You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We're excited to introduce the new Crowdstrike Falcon FileVantage app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Crowdstrike FileVantage source that collects FileVantage logs from CrowdStrike. It enables the detection of unauthorized or high-risk file changes, policy violations, and suspicious activities that may indicate potential threats or compliance breaches. [Learn more](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/).
14
+
We're excited to introduce the new CrowdStrike Falcon FileVantage app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud CrowdStrike FileVantage source that collects FileVantage logs from CrowdStrike. It enables the detection of unauthorized or high-risk file changes, policy violations, and suspicious activities that may indicate potential threats or compliance breaches. [Learn more](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/).
Copy file name to clipboardExpand all lines: docs/integrations/saas-cloud/crowdstrike-falcon-filevantage.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
id: crowdstrike-falcon-filevantage
3
-
title: Crowdstrike Falcon FileVantage
4
-
sidebar_label: Crowdstrike Falcon FileVantage
3
+
title: CrowdStrike Falcon FileVantage
4
+
sidebar_label: CrowdStrike Falcon FileVantage
5
5
description: Analyze CrowdStrike Falcon FileVantage data to identify unauthorized file changes, policy violations, and unusual activity indicating potential threats or compliance breaches.
6
6
---
7
7
@@ -24,10 +24,10 @@ Use cases for the CrowdStrike Falcon FileVantage app include:
24
24
-**Threat investigation**. Investigate suspicious file modifications to uncover potential breaches or insider threats.
25
25
-**Host Activity Analysis**. Analyze file changes at the host level to identify risky behaviors or compromised endpoints.
26
26
27
-
The Sumo Logic app for Crowdstrike Falcon FileVantage is an essential tool for security teams. It provides the visibility and intelligence needed to detect and respond to file-related threats, ensuring data integrity and compliance across the organization.
27
+
The Sumo Logic app for CrowdStrike Falcon FileVantage is an essential tool for security teams. It provides the visibility and intelligence needed to detect and respond to file-related threats, ensuring data integrity and compliance across the organization.
28
28
29
29
:::info
30
-
This app includes [built-in monitors](#crowdstrike-fdr-host-inventory-alerts). For details on creating custom monitors, refer to [Create monitors for CrowdStrike FDR Host Inventory app](#create-monitors-for-crowdstrike-fdr-host-inventory-app).
30
+
This app includes [built-in monitors](#crowdstrike-falcon-filevantage-monitors). For details on creating custom monitors, refer to [Create monitors for CrowdStrike Falcon FileVantage app](#create-monitors-for-crowdstrike-falcon-filevantage-app).
Follow the instructions provided to set up [Cloud-to-Cloud Integration for Crowdstrike Falcon FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Crowdstrike Falcon FileVantage app is properly integrated and configured to collect and analyze your Crowdstrike Falcon FileVantage data.
118
+
Follow the instructions provided to set up [Cloud-to-Cloud Integration for CrowdStrike Falcon FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your CrowdStrike Falcon FileVantage app is properly integrated and configured to collect and analyze your CrowdStrike Falcon FileVantage data.
119
119
120
-
## Installing the Crowdstrike Falcon FileVantage app
120
+
## Installing the CrowdStrike Falcon FileVantage app
121
121
122
122
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
129
129
130
130
<ViewDashboards/>
131
131
132
132
### Overview
133
133
134
-
The **Crowdstrike Falcon FileVantage - Overview** dashboard provides a comprehensive overview of file and directory activity, helping security analysts monitor file integrity and identify potential risks. It provides a total count of the file changes, categorizing them by severity—**Critical**, **High**, **Medium**, and **Low**—to prioritize investigations. Suppressed changes, which are ignored due to predefined policies, are also highlighted.
134
+
The **CrowdStrike Falcon FileVantage - Overview** dashboard provides a comprehensive overview of file and directory activity, helping security analysts monitor file integrity and identify potential risks. It provides a total count of the file changes, categorizing them by severity—**Critical**, **High**, **Medium**, and **Low**—to prioritize investigations. Suppressed changes, which are ignored due to predefined policies, are also highlighted.
135
135
136
136
Key metrics include file change types (**WRITE**, **RENAME**, **READ****PERMISSION**, **OTHERS**, **DELETE**), displayed in an easy-to-read pie chart for quick analysis. The dashboard tracks changes by operating system, identifies top hosts and users making changes, and highlights threats or anomalies.
