CrowdStrike Analytics
After Logpoint ingests your logs, you can:
Use Search Templates to access and view events.
Access and view events through Dashboards.
You can use the following Alert Rules for CrowdStrike:
LP_High Serverity EPP
LP_Host Generating Multiple High Severity EPP Alert
LP_Host Generating Multiple Medium Severity EPP Alert
LP_Medium Severity EPP Alert
Search Templates
Search Templates are GUI-based search queries that use base queries or placeholders filled in at run time. You can add multiple base queries to a search template and use them to run search queries or create dashboard widgets.
CrowdStrike includes 1 out-of-the-box template:
LP_Crowdstrike
Add the CrowdStrike Search Template
Go to Settings >> KnowledgeBase from the navigation bar and click Search Templates.
Select VENDOR SEARCH TEMPLATES from the drop-down and click LP_Crowdstrike.
In Update Parameters:
Select Override widget time range to set a time range.
Select Repos.
Click Update.
After updating, the widgets start populating the results. Logpoint forwards you to Search Template View where you can see the dashboards generated from the search.
CrowdStrike Dashboard
Dashboards give you log source data visualization updated in real-time. Out-of-the-box dashboards included with the integration are termed Vendor Dashboards.
CrowdStrike has 1 out-of-the-box dashboard:
LP_Crowdstrike
This dashboard consists of the following widgets:
Overview
The detected event’s summary with information like Event ID, Category, Source IP, Source Port and Destination IP.
Event Type Distributions
The occurred events summary with information like the date and time of the occurrence, the actual description of the event, the severity of the event and application or process involved.
Detection Update Summary
The detection ID and its status along with assignees information like user, assigned user, source address, assigned to, comment and status.
Top Host Generating Detection
The top 20 hosts that generated the detection of events based on host, log level and event category.
Incident Summary
The summary of an incident based on start and end timestamp, incident duration, state, URL and fine score.
Real Time Response Summary
The real-time response summary based on log timestamp, user, host and command. It allows security administrations to remotely access user systems for administration tasks, remediation actions or forensics collection, without requiring physical access to their system.
Successful User Login Events
The user login events based on user, event category, source address and event timestamp.
Failed User Login Events
The failed login events.
Top 10 Detection by Tactic
The top ten detections associated with each attack category such as execution, command and control and machine learning.
Top 10 Detection by Techniques
The top ten detections associated with attack tag. An attack tag is equivalent to an attack technique like spoofing, used to exploit the vulnerabilities in your system.
Top 10 Detections by Objective
The top ten detections via intent of what an attacker tried to accomplish.
Top 10 Detection by Log Level
The detection of events by log level which can help flag critical issues that need immediate response.
Top 10 Quarantined Files
The top quarantine files from different hosts based on host, file and hash.
Detection Summary
The overall summary of detection based on log timestamp, log level, host, source address, user, attack tag, file, message, IOC type and IOC value.
Host Generating Higher Severity Detection
The vulnerable host generating high or critical severity for the security administrations to prioritize and quickly respond.
Add the CrowdStrike Dashboard
Go to Settings >> KnowledgeBase from the navigation bar and click Dashboards.
Select VENDOR DASHBOARD from the drop-down.
Click the Use icon from Actions.
Click Choose Repos.
Select the repo to store the logs and click Done.
Select the dashboard and click Ok.
You can find the CrowdStrike dashboards under Dashboards.
We do our best to ensure that the content we provide is complete, accurate and up to date. Logpoint makes no representations or warranties of any kind, express or implied about the documentation. We update it on a best-effort basis.
Last updated
Was this helpful?




