Skip to main content
Version: 2.14.0

CrowdStrike Next-Gen SIEM

Free integration setupWe’ll install and validate this for you.
Book a setup call

Support Statement

DISCLAIMER

This documentation is provided "as is" without support for 3rd party software. The level of support for this integration guide is best effort without any SLA on response time. No 3rd party product support can be provided by Superna directly. 3rd party components require support contracts. See EULA for more details.

Overview

Superna Data Security Edition integrates with CrowdStrike Next-Gen SIEM to stream security findings from the storage layer directly into the Falcon platform for search, correlation, and alerting. When Superna detects malicious activity - it automatically forwards those findings to CrowdStrike Next-Gen SIEM via the Collector API, where they appear as searchable log events and detections alongside other security telemetry.

For ransomware detection, all required indicators are preconfigured by Superna and do not need to be recreated in the SIEM. Each payload contains the necessary details for the SecOps team to assess the event, conduct investigations, or build correlation rules with detections from other security systems.

Demo Video

Features and Solution Overview

This integration provides the following capabilities:

  • Structured log ingestion — Superna findings are forwarded to CrowdStrike Next-Gen SIEM via the Collector API, mapped to CrowdStrike Parsing Standard (CPS) format for native compatibility.
  • Detections visibility — high-confidence findings surface as detections in the CrowdStrike Falcon console for SOC review and triage.
  • Rich incident context — each webhook payload includes the actor username, client IP addresses, affected SMB shares, file paths, severity, and detection state so the SOC can immediately assess scope.

Customer Workflow Benefits

  • Correlate Superna's storage-layer detections with endpoint, identity, and network signals already in Next-Gen SIEM.
  • Reduce mean time to detect and respond (MTTD/MTTR) by centralizing storage security findings in a single pane of glass.
  • Build saved searches, alerts, and correlation rules in Next-Gen SIEM based on Superna event fields.

Limitations

  • Requires a CrowdStrike Next-Gen SIEM subscription with Data Onboarding entitlement.
  • The integration runs as a service on the Superna (Eyeglass) VM and requires direct outbound HTTPS connectivity from the VM to CrowdStrike. HTTPS proxy routing is not supported.
  • Upgrade and rollback functionality is not available.

About CrowdStrike Next Gen SIEM

CrowdStrike Falcon Next-Gen SIEM revolutionizes threat detection, investigation, and response by bringing together unmatched security depth and breadth in one unified platform. It combines log ingestion, search, correlation, and detection capabilities natively within the Falcon platform, eliminating the need for separate SIEM infrastructure. The Superna data source is available directly within the Next-Gen SIEM Data Onboarding tab via the CrowdStrike Marketplace.


Prerequisites

Before beginning, ensure the following requirements are met:

Superna Requirements

  • Superna Data Security Edition - version 2.13.0 or later is recommended for built-in webhook test button
  • Active Superna license with Zero Trust / Data Security features enabled.
  • Superna (Eyeglass) VM running Linux with systemd
  • Minimum 1 GB free disk space on the Eyeglass VM.
  • Root (sudo) access to the Eyeglass VM.

CrowdStrike Requirements

  • CrowdStrike Next-Gen SIEM subscription with Data Onboarding entitlement.
  • Superna Crowdstrike Connector is available in Crowdstrike marketplace here
  • The Superna data source connector must be created in Next-Gen SIEM first (see details below) to obtain the required API URL and API Key.

Network Connectivity

  • The Superna VM must have outbound HTTPS (port 443) access to your CrowdStrike API endpoint (api.crowdstrike.com or regional equivalent).
  • No inbound firewall rules are required for this integration.
  • HTTP/HTTPS proxy routing is NOT supported. Direct connectivity is required.

Installation

Configure the Superna Data Connector in CrowdStrike Next-Gen SIEM

Before installing the Feature Pack, you must set up the Superna data source connector in CrowdStrike Next-Gen SIEM to obtain the API URL and API Key needed to configure the integration.

  1. Log in to the CrowdStrike Falcon console.
  2. Navigate to Next-Gen SIEM → Data Onboarding.
  3. In the Data Source Search box, type Superna.
  4. Click the Superna Data Security Edition connector.
  5. Fill in the required fields and click Save.
  6. When prompted, click Generate API Key. Copy and securely store this key - it is shown only once.
  7. Navigate to Data Sources, click on the newly created data source, and record the API URL (ingest endpoint URL). Save this URL for the Feature Pack configuration step.
API URL Format

The API URL format is typically: https://<id>.ingest.<region>.crowdstrike.com/services/collector

The region matches your Falcon tenant (e.g., us-2, eu-1).

Download the Installer

  1. Download the Feature Pack installer file crowdstrike-siem-v1.0.0.run from the Superna support portal.

    Download Superna Software

  2. Transfer it to the Eyeglass VM using SCP or your preferred secure file transfer method:

    scp crowdstrike-siem-v1.0.0.run user@your-eyeglass-vm:/tmp/

Make the Installer Executable

SSH into the Eyeglass VM, navigate to the installer location, and set the executable bit:

ssh user@your-eyeglass-vm
cd /tmp
chmod +x crowdstrike-siem-v1.0.0.run

Run the Installer

The installer provides an interactive Text User Interface (TUI). Root (sudo) is required.

sudo ./crowdstrike-siem-v1.0.0.run

TUI Keyboard Navigation

KeyAction
TabNavigate between fields
EnterEdit field / Confirm selection
EscExit field (enables keyboard shortcuts)
VValidate all fields
IInstall (press Esc first to exit any active field)
QQuit installer
HShow help

Installation Workflow

  1. Fill in the required configuration fields (see table below).
  2. Press Esc to exit the active field, then press V to validate all fields.
  3. Review any validation errors and correct them.
  4. Press Esc, then press I to start the installation. Confirm when prompted.

