# Crowdstrike

## Why Integrate With Crowdstrike? (Benefits)

Integration with Crowdstrike Falcon is considered a best practice if your organization has endpoints running it. It provides a number of benefits such as:

**It helps by contributing artifacts to Host ID that enhance the accuracy and speed of Host identification.**

* Vectra's Host ID technology automatically identifies hosts in your environment which makes analyst workload easier by allowing them to track Detections to specific hosts rather than just the IP address a Host may be using at any given moment.
* The host details are pulled via API calls made from your Vectra Brain to the various Crowdstrike endpoints.
* For additional information regarding Host ID, please see [Understanding Vectra Detect Host Naming](https://docs.vectra.ai/reference/understanding-vectra-host-naming).

**Analysts can easily see details such as the below provided by Crowdstrike Falcon when examining Host details for a specific Host in the Vectra UI:**

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-bd36b60dce08a242118f299fc4aba610d361e5c3%2F631c89059c2a27350db7c764a0fccf9feb8b86b21bb57c761e1ad4199bc2fad1.jpg?alt=media" alt=""><figcaption></figcaption></figure>

**Analysts can easily jump into their Crowdstrike Falcon console via the links provided (see above example) to further dig into the specific Host.**

* The top link provides a link that drills into the specific **Host Management** view for the Host of interest in your Crowdstrike Falcon console.
* The bottom link provides a link that drills into the specific **Investigate Host** view for the Host of interest in your Crowdstrike Falcon console.

**It enables the "Host Lockdown" feature of Vectra for Hosts running Crowdstrike Falcon.**

* [Host Lockdown](https://docs.vectra.ai/configuration/response/lockdown/host-lockdown-edr) is a feature of Detect that gives users the ability to temporarily disable network Hosts during a security investigation. Host Lockdown is enforced through the use of Crowdstrike Falcon's Host isolation capabilities.
* Host Lockdown can run in an automated or manual mode.
  * In automated mode, action is taken once privilege, threat and certainty score thresholds have been passed.
  * In manual mode, a security analyst can isolate a Host directly from a Detect Host page.

**NEW! It Enables EDR Process AI Stitching**

* **EDR Process Correlation** is Vectra AI's breakthrough capability that automatically identifies which process on an endpoint triggered suspicious network behavior detected by Vectra. This feature eliminates the manual correlation gap between Network Detection and Response (NDR) and Endpoint Detection and Response (EDR) systems, thus exposing root cause instantly.
* **Extended Crowdstrike API Permissions** are required to enable this capability. Read/Write permissions for NGSIEM are required to enable EDR Process Correlation. Additional details are available in the permissions section in this document.  Previously configured API clients can be modified to extend the required permissions without needing to configure new client credentials within an existing Vectra Crowdstrike integration.
* **Temporary Limitation** prevents this feature from operating on multi-tenant Crowdstrike environments. If you see a dropdown or switcher to change between different tenants in the top-right corner of your Falcon console (near your username), then you are multi-tenant.  This limitation will be lifted in Q1 2026.

## Requirements

### Selecting your Crowdstrike Falcon URL:

|                                               |                          |                                                                         |
| --------------------------------------------- | ------------------------ | ----------------------------------------------------------------------- |
| **If you log into CrowdStrike Falcon via...** | **You are using the...** | **Select this URL when setting up your CrowdStrike External Connector** |
| <https://falcon.crowdstrike.com>              | US Commercial Cloud      | api.crowdstrike.com                                                     |
| <https://falcon.us-2.crowdstrike.com>         | US Commercial Cloud 2    | api.us-2.crowdstrike.com                                                |
| <https://falcon.laggar.gcw.crowdstrike.com>   | AWS GovCloud             | api.laggar.gcw\.crowdstrike.com                                         |
| <https://falcon.eu-1.crowdstrike.com>         | EU Cloud                 | api.eu-1.crowdstrike.com                                                |

Later in the [Configuration](#Configuration) section of this article, you will need to choose the proper URL in the Vectra UI.

### Network Communications Requirements (Firewall Rules)

* Traffic from the Brain FQDN or IPs should be permitted over HTTPS 443 to the selected target external connector.
* Vectra integrates with the CrowdStrike Query API.
* See below for additional information from Crowdstrike.
  * <https://falcon.crowdstrike.com/documentation/page/a2a7fc0e/crowdstrike-oauth2-based-apis>

### Obtain Crowdstrike Falcon OAuth2 Credentials:

1. Navigate in your Falcon console to *Support and resources > Resources and tools > API clients and keys*:

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-b9a15c69f50bbdb227dd93afe7a19114e92ed34a%2F1f0dea1276047549b5ac6d045a92a37833cb6186fc29c7dc3d3051040323386f.jpg?alt=media)

2. From the API Clients and Keys screen, click on **Create API client**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-cb4ecc127f6541010c8e1cbe85a46d58bdd4e350%2F0025f48685f1a9ca6534d77f09dc00c8d80e6ac5ad81394edf93c735f4e3ed20.jpg?alt=media)

3. Give the client a name, description (optional), and grant it the following permissions:
   * **Host Read** - Required for CrowdStrike device context that links to CrowdStrike and improves device identification.
   * **Host Write** - Required for manual or automated response actions (Host Lockdown).
   * **NGSIEM Read / NGSIEM Write** - Required for EDR process integration functionality.
     * See the [Permissions](#Permissions) section for more details on the above requirements.
   * Ensure that both Host and NGSIEM permissions are set as shown here before clicking **Create**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-98dde7dae8b0158d19e53dceece523392f534a77%2F471b3ed43dc559e1e0d9ca757a401d4dc85e32329be4ca9773cc7ddc2ff4ba9a.jpg?alt=media)

