Skip to content

Commit fc79481

Browse files
amee-sumojpipkin1JV0812
authored
New doc- CrowdStrike Falcon FileVantage (Apps) (#4849)
* created new doc- Crowdstrike Falcon FileVantage (Apps) * Corrected spelling errors * Fix spelling error * Update docs/integrations/saas-cloud/crowdstrike-falcon-filevantage.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/integrations/saas-cloud/crowdstrike-falcon-filevantage.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/integrations/saas-cloud/crowdstrike-falcon-filevantage.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update crowdstrike-falcon-filevantage.md * Update 2024-12-11-apps.md * Updated the dashboard images * Updated the images * Change release note date to Dec 9 2024 --------- Co-authored-by: John Pipkin <[email protected]> Co-authored-by: Jagadisha V <[email protected]>
1 parent 9df4587 commit fc79481

File tree

6 files changed

+197
-1
lines changed

6 files changed

+197
-1
lines changed

blog-service/2024-12-09-apps.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: CrowdStrike Falcon FileVantage (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- crowdstrike-falcon-filevantage
6+
- apps
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new CrowdStrike Falcon FileVantage app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud CrowdStrike FileVantage source that collects FileVantage logs from the CrowdStrike platform. This app helps you detect unauthorized or high-risk file changes, policy violations, and suspicious activities that may indicate potential threats or compliance breaches. [Learn more](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/).

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2085,6 +2085,7 @@
20852085
"/cid/4019": "/docs/send-data/installed-collectors/sources/script-action",
20862086
"/cid/4412": "/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory",
20872087
"/cid/44122": "/docs/integrations/saas-cloud/crowdstrike-spotlight",
2088+
"/cid/44123": "/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage",
20882089
"/cid/4020": "/docs/search/logreduce",
20892090
"/cid/4021": "/docs/search/search-query-language/search-operators/accum",
20902091
"/cid/40001": "/docs/search/search-query-language/search-operators/as",

