Skip to main content
Version: 2.14.0

Crowdstrike Falcon Endpoint Security (EDR)

Free integration setupWe’ll install and validate this for you.
Book a setup call

Support Statement

DISCLAIMER

This documentation is provided "as is" without support for 3rd party software. The level of support for this integration guide is best effort without any SLA on response time. No 3rd party product support can be provided by Superna directly. 3rd party components require support contracts. See EULA for more details.


Overview

Superna Data Security Edition integrates with CrowdStrike Falcon Endpoint Security to deliver automated, coordinated response across the storage and endpoint layers. When Superna detects malicious activity at the data layer it automatically triggers CrowdStrike Falcon to contain the offending host before the attack can spread.

For ransomware detection, all required indicators are preconfigured by Superna and do not need to be recreated in the EDR. Each payload contains the necessary details for the SecOps team to assess the event, conduct investigations, and trigger automated containment via CrowdStrike Falcon APIs.

See the CrowdStrike integration landing page.


Demo Video


Features and Solution Overview

This integration provides the following capabilities:

  • Automated host containment — Superna's storage-layer detection triggers CrowdStrike Falcon to network-isolate the compromised host without manual intervention.
  • Lower MTTR and reduced blast radius — compromised hosts are cut off fast, limiting lateral movement and data loss.
  • Prevents additional host infection reducing the impact of the cyber incident.
  • Rich incident context — each webhook payload includes the actor username, client IP addresses, affected SMB shares, file paths, severity, and detection state so the SOC can immediately assess scope.
  • Works with your SOC toolchain — built on Superna's Zero Trust API and webhooks; compatible with Fusion SOAR for further orchestration.

Customer Workflow Benefits

  • Correlate Superna's storage-layer detections with other security systems
  • Reduce mean time to remediate (MTTR) through automated incident creation

Limitations

  • Requires CrowdStrike Falcon Prevent or Falcon Insight (EDR/NGAV) subscription with API access enabled.
  • The integration runs as a service on the Superna (Eyeglass) VM and requires direct outbound HTTPS connectivity from the VM to CrowdStrike API endpoints. HTTP/HTTPS proxy routing is not supported.
  • Host containment matches on client IP address from the Superna event payload; accuracy depends on correct IP-to-host mapping in Falcon.
  • Upgrade and rollback functionality is not available.

About CrowdStrike Falcon

CrowdStrike Falcon is a cloud-native endpoint protection platform (EPP) that combines next-generation antivirus (NGAV), endpoint detection and response (EDR), threat intelligence, and managed hunting. Falcon uses a lightweight agent and AI-powered detection to stop breaches on Windows, macOS, and Linux hosts, with unified visibility and response managed from the Falcon console.


Prerequisites

Before beginning, ensure the following requirements are met:

Superna Requirements

  • Superna Data Security Edition - version 2.13.0 or later is recommended for built-in webhook test button
  • Active Superna license with Zero Trust / Data Security features enabled.
  • Superna (Eyeglass) VM running Linux with systemd
  • Minimum 1 GB free disk space on the Eyeglass VM.
  • Root (sudo) access to the Eyeglass VM.

CrowdStrike Requirements

  • CrowdStrike Falcon Prevent or Falcon Insight subscription.
  • API Client credentials (Client ID and Client Secret) with the following scopes:
    • Hosts: Read and Write (required for host containment and release)
    • Detections: Read (optional, for enrichment)
  • Know your CrowdStrike API Base URL (e.g., https://api.us-2.crowdstrike.com or https://api.eu-1.crowdstrike.com).

Network Connectivity

  • The Superna VM must have outbound HTTPS (port 443) access to your CrowdStrike API endpoint (api.crowdstrike.com or regional equivalent).
  • No inbound firewall rules are required for this integration.
  • HTTP/HTTPS proxy routing is NOT supported. Direct connectivity is required.

Installation

Download the Installer

  1. Download the Feature Pack installer file crowdstrike-endpoint-v1.x.x.run from the Superna support portal.

    Download Superna Software

  2. Transfer it to the Eyeglass VM using SCP or your preferred secure file transfer method.

    scp crowdstrike-endpoint-v1.0.0.run user@your-eyeglass-vm:/tmp/

Turn the Installer Executable

SSH into the Eyeglass VM, navigate to the installer location, and set the executable bit:

ssh user@your-eyeglass-vm
cd /tmp
chmod +x crowdstrike-endpoint-v1.0.0.run

Run the Installer

The installer provides an interactive Text User Interface (TUI). Root (sudo) is required.

sudo ./crowdstrike-endpoint-v1.0.0.run

TUI Keyboard Navigation

KeyAction
TabNavigate between fields
EnterEdit field / Confirm selection
EscExit field (enables keyboard shortcuts)
VValidate all fields
IInstall (press Esc first to exit any active field)
QQuit installer
HShow help

Installation Workflow

  1. Fill in the required configuration fields (see table below).
  2. Press Esc to exit the active field, then press V to validate all fields.
  3. Review any validation errors and correct them.
  4. Press Esc, then press I to start the installation. Confirm when prompted.

