Skip to main content

CrowdStrike Falcon FileVantage

thumbnail icon

The Sumo Logic app for CrowdStrike Falcon FileVantage enables security analysts to monitor and analyze file integrity across your environment. Leveraging the CrowdStrike Falcon FileVantage data helps detect unauthorized or high-risk file changes, policy violations, and suspicious activity that may indicate potential threats or compliance breaches.

Key features of the CrowdStrike Falcon FileVantage app include:

  • File integrity monitoring. Obtain a comprehensive overview of file changes, organized by severity and type, including write, delete, rename, and permission changes. Additionally, you can gain insights into file changes based on the operating system version and view detailed information, such as rule violations and suppressed changes.
  • Host based monitoring. Monitor the hosts, users, and processes involved in the file modifications to identify anomalies.
  • Policy violation detection. Identify high-risk file activities and policy violations, focusing on severity, suspicious file creations, and deletions. Analyzing trends over time helps detect spikes in malicious activity.

Use cases for the CrowdStrike Falcon FileVantage app include:

  • Security monitoring. Detect unauthorized or unusual file activities in real time, such as critical file deletions or configuration changes.
  • Compliance: Monitor adherence to file integrity policies and flag violations that might impact compliance with regulatory requirements.
  • Threat investigation. Investigate suspicious file modifications to uncover potential breaches or insider threats.
  • Host Activity Analysis. Analyze file changes at the host level to identify risky behaviors or compromised endpoints.

The Sumo Logic app for CrowdStrike Falcon FileVantage is an essential tool for security teams. It provides the visibility and intelligence needed to detect and respond to file-related threats, ensuring data integrity, and compliance across the organization.

info

This app includes built-in monitors. For details on creating custom monitors, refer to the Create monitors for CrowdStrike Falcon FileVantage app.

Log types​

This app uses Sumo Logic’s CrowdStrike FileVantage Source to collect the FileVantage logs from CrowdStrike platform.

Sample log message​

Event Log
{
"id": "d456mnopq4567rstuvwx8901yzab5678fghij",
"cid": "e567rstuvwx8901yzab5678fghijklmopqrs",
"aid": "f678yzab5678fghijklmnoqrstuvwxyza345",
"platform_name": "Windows",
"ingestion_timestamp": "2024-11-27T10:05:50Z",
"entity_type": "FOLDER",
"entity_path": "D:\\Projects\\NewProject\\",
"is_from_different_mount_namespace": false,
"action_type": "CREATE",
"action_timestamp": "2024-11-27T10:05:50Z",
"severity": "HIGH",
"process_id": "3344556677889",
"process_image_file_name": "D:\\Tools\\project_tool.exe",
"user_id": "1100",
"user_name": "projectadmin",
"command_line": "project_tool.exe --new D:\\Projects\\NewProject\\",
"diff": {},
"host": {
"name": "devserver01.example.com",
"os_version": "Windows 10",
"local_ip": "192.168.5.50",
"external_ip": "198.51.100.14",
"agent_version": "8.29.17000.0",
"containment_status": "normal",
"groups": [
{
"name": "Development"
}
]
},
"policy": {
"name": "Project Folder Policy",
"rule_group": {
"name": "Project Folder Monitoring",
"rule": {
"base_path": "D:\\Projects\\"
}
}
},
"is_suppressed": true,
"real_user_id": "1100",
"parent_process_image_file_name": "explorer.exe",
"grandparent_process_image_file_name": "cmd.exe",
"tags": [
{
"name": "NewProject"
}
],
"prevalence": {
"key": "14:14:FOLDER:CREATE:D:\\Projects\\NewProject\\::project_tool.exe:projectadmin",
"current": "RARE",
"reported": "RARE",
"computed_timestamp": "2024-11-27T10:06:50Z"
}
}

