Community
Questions Library
Docs
Blog
Events
Swag
Github
Slack
JupiterOne
Discussions
Release Notes
Contact Us
CrowdStrike - AskJ1 Community
<main> <article class="userContent"> <h2 data-id="crowdstrike-jupiterone-integration-benefits">CrowdStrike + JupiterOne Integration Benefits</h2> <ul><li><p>Visualize your CrowdStrike endpoint agents and the devices they protect in the<br> JupiterOne graph.</p></li> <li><p>Map endpoint agents to devices and devices to the employee who is the owner.</p></li> <li>Monitor changes to CrowdStrike endpoints using JupiterOne alerts.</li> </ul><h2 data-id="how-it-works">How it Works</h2> <ul><li><p>JupiterOne periodically fetches CrowdStrike agents and devices to update the<br> graph.</p></li> <li><p>Write JupiterOne queries to review and monitor updates to the graph.</p></li> <li>Configure alerts to take action when the JupiterOne graph changes.</li> </ul><h2 data-id="requirements">Requirements</h2> <ul><li><p>JupiterOne requires an API client ID and client secret configured in your<br> CrowdStrike account with the appropriate permissions.</p></li> <li><p>You must have permission in JupiterOne to install new integrations.</p></li> </ul><h2 data-id="support">Support</h2> <p>The query used to ingest vulnerabilities limits to the date/time of the last<br> successful integration or to the last 30 days for the initial run. Similarly,<br> only crowdstrike_sensors seen by CrowdStrike in the last 30 days will be<br> ingested.</p> <p>If you need help with this integration, please contact<br><a rel="nofollow" href="https://support.jupiterone.io">JupiterOne Support</a>.</p> <h2 data-id="integration-walkthrough">Integration Walkthrough</h2> <h3 data-id="in-crowdstrike">In CrowdStrike</h3> <p>CrowdStrike Falcon provides <a rel="nofollow" href="https://www.crowdstrike.com/blog/tech-center/get-access-falcon-apis/">detailed instructions on creating API<br> credentials</a>.</p> <p>At a minimum, please provide Read access to the following API Scopes:</p> <ul><li>Hosts</li> <li>Prevention policies</li> </ul><p>An additional scope is needed for ingesting vulnerabilities (Spotlight<br> Vulnerabilities). Future additions may require other scopes.</p> <h3 data-id="in-jupiterone">In JupiterOne</h3> <ol><li>From the top navigation of the J1 Search homepage, select <strong>Integrations</strong>.</li> <li>Scroll to the <strong>CrowdStrike</strong> integration tile and click it.</li> <li>Click the <strong>Add Configuration</strong> button and configure the following settings:</li> </ol><ul><li><p>Enter the <strong>Account Name</strong> by which you'd like to identify this CrowdStrike<br> account in JupiterOne. Ingested entities will have this value stored in<br><code class="code codeInline" spellcheck="false" tabindex="0">tag.AccountName</code> when <strong>Tag with Account Name</strong> is checked.</p></li> <li><p>Enter a <strong>Description</strong> that will further assist your team when identifying<br> the integration instance.</p></li> <li><p>Select a <strong>Polling Interval</strong> that you feel is sufficient for your monitoring<br> needs. You may leave this as <code class="code codeInline" spellcheck="false" tabindex="0">DISABLED</code> and manually execute the integration.</p></li> <li><p>Enter the <strong>API client ID</strong> used to authenticate with the CrowdStrike<br><em><strong>Falcon</strong></em> and <em><strong>Spotlight</strong></em> APIs.</p></li> <li><p>Enter the <strong>API client secret</strong> used to authenticate with the CrowdStrike<br><em><strong>Falcon</strong></em> and <em><strong>Spotlight</strong></em> APIs.</p></li> <li><p>Enter the <strong>Availability Zone</strong> you'd like to use for API calls. Leave blank<br> to use the main API endpoint. For example, entering <code class="code codeInline" spellcheck="false" tabindex="0">us-2</code> as the availability<br> zone will result in the use of a CrowdStrike API endpoint of<br><code class="code codeInline" spellcheck="false" tabindex="0">api.us-2.crowdstrike.com</code></p></li> </ul><ol start="4"><li>Click <strong>Create Configuration</strong> once all values are provided.</li> </ol><h2 data-id="how-to-uninstall">How to Uninstall</h2> <ol><li>From the top navigation of the J1 Search homepage, select <strong>Integrations</strong>.</li> <li>Scroll to the <strong>CrowdStrike</strong> integration tile and click it.</li> <li>Identify and click the <strong>integration to delete</strong>.</li> <li>Click the <strong>trash can</strong> icon.</li> <li>Click the <strong>Remove</strong> button to delete the integration.</li> </ol><p><br></p> <h2 data-id="data-model">Data Model</h2> <h3 data-id="entities">Entities</h3> <p>The following entities are created:</p> <table><thead><tr><th>Resources</th> <th>Entity <code class="code codeInline" spellcheck="false" tabindex="0">_type</code></th> <th>Entity <code class="code codeInline" spellcheck="false" tabindex="0">_class</code></th> </tr></thead><tbody><tr><td>Account</td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_account</code></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">Account</code></td> </tr><tr><td>Application</td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_detected_application</code></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">Application</code></td> </tr><tr><td>Device Sensor Agent</td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_sensor</code></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">HostAgent</code></td> </tr><tr><td>Prevention Policy</td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_prevention_policy</code></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">ControlPolicy</code></td> </tr><tr><td>Service</td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_endpoint_protection</code></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">Service</code></td> </tr><tr><td>Vulnerability</td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_vulnerability</code></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">Finding</code></td> </tr></tbody></table><h3 data-id="relationships">Relationships</h3> <p>The following relationships are created:</p> <table><thead><tr><th>Source Entity <code class="code codeInline" spellcheck="false" tabindex="0">_type</code></th> <th>Relationship <code class="code codeInline" spellcheck="false" tabindex="0">_class</code></th> <th>Target Entity <code class="code codeInline" spellcheck="false" tabindex="0">_type</code></th> </tr></thead><tbody><tr><td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_account</code></td> <td><strong>HAS</strong></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_endpoint_protection</code></td> </tr><tr><td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_account</code></td> <td><strong>HAS</strong></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_sensor</code></td> </tr><tr><td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_detected_application</code></td> <td><strong>HAS</strong></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_vulnerability</code></td> </tr><tr><td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_prevention_policy</code></td> <td><strong>ENFORCES</strong></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_endpoint_protection</code></td> </tr><tr><td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_sensor</code></td> <td><strong>ASSIGNED</strong></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_prevention_policy</code></td> </tr><tr><td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_vulnerability</code></td> <td><strong>EXPLOITS</strong></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">crowdstrike_sensor</code></td> </tr></tbody></table><p><br></p> </article> </main>