Required Configuration Fields

FieldDescriptionExample
CrowdStrike API Client IDAPI Client ID from Falcon consoleabc123xyz...
CrowdStrike API Client SecretAPI Client Secret (masked in TUI)(masked)
CrowdStrike API Base URLRegional API endpoint URLhttps://api.us-2.crowdstrike.com
Eyeglass Host IP AddressIP of the Superna Eyeglass VM10.0.0.50
Enable Host IsolationEnable automatic host containment on detectiontrue (recommended)
Webhook PortLocal port for the webhook listener (auto-assigned if conflict)5000
Install Default WebhookAuto-register webhook in Superna Data Security Editiontrue (recommended)

Note: The installer automatically detects port conflicts and assigns the next available port if the requested webhook port is already in use by another integration.

Preview / Dry Run (Optional)

To preview what the installer will do without making any system changes, run:

sudo ./crowdstrike-endpoint-v1.0.0.run --dry-run

Verify Service Status

After installation completes, confirm the integration service is running:

sudo systemctl status crowdstrike-endpoint.service

Expected output:

crowdstrike-endpoint.service - CrowdStrike Endpoint Integration
Loaded: loaded (/etc/systemd/system/crowdstrike-endpoint.service)
Active: active (running) since ...

Configuration

Configure CrowdStrike Falcon API Credentials

  1. Log in to the CrowdStrike Falcon console.
  2. Navigate to Support → API Clients and Keys.
  3. Click Add new API client.
  4. Provide a descriptive name (e.g., Superna-Integration).
  5. Enable the following API scopes: Hosts – Read and Write.
  6. Record the Client ID and Client Secret. The secret is shown only once.
  7. Note your regional API base URL (visible on the API Clients page or in Falcon platform settings).

Configure Superna Webhooks

If Install Default Webhook was selected as true during installation, the webhook is already registered automatically. You can review or adjust the configuration at:

Integrations → Webhooks → crowdstrike-endpoint

Recommended webhook filter settings:

  • Severities: Critical and Major events only.
  • Events / Lifecycle states: LOCKED_OUT and DELAYED_LOCKOUT (events that signal active containment decisions).
  • Event types: THREAT_DETECTION.

Note: In Enforcement mode, only Critical and Major events are generated. In Monitor mode, Warning events are generated. Align your webhook filter to your operating mode to avoid alert fatigue.

Test the Integration

For Superna Data Security Edition 2.13 and later:

  1. Log in to the Superna Data Security Edition web interface.
  2. Navigate to Integrations → Webhooks.
  3. Locate the crowdstrike-endpoint webhook entry.
  4. Click the Test Webhook button.
  5. Verify HTTP response code 200 or 201 is returned. Any other response indicates a configuration issue.

Webhook Test Result

Manual testing (versions earlier than 2.13)

Send a sample payload manually using a sample curl command.

Modify Configuration After Installation

Run the installer again to make any changes in your configuration.


SecOps Administrator Integration Experience

How the Integration Works End-to-End

Once the integration is fully configured, the automated response flow is as follows:

  1. Detect — Superna Data Security Edition identifies a critical threat on the storage layer (e.g., ransomware encryption patterns, mass deletion, anomalous SMB activity).
  2. Trigger — Superna's webhook posts an event payload to the local crowdstrike-endpoint service. The payload includes severity, user, client IP addresses, affected shares, and file paths.
  3. Contain — The integration service calls the CrowdStrike Falcon API to contain (network-isolate) the matching host, identified by the client IP from the Superna event.
  4. Confirm — Host containment status is immediately visible in the CrowdStrike Falcon Host Management console. The SOC proceeds with investigation and host remediation.
  5. Release — Once the host is validated clean, the SOC releases containment from the Falcon console. The Zero Trust lockout in Superna can be cleared through the Superna interface.

What Administrators Will See in CrowdStrike Falcon

  • The contained host appears in Falcon Host Management with status Network Contained.
  • Host containment events are logged in Falcon's audit trail with the API client name (e.g., Superna-Integration) as the actor.
  • Standard Falcon investigation workflows apply: examine process trees, network activity, file writes, and registry changes associated with the affected host.
  1. Receive notification — an alert is generated in your monitoring or SIEM system (Falcon or a third-party SIEM) indicating a Superna detection.
  2. Review Superna alert — examine the event details in the Superna Data Security Edition interface: which user triggered the alert, what files and shares were affected, and what the current state is (LOCKED_OUT, DELAYED_LOCKOUT).
  3. Review Falcon telemetry — pivot to the Falcon console to review endpoint behavior on the contained host: process activity, network connections, file events.
  4. Correlate signals — combine Superna's storage-layer view with all the signals available in your SIEM.
  5. Investigate and remediate — work with your IR process to clean the host (run Falcon Real Time Response, re-image, restore from snapshot).
  6. Release and restore — release network containment in Falcon and clear the Zero Trust lockout made by Superna (using Superna's interface or leveraging our API via SOAR) once the host is clean.

