180 seconds.

API Root Required

API root of the CrowdStrike instance.

Default value is https://api.crowdstrike.com.

Client ID Required

Client ID of the CrowdStrike account.

Client Secret Required

Client Secret of the CrowdStrike account.

Lowest Severity Score To Fetch Optional

Lowest severity score of the detections to fetch.

If no value is provided, the connector doesn't apply this filter.

Max value is 100.

Default value is 50.

Lowest Confidence Score To Fetch Optional

Lowest confidence score of the detections to fetch.

If no value is provided, the connector doesn't apply this filter.

Max value is 100.

Default value is 0.

Max Hours Backwards Optional

Amount of hours from where to fetch detections.

Default value is 1 hour.

Max Detections To Fetch Optional

Number of detections to process per one connector iteration.

Default value is 10.

Verify SSL Required

If checked, verifies that the SSL certificate for the connection to the CrowdStrike server is valid.

Unchecked by default.

Proxy Server Address Optional

Address of the proxy server to use.

Proxy Username Optional

Proxy username to authenticate with.

Proxy Password Optional

Proxy password to authenticate with.

Alert Name Template Optional

If provided, the connector uses this value for the Google Security Operations SOAR alert name.

You can provide placeholders in the following format: [FIELD_NAME], such as Phishing - [event_mailbox].

If no value or an invalid template is provided, the connector uses the default alert name.

This parameter allows only keys with a string value.

Padding Period Optional

Number of hours the connector uses for padding.

Max value is 6 hours.

Connector rules

The connector supports proxy.

Connector events

Example of the connector event is as follows:

{
    "cid": "27fe4e476ca3490b8476b2b6650e5a74",
    "created_timestamp": "2021-01-12T16:19:08.651448357Z",
    "detection_id": "ldt:74089e36ac3a4271ab14abc076ed18eb:4317290676",
    "device": {
        "device_id": "74089e36ac3a4271ab14abc076ed18eb",
        "cid": "27fe4e476ca3490b8476b2b6650e5a74",
        "agent_load_flags": "0",
        "agent_local_time": "2021-01-12T16:07:16.205Z",
        "agent_version": "6.13.12708.0",
        "bios_manufacturer": "Example LTD",
        "bios_version": "6.00",
        "config_id_base": "65994753",
        "config_id_build": "12708",
        "config_id_platform": "3",
        "external_ip": "203.0.113.1",
        "hostname": "EXAMPLE-01",
        "first_seen": "2021-01-12T16:01:43Z",
        "last_seen": "2021-01-12T16:17:21Z",
        "local_ip": "192.0.2.1",
        "mac_address": "00-50-56-a2-5d-a3",
        "major_version": "10",
        "minor_version": "0",
        "os_version": "Windows 10",
        "platform_id": "0",
        "platform_name": "Windows",
        "product_type": "1",
        "product_type_desc": "Workstation",
        "status": "normal",
        "system_manufacturer": "Example, Inc.",
        "system_product_name": "Example ",
        "modified_timestamp": "2021-01-12T16:17:29Z",
    "behaviors": 
        {
            "device_id": "74089e36ac3a4271ab14abc076ed18eb",
            "timestamp": "2021-01-12T16:17:19Z",
            "template_instance_id": "10",
            "behavior_id": "10146",
            "filename": "reg.exe",
            "filepath": "\\Device\\HarddiskVolume2\\Windows\\System32\\reg.exe",
            "alleged_filetype": "exe",
            "cmdline": "REG  ADD HKCU\\Environment /f /v UserInitMprLogonScript /t REG_MULTI_SZ /d \"C:\\TMP\\mim.exe sekurlsa::LogonPasswords > C:\\TMP\\o.txt\"",
            "scenario": "credential_theft",
            "objective": "Gain Access",
            "tactic": "Credential Access",
            "tactic_id": "TA0006",
            "technique": "Credential Dumping",
            "technique_id": "T1003",
            "display_name": "Example-Name",
            "severity": 70,
            "confidence": 80,
            "ioc_type": "hash_sha256",
            "ioc_value": "b211c25bf0b10a82b47e9d8da12155aad95cff14cebda7c4acb35a94b433ddfb",
            "ioc_source": "library_load",
            "ioc_description": "\\Device\\HarddiskVolume2\\Windows\\System32\\reg.exe",
            "user_name": "Admin",
            "user_id": "example-id",
            "control_graph_id": "ctg:74089e36ac3a4271ab14abc076ed18eb:4317290676",
            "triggering_process_graph_id": "pid:74089e36ac3a4271ab14abc076ed18eb:4746437404",
            "sha256": "b211c25bf0b10a82b47e9d8da12155aad95cff14cebda7c4acb35a94b433ddfb",
            "md5": "05cf3ce225b05b669e3118092f4c8eab",
            "parent_details": {
                "parent_sha256": "d0ceb18272966ab62b8edff100e9b4a6a3cb5dc0f2a32b2b18721fea2d9c09a5",
                "parent_md5": "9d59442313565c2e0860b88bf32b2277",
                "parent_cmdline": "C:\\Windows\\system32\\cmd.exe /c \"\"C:\\Users\\Admin\\Desktop\\APTSimulator-master\\APTSimulator-master\\APTSimulator.bat\" \"",
                "parent_process_graph_id": "pid:74089e36ac3a4271ab14abc076ed18eb:4520199381"
            },
            "pattern_disposition": 2048,
            "pattern_disposition_details": {
                "indicator": false,
                "detect": false,
                "inddet_mask": false,
                "sensor_only": false,
                "rooting": false,
                "kill_process": false,
                "kill_subprocess": false,
                "quarantine_machine": false,
                "quarantine_file": false,
                "policy_disabled": false,
                "kill_parent": false,
                "operation_blocked": false,
                "process_blocked": true,
                "registry_operation_blocked": false,
                "critical_process_disabled": false,
                "bootup_safeguard_enabled": false,
                "fs_operation_blocked": false,
                "handle_operation_downgraded": false
            }
        }
    },
    "email_sent": false,
    "first_behavior": "2021-01-12T16:17:19Z",
    "last_behavior": "2021-01-12T16:17:19Z",
    "max_confidence": 80,
    "max_severity": 70,
    "max_severity_displayname": "High",
    "show_in_ui": true,
    "status": "new",
    "hostinfo": {
        "domain": ""
    },
    "seconds_to_triaged": 0,
    "seconds_to_resolved": 0,
}

