Skip to content

CrowdStrike ​

Manage hosts, detections, incidents, and threat intelligence via CrowdStrike Falcon.

DetailValue
CategorySecurity
Base URLhttps://api.crowdstrike.com
AuthenticationOAuth2 Client Credentials
Endpoints5
Connector keycrowdstrike

Using CrowdStrike in a workflow ​

  1. Go to Connections and click New Connection.
  2. Pick CrowdStrike from the marketplace.
  3. Enter your credentials (see Authentication above for what's expected).
  4. In a workflow, drop an API Call node and select this connection.
  5. Pick the operation you need from the Operation dropdown — see the table below.

Available Endpoints ​

EndpointSummary
GET /devices/queries/devices/v1Search for hosts
GET /detects/queries/detects/v1Search detections
GET /incidents/queries/incidents/v1Search incidents
GET /intel/queries/actors/v1Search threat actors
GET /policy/queries/prevention/v1Search prevention policies

Each endpoint has its own page with parameter details, an example API Call node configuration, and the response shape.