CrowdStrike External Alerts
Generates a detection alert for each CrowdStrike alert written to the configured indices. Enabling this rule allows you to immediately begin investigating CrowdStrike alerts in the app.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2025/07/31"
3integration = ["crowdstrike"]
4maturity = "production"
5promotion = true
6min_stack_version = "8.18.0"
7min_stack_comments = "Introduced support for CrowdStrike alert promotion"
8updated_date = "2025/09/02"
9
10[rule]
11author = ["Elastic"]
12description = """
13Generates a detection alert for each CrowdStrike alert written to the configured indices. Enabling this rule allows you
14to immediately begin investigating CrowdStrike alerts in the app.
15"""
16from = "now-2m"
17index = ["logs-crowdstrike.alert-*"]
18interval = "1m"
19language = "kuery"
20license = "Elastic License v2"
21max_signals = 1000
22name = "CrowdStrike External Alerts"
23note = """## Triage and analysis
24
25### Investigating CrowdStrike External Alerts
26
27CrowdStrike Falcon is a cloud-native endpoint protection platform that delivers real-time threat detection and response capabilities. The rule captures security alerts generated by Falcon and enables analysts to investigate threats rapidly based on behavioral indicators and threat intelligence.
28
29### Possible investigation steps
30
31- Review the associated process, file path, and command line to determine whether the activity is legitimate or suspicious.
32- Investigate the user account and host involved in the alert to validate whether the activity was authorized.
33- Cross-reference the alert with CrowdStrike Falcon console for additional context, including process tree, behavioral tags, and threat intelligence matches.
34- Check for any related alerts from the same host, user, or file hash to identify whether this is part of a larger attack chain.
35- Consult the Crowdstrike investigation guide and resources tagged in the alert for specific guidance on handling similar threats.
36
37### False positive analysis
38
39- Alerts involving known and trusted software tools (e.g., remote administration tools) may be false positives. Confirm intent before excluding.
40- Security assessments or penetration testing activities might mimic real threats. Validate the activity with responsible teams.
41- Scheduled jobs, IT scripts, or automation tools may trigger alerts if they behave similarly to malicious code.
42- Review alerts based on detection confidence levels and behavioral scoring to filter out low-confidence or known-benign triggers.
43
44### Response and remediation
45
46- Isolate affected endpoints to prevent lateral movement if malicious behavior is confirmed.
47- Quarantine any identified malicious files and block related hashes or domains.
48- Investigate how the threat entered the environment and close any exploited vulnerabilities.
49- Reset credentials for compromised user accounts or escalate to incident response.
50- Review CrowdStrike Falcon policies and detections to fine-tune future alerting and response coverage.
51- Document the findings and update detection logic or exceptions accordingly.
52"""
53references = ["https://docs.elastic.co/en/integrations/crowdstrike"]
54risk_score = 47
55rule_id = "aeebe561-c338-4118-9924-8cb4e478aa58"
56rule_name_override = "crowdstrike.alert.name"
57setup = """## Setup
58
59### CrowdStrike Alert Integration
60This rule is designed to capture alert events generated by the CrowdStrike integration and promote them as Elastic detection alerts.
61
62To capture CrowdStrike alerts, install and configure the CrowdStrike integration to ingest alert events into the `logs-crowdstrike.alert-*` index pattern.
63
64If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same CrowdStrike events. Consider adding a rule exception for the External Alert rule to exclude data_stream.dataset:crowdstrike.alert to avoid receiving duplicate alerts.
65
66### Additional notes
67
68For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
69"""
70severity = "medium"
71tags = ["Data Source: Crowdstrike", "Use Case: Threat Detection", "Resources: Investigation Guide", "Promotion: External Alerts"]
72timestamp_override = "event.ingested"
73type = "query"
74
75query = '''
76event.kind: alert and data_stream.dataset: crowdstrike.alert
77'''
78
79[[rule.risk_score_mapping]]
80field = "crowdstrike.alert.incident.score"
81operator = "equals"
82value = ""
83
84[[rule.severity_mapping]]
85field = "event.severity"
86operator = "equals"
87severity = "low"
88value = "21"
89
90[[rule.severity_mapping]]
91field = "event.severity"
92operator = "equals"
93severity = "medium"
94value = "47"
95
96[[rule.severity_mapping]]
97field = "event.severity"
98operator = "equals"
99severity = "high"
100value = "73"
101
102[[rule.severity_mapping]]
103field = "event.severity"
104operator = "equals"
105severity = "critical"
106value = "99"
Triage and analysis
Investigating CrowdStrike External Alerts
CrowdStrike Falcon is a cloud-native endpoint protection platform that delivers real-time threat detection and response capabilities. The rule captures security alerts generated by Falcon and enables analysts to investigate threats rapidly based on behavioral indicators and threat intelligence.
Possible investigation steps
- Review the associated process, file path, and command line to determine whether the activity is legitimate or suspicious.
- Investigate the user account and host involved in the alert to validate whether the activity was authorized.
- Cross-reference the alert with CrowdStrike Falcon console for additional context, including process tree, behavioral tags, and threat intelligence matches.
- Check for any related alerts from the same host, user, or file hash to identify whether this is part of a larger attack chain.
- Consult the Crowdstrike investigation guide and resources tagged in the alert for specific guidance on handling similar threats.
False positive analysis
- Alerts involving known and trusted software tools (e.g., remote administration tools) may be false positives. Confirm intent before excluding.
- Security assessments or penetration testing activities might mimic real threats. Validate the activity with responsible teams.
- Scheduled jobs, IT scripts, or automation tools may trigger alerts if they behave similarly to malicious code.
- Review alerts based on detection confidence levels and behavioral scoring to filter out low-confidence or known-benign triggers.
Response and remediation
- Isolate affected endpoints to prevent lateral movement if malicious behavior is confirmed.
- Quarantine any identified malicious files and block related hashes or domains.
- Investigate how the threat entered the environment and close any exploited vulnerabilities.
- Reset credentials for compromised user accounts or escalate to incident response.
- Review CrowdStrike Falcon policies and detections to fine-tune future alerting and response coverage.
- Document the findings and update detection logic or exceptions accordingly.
References
Related rules
- System File Ownership Change
- Execution via local SxS Shared Module
- Remote Desktop File Opened from Suspicious Path
- Suspicious Process Execution via Renamed PsExec Executable
- Suspicious Windows Command Shell Arguments