CrowdStrike Falcon Streaming Events Connector

Refer to the following examples to check what use cases the connector addresses:

  1. Detection events data ingestion.
    CrowdStrike Falcon detects an attempt to execute the malicious SophosCleanM.exe file on an endpoint. CrowdStrike stops the operation and creates an alert containing file hashes in the event data.
    An analyst interested in file reputation runs discovered hashes in VirusTotal and finds out that a hash is malicious. As a following step, the Mcafee EDR action quarantines the malicious file.
  2. User activity audit events data ingestion.
    A CrowdStrike user, Dani, updates the detection status from new to false-positive. This user action creates an event named detection_update.
    The analyst performs a follow up to understand why Dani has marked the action false positive and checks the ingested event containing the information about Dani's identity.
    As a following step, the analyst runs the Active Directory Enrich Entities action to obtain more details about the incident and simplify tracking Dani down.
  3. Auth activity audit events data ingestion.
    An event indicates that Dani has created a new user account and granted user roles to it.
    To investigates the event and understand why the user was created, the analyst uses Dani's user ID to run the Active Directory Enrich Entities action and find out Dani's user role to confirm if they are authorized to add new users.
  4. Remote response end events data ingestion.
    A remote event indicates that Dani had a remote connection to a specific host and executed commands as a root user to access a web server directory.
    To get more information about both Dani and the host involved, the analyst runs the Active Directory action to enrich both the user and the host. Based on information returned, the analyst might decide to suspend Dani until the purpose of the remote connection is clarified.

Connector Parameters

To configure the connector, use the following parameters:

Parameters
Product Field Name Required

Enter the source field name to retrieve the Product Field name.

Default value is device_product.

Event Field Name Required

Enter the source field name to retrieve the Event Field name.

Default value is Name.

Environment Field Name Optional

Name of the field where the environment name is stored.

If the environment field isn't found, the default environment is used.

Default value is "".

Environment Regex Pattern Optional

A regular expression pattern to run on the value found in the Environment Field Name field.

The default value .* catches all and returns the value unchanged.

The parameter lets you manipulate the environment field using the regular expression logic.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

API Root Required

API root of the CrowdStrike instance.

Default value is https://api.crowdstrike.com.

Client ID Required

Client ID of the CrowdStrike account.

Client Secret Required

Client Secret of the CrowdStrike account.

Event types Optional

A comma-separated list of event types.

Examples of the event types are:

  • DetectionSummaryEvent
  • IncidentSummaryEvent
  • AuthActivityAuditEvent
  • UserActivityAuditEvent
  • RemoteResponseSessionStartEvent
  • RemoteResponseSessionEndEvent
Max Days Backwards Optional

Number of days before today to retrieve detections from.

