CrowdStrike Event Streams

Panther supports connecting to CrowdStrike's Event Streams API

Overview

Panther can fetch CrowdStrike events by querying the CrowdStrike Event Streams API. Panther queries for new events every one minute.

CrowdStrike Event Streams only exports non-sensor data, which includes SaaS audit activity and CrowdStrike Detection Summary events. To ingest device telemetry, a CrowdStrike Falcon Data Replicator (FDR) source is required.

The action of Panther querying the Event Streams API for new events itself generates additional Crowdstrike.EventStreams logs. If this creates unwanted noise in your integration, you can configure an ingestion filter to filter out these logs.

How to onboard CrowdStrike Event Streams logs to Panther

Prerequisite

Step 1: Create CrowdStrike Falcon API client

  1. Log into the Falcon console using an account with administrator-level permissions.

  2. In the navigation bar, click Support and resources > API clients and keys. In an Endpoint security Activity dashboard, arrows are drawn to the three-lines navigation bar icon, a "Support and resources" option, and an "API clients and keys" option.

  3. Within the OAuth2 API clients tab, click Create API client. In a Support and resources dashboard, under an OAuth2 API clients tab, a table with Client name, Created, Last modified, and Client ID is shown.

  4. Fill in the Create API client form:

    • Client name: Enter a descriptive name.

    • Description: Enter a useful description.

    • In the table of scopes, in the Event streams row, select the Read checkbox. A "Create API client" header is above various form fields, like Client name, Description, and a Scope table. An arrow is drawn to the "Read" checkbox in the Event stream row.

  5. Click Create.

  6. The API client created pop-up modal will display Client ID, Secret, and Base URL values. Copy these values and store them in a secure location, as you will need them in the next step. This is the only time the Secret will be shown. Under an "API client created' header are Client ID, Secret, and Base URL values.

  7. Click Done.

Step 2: Create a new CrowdStrike Event Streams source in Panther

  1. In the left-hand navigation bar of your Panther Console, click Configure > Log Sources.

  2. Click Create New.

  3. Search for "CrowdStrike Event Streams," then click its tile.

  4. In the slide-out panel, click Start Setup. A "CrowdStrike Event Streams" page is shown. An arrow is drawn to a "Start Setup" button in the upper-right corner.

  5. On the Configure page, enter a descriptive Name for the source.

  6. Click Setup.

  7. On the Credentials page, fill in the form:

    • Client Id: Enter the Client ID you generated in CrowdStrike in the previous step.

    • Client Secret: Enter the Secret you generated in CrowdStrike in the previous step.

    • Client Cloud: Select the region shown in the Base URL you generated in CrowdStrike in the previous step.

    • App Id: Enter a label to identify your connection.

      • There is a maximum of 20 alphanumeric characters (a-z, A-Z, 0-9).

    • Member Cid (Optional): Optionally enter the Customer ID (CID) selector, for cases when the CrowdStrike Client Id and Secret have access to multiple CIDs.The text at the top reads, "Fill in the form below with your credentials." Below are various form fields, like Client Id and Client Secret.

  8. Click Setup. You will be directed to a success screen:

    The success screen reads, "Everything looks good! Panther will now automatically pull & process logs from your account"
    • You can optionally enable one or more Detection Packs.

    • The Trigger an alert when no events are processed setting defaults to YES. We recommend leaving this enabled, as you will be alerted if data stops flowing from the log source after a certain period of time. The timeframe is configurable, with a default of 24 hours.

      The "Trigger an alert when no events are processed" toggle is set to YES. The "How long should Panther wait before it sends you an alert that no events have been processed" setting is set to 1 Day

Supported log types

Crowdstrike.EventStreams

Crowdstrike.EventStreams logs represent activity observed on your hosts by the Falcon sensor and shown in the Falcon console's Investigate dashboards and searches.

Last updated

Was this helpful?