Architecture / Flow


Troubleshooting

Useful Commands

Check real-time service logs:

sudo journalctl -u crowdstrike-endpoint.service -f

Start / Stop / Restart:

sudo systemctl start crowdstrike-endpoint.service
sudo systemctl stop crowdstrike-endpoint.service
sudo systemctl restart crowdstrike-endpoint.service
sudo systemctl status crowdstrike-endpoint.service

Enable / Disable Auto-Start on Boot:

sudo systemctl enable crowdstrike-endpoint.service
sudo systemctl disable crowdstrike-endpoint.service

Review Logs:

ls -la /opt/superna/sca/logs/crowdstrike-endpoint-fpk-install-20260115-163142.log

Real-time service logs:

sudo journalctl -u crowdstrike-endpoint.service -f
sudo journalctl -u crowdstrike-endpoint.service -n 100

View last 100 log lines:

sudo journalctl -u crowdstrike-endpoint.service -n 100

View webhook registration:

sudo cat /opt/superna/sca/data/eventWebhook.json | jq .

Test CrowdStrike API connectivity from the VM:

curl -s https://api.crowdstrike.com/oauth2/token \
-d "client_id=$CROWDSTRIKE_CLIENT_ID&client_secret=$CROWDSTRIKE_CLIENT_SECRET" \
-H "Content-Type: application/x-www-form-urlencoded"

Common Misconfigurations

IssueLikely CauseResolution
Service fails to startMissing or invalid config.env valuesCheck config.env; verify Client ID, Secret, and Base URL are correct. Restart service.
Webhook returns non-200 responseService not running or port mismatchRun: systemctl status crowdstrike-endpoint.service. Check that the webhook URL port matches the assigned WEBHOOK_PORT.
Host not contained after detectionClient IP not matching a Falcon-enrolled hostVerify the client IP in the Superna event corresponds to a Falcon-managed host. Check Host Management in Falcon console.
API authentication failure (401)Expired or revoked API credentialsRegenerate API credentials in Falcon console, update config.env, and restart the service.
Permission denied on Falcon API (403)API client missing required scopesEnsure the API client has Hosts: Read and Write scopes enabled. Update in Falcon API Clients and Keys.
Cannot reach CrowdStrike APIFirewall blocking outbound HTTPS from VMVerify outbound port 443 is open from the Eyeglass VM to api.crowdstrike.com (or your regional endpoint). Proxy is not supported.
Port conflict during installationRequested webhook port already in useThe installer auto-detects and assigns the next available port. Check the installation log and verify WEBHOOK_PORT in config.env.

Debugging Steps

  1. Verify the service is running: systemctl status crowdstrike-endpoint.service.
  2. Check service logs for errors: journalctl -u crowdstrike-endpoint.service -n 50.
  3. Validate config.env contains correct API credentials and base URL.
  4. Test CrowdStrike API authentication using the curl command above.
  5. Send a manual test webhook and check the service log for the response.
  6. In Falcon, confirm the target host IP is associated with a managed host in Host Management.
  7. Contact Superna support with service logs if the issue persists.

FAQs

Does this change how AD lockouts work?

No. Falcon containment is in addition to any Superna lockout actions you already use.

Will containment hit performance?

The API calls are lightweight. The only impactful action is Falcon's host containment, which is expected and controlled by your SOC.

Can we pilot in a lab first?

Yes — we recommend starting with a non-prod endpoint to validate end-to-end.

What's required from our side?

CrowdStrike API client credentials with Host/Asset read/write in your Falcon tenant. We'll guide you.

Is host containment automatic?

Yes, if the "Enable Host Isolation" flag is set to true during installation. The integration automatically contains hosts when Superna detects critical threats.

What versions of Superna are supported?

Version 2.13.0 or later is recommended for the built-in webhook test button, but earlier versions are supported with manual webhook testing.

Can I use this integration with a proxy?

No. HTTP/HTTPS proxy routing is not supported. The Superna VM must have direct outbound HTTPS connectivity to CrowdStrike API endpoints.

How accurate is IP-to-host matching?

Host containment accuracy depends on the CrowdStrike Falcon database maintaining correct IP-to-host mappings. Verify in Falcon Host Management that client IPs resolve to the expected devices.

Can I upgrade or rollback the integration?

Upgrade and rollback functionality is not currently available. Contact Superna support for assistance with version changes.

Where can I find installation logs?

Installation logs are stored in /opt/superna/sca/logs/ with filenames like crowdstrike-endpoint-fpk-install-YYYYMMDD-HHMMSS.log.