CrowdStrike Falcon Integration
Integrate Noxys with CrowdStrike Falcon to correlate AI interaction events with endpoint detection and response data.
Overview
This integration enables:
- AI platform visibility within CrowdStrike Falcon
- Event correlation between AI and endpoint activities
- Custom detection rules for AI-related threats
- Automated response playbooks for policy violations
- Risk scoring combining AI and endpoint data
Data Flow:
AI Interaction → Noxys API → CrowdStrike API → Falcon Console → Incidents & Detection
Prerequisites
- CrowdStrike Falcon with API access
- CrowdStrike admin credentials
- Noxys admin role
- OAuth 2.0 API credentials (API keys)
Step 1: Create CrowdStrike API Credentials
Register Noxys in CrowdStrike to enable API access.
- CrowdStrike Falcon Console → Integrations → API Clients & Keys
- Click Create New API Client
- Configure:
- Client name:
Noxys AI Firewall - Description: "Integration for AI interaction data"
- Client name:
- Assign API Scopes:
- ✓
incidents_write— Create and update incidents - ✓
ioc_write— Create IOCs (Indicators of Compromise) - ✓
detection_write— Create custom detections - ✓
host_read— Read host information
- ✓
- Click Create
- Copy Client ID and Client Secret (shown once)
Step 2: Enable in Noxys
Configure CrowdStrike API integration in Noxys.
- Noxys Admin Panel → Integrations → CrowdStrike Falcon
- Click Enable Integration
- Configure:
| Field | Value |
|---|---|
| Client ID | From step 1 |
| Client Secret | From step 1 |
| Region | US1, US2, EU1, etc. (match your Falcon region) |
- Click Test Connection
- Should show: "✓ Successfully connected to CrowdStrike Falcon"
- Click Save
Step 3: Configure Event Forwarding
Select events to forward to CrowdStrike.
- Settings → Event Forwarding
- Enable:
- ✓
interaction.policy_violated— Policy violations - ✓
interaction.high_risk— High-risk interactions - ✓
alert.severity_critical— Critical alerts
- ✓
- Click Save
Step 4: Create IOC Indicators
Define Indicators of Compromise for AI threats.
- CrowdStrike Falcon → Intelligence → Indicators
- Create indicator for suspicious platforms:
Value: perplexity
Type: Domain
Source: Noxys
Severity: High
Action: Block
Description: Unvetted AI platform with sensitive data exposure
- Repeat for risky platforms:
deepseekgrokclaude.ai(if unapproved)
Step 5: Create Custom Detection Rules
Build detection rules based on Noxys events.
Rule 1: Blocked PII on Unauthorized Platform
- CrowdStrike Falcon → Host Assurance → Custom Detections
- Click Create Detection Rule
- Configure:
Trigger:
event_type == "interaction.policy_violated"
AND platform_id IN ["perplexity", "deepseek", "grok"]
AND classification_count > 0
AND action == "block"
Severity: High
Name: "Blocked sensitive data on unauthorized AI platform"
Response:
- Create incident
- Send alert to SOC
- Enable
Rule 2: High Volume of Violations from User
event_type == "interaction.policy_violated"
| stats count by user_id
| where count > 10 in last 1 hour
→ Severity: Medium
→ Create incident for user
Rule 3: Credit Card / Financial Data Exposure
event_type == "interaction.high_risk"
AND classification_type IN ["CREDIT_CARD", "IBAN", "SSN"]
AND risk_score > 0.8
→ Severity: Critical
→ Auto-isolate host (if configured)
Step 6: Create Incidents
Noxys automatically creates incidents in CrowdStrike.
- CrowdStrike Falcon → Incidents
- Filter by Source: Noxys
- See incidents like:
- "Policy violation: Block PII on ChatGPT"
- "High-risk interaction: Restricted data detected"
Each incident contains:
- Detection time: When policy was triggered
- Severity: Based on risk score and action
- User: Who triggered the interaction
- Platform: Which AI service
- Classification: PII types detected
- Host: Device running the interaction
Step 7: Create Response Actions
Set up automated response playbooks.