Default value is 3 days.

Max Events Per Cycle Optional

Number of events to process per one connector iteration.

Default value is 10.

Min Severity Optional

Events to ingest based on the event severity (detection events). The value ranges from 0 to 5.

If other event types besides detections are ingested, their severity is set to -1 and this filter doesn't apply to them.

Verify SSL Required

If checked, verifies that the SSL certificate for the connection to the CrowdStrike server is valid.

Unchecked by default.

Script Timeout (Seconds) Required

Timeout limit for the python process running the current script.

Default value is 60 seconds.

Proxy Server Address Optional

Address of the proxy server to use.

Proxy Username Optional

Proxy username to authenticate with.

Proxy Password Optional

Proxy password to authenticate with.

Rule Generator Template Optional

If provided, the connector uses this value for the Google Security Operations SOAR rule generator.

You can provide placeholders in the following format: [FIELD_NAME], such as Phishing - [event_mailbox].

If no value or an invalid template is provided, the connector uses the default rule generator.

This parameter allows only keys with a string value.

Connector rules

Connector supports proxy.

Connector doesn't support dynamic list.

CrowdStrike Identity Protection Detections Connector

Pull Identity Protection detections from CrowdStrike. The dynamic list works with the display_name parameter.

Connector parameters

To configure the connector, use the following parameters:

Parameters
Product Field Name Required

Enter the source field name to retrieve the Product Field name.

Default value is Product Name.

Event Field Name Required

Enter the source field name to retrieve the Event Field name.

Default value is behaviors_technique.

Environment Field Name Optional

Name of the field where the environment name is stored.

If the environment field isn't found, the default environment is used.

Default value is "".

Environment Regex Pattern Optional

A regular expression pattern to run on the value found in the Environment Field Name field.

The default value .* catches all and returns the value unchanged.

The parameter lets you manipulate the environment field using the regular expression logic.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout (Seconds) Required

Timeout limit for the python process running the current script.

Default value is 180 seconds.

API Root Required

API root of the CrowdStrike instance.

Default value is https://api.crowdstrike.com.

Client ID Required

Client ID of the CrowdStrike account.

Client Secret Required

Client Secret of the CrowdStrike account.

Lowest Severity Score To Fetch Optional

Lowest severity score of the detections to fetch.

If no value is provided, the connector doesn't apply this filter.

Max value is 100.

Default value is 50.

The connector also supports the following values for this parameter:

  • Low
  • Medium
  • High
  • Critical
Lowest Confidence Score To Fetch Optional

Lowest confidence score of the detections to fetch.

If no value is provided, the connector doesn't apply this filter.

Max value is 100.

Default value is 0.

Max Hours Backwards Optional

Number of hours prior to now to retrieve detections from.

Default value is 1 hour.

Max Detections To Fetch Optional

Number of detections to process per one connector iteration.

Default value is 10.

Verify SSL Required

If checked, verifies that the SSL certificate for the connection to the CrowdStrike server is valid.

Unchecked by default.

Proxy Server Address Optional

Address of the proxy server to use.

Proxy Username Optional

Proxy username to authenticate with.

Proxy Password Optional

Proxy password to authenticate with.

Connector rules

Connector supports proxy.

Connector event

Example of the connector event is as follows:

