Skip to main content

Integrate Contrast Security ADR with CrowdStrike Falcon® Next-Gen SIEM (Northstar)

The Contrast Security ADR integration with CrowdStrike Falcon Next-Gen SIEM enables ADR to send incident details to your Security Information and Event Management (SIEM), Security Orchestration, Automation and Response (SOAR), and Extended Detection and Response (XDR) environments, contextualizing incidents with other threat detection and response solutions.

How it works

When configured, the Contrast Security ADR sends detected attack events from the Contrast Security platform to your CrowdStrike instance over HTTPs.

The Contrast Security ADR for CrowdStrike application enables CrowdStrike to:

  • Parse and normalize the data received over the HTTPs.

  • Display Contrast Security ADR attack events in CrowdStrike, for consumption in the provided Contrast Security ADR Dashboard in CrowdStrike, or search and correlation in CrowdStrike Cloud SIEM.

Before you begin

Before you start, you must have:

  • CrowdStrike

  • Applications instrumented with a Contrast agent

Set up CrowdStrike log ingestion

Follow the steps outlined in the icon-external-link.svgCrowdStrike documentation.

  • Remember to select Contrast Security Application Detection and Response Data Connector and select Configure.

  • After selecting to generate an API key, copy and safely store the API key and API URL; these will be needed in the next step.

Configure Contrast Security ADR to send events to CrowdStrike

Configure the integration in Northstar to send attack events, observations, and incidents to the CrowdStrike application.

  1. For Northstar, in the left navigation, select Administration > Integrations.

  2. Select the CrowdStrike Falcon option under the Integrations section.

  3. Under the Manage Credentials tab:

    1. Enter the API URL for the destination as well as your authentication token as configured under Set up CrowdStrike log ingestion .

    2. Select the Integration Enabled toggle to enable the integration. This setting allows you to temporarily disable the integration without losing your configuration.

  4. Under the Advanced tab, select from the modes of data to send to the app:

    1. Select All Observations and incidents to send all attack event observations detected by agents, as well as incidents and issues associated with the incident. This is recommended for SOC practices seeking deep visibility into application runtime and are building their custom use cases.

    2. Select Incidents and only incident-related observations to send incidents, associated observations, and issues to Microsoft Sentinel. This is recommended for SOC practices that want to minimize the volume of data sent to their SIEM and only receive alerts for security incidents and related observations.

  5. Select Save.

  6. Continue to Verify successful data ingestion.

Verify successful data ingestion

Important

Search results are not generated until an applicable event occurs. Before verifying successful data ingestion, wait until the data connector status is Active and an event has occurred. Note that if an event timestamp exceeds the retention period, the data is not visible in search.

Refer to the icon-external-link.svg CrowdStrike documentation for more information.

  1. Verify that data is being ingested and appears in Next-Gen SIEM search results.

  2. Confirm that at least one match is generated.

  3. If you need to run a manual search, use this query in Advanced Event Search:

    #Vendor = "contrastsecurity" | #repo = "3pi_contrast_security_adr"

See also