Sample queries​

File Changes
_sourceCategory="Labs/CrowdStrikeFalconFileVantage" entity_type file
| json "id", "is_suppressed", "severity", "entity_type", "action_type", "host.os_version", "platform_name", "host.name", "user_name", "policy.rule_group.name", "policy.rule_group.rule.base_path", "process_id", "process_image_file_name", "host.external_ip", "action_timestamp", "entity_path", "policy.name" as id, is_suppressed, severity, entity_type, action_type, os_version, platform_name, host_name, user_name, rule_group_name, rule_base_path, process_id, process_image_file_name, ip, action_timestamp, entity_path, policy_name nodrop

| where action_type matches "{{action_type}}" and entity_type matches"{{entity_type}}" and entity_path matches"{{entity_path}}" and host_name matches"{{host_name}}" and user_name matches"{{user_name}}"and os_version matches"{{os_version}}" and rule_group_name matches"{{rule_group_name}}" and policy_name matches"{{policy_name}}" and severity matches"{{severity}}"

| where toLowerCase(entity_type) matches "*file*"
| count by id, action_type
| count as frequency by action_type
| sort by frequency, action_type

Set up collection​

Follow the instructions provided to set up Cloud-to-Cloud Integration for CrowdStrike Falcon FileVantage Source to create the source and use the same source category while installing the app. By following these steps, you can ensure that your CrowdStrike Falcon FileVantage app is properly integrated and configured to collect and analyze your CrowdStrike Falcon FileVantage data.

Installing the CrowdStrike Falcon FileVantage app​

To install the app, do the following:

  1. Select App Catalog.
  2. In the πŸ”Ž Search Apps field, run a search for your desired app, then select it.
  3. Click Install App.
    note

    Sometimes this button says Add Integration.

  4. Click Next in the Setup Data section.
  5. In the Configure section of your respective app, complete the following fields.
    1. Key. Select either of these options for the data source.
      • Choose Source Category and select a source category from the list for Default Value.
      • Choose Custom, and enter a custom metadata field. Insert its value in Default Value.
  6. Click Next. You will be redirected to the Preview & Done section.

Post-installation

Once your app is installed, it will appear in your Installed Apps folder, and dashboard panels will start to fill automatically.

Each panel slowly fills with data matching the time range query and received since the panel was created. Results will not immediately be available, but will update with full graphs and charts over time.

Viewing CrowdStrike Falcon FileVantage dashboards​

All dashboards have a set of filters that you can apply to the entire dashboard. Use these filters to drill down and examine the data to a granular level.

  • You can change the time range for a dashboard or panel by selecting a predefined interval from a drop-down list, choosing a recently used time range, or specifying custom dates and times. Learn more.
  • You can use template variables to drill down and examine the data on a granular level. For more information, see Filtering Dashboards with Template Variables.
  • Most Next-Gen apps allow you to provide the scope at the installation time and are comprised of a key (_sourceCategory by default) and a default value for this key. Based on your input, the app dashboards will be parameterized with a dashboard variable, allowing you to change the dataset queried by all panels. This eliminates the need to create multiple copies of the same dashboard with different queries.

Overview​

The CrowdStrike Falcon FileVantage - Overview dashboard provides a comprehensive overview of file and directory activity, helping security analysts monitor file integrity, and identify potential risks. It provides a total count of the file changes, categorizing them by severity: Critical, High, Medium, and Low, to prioritize investigations. Suppressed changes, which are ignored due to predefined policies are also highlighted.

Key metrics include file change types (WRITE, RENAME, READ PERMISSION, OTHERS, and/or DELETE), displayed in an easy-to-read pie chart for quick analysis. The dashboard tracks changes by operating system, identifies top hosts and users making changes, and highlights threats or anomalies.

The dashboard also shows the monitoring rules that triggered the most changes, assisting in policy refinement. A detailed table of recent file activities, including timestamps, hostnames, file paths, severities, and associated policies, is provided. Overall, the dashboard strengthens the detection and response to unauthorized or suspicious file activities.
CrowdStrike Falcon FileVantage Overview

Security​

The CrowdStrike Falcon FileVantage - Security dashboard is tailored for security analysts to monitor high-risk file actions and potential policy violations. It categorizes file activities based on severity (CRITICAL, HIGH, LOW, and MEDIUM) and action types, such as file creation, deletion, renaming, and attribute changes. This categorization helps analysts prioritize their responses to significant security events.

