Configure CrowdStrike Falcon Endpoint for Arctic Wolf monitoring
You can configure CrowdStrike Falcon® endpoint to send the necessary logs to Arctic Wolf® for security monitoring.
These resources are required:
- A Falcon Administrator role for the CrowdStrike Falcon environment that you want Arctic Wolf to monitor.
- A CrowdStrike Falcon Enterprise license.
For more information about pricing, see CrowdStrike pricing.
After configuring Arctic Wolf monitoring of your CrowdStrike Falcon environment, you can configure CrowdStrike Falcon to contain possibly compromised hosts. For more information, see Configure CrowdStrike Falcon for Arctic Wolf Active Response.
Create the API client
Provide CrowdStrike Falcon credentials to Arctic Wolf
Time-based events are polled with a delay to make sure that data is available. For new deployments, Arctic Wolf begins polling and reviewing activity from approximately one hour prior to configuration success. If API credentials fail, for example due to expired credentials, Arctic Wolf notifies you and requests a new set of credentials. After receiving refreshed credentials, Arctic Wolf can only retrieve data from the previous 12 hours. Provide refreshed credentials within 12 hours of expiry to enable complete data polling and coverage.