{
  "added_privileges": [
      "DomainAdminsRole"
  ],
  "aggregate_id": "aggind:27fe4e476ca3490b8476b2b6650e5a74:C34185DF-C3BA-4F69-93EB-1B61A213AF86",
  "cid": "27fe4e476ca3490b8476b2b6650e5a74",
  "composite_id": "27fe4e476ca3490b8476b2b6650e5a74:ind:27fe4e476ca3490b8476b2b6650e5a74:C34185DF-C3BA-4F69-93EB-1B61A213AF86",
  "confidence": 20,
  "context_timestamp": "2022-11-15T12:58:13.155Z",
  "crawl_edge_ids": {
      "Sensor": [
          "N6Fq4_]TKjckDDWI$fKO`l>_^KFO4!,Z/&o<H7_)4[Ip*h@KUG8%Xn3Fm3@]<gF_c,c1eeW\\O-J9l;HhVHA\"DH#\\pO1M#>X^dZWWg%V:`[+@g9@3h\"Q\"7r8&lj-o[K@24f;Xl.rlhgWC8%j5\\O7p/G7iQ*ST&12];a_!REjkIUL.R,/U^?]I!!*'!",
          "XNXPaK.m]6i\"HhDPGX=XlMl2?8Mr#H;,A,=7aF9N)>5*/Hc!D_>MmDTO\\t1>Oi6ENO`QkWK=@M9q?[I+pm^)mj5=T_EJ\"4cK99U+!/ERSdo(X^?.Z>^]kq!ECXH$T.sfrJpT:TE+(k]<'Hh]..+*N%h_5<Z,63,n!!*'!",
          "N6L$J`'>\":d#'I2pLF4-ZP?S-Qu#75O,>ZD+B,m[\"eGe@(]>?Nqsh8T3*q=L%=`KI_C[Wmj3?D!=:`(K)7/2g&8cCuB`r9e\"jTp/QqK7.GocpPSq4\\-#t1Q*%5C0%S1$f>KT&a81dJ!Up@EZY*;ssFlh8$cID*qr1!)S<!m@A@s%JrG9Go-f^B\"<7s8N"
      ]
  },
  "crawl_vertex_ids": {
      "Sensor": [
          "uid:27fe4e476ca3490b8476b2b6650e5a74:S-1-5-21-3479765008-4256118348-3151044947-3195",
          "ind:27fe4e476ca3490b8476b2b6650e5a74:C34185DF-C3BA-4F69-93EB-1B61A213AF86",
          "aggind:27fe4e476ca3490b8476b2b6650e5a74:C34185DF-C3BA-4F69-93EB-1B61A213AF86",
          "idpind:27fe4e476ca3490b8476b2b6650e5a74:715224EE-7AD6-33A1-ADA9-62C4608DA546"
      ]
  },
  "crawled_timestamp": "2022-11-15T14:33:50.641703679Z",
  "created_timestamp": "2022-11-15T12:59:15.444106807Z",
  "description": "A user received new privileges",
  "display_name": "Privilege escalation (user)",
  "end_time": "2022-11-15T12:58:13.155Z",
  "falcon_host_link": "https://example.com/identity-protection/detections/",
  "id": "ind:27fe4e476ca3490b8476b2b6650e5a74:C34185DF-C3BA-4F69-93EB-1B61A213AF86",
  "name": "IdpEntityPrivilegeEscalationUser",
  "objective": "Gain Access",
  "pattern_id": 51113,
  "previous_privileges": "0",
  "privileges": "8321",
  "product": "idp",
  "scenario": "privilege_escalation",
  "severity": 2,
  "show_in_ui": true,
  "source_account_domain": "EXAMPLE.COM",
  "source_account_name": "ExampleName",
  "source_account_object_sid": "S-1-5-21-3479765008-4256118348-3151044947-3195",
  "start_time": "2022-11-15T12:58:13.155Z",
  "status": "new",
  "tactic": "Privilege Escalation",
  "tactic_id": "TA0004",
  "technique": "Valid Accounts",
  "technique_id": "T1078",
  "timestamp": "2022-11-15T12:58:15.397Z",
  "type": "idp-user-endpoint-app-info",
  "updated_timestamp": "2022-11-15T14:33:50.635238527Z"
}

CrowdStrike Incidents Connector

Pull incident and related behaviors from CrowdStrike.

The dynamic list works with the incident_type parameter.

Connector parameters

To configure the connector, use the following parameters:

Parameters
Product Field Name Required

Enter the source field name to retrieve the Product Field name.

Default value is Product Name.

Event Field Name Required

Enter the source field name to retrieve the Event Field name.

Default value is data_type.

Environment Field Name Optional

Name of the field where the environment name is stored.

If the environment field isn't found, the default environment is used.

Default value is "".

Environment Regex Pattern Optional

A regular expression pattern to run on the value found in the Environment Field Name field.

The default value .* catches all and returns the value unchanged.

The parameter lets you manipulate the environment field using the regular expression logic.

If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout (Seconds) Required

Timeout limit for the python process running the current script.

Default value is 180 seconds.

API Root Required

API root of the CrowdStrike instance.

Default value is https://api.crowdstrike.com.

Client ID Required

Client ID of the CrowdStrike account.

Client Secret Required

Client Secret of the CrowdStrike account.

Lowest Severity Score To Fetch Optional

Lowest severity score of the incidents to fetch.

If no value is provided, the connector ingests incidents with all severities.

Max value is 100.

Max Hours Backwards Optional

Number of hours before now to retrieve incidents from.

Default value is 1 hour.

Max Incidents To Fetch Optional

Number of incidents to process per one connector iteration.

Max value is 100.

Default value is 10.

Use dynamic list as a blocklist Required

If checked, the dynamic list is used as a blocklist.

Unchecked by default.

