- 06 Apr 2025
- 2 Minutes to read
- DarkLight
- PDF
CrowdStrike Falcon 2.2.2
- Updated on 06 Apr 2025
- 2 Minutes to read
- DarkLight
- PDF
CrowdStrike Falcon - 2.2.2
tags: Python | EDR | Automation | Enrichment
Table of Contents
Description
Integration with CrowdStrike Falcon EDR supports CDC users by providing enrichment consisting of host, user, hash, IP, and vulnerability details. This enables CDC users to make informed decisions on incident response.
Falcon is a CrowdStrike platform purpose-built to stop breaches via a unified set of cloud-delivered technologies that prevent all types of attacks — including malware and much more.
CyberProof uses customized adaptive cards to display host, user, hash, IP, and vulnerabilities-related information in a meaningful intuitive GUI. This helps facilitate easy understanding of the data received from CrowdStrike Falcon.
We provide CLI commands to enrich basic host information, user information, hash, IP, and vulnerabilities-related information available on CrowdStrike Falcon. For more complex queries and prevent actions, we make use of the query framework.
Integration Type: | EPP/ EDR |
Information read: | Host, User, IP, Vulnerability information |
API Supported: | API V1, V2 |
Input: | Host ID/ Host Name/ IP/ Hash for enrichment |
Output: | Detailed enrichment consisting of host/user/IP/Hash/ Vulnerability information and detections which lead to creation of alerts and observable in CDC |
Customer Configuration
No Customer Configuration
CDC Command Lines
* **get_host_details_by_ioc_cli**
CLI of the CDC to get host details related to a custom IOC. Important point to note : value can either be of type md5, sha256, ipv4 or ipv6.
Option | Type | Description | Required |
---|---|---|---|
value | string | The string representation of the indicator. | True |
* **get_host_details_by_ip_cli**
CLI of the CDC to retrieve the host details connected to a local IP.
Option | Type | Description | Required |
---|---|---|---|
local_ip | string | Parameters to filter host details from CrowdStrike Falcon | True |
* **get_vulnerabilities_detail_cli**
CLI of the CDC to retrieve vulnerability details related to a host.
Option | Type | Description | Required |
---|---|---|---|
host_name | string | Parameters for vulnerability details from CrowdStrike Falcon | True |
* **get_detection_detail_cli**
CLI of the CDC to get detection details of a given detection ID.
Option | Type | Description | Required |
---|---|---|---|
detection_id | string | detection id from CrowdStrike Falcon | True |
* **get_host_detail_cli**
CLI of the CDC to get details on a host, by providing the host ID.
Option | Type | Description | Required |
---|---|---|---|
host_id | string | host id from CrowdStrike Falcon | True |
* **get_process_id_detail_cli**
CLI of the CDC to get process details for a given process ID (PID).
Option | Type | Description | Required |
---|---|---|---|
process_id | string | Process ID from CrowdStrike Falcon | True |
Workflows
* **automate_alert_closing**
closing crowd_strike_falcon alerts
* **get_vulnerabilities**
Get vulnerabilites workflow
* **host_details_by_ioc**
Host details by ioc workflow
* **inject_csf_alert_to_cdc**
converting CrowdStrike Falcon detection into CDC alert
* **investigate_host_by_ip**
Get host details by ip workflow
* **post_get_host_details_by_ioc**
Post get-host-details-by-ioc in the CDC, by the ID of the incident/message/channel.
* **post_get_host_details_by_ip**
Post get-host-details-by-ip in the CDC, by the ID of the incident/message/channel.
* **post_get_vulnerabilities_detail**
Post get-vulnerabilities-detail in the CDC, by the ID of the incident/message/channel.
* **post_get_detection_detail**
Post get-detection-detail in CDC by ID of incident/message/chanel.
* **post_get_host_detail**
Post get-host-detail in CDC by ID of incident/message/chanel.
* **post_get_process_id_detail**
Post get-process-id-detail in CDC by ID of incident/message/chanel.
Rules
* **close_cdc_alert_in_crowd_strike_falcon**
Close Alerts in crowd_strike_falcon
* **cdc_new_alert_from_crowdstrike_falcon**
Triggering inject new alert to CDC workflow when a new alert is created in Crowd Strike
Sensors
* **CrowdStrikeFalconSensor**
Sensor to pull reported detections from CrowdStrike Falcon
Poll interval - 30s
Triggers
No triggers
Known Issues
No issues