Skip to content

Commit df51cde

Browse files
[crowdstrike] Add support of Vulnerability Events. (elastic#12973)
- Added vulnerability data stream. - Updated ecs version to 8.17.0. - Updated kibana version to the latest (^8.18.0 || ^9.0.0). - Added support of agentless server. - Added navigation link of vulnerability dashboard in existing dashboard.
1 parent 36e3aee commit df51cde

File tree

63 files changed

+5157
-486
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+5157
-486
lines changed
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
dependencies:
22
ecs:
3-
reference: "git@v8.11.0"
3+
reference: "git@v8.17.0"

packages/crowdstrike/_dev/build/docs/README.md

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@ The [CrowdStrike](https://www.crowdstrike.com/) integration allows you to easily
1212

1313
- `host` dataset: It retrieves all the hosts/devices in your environment providing information such as device metadata, configuration, and status generated by the CrowdStrike Falcon platform, via Falcon Intelligence Host/Device API - `/devices/entities/devices/v2`. It is more focused to provide the management and monitoring information of devices such as login details, status, policies, configuration etc.
1414

15+
- `vulnerability` dataset: It retrieves all the vulnerabilities in your environment, providing information such as severity, status, confidence levels, remediation guidance, and affected hosts, as detected by the CrowdStrike Falcon platform, via the Falcon Spotlight Vulnerability API - `/spotlight/entities/vulnerabilities/v2`.
16+
1517
3. **Falcon Data Replicator**: This Collect events in near real time from your endpoints and cloud workloads, identities and data. CrowdStrike Falcon Data Replicator (FDR) enables you with actionable insights to improve SOC performance. FDR contains near real-time data collected by the Falcon platform's single, lightweight agent. It includes the following datasets for receiving logs:
1618

1719
- `fdr` dataset: consists of logs forwarded using the [Falcon Data Replicator](https://github.com/CrowdStrike/FDR).
@@ -25,6 +27,36 @@ The [CrowdStrike](https://www.crowdstrike.com/) integration allows you to easily
2527
This integration is compatible with CrowdStrike Falcon SIEM-Connector-v2.0, REST API, and CrowdStrike Event Streaming.
2628
For Rest API support, this module has been tested against the **CrowdStrike API Version v1/v2**.
2729

30+
## Requirements
31+
32+
### Agentless Enabled Integration
33+
Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to [Agentless integrations](https://www.elastic.co/guide/en/serverless/current/security-agentless-integrations.html) and the [Agentless integrations FAQ](https://www.elastic.co/guide/en/serverless/current/agentless-integration-troubleshooting.html).
34+
35+
Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.
36+
37+
### Agent Based Installation
38+
- Elastic Agent must be installed
39+
- You can install only one Elastic Agent per host.
40+
- Elastic Agent is required to stream data from the GCP Pub/Sub or REST API and ship the data to Elastic, where the events will then be processed via the integration's ingest pipelines.
41+
42+
#### Installing and managing an Elastic Agent:
43+
44+
You have a few options for installing and managing an Elastic Agent:
45+
46+
#### Install a Fleet-managed Elastic Agent (recommended):
47+
48+
With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.
49+
50+
#### Install Elastic Agent in standalone mode (advanced users):
51+
52+
With this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.
53+
54+
#### Install Elastic Agent in a containerized environment:
55+
56+
You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry and we provide deployment manifests for running on Kubernetes.
57+
58+
There are some minimum requirements for running Elastic Agent and for more information, refer to the link [here](https://www.elastic.co/guide/en/fleet/current/elastic-agent-installation.html).
59+
2860
## Setup
2961
### To collect data from CrowdStrike REST API, the following parameters from your CrowdStrike instance are required:
3062

@@ -38,6 +70,7 @@ For Rest API support, this module has been tested against the **CrowdStrike API
3870
| ------------- | ------------- |
3971
| Alert | read:alert |
4072
| Host | read:host |
73+
| Vulnerability | read:vulnerability |
4174

4275
### To collect data from CrowdStrike Event Stream, the following parameters from your CrowdStrike instance are required:
4376

@@ -234,3 +267,13 @@ This is the `Host` dataset.
234267
{{event "host"}}
235268

236269
{{fields "host"}}
270+
271+
### Vulnerability
272+
273+
This is the `Vulnerability` dataset.
274+
275+
#### Example
276+
277+
{{event "vulnerability"}}
278+
279+
{{fields "vulnerability"}}

packages/crowdstrike/_dev/deploy/docker/docker-compose.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,3 +26,16 @@ services:
2626
- http-server
2727
- --addr=:8090
2828
- --config=/files/config-host.yml
29+
crowdstrike-vulnerability:
30+
image: docker.elastic.co/observability/stream:v0.15.0
31+
hostname: crowdstrike-vulnerability
32+
ports:
33+
- 8090
34+
volumes:
35+
- ./files:/files:ro
36+
environment:
37+
PORT: '8090'
38+
command:
39+
- http-server
40+
- --addr=:8090
41+
- --config=/files/config-vulnerability.yml

0 commit comments

Comments
 (0)