Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | CrowdStrikeAPIConnector |
| Publisher | Microsoft |
| Used in Solutions | CrowdStrike Falcon Endpoint Protection |
| Collection Method | CCF |
| Connector Definition Files | CrowdStrikeAPI_Definition.json |
| CCF Configuration | CrowdStrikeAPI_PollingConfig.json |
| CCF Capabilities | OAuth2, Paging, Nested |
The CrowdStrike Data Connector allows ingesting logs from the CrowdStrike API into Microsoft Sentinel. This connector provides the capability to ingest CrowdStrike Alerts, Detections, Hosts, Cases, and Vulnerabilities into Microsoft Sentinel. This connector is built on the Microsoft Sentinel Codeless Connector Platform and uses the CrowdStrike API to fetch logs. It supports DCR-based ingestion time transformations so that queries can run more efficiently. Refer to CrowdStrike API documentation for more information.
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
CrowdStrikeAlerts |
✓ | ✓ | ? |
CrowdStrikeCases |
✓ | ✓ | ? |
CrowdStrikeDetections |
✓ | ✓ | ? |
CrowdStrikeHosts |
✓ | ✓ | ? |
CrowdStrikeVulnerabilities |
✓ | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Workspace (Workspace): Read and Write permissions are required.
Custom Permissions: - Crowdstrike OAuth2 API Client and Scopes: Alerts, API Integrations, App Logs, Cases, Correlation Rules, Detections, Hosts, Assets, Incidents, Quarantined Files, Vulnerabilities are required for REST API. See the documentation to learn more about API.
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
1. Connect CrowdStrike to Microsoft Sentinel
ℹ️ Important Notice: The Incidents API is fully decommissioned. Use the new Cases data type instead. To gather data from CrowdStrike, you need to provide the following resources 1. Base API URL - To gather data from CrowdStrike, you'll need the Base API URL. 2. Client ID - To gather data from CrowdStrike, you'll need the Client ID. 3. Client Secret - To gather data from CrowdStrike, you'll need the Client Secret. For detailed instructions on retrieving the Base API URL, Client ID, and Client Secret, please refer to the Connector Tutorial. Connector Management Interface
This section is an interactive interface in the Microsoft Sentinel portal that allows you to manage your data collectors.
📊 View Existing Collectors: A management table displays all currently configured data collectors with the following information: - Data Type
➕ Add New Collector: Click the "Add new collector" button to configure a new data collector (see configuration form below).
🔧 Manage Collectors: Use the actions menu to delete or modify existing collectors.
💡 Portal-Only Feature: This configuration interface is only available when viewing the connector in the Microsoft Sentinel portal. You cannot configure data collectors through this static documentation.
Configure CrowdStrike API Connection
Connect to CrowdStrike to ingest security data
When you click the "Add Connection" button in the portal, a configuration form will open. You'll need to provide:
In your CrowdStrike Falcon console, go to Support and resources > API clients and keys, select your API client, and enable the following scopes with Read access: Alerts, Cases, Detections, Hosts, Spotlight Vulnerabilities.
Log in to your CrowdStrike Console and navigate to the API section to copy your Base API URL.
Obtain your Client ID and Client Secret from the API credentials section in your CrowdStrike account.
💡 Portal-Only Feature: This configuration form is only available in the Microsoft Sentinel portal.
2. Querying Detections (after successful connection)
Once logs are ingesting, the CrowdStrikeDetections table contains individual alert records grouped by aggregate_id. To view true detection-level behavior, use the following KQL query to aggregate alerts by their detection group:
CrowdStrikeDetections
| summarize
AlertCount = count(),
FirstSeen = min(CreatedTimestamp),
LastSeen = max(CreatedTimestamp),
MaxSeverity = max(Severity)
by AggregateId
📄 Source: CrowdStrike Falcon Endpoint Protection\Data Connectors\CrowdStrikeAPI_ccp\README.md
This Microsoft Sentinel data connector enables ingestion of security data from CrowdStrike Falcon Platform. The connector captures alerts, detections, incidents, host information, and vulnerability data from the CrowdStrike Falcon platform, providing comprehensive endpoint protection visibility.
This solution helps security teams monitor endpoints for threats, track security incidents, and maintain visibility into their security posture by sending normalized security data to Microsoft Sentinel in near real-time.
CrowdStrikeAlerts - Security alerts and threat notificationsCrowdStrikeCases - Case management that include security incident and investigationsCrowdStrikeDetections - Threat detections and behavioral analysisCrowdStrikeIncidents(Deprecated) - Security incidents and investigationsCrowdStrikeHosts - Endpoint device information and statusCrowdStrikeVulnerabilities - Vulnerability data from Falcon Spotlight| Data Type | CrowdStrike Scope | Description |
|---|---|---|
| Alerts | alerts:read |
Read access to security alerts |
| Cases | cases:read |
Read access to case management |
| Detections | detects:read |
Read access to threat detections |
| Hosts | hosts:read |
Read access to endpoint device information |
| Incidents | incidents:read |
Read access to security incidents |
| Vulnerabilities | spotlight-vulnerabilities:read |
Read access to Falcon Spotlight vulnerability data |
Note: You can grant only the scopes for the data types you need. If you want all data types, grant all scopes listed above.
| Region | Base URL |
|---|---|
| US-1 | https://api.crowdstrike.com |
| US-2 | https://api.us-2.crowdstrike.com |
| EU-1 | https://api.eu-1.crowdstrike.com |
| US-GOV-1 | https://api.laggar.gcw.crowdstrike.com |
Save the following values for connector deployment: - Client ID - Client Secret - Base URL (from the table above)
When deploying the connector, you'll need to provide:
Base API URL: https://api.us-2.crowdstrike.com
Client ID: a1b2c3d4e5f6g7h8i9j0
Client Secret: [Your secure client secret]
After deployment, verify that data is flowing into Microsoft Sentinel:
// Check CrowdStrike Alerts
CrowdStrikeAlerts
| take 10
// Check Crowdstrike Cases
CrowdStrikeCases
| take 10
// Check CrowdStrike Detections
CrowdStrikeDetections
| take 10
// Check CrowdStrike Incidents
CrowdStrikeIncidents
| take 10
// Check CrowdStrike Hosts
CrowdStrikeHosts
| take 10
// Check CrowdStrike Vulnerabilities
CrowdStrikeVulnerabilities
| take 10
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