137
137
138
-
The dashboard also shows the monitoring rules that triggered the most changes, assisting in policy refinement. A detailed table of recent file activities, including timestamps, hostnames, file paths, severities, and associated policies, is provided. Overall, the dashboard strengthens the detection and response to unauthorized or suspicious file activities. <br/> <img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Crowdstrike+Falcon+FileVantage/Crowdstrike+Falcon+FileVantage+dashboard.png')} alt="Crowdstrike Falcon FileVantage Overview" />
138
+
The dashboard also shows the monitoring rules that triggered the most changes, assisting in policy refinement. A detailed table of recent file activities, including timestamps, hostnames, file paths, severities, and associated policies, is provided. Overall, the dashboard strengthens the detection and response to unauthorized or suspicious file activities. <br/> <img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Crowdstrike+Falcon+FileVantage/Crowdstrike+Falcon+FileVantage+dashboard.png')} alt="CrowdStrike Falcon FileVantage Overview" />
139
139
140
140
141
141
### Security
@@ -146,29 +146,29 @@ The dashboard tracks high-risk actions over time, enabling security teams to ide
146
146
147
147
Additionally, security analysts can review file deletions with specific details, including file paths, user names, and originating countries. The severity trends are visually represented, providing a clear overview of security incidents over time and helping teams identify escalation points.
148
148
149
-
While the dashboard provides placeholders for tracking malicious file changes and directory changes, data in these sections requires specific configuration based on the environment. Finally, the **Host-Based Change Monitoring** table offers detailed insights into the hosts and host groups involved in file changes, assisting in pinpointing areas that need further investigation. Overall, this dashboard is a vital tool for ensuring file integrity and effectively mitigating risks. <br/> <img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Crowdstrike+Falcon+FileVantage/Crowdstrike+Falcon+FileVantage+Security.png')} alt="Crowdstrike Falcon FileVantage Security" />
149
+
While the dashboard provides placeholders for tracking malicious file changes and directory changes, data in these sections requires specific configuration based on the environment. Finally, the **Host-Based Change Monitoring** table offers detailed insights into the hosts and host groups involved in file changes, assisting in pinpointing areas that need further investigation. Overall, this dashboard is a vital tool for ensuring file integrity and effectively mitigating risks. <br/> <img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Crowdstrike+Falcon+FileVantage/Crowdstrike+Falcon+FileVantage+Security.png')} alt="CrowdStrike Falcon FileVantage Security" />
150
150
151
-
## Create monitors for Crowdstrike Falcon FileVantage app
151
+
## Create monitors for CrowdStrike Falcon FileVantage app
152
152
153
153
import CreateMonitors from '../../reuse/apps/create-monitors.md';
154
154
155
155
<CreateMonitors/>
156
156
157
-
### Crowdstrike Falcon FileVantage monitors
157
+
### CrowdStrike Falcon FileVantage monitors
158
158
159
159
| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
160
160
|:--|:--|:--|:--|
161
-
|`Crowdstrike Falcon FileVantage - Changes from Embargoed Geo Locations`| This alert identifies file activity originating from locations considered restricted or embargoed by the organization. It helps detect potentially unauthorized access or data exfiltration attempts from high-risk geographic areas. | Critical | Count > 0 |
162
-
|`Crowdstrike Falcon FileVantage - Suppressed Changes`| This alert captures file changes that have been intentionally excluded or suppressed due to pre-defined policies or filters. It provides visibility into the suppressed events for auditing or validation purposes. | Critical | Count > 0|
163
-
|`Crowdstrike Falcon FileVantage - Critical Changes`| This alert tracks high-severity file modifications, deletions, or access attempts flagged as critical by CrowdStrike Falcon FileVantage. These changes could indicate potential security incidents, such as unauthorized access or malicious activity. | Critical | Count > 0|
161
+
|`CrowdStrike Falcon FileVantage - Changes from Embargoed Geo Locations`| This alert identifies file activity originating from locations considered restricted or embargoed by the organization. It helps detect potentially unauthorized access or data exfiltration attempts from high-risk geographic areas. | Critical | Count > 0 |
162
+
|`CrowdStrike Falcon FileVantage - Suppressed Changes`| This alert captures file changes that have been intentionally excluded or suppressed due to pre-defined policies or filters. It provides visibility into the suppressed events for auditing or validation purposes. | Critical | Count > 0|
163
+
|`CrowdStrike Falcon FileVantage - Critical Changes`| This alert tracks high-severity file modifications, deletions, or access attempts flagged as critical by CrowdStrike Falcon FileVantage. These changes could indicate potential security incidents, such as unauthorized access or malicious activity. | Critical | Count > 0|
164
164
165
-
## Upgrade/Downgrade the Crowdstrike Falcon FileVantage app (Optional)
165
+
## Upgrade/Downgrade the CrowdStrike Falcon FileVantage app (Optional)
166
166
167
167
import AppUpdate from '../../reuse/apps/app-update.md';
168
168
169
169
<AppUpdate/>
170
170
171
-
## Uninstalling the Crowdstrike Falcon FileVantage app (Optional)
171
+
## Uninstalling the CrowdStrike Falcon FileVantage app (Optional)
172
172
173
173
import AppUninstall from '../../reuse/apps/app-uninstall.md';
0 commit comments