The dashboard tracks high-risk actions over time, enabling security teams to identify patterns or spikes in suspicious activity. There is also a dedicated section for policy violations, which lists instances where file changes conflict with configured security policies. This section includes details such as affected files, associated rules, and timestamps.

Additionally, security analysts can review file deletions with specific details, including file paths, user names, and originating countries. The severity trends are visually represented, providing a clear overview of security incidents over time and helping teams identify escalation points.

While the dashboard provides placeholders for tracking malicious file changes and directory changes, data in these sections requires specific configuration based on the environment. Finally, the Host-Based Change Monitoring table offers detailed insights into the hosts and host groups involved in file changes, assisting in pinpointing areas that need further investigation. Overall, this dashboard is a vital tool for ensuring file integrity and effectively mitigating risks.
CrowdStrike Falcon FileVantage Security

Create monitors for CrowdStrike Falcon FileVantage app​

From your App Catalog:

  1. From the Sumo Logic navigation, select App Catalog.
  2. In the Search Apps field, search for and then select your app.
  3. Make sure the app is installed.
  4. Navigate to What's Included tab and scroll down to the Monitors section.
  5. Click Create next to the pre-configured monitors. In the create monitors window, adjust the trigger conditions and notifications settings based on your requirements.
  6. Scroll down to Monitor Details.
  7. Under Location click on New Folder.
    note

    By default, monitor will be saved in the root folder. So to make the maintenance easier, create a new folder in the location of your choice.

  8. Enter Folder Name. Folder Description is optional.
    tip

    Using app version in the folder name will be helpful to determine the versioning for future updates.

  9. Click Create. Once the folder is created, click on Save.

CrowdStrike Falcon FileVantage monitors​

NameDescriptionTrigger Type (Critical / Warning / MissingData)Alert Condition
CrowdStrike Falcon FileVantage - Changes from Embargoed Geo LocationsThis alert identifies file activity originating from locations considered restricted or embargoed by the organization. It helps detect potentially unauthorized access or data exfiltration attempts from high-risk geographic areas.CriticalCount > 0
CrowdStrike Falcon FileVantage - Suppressed ChangesThis alert captures file changes that have been intentionally excluded or suppressed due to pre-defined policies or filters. It provides visibility into the suppressed events for auditing or validation purposes.CriticalCount > 0
CrowdStrike Falcon FileVantage - Critical ChangesThis alert tracks high-severity file modifications, deletions, or access attempts flagged as critical by CrowdStrike Falcon FileVantage. These changes could indicate potential security incidents, such as unauthorized access or malicious activity.CriticalCount > 0

Upgrade/Downgrade the CrowdStrike Falcon FileVantage app (Optional)​

To update the app, do the following:

  1. Select App Catalog.
  2. In the Search Apps field, search for and then select your app.
    Optionally, you can identify apps that can be upgraded in the Upgrade available section.
  3. To upgrade the app, select Upgrade from the Manage dropdown.
    1. If the upgrade does not have any configuration or property changes, you will be redirected to the Preview & Done section.
    2. If the upgrade has any configuration or property changes, you will be redirected to Setup Data page.
      1. In the Configure section of your respective app, complete the following fields.
        • Key. Select either of these options for the data source.
          • Choose Source Category and select a source category from the list for Default Value.
          • Choose Custom and enter a custom metadata field. Insert its value in Default Value.
      2. Click Next. You will be redirected to the Preview & Done section.

Post-update

Your upgraded app will be installed in the Installed Apps folder, and dashboard panels will start to fill automatically.

note

See our Release Notes changelog for new updates in the app.

To revert the app to a previous version, do the following:

  1. Select App Catalog.
  2. In the Search Apps field, search for and then select your app.
  3. To version down the app, select Revert to < previous version of your app > from the Manage dropdown.

Uninstalling the CrowdStrike Falcon FileVantage app (Optional)​

To uninstall the app, do the following:

  1. Select App Catalog.
  2. In the πŸ”Ž Search Apps field, run a search for your desired app, then select it.
  3. Click Uninstall.
Status
Legal
Privacy Statement
Terms of Use

Copyright Β© 2024 by Sumo Logic, Inc.