- CrowdStrike Falcon → Response actions
- Create playbook for high-risk violations:
Trigger: Incident severity = Critical
Actions:
-
Isolate host (optional)
-
Create ticket in IT ticketing system
-
Send alert to security team
-
Block process on endpoint (if unsafe to continue)
-
Enable playbook
Step 8: Monitor Incidents
Track Noxys-related incidents in Falcon.
- Incidents dashboard
- Create saved search:
- Source: Noxys
- Severity: High, Critical
- Monitor daily for trends
- Review incidents for:
- Repeated offenders
- Vulnerable platforms
- Data exposure patterns
Advanced: Behavioral Analytics
Enable CrowdStrike Falcon's behavioral analytics for AI threat detection.
- Falcon → Settings → Detection & prevention
- Enable:
- ✓ Machine learning detection
- ✓ Behavioral analytics
- Let Falcon correlate:
- AI interaction patterns
- Endpoint process execution
- Network activity
- Falcon automatically creates high-fidelity alerts
Troubleshooting
Events Not Creating Incidents
- Verify integration is Enabled
- Settings → Integrations → CrowdStrike
- Check event forwarding is configured
- Settings → Event Forwarding
- Verify API credentials are correct
- Test Connection button should work
- Check CrowdStrike scopes allow incident creation
- Verify
incidents_writescope is granted
- Verify
- Review CrowdStrike API logs:
- Falcon → Integrations → API activity
Incidents Not Detected
- Verify custom detection rules are Enabled
- Test rule with manual test incident
- Check rule logic:
- Run query in Falcon to verify syntax
- Test with sample event
- Verify rule severity threshold is appropriate
High Latency
- Check API rate limits:
- CrowdStrike may throttle requests
- Implement exponential backoff in Noxys
- Optimize event volume:
- Only forward critical events
- Filter out noisy events
Integration with Response Playbooks
CrowdStrike Response playbooks can use Noxys data.
Example Playbook: Credential Exposure Response
Trigger: Noxys event with classification=EMAIL or SSN
Playbook Steps:
1. Check if user has MFA enabled
2. Force password reset
3. Clear sessions
4. Send notification to user
5. Create ticket for security team
6. Monitor user for 24 hours
- CrowdStrike Falcon → Response → Playbooks
- Create playbook using Noxys event data
- Automate response workflow
Compliance & Audit
Monitor integration health:
- CrowdStrike Falcon → Integrations → Activity
- Review:
- API call success rate
- Errors encountered
- Data volume
- Export logs for compliance audit
Cost Considerations
- CrowdStrike Falcon: License required (typically $50-200/device/year)
- Noxys CrowdStrike integration: Included, no additional cost
- API calls: Included in Falcon subscription (fair use limits apply)
Best Practices
-
Forward only critical events:
- Focus on
policy_violatedandhigh_risk - Skip routine
interaction.createdevents
- Focus on
-
Create targeted detection rules:
- One rule per threat type
- Test with historical data first
- Monitor for false positives
-
Use incident categorization:
- Tag incidents by platform (ChatGPT, Claude, etc.)
- Tag by data type (PII, financial, etc.)
- Simplifies filtering and reporting
-
Set up alerting:
- Alert on critical incidents immediately
- Daily summary of high-severity incidents
- Weekly trends report
-
Monitor playbook effectiveness:
- Track manual vs. automated responses
- Measure MTTR (Mean Time To Respond)
- Optimize playbooks based on metrics
Disabling Integration
If you need to disable CrowdStrike integration:
- Integrations → CrowdStrike Falcon → Disable
- No more incidents are created
- Existing incidents remain in CrowdStrike
- Data is not deleted
To re-enable:
- Follow configuration steps again
- Verify API credentials are still valid
- Events resume flowing to CrowdStrike
Support & Resources
- CrowdStrike API Docs: https://developer.crowdstrike.com/
- Falcon Query Language: https://falcon.crowdstrike.com/documentation/page/55b06bf9-b8d8-4ba7-b1c4-fc0e2d83c39a/doc/en/cs/falcon-query-language
- Noxys Support: support@noxys.eu
- CrowdStrike Support: Check your Falcon console for support options
Related Integrations
- Microsoft Defender — Microsoft EDR
- HarfangLab — European EDR
- Webhooks API — Custom webhook configuration