The Vulcan integration with CrowdStrike has multiple capabilities that can be configured in the connector.

  • Use Crowdstrike Falcon asset inventory in Vulcan.

  • Manage vulnerability remediation from CrowdStrike Spotlight using Vulcan.

  • Take remediation actions from Vulcan using real-time response.


This guide covers:

Configure the connector

In the CrowdStrike Falcon platform create API client:
Note: Only Falcon Administrator role can view, create, or modify API clients or keys.

  1. Sign in to the Falcon console

  2. Go to Support > API Clients and Keys

  3. Click Add new API client

  4. Enter a descriptive Client name that identifies your API client in Falcon and in API action logs.

  5. (Optional) Enter a Description, such as your API client's intended purpose

  6. Check the following permissions:

    • Hosts - Read

    • Hosts Groups - Read


    • Spotlight vulnerabilities: Read

    • Real-time response (admin): Write

    • Real-time response: Read, Write

    *Note: If optional permissions are not configured, CrowdStrike spotlight vulnerability information and real-time response insights will not be visible in the Vulcan platform.

  7. Click Add to create the API Key

  8. Copy the API Client ID and Secret into a safe please to use in the next step.

In Vulcan:

  1. Go to Connectors < Add a new connector > CrowdStrike.

  2. Set the API URL / Region, Client ID and Client Secret as retrieved above.

  3. Check the "Spotlight" option if relevant.

  4. Check the "Real Time Response" option if relevant.

  5. Click "Test Connectivity". If successful, click Create.

  6. Wait until the Connector finishes processing. Once completed, you can start reviewing the data in the Vulcan Platform.

CrowdStrike as an Asset Inventory

Vulcan's CrowdStrike connector will pull all the assets that are managed by CrowdStrike and display them as hosts. The asset will automatically correlate with asset inventory tools such as Service Now or cloud providers.

Additional Asset information can be found on each asset in the Asset Details tab.

CrowdStrike as a VM tool

See all vulnerabilities under the vulnerabilities tab. You can filter by vulnerability source = CrowdStrike

Each vulnerability has CVE, Score, Solution from CrowdStrike. The Vulcan platform adds a risk score calculated by the Vulcan platform.

Each vulnerability can be fetched with "Vulnerable", "Fixed" or "Ignored" (Risk_Acknowledged) status from the connector. Vulnerabilities with the Ignored status will appear under the Ignored tab on the vulnerabilities page.

Each vulnerability is enriched with threat intelligence provided by Vulcan.

Note that CrowdStrike threat intelligence is not available at this time.

Vulnerability description from NVD

CrowdStrike - Real-Time Response (RTR)

• Take action -> CrowdStrike

Each workaround can be modified with different actions and values.
Once the workaround is selected - we automatically trigger a CrowdStrike script that applies the chosen workaround (PowerShell based).

• After the action will be taken, you will see the open campaign under the campaigns tab.

By orchestrating the entire remediation process from start to finish and providing advanced analytics Vulcan helps your team drive remediation outcomes, ensuring vulnerabilities aren’t just found, they’re fixed.


  • For fetching hosts data, we use in the query_url:


  • For fetching vulnerabilities data, we use in the query_url:


Re-generate Access Token

CrowdStrike requires its users to regenerate the access token every 3 months. It can be done easily from the CS interface using the following steps:

  1. Log in to your CrowdStrike Falcon account.

  2. Click on the CS icon in the upper left corner.

  3. Go to Support >> API Clients and Keys

  4. Choose the Account ID configured in Vulcan.

  5. Click on the account ID >> Reset secret.

  6. After a new secret is generated, copy it and paste it to the "Client Secret" field in Vulcan.

  7. Click OK and you're ready to go.

Did this answer your question?