Apps
Crowdstrike Falcon
Interpres Application - Crowdstrike Falcon
- Type: Endpoint
- Vendor: Crowdstrike
The Crowdstrike app will process Crowdstrike Detections and turn them into the Alert and Detection DataModel for Interpres. This includes both the Behavioral and Custom IOA based detections
Go to Support and Resources then API clients and keys
- Click Create API client
- For Client name enter “Interpres”
- Add the below Scopes as with the “Read” permission
- Click Create
- Copy the Client ID, Secret, and Base URL to Interpres. If setting up more than one CrowdStrike integration (e.g. CrowdStrike Falcon EDR and CrowdStrike Spotlight) then do not click Done until you have used these credentials for both integrations.
- Base URL: The base url for the api this should just be scheme + host e.g. https://api.us-2.crowdstrike.com
- Client ID: The API Client ID created
- Client Secret: The API Client ID created
- Asset FQDN: Only grab assets with this fully qualified domain name
Check there is connectivity (green light) in the integration created.
- Get Alerts: Get Alerts will process all the crowdstrike detection objects into alerts, these are uniquely linked to detections via behavior_id.
- Get Available Telemetry: This action just returns a predefined set of telemetry that Crowdstrike provides if it is in use.
- file access telemetry
- file creation telemetry
- file modification telemetry
- file deletion telemetry
- network connection creation telemetry
- active dns telemetry
- command execution telemetry
- process access telemetry
- process creation telemetry
- process metadata telemetry
- scheduled job creation telemetry
- scheduled job deletion telemetry
- scheduled job metadata telemetry
- scheduled job modification telemetry
- user account authentication telemetry
- user account creation telemetry
- windows registry key access telemetry
- windows registry key creation telemetry
- windows registry key deletion telemetry
- windows registry key modification telemetry
- wmi creation telemetry
- Get Detections: This action processes the Crowdstrike Detection Objects which are really are triggered detections (not to be confused with the detection logic). Each Crowdstrike detection contains device metadata along with one or more behavioral detections which fired. These are turned into the Interpres Detection which is also maintained in state along with a last seen timestamp such that the detection list should contain any detection that was seen over the course of this plugin being installed. For all of the non-IOA alerts they are identified by behavoir id which uniquely identifies a detection to alert mapping.