heroui logo

Crowdstrike Detection Passthrough

Panther Rules

View Source
Summary
The "Crowdstrike Detection Passthrough" detection rule is designed to monitor and respond to detected malicious activity on hosts running the Crowdstrike Falcon platform. This rule invokes detection events that indicate potentially harmful behaviors exhibited by processes on these hosts, particularly concerning low severity findings categorized under Adware/PUP. It leverages data from two log types: Crowdstrike Detection Summary and Crowdstrike FDREvent, which provide insights into various suspicious activity across endpoints. The rule enables incident response teams to efficiently act upon alerts by directing them to the Falcon console for further investigation and remediation according to the established incident response (IR) process. Key parameters of this rule include severity levels tagged as medium, with a deduplication period of 60 minutes to prevent alert fatigue in cases of repeated detections. The rule's construction emphasizes critical process behavior scrutiny, providing attributes useful for guiding investigations while conforming with best practices for proactive threat detection.
Categories
  • Endpoint
  • Windows
  • macOS
  • Cloud
Data Sources
  • User Account
  • Sensor Health
  • Logon Session
  • Process
Created: 2022-09-02