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-0ffa43157dd6b703b4ee7ebac00b9682ef12fbaf%2F7ffa4e1ce6e72f28fe90004cf8140302e22859df21a9ad2eb96f106c12156f11.jpg?alt=media)

4. **Please record the Client ID and Secret.** You will later input these values into the Vectra External Connector setup dialog.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-daabb94c4c4234ff542654307ce5ecc8d18ffcc4%2Ff2e4627f1f778ec35cbf0585507602988dd57997c6cdc7d60c1597bc8f71f32c.jpg?alt=media)

{% hint style="warning" %}
**Please Note:**

* This is the only time you will be able to view this secret in the Falcon UI.
* You must start over and create a new API client if you do not record the secret at this time.
  {% endhint %}

### What permissions are required in CrowdStrike?

#### Editing API Client Permissions

* Existing API clients can be edited in your Falcon console to change the permissions if desired.
* You do not need to delete or recreate the API client if you still have the secret for input into the Vectra UI.

#### CrowdStrike API Client Permissions

* **Hosts Read** — Required for CrowdStrike device context that links to CrowdStrike and improves device identification.
* **Host Write** — Required for manual or automated response actions.
* **NGSIEM Read / NGSIEM Write** — Required for EDR process integration functionality.

#### NGSIEM Permissions

This is to support the automatic stitching of EDR process data to Vectra detections, exposing root cause processes.

* **Write permissions** are required to POST queries to CrowdStrike NGSIEM. No data is written to NGSIEM.
* **Read permissions** are required to GET the results from NGSIEM.

Benefits of this expanded integration include:

* Stronger NDR through enhanced EDR integration.
* Answers to what process caused an NDR detection.
* Automated investigation and correlation of relevant context.

## How Do I Configure The Integration?

* To enable the integration, simply navigate to *Configuration → SETUP → EDR Integrations* and edit the CrowdStrike settings area:

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-7f698f28132de6636680eba9914c57933234bda6%2Ff86c960d303f30e3992ab20485b9526b7704fdbbb7bfab63a34ff4581fa7f01c.jpg?alt=media)

* Toggle the integration to **On**.
* Select the proper CrowdStrike ULR per the earlier guidance provided in [Requirements](#Requirements).
* Paste the Client ID and Client Secret that you gathered earlier per the guidance provided in [Requirements](#Requirements).
* Choose whether you wish to require verification of the SSL certificate (recommended).
* Proxy support
  * If you have a proxy configured in Configuration → COVERAGE → *Data Sources → Network → Brain Setup → Proxy & Status*, then the **Use the configured proxy in Services** option will be displayed.
  * If you would like API communication from the Vectra Brain to your Crowdstrike URL to use the same proxy settings that Vectra uses for communication to the Vectra Cloud, then check this box.
    * If you do not check this box, the Brain will attempt to communicate to Crowdstrike directly and will NOT use the configured proxy.
* **Save** your configuration.

## How Do I Enable / Configure Lockdown?

### Enabling the Host Lockdown feature

* Host Lockdown can be enabled via *Configuration → RESPONSE → Lockdown → Host Lockdown* for automatic lockdown based on a set of criteria.
* Once configured, lockdown can also be done manually on a Host by navigating to the Host page and selecting the **Lock Host** button in the CrowdStrike widget if you choose to not enable automatic lockdown.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-c42da13d05573a3477861233b4beb0afe712e2b9%2Feeaacc7779eae55730a234797122ca9fce638463879d05df128361b06c6265d3.jpg?alt=media)

* If the **Host Write** permission is not enabled for the Crowdstrike API client, then Host Lockdown will not work.
* For more details about Host Lockdown, please see [Host Lockdown (EDR)](https://docs.vectra.ai/configuration/response/lockdown/host-lockdown-edr).

## Appendix - Additional Related Information

* Some additional KBs that mention Crowdstrike and provide additional detail:
  * [Understanding Vectra Detect Host Naming](https://docs.vectra.ai/reference/understanding-vectra-host-naming)
  * [Optimizing Vectra for use with VPN clients](https://docs.vectra.ai/configuration/coverage/remote-users/optimizing-vectra-for-use-with-vpn-clients)
  * [Vectra Platform Deployment Traffic Recommendations](https://docs.vectra.ai/deployment/traffic-engineering-and-validation/network-traffic-recommendations)
* Landing page for Crowdstrike on Vectra's public website:
  * <https://www.vectra.ai/partners/crowdstrike>
* [Solution Brief](https://content.vectra.ai/hubfs/downloadable-assets/ProductIntegration_Crowdstrike.pdf?_ga=2.141110645.654476414.1675099116-1306132048.1675099116&_gl=1*7zmkd4*_ga*MTMwNjEzMjA0OC4xNjc1MDk5MTE2*_ga_0F9PRG4D5J*MTY3NTEwNjYwOC4yLjEuMTY3NTEwNjc5MC4wLjAuMA)
* EDR Extended ID and Reporting
  * This feature came out in Vectra Detect 6.4
    * Vectra Detect can now identify hosts running security agents based on network traffic behaviors associated with popular endpoint detection and response (EDR) security agents.
    * The Host details page will now display EDR agent information, whenever available, even if the EDR has not been configured as an External Connector.
    * The **What’s on my network?** section of the Executive report has also been expanded to display hosts observed running EDR agents.
  * This ID and Reporting is driven by analyzing network traffic for signs of communication with the various EDR systems that Vectra integrates with.
  * If you see Crowdstrike in Host Details, it could be a result of this feature and NOT the CrowdStrike API level integration that is the main subject of this article.
    * You should make sure the full integration is configured to enjoy all the [#Benefits](#Benefits).
  * A video demo of this feature is available here:

{% embed url="<https://player.vimeo.com/video/504563188>" %}