docs/integrations/product-list/product-list-a-l.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
168168
| <img src={useBaseUrl('img/integrations/databases/couchbase-logo.png')} alt="Thumbnail icon" width="50"/> | [Couchbase](https://www.couchbase.com/) | Apps:<br/>- [Couchbase](/docs/integrations/databases/couchbase/) <br/>- [Couchbase - OpenTelemetry](/docs/integrations/databases/opentelemetry/couchbase-opentelemetry/) |
169169
| <img src={useBaseUrl('img/integrations/misc/cribl-logo.png')} alt="Thumbnail icon" width="75"/> | [Cribl](https://cribl.io/) | Automation integration: [Cribl](/docs/platform-services/automation-service/app-central/integrations/cribl/) <br/>Partner integration: [Cribl](https://docs.cribl.io/stream/destinations-sumo-logic/) |
170170
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/criminal-ip.png')} alt="Thumbnail icon" width="100"/> | [Criminal IP](https://www.criminalip.io/) | Automation integration: [Criminal IP](/docs/platform-services/automation-service/app-central/integrations/criminal-ip) |
171-
| <img src={useBaseUrl('img/integrations/security-threat-detection/crowdstrike.png')} alt="Thumbnail icon" width="75"/> | [CrowdStrike](https://www.crowdstrike.com/) | Apps: <br/>- [CrowdStrike Falcon Endpoint Protection](/docs/integrations/security-threat-detection/crowdstrike-falcon-endpoint-protection/) <br/>- [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/) <br/>- [CrowdStrike FDR Host Inventory](/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory) <br/>- [CrowdStrike Spotlight](/docs/integrations/saas-cloud/crowdstrike-spotlight) <br/>Automation integrations: <br/>- [CrowdStrike Falcon](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon/) <br/>- [CrowdStrike Falcon Discover](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-discover/) <br/>- [CrowdStrike Falcon Intelligence](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-intelligence/) <br/>- [CrowdStrike Falcon Sandbox](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-sandbox/) <br/>Cloud SIEM integrations: <br/>- [CrowdStrike](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/79ade329-b6d4-43ae-8db1-2a9cc45c0fb0.md) <br/>- [PreemptSecurity](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/15c77a62-0fbb-4a60-9fae-ead49ec423f9.md) <br/>Collectors:<br/>- [CrowdStrike Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-source/) <br/>- [Crowdstrike FDR Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-source/)<br/>- [CrowdStrike FDR Host Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-host-inventory-source/) <br/>- [CrowdStrike FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/)<br/>- [CrowdStrike Spotlight Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-spotlight-source/) |
171+
| <img src={useBaseUrl('img/integrations/security-threat-detection/crowdstrike.png')} alt="Thumbnail icon" width="75"/> | [CrowdStrike](https://www.crowdstrike.com/) | Apps: <br/>- [CrowdStrike Falcon Endpoint Protection](/docs/integrations/security-threat-detection/crowdstrike-falcon-endpoint-protection/) <br/>- [CrowdStrike Falcon FileVantage](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/) <br/>- [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/) <br/>- [CrowdStrike FDR Host Inventory](/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory) <br/>- [CrowdStrike Spotlight](/docs/integrations/saas-cloud/crowdstrike-spotlight) <br/>Automation integrations: <br/>- [CrowdStrike Falcon](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon/) <br/>- [CrowdStrike Falcon Discover](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-discover/) <br/>- [CrowdStrike Falcon Intelligence](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-intelligence/) <br/>- [CrowdStrike Falcon Sandbox](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-sandbox/) <br/>Cloud SIEM integrations: <br/>- [CrowdStrike](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/79ade329-b6d4-43ae-8db1-2a9cc45c0fb0.md) <br/>- [PreemptSecurity](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/15c77a62-0fbb-4a60-9fae-ead49ec423f9.md) <br/>Collectors:<br/>- [CrowdStrike Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-source/) <br/>- [Crowdstrike FDR Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-source/)<br/>- [CrowdStrike FDR Host Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-host-inventory-source/) <br/>- [CrowdStrike FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/)<br/>- [CrowdStrike Spotlight Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-spotlight-source/) |
172172
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/cuckoo.png')} alt="Thumbnail icon" width="75"/> | [Cuckoo](https://cuckoo.readthedocs.io/en/latest/#) | Automation integration: [Cuckoo](/docs/platform-services/automation-service/app-central/integrations/cuckoo/) |
173173
| <img src={useBaseUrl('img/send-data/cyberark.png')} alt="Thumbnail icon" width="50"/> | [CyberArk](https://www.cyberark.com/) | Automation integrations: <br/>- [CyberArk AAM](/docs/platform-services/automation-service/app-central/integrations/cyberark-aam/) <br/>- [CyberArk PAM](/docs/platform-services/automation-service/app-central/integrations/cyberark-pam) <br/>Cloud SIEM integration: [CyberArk](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/8a3d333e-ffad-49ed-9edd-0cf1c797b24f.md) <br/>Collector: [CyberArk EPM Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-source/) |
174174
| <img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/cyberint.png')} alt="cyberint" width="75"/> | [CyberInt](https://cyberint.com/) | Automation integration: [Cyberint](/docs/platform-services/automation-service/app-central/integrations/cyberint) |
Lines changed: 174 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,174 @@
