- Visualize your CrowdStrike endpoint agents and the devices they protect in the JupiterOne graph.
- Map endpoint agents to devices and devices to the employee who is the owner.
- Monitor changes to CrowdStrike endpoints using JupiterOne alerts.
- JupiterOne periodically fetches CrowdStrike agents and devices to update the graph.
- Write JupiterOne queries to review and monitor updates to the graph.
- Configure alerts to take action when the JupiterOne graph changes.
- JupiterOne requires an API client ID and client secret configured in your CrowdStrike account with the appropriate permissions.
- You must have permission in JupiterOne to install new integrations.
The query used to ingest vulnerabilities limits to the date/time of the last successful integration or to the last 30 days for the initial run. Similarly, only crowdstrike_sensors seen by CrowdStrike in the last 30 days will be ingested.
If you need help with this integration, please contact JupiterOne Support.
CrowdStrike Falcon provides detailed instructions on creating API credentials.
At a minimum, please provide Read access to the following API Scopes:
- Hosts
- Prevention policies
- Zero Trust Assessments
An additional scope is needed for ingesting vulnerabilities (Spotlight Vulnerabilities). Future additions may require other scopes.
- From the top navigation of the J1 Search homepage, select Integrations.
- Scroll to the CrowdStrike integration tile and click it.
- Click the Add Configuration button and configure the following settings:
- Enter the Account Name by which you'd like to identify this CrowdStrike
account in JupiterOne. Ingested entities will have this value stored in
tag.AccountName
when Tag with Account Name is checked. - Enter a Description that will further assist your team when identifying the integration instance.
- Select a Polling Interval that you feel is sufficient for your monitoring
needs. You may leave this as
DISABLED
and manually execute the integration. - Enter the API client ID used to authenticate with the CrowdStrike Falcon and Spotlight APIs.
- Enter the API client secret used to authenticate with the CrowdStrike Falcon and Spotlight APIs.
- Enter the Availability Zone you'd like to use for API calls. Leave blank
to use the main API endpoint. For example, entering
us-2
as the availability zone will result in the use of a CrowdStrike API endpoint ofapi.us-2.crowdstrike.com
- Click Create Configuration once all values are provided.
- From the top navigation of the J1 Search homepage, select Integrations.
- Scroll to the CrowdStrike integration tile and click it.
- Identify and click the integration to delete.
- Click the trash can icon.
- Click the Remove button to delete the integration.
The following entities are created:
Resources | Entity _type |
Entity _class |
---|---|---|
Account | crowdstrike_account |
Account |
Application | crowdstrike_detected_application |
Application |
Device Sensor Agent | crowdstrike_sensor |
HostAgent |
Discover Application | crowdstrike_discover_application |
Application |
Prevention Policy | crowdstrike_prevention_policy |
ControlPolicy |
Service | crowdstrike_endpoint_protection |
Service |
Vulnerability | crowdstrike_vulnerability |
Finding |
Zero Trust Assessment | crowdstrike_zero_trust_assessment |
Assessment |
The following relationships are created:
Source Entity _type |
Relationship _class |
Target Entity _type |
---|---|---|
crowdstrike_account |
HAS | crowdstrike_endpoint_protection |
crowdstrike_account |
HAS | crowdstrike_sensor |
crowdstrike_detected_application |
HAS | crowdstrike_vulnerability |
crowdstrike_prevention_policy |
ENFORCES | crowdstrike_endpoint_protection |
crowdstrike_sensor |
ASSIGNED | crowdstrike_prevention_policy |
crowdstrike_sensor |
HAS | crowdstrike_discover_application |
crowdstrike_sensor |
HAS | crowdstrike_zero_trust_assessment |
crowdstrike_vulnerability |
EXPLOITS | crowdstrike_sensor |
The following mapped relationships are created:
Source Entity _type |
Relationship _class |
Target Entity _type |
Direction |
---|---|---|---|
crowdstrike_vulnerability |
IS | *cve* |
FORWARD |