CrowdStrike Integration
CrowdStrike offers product like Falcon that extends industry’s most powerful real-time detection and automated response across the security stack.
Last updated
CrowdStrike offers product like Falcon that extends industry’s most powerful real-time detection and automated response across the security stack.
Last updated
(c) 2011 - 2024 ilert GmbH
Go to Alert sources --> Alert sources and click on Create new alert source
Search for CrowdStrike in the search field, click on the CrowdStrike tile and click on Next.
Give your alert source a name, optionally assign teams and click Next.
Select an escalation policy by creating a new one or assigning an existing one.
Select you Alert grouping preference and click Continue setup. You may click Do not group alerts for now and change it later.
The next page show additional settings such as customer alert templates or notification prioritiy. Click on Finish setup for now.
On the final page, an API key and / or webhook URL will be generated that you will need later in this guide.
Go to Workflows Dashboard by clicking the "CrowdStrike" logo on top left and choose Workflows
Click on Create a Workflow on top right, on the workflow workspace add a trigger, and choose "New Detection" additionally you can also add Condition, in this case we chose greater than Medium severity
On creating Action choose Action type Notification and Call webhook as Action, you might need to configure it from store if you haven't done so. Go ahead and click the Store link, and click "Configure" on the Webhook.
Add the Name in this case we name it as ilert-incident and put the Webhook URL that we got from ilert's dashboard earlier.
Click Save Configuration, and it should be added to the Workflow workspace.
Choose the Webhook name based on the name that we set earlier, and choose ALL Data to include
Save the configuration and turn the workflow on, and upon Detection creation, the incident will be created on ilert.