CloudStrike (Next-Gen SIEM)
Prerequisites
CrowdStrike tenant with access to Falcon LogScale (or Next‑Gen SIEM).
Permission to create Ingest Tokens on a target Repository.
Network egress from Teleskope to your CrowdStrike ingest URL.
1) Create a LogScale Ingest Token & find your ingest URL
In the CrowdStrike Falcon console, open LogScale → choose your Repository (or create one dedicated to Teleskope alerts).
Go to Settings → Ingest Tokens → Create Token.
(Optional) Attach a parser to this token if you want custom field mapping.
Copy:
Ingest URL (examples:
https://cloud.us.humio.com
,https://cloud.eu.humio.com
)Ingest Token (bearer token)
Endpoints:
Structured JSON:
POST /api/v1/ingest/humio-structured
2) Add the CrowdStrike destination in Teleskope
Policy Maker → Integrations → CrowdStrike
Provide:
Base URL: your LogScale URL (e.g.,
https://cloud.us.humio.com
)Bearer token: the Ingest Token from step 1
If your Teleskope environment doesn’t show a CrowdStrike destination yet, reach out to Teleskope support.
3) Create a policy
Policy Maker → Create/Edit Policy
Define your conditions as usual.
Step 4 – Actions: choose Send to CrowdStrike.
It is recommended to add CrowdStrike notifications after a policy has been created and the initial violations populated. A ticket is created per violation, so ensure that policies are sufficiently scoped.
Last updated
Was this helpful?