1+
---
2+
id: crowdstrike-falcon-filevantage
3+
title: CrowdStrike Falcon FileVantage
4+
sidebar_label: CrowdStrike Falcon FileVantage
5+
description: Analyze CrowdStrike Falcon FileVantage data to identify unauthorized file changes, policy violations, and unusual activity indicating potential threats or compliance breaches.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/integrations/security-threat-detection/crowdstrike.png')} alt="thumbnail icon" width="85"/>
11+
12+
The Sumo Logic app for CrowdStrike Falcon FileVantage enables security analysts to monitor and analyze file integrity across your environment. Leveraging the CrowdStrike Falcon FileVantage data helps detect unauthorized or high-risk file changes, policy violations, and suspicious activity that may indicate potential threats or compliance breaches.
13+
14+
Key features of the CrowdStrike Falcon FileVantage app include:
15+
16+
- **File integrity monitoring**. Obtain a comprehensive overview of file changes, organized by severity and type, including write, delete, rename, and permission changes. Additionally, you can gain insights into file changes based on the operating system version and view detailed information, such as rule violations and suppressed changes.
17+
- **Host based monitoring**. Monitor the hosts, users, and processes involved in the file modifications to identify anomalies.
18+
- **Policy violation detection**. Identify high-risk file activities and policy violations, focusing on severity, suspicious file creations, and deletions. Analyzing trends over time helps detect spikes in malicious activity.
19+
20+
Use cases for the CrowdStrike Falcon FileVantage app include:
21+
22+
- **Security monitoring**. Detect unauthorized or unusual file activities in real time, such as critical file deletions or configuration changes.
23+
- **Compliance**: Monitor adherence to file integrity policies and flag violations that might impact compliance with regulatory requirements.
24+
- **Threat investigation**. Investigate suspicious file modifications to uncover potential breaches or insider threats.
25+
- **Host Activity Analysis**. Analyze file changes at the host level to identify risky behaviors or compromised endpoints.
26+
27+
The Sumo Logic app for CrowdStrike Falcon FileVantage is an essential tool for security teams. It provides the visibility and intelligence needed to detect and respond to file-related threats, ensuring data integrity, and compliance across the organization.
28+
29+
:::info
30+
This app includes [built-in monitors](#crowdstrike-falcon-filevantage-monitors). For details on creating custom monitors, refer to the [Create monitors for CrowdStrike Falcon FileVantage app](#create-monitors-for-crowdstrike-falcon-filevantage-app).
31+
:::
32+
33+
## Log types
34+
35+
This app uses Sumo Logic’s [CrowdStrike FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/) to collect the FileVantage logs from CrowdStrike platform.
36+
37+
### Sample log message
38+
39+
<details>
40+
<summary>Event Log</summary>
41+
42+
```json
43+
{
44+
"id": "d456mnopq4567rstuvwx8901yzab5678fghij",
45+
"cid": "e567rstuvwx8901yzab5678fghijklmopqrs",
46+
"aid": "f678yzab5678fghijklmnoqrstuvwxyza345",
47+
"platform_name": "Windows",
48+
"ingestion_timestamp": "2024-11-27T10:05:50Z",
49+
"entity_type": "FOLDER",
50+
"entity_path": "D:\\Projects\\NewProject\\",
51+
"is_from_different_mount_namespace": false,
52+
"action_type": "CREATE",
53+
"action_timestamp": "2024-11-27T10:05:50Z",
54+
"severity": "HIGH",
55+
"process_id": "3344556677889",
56+
"process_image_file_name": "D:\\Tools\\project_tool.exe",
57+
"user_id": "1100",
58+
"user_name": "projectadmin",
59+
"command_line": "project_tool.exe --new D:\\Projects\\NewProject\\",
60+
"diff": {},
61+
"host": {
62+
"name": "devserver01.example.com",
63+
"os_version": "Windows 10",
64+
"local_ip": "192.168.5.50",
65+
"external_ip": "198.51.100.14",
66+
"agent_version": "8.29.17000.0",
67+
"containment_status": "normal",
68+
"groups": [
69+
{
70+
"name": "Development"
71+
}
72+
]
73+
},
74+
"policy": {
75+
"name": "Project Folder Policy",
76+
"rule_group": {
77+
"name": "Project Folder Monitoring",
78+
"rule": {
79+
"base_path": "D:\\Projects\\"
80+
}
81+
}
82+
},
83+
"is_suppressed": true,
84+
"real_user_id": "1100",
85+
"parent_process_image_file_name": "explorer.exe",
86+
"grandparent_process_image_file_name": "cmd.exe",
87+
"tags": [
88+
{
89+
"name": "NewProject"
90+
}
91+
],
92+
"prevalence": {
93+
"key": "14:14:FOLDER:CREATE:D:\\Projects\\NewProject\\::project_tool.exe:projectadmin",
94+
"current": "RARE",
95+
"reported": "RARE",
96+
"computed_timestamp": "2024-11-27T10:06:50Z"
97+
}
98+
}
99+
```
100+
</details>
101+
102+
### Sample queries
103+
104+
```sql title="File Changes"
105+
_sourceCategory="Labs/CrowdStrikeFalconFileVantage" entity_type file
106+
| json "id", "is_suppressed", "severity", "entity_type", "action_type", "host.os_version", "platform_name", "host.name", "user_name", "policy.rule_group.name", "policy.rule_group.rule.base_path", "process_id", "process_image_file_name", "host.external_ip", "action_timestamp", "entity_path", "policy.name" as id, is_suppressed, severity, entity_type, action_type, os_version, platform_name, host_name, user_name, rule_group_name, rule_base_path, process_id, process_image_file_name, ip, action_timestamp, entity_path, policy_name nodrop
107+
108+
| where action_type matches "{{action_type}}" and entity_type matches"{{entity_type}}" and entity_path matches"{{entity_path}}" and host_name matches"{{host_name}}" and user_name matches"{{user_name}}"and os_version matches"{{os_version}}" and rule_group_name matches"{{rule_group_name}}" and policy_name matches"{{policy_name}}" and severity matches"{{severity}}"