Verify SSL Required

If checked, verifies that the SSL certificate for the connection to the CrowdStrike server is valid.

Unchecked by default.

Proxy Server Address Optional

Address of the proxy server to use.

Proxy Username Optional

Proxy username to authenticate with.

Proxy Password Optional

Proxy password to authenticate with.

Connector rules

Connector supports proxy.

Connector events

The Incidents Connector has two types of events: one is based on incident and the other on behavior.

The example of an event based on incident is as follows:

 {
"data_type": "Incident"
            "incident_id": "inc:fee8a6ef0cb3412e9a781dcae0287c85:9dfa480ae6214309bff0c8dc2ad8af7c",
            "incident_type": 1,
            "cid": "27fe4e476ca3490b8476b2b6650e5a74",
            "host_ids": [
                "fee8a6ef0cb3412e9a781dcae0287c85"
            ],
            "hosts": [
                {
                    "device_id": "fee8a6ef0cb3412e9a781dcae0287c85",
                    "cid": "27fe4e476ca3490b8476b2b6650e5a74",
                    "agent_load_flags": "1",
                    "agent_local_time": "2023-01-09T11:28:59.170Z",
                    "agent_version": "6.48.16207.0",
                    "bios_manufacturer": "Example Inc.",
                    "bios_version": "1.20.0",
                    "config_id_base": "65994753",
                    "config_id_build": "16207",
                    "config_id_platform": "3",
                    "external_ip": "203.0.113.1",
                    "hostname": "DESKTOP-EXAMPLE",
                    "first_seen": "2022-09-26T09:56:42Z",
                    "last_seen": "2023-01-09T12:11:35Z",
                    "local_ip": "192.0.2.1",
                    "mac_address": "00-15-5d-65-39-86",
                    "major_version": "01",
                    "minor_version": "0",
                    "os_version": "Windows 10",
                    "platform_id": "0",
                    "platform_name": "Windows",
                    "product_type": "1",
                    "product_type_desc": "Workstation",
                    "status": "contained",
                    "system_manufacturer": "Example Inc.",
                    "system_product_name": "G5 5500",
                    "modified_timestamp": "2023-01-09T12:11:48Z"
                }
            ],
            "created": "2023-01-09T12:12:51Z",
            "start": "2023-01-09T11:23:27Z",
            "end": "2023-01-09T12:52:01Z",
            "state": "closed",
            "status": 20,
            "tactics": [
                "Defense Evasion",
                "Privilege Escalation",
                "Credential Access"
            ],
            "techniques": [
                "Disable or Modify Tools",
                "Access Token Manipulation",
                "Input Capture",
                "Bypass User Account Control"
            ],
            "objectives": [
                "Keep Access",
                "Gain Access"
            ],
            "users": [
                "DESKTOP-EXAMPLE$",
                "EXAMPLE"
            ],
            "fine_score": 21
        }

The example of an event based on behavior is as follows:

 {
            "behavior_id": "ind:fee8a6ef0cb3412e9a781dcae0287c85:1298143147841-372-840208",
            "cid": "27fe4e476ca3490b8476b2b6650e5a74",
            "aid": "fee8a6ef0cb3412e9a781dcae0287c85",
            "incident_id": "inc:fee8a6ef0cb3412e9a781dcae0287c85:9dfa480ae6214309bff0c8dc2ad8af7c",
            "incident_ids": [
                "inc:fee8a6ef0cb3412e9a781dcae0287c85:9dfa480ae6214309bff0c8dc2ad8af7c"
            ],
            "pattern_id": 372,
            "template_instance_id": 0,
            "timestamp": "2023-01-09T11:24:25Z",
            "cmdline": "\"C:\\WINDOWS\\system32\\SystemSettingsAdminFlows.exe\" SetNetworkAdapter {4ebe49ef-86f5-4c15-91b9-8da03d796416} enable",
            "filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\SystemSettingsAdminFlows.exe",
            "domain": "DESKTOP-EXAMPLE",
            "pattern_disposition": -1,
            "sha256": "78f926520799565373b1a8a42dc4f2fa328ae8b4de9df5eb885c0f7c971040d6",
            "user_name": "EXAMPLE",
            "tactic": "Privilege Escalation",
            "tactic_id": "TA0004",
            "technique": "Bypass User Account Control",
            "technique_id": "T1548.002",
            "display_name": "ProcessIntegrityElevationTarget",
            "objective": "Gain Access",
            "compound_tto": "GainAccess__PrivilegeEscalation__BypassUserAccountControl__1__0__0__0"
        }