109+
110+
| where toLowerCase(entity_type) matches "*file*"
111+
| count by id, action_type
112+
| count as frequency by action_type
113+
| sort by frequency, action_type
114+
```
115+
116+
## Set up collection
117+
118+
Follow the instructions provided to set up [Cloud-to-Cloud Integration for CrowdStrike Falcon FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your CrowdStrike Falcon FileVantage app is properly integrated and configured to collect and analyze your CrowdStrike Falcon FileVantage data.
119+
120+
## Installing the CrowdStrike Falcon FileVantage app
121+
122+
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
123+
124+
<AppInstall2/>
125+
126+
## Viewing CrowdStrike Falcon FileVantage dashboards
127+
128+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
129+
130+
<ViewDashboards/>
131+
132+
### Overview
133+
134+
The **CrowdStrike Falcon FileVantage - Overview** dashboard provides a comprehensive overview of file and directory activity, helping security analysts monitor file integrity, and identify potential risks. It provides a total count of the file changes, categorizing them by severity: **Critical**, **High**, **Medium**, and **Low**, to prioritize investigations. Suppressed changes, which are ignored due to predefined policies are also highlighted.
135+
136+
Key metrics include file change types (**WRITE**, **RENAME**, **READ** **PERMISSION**, **OTHERS**, and/or **DELETE**), displayed in an easy-to-read pie chart for quick analysis. The dashboard tracks changes by operating system, identifies top hosts and users making changes, and highlights threats or anomalies.
137+
138+
The dashboard also shows the monitoring rules that triggered the most changes, assisting in policy refinement. A detailed table of recent file activities, including timestamps, hostnames, file paths, severities, and associated policies, is provided. Overall, the dashboard strengthens the detection and response to unauthorized or suspicious file activities. <br/> <img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Crowdstrike+Falcon+FileVantage/CrowdStrike+Falcon+FileVantage+-+Overview.png')} alt="CrowdStrike Falcon FileVantage Overview" style={{border: '1px solid gray'}} width="800" />
139+
140+
### Security
141+
142+
The **CrowdStrike Falcon FileVantage - Security** dashboard is tailored for security analysts to monitor high-risk file actions and potential policy violations. It categorizes file activities based on severity (**CRITICAL**, **HIGH**, **LOW**, and **MEDIUM**) and action types, such as file creation, deletion, renaming, and attribute changes. This categorization helps analysts prioritize their responses to significant security events.
143+
144+
The dashboard tracks high-risk actions over time, enabling security teams to identify patterns or spikes in suspicious activity. There is also a dedicated section for policy violations, which lists instances where file changes conflict with configured security policies. This section includes details such as affected files, associated rules, and timestamps.
145+
146+
Additionally, security analysts can review file deletions with specific details, including file paths, user names, and originating countries. The severity trends are visually represented, providing a clear overview of security incidents over time and helping teams identify escalation points.
147+
148+
While the dashboard provides placeholders for tracking malicious file changes and directory changes, data in these sections requires specific configuration based on the environment. Finally, the **Host-Based Change Monitoring** table offers detailed insights into the hosts and host groups involved in file changes, assisting in pinpointing areas that need further investigation. Overall, this dashboard is a vital tool for ensuring file integrity and effectively mitigating risks. <br/> <img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Crowdstrike+Falcon+FileVantage/CrowdStrike+Falcon+FileVantage+-+Security.png')} alt="CrowdStrike Falcon FileVantage Security" style={{border: '1px solid gray'}} width="800" />
149+
150+
## Create monitors for CrowdStrike Falcon FileVantage app
151+
152+
import CreateMonitors from '../../reuse/apps/create-monitors.md';
153+
154+
<CreateMonitors/>
155+
156+
### CrowdStrike Falcon FileVantage monitors
157+
158+
| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
159+
|:--|:--|:--|:--|
160+
| `CrowdStrike Falcon FileVantage - Changes from Embargoed Geo Locations` | This alert identifies file activity originating from locations considered restricted or embargoed by the organization. It helps detect potentially unauthorized access or data exfiltration attempts from high-risk geographic areas. | Critical | Count > 0 |
161+
| `CrowdStrike Falcon FileVantage - Suppressed Changes` | This alert captures file changes that have been intentionally excluded or suppressed due to pre-defined policies or filters. It provides visibility into the suppressed events for auditing or validation purposes. | Critical | Count > 0|
162+
| `CrowdStrike Falcon FileVantage - Critical Changes` | This alert tracks high-severity file modifications, deletions, or access attempts flagged as critical by CrowdStrike Falcon FileVantage. These changes could indicate potential security incidents, such as unauthorized access or malicious activity. | Critical | Count > 0|
163+
164+
## Upgrade/Downgrade the CrowdStrike Falcon FileVantage app (Optional)
165+
166+
import AppUpdate from '../../reuse/apps/app-update.md';
167+
168+
<AppUpdate/>
169+
170+
## Uninstalling the CrowdStrike Falcon FileVantage app (Optional)
171+
172+
import AppUninstall from '../../reuse/apps/app-uninstall.md';
173+
174+
<AppUninstall/>

0 commit comments

Comments
 (0)