Required Configuration Fields

FieldDescriptionExample
CrowdStrike Collector API URLIngest endpoint URL from the Next-Gen SIEM data sourcehttps://<id>.ingest.us-2.crowdstrike.com/services/collector
CrowdStrike API KeyAPI Key generated from the Superna connector in Next-Gen SIEM (masked in TUI)(masked)
Eyeglass Host IP AddressIP of the Superna Eyeglass VM10.0.0.50
Webhook PortLocal port for the webhook listener (auto-assigned if conflict)5000
Install Default WebhookAuto-register webhook in Superna Data Security Editiontrue (recommended)
Port Conflict Detection

The installer automatically detects port conflicts and assigns the next available port if the requested webhook port is already in use by another integration.

Preview / Dry Run (Optional)

To preview what the installer will do without making any system changes, run:

sudo ./crowdstrike-siem-v1.0.0.run --dry-run

Verify Service Status

After installation completes, confirm the integration service is running:

sudo systemctl status crowdstrike-siem.service

Expected output:

● crowdstrike-siem.service - CrowdStrike Next-Gen SIEM Integration
Loaded: loaded (/etc/systemd/system/crowdstrike-siem.service)
Active: active (running) since ...

Configuration

Configure Superna Webhooks

If Install Default Webhook was selected as true during installation, the webhook is already registered automatically. You can review or adjust the configuration at:

Integrations → Webhooks → crowdstrike-siem

Recommended webhook filter settings:

  • Severities: Critical and Major events only.
  • Events / Lifecycle states: LOCKED_OUT and DELAYED_LOCKOUT (events that signal active containment decisions).
  • Event types: THREAT_DETECTION.
Operating Mode Alignment

In Enforcement mode, only Critical and Major events are generated. In Monitor mode, Warning events are generated. Align your webhook filter to your operating mode to avoid alert fatigue.

Test the Integration

For Superna Data Security Edition 2.13 and later:

  1. Log in to the Superna Data Security Edition web interface.
  2. Navigate to Integrations → Webhooks.
  3. Locate the crowdstrike-siem webhook entry.
  4. Click the Test Webhook button.
  5. Verify HTTP response code 200 or 201 is returned. Any other response indicates a configuration issue.

Webhook Test Result

Manual testing (versions earlier than 2.13)

Send a sample payload manually using a sample curl command.

Modify Configuration After Installation

Run the installer again to make any changes in your configuration.


SecOps Administrator Integration Experience

How the Integration Works End-to-End

Once the integration is fully configured, the event flow is as follows:

  1. Detect — Superna Data Security Edition identifies a threat at the storage layer (e.g., ransomware patterns, mass deletion, anomalous SMB activity).
  2. Trigger — Superna's webhook posts an event payload to crowdstrike-siem service on the Eyeglass VM. The payload includes severity, user, client IP addresses, affected shares, and file paths.
  3. Translate — The service translates the Superna payload into CrowdStrike Parsing Standard (CPS) format and forwards it to the CrowdStrike Collector API using the configured API key and ingest URL.
  4. Ingest — CrowdStrike Next-Gen SIEM receives the event and makes it available in Investigate → Event Search as a parsed, searchable log entry.
  5. Alert — High-confidence findings surface as detections in the Next-Gen SIEM console. SOC analysts can investigate, correlate with other signals, and respond.

What Administrators Will See in CrowdStrike Next-Gen SIEM

  • Events appear in Investigate → Event Search, searchable and filterable by vendor ("Superna"), severity, user, shares, files, and client IP.
  • Detections generated from Superna findings are visible in the Falcon Detections console for SOC triage.
  • All forwarded events are in CPS format, enabling native correlation with CrowdStrike Next-Gen SIEM.
  • Saved searches and custom alerts can be built in Next-Gen SIEM based on any Superna event field (e.g., alert on any event where severity = CRITICAL).
  1. Receive notification — a detection or saved search alert fires in CrowdStrike Next-Gen SIEM based on a Superna finding.
  2. Review the Superna event — in Event Search, examine the full event fields: which user triggered the alert, what files and shares were affected, client IP addresses, and current state (LOCKED_OUT, DELAYED_LOCKOUT).
  3. Correlate with endpoint signals — pivot from the client IP or username to CrowdStrike Falcon Insight (EDR) data in the same platform to review process activity, network connections, and file events on the host.
  4. Correlate with identity signals — cross-reference the Active Directory user from the Superna event with identity and authentication logs in Next-Gen SIEM.
  5. Correlate signals — combine Superna's storage-layer view (files encrypted, mass deletes) with Falcon's endpoint-layer view (malicious process, lateral movement).
  6. Respond — take action using available tools: trigger host containment via the EDR integration, run playbooks via Falcon Fusion SOAR, or escalate to Tier 2/3.
  7. Remediate and close — once the host is clean, release any lockouts made by Superna and close the detection.

Building Saved Searches and Alerts in Next-Gen SIEM

Use the following example searches in Next-Gen SIEM Event Search to build saved queries or alerting rules:

All Superna events:

vendor=Superna

Critical severity events only:

vendor=Superna severity=CRITICAL

Locked-out hosts:

vendor=Superna state=LOCKED_OUT

Events involving a specific user:

vendor=Superna userName=<username>

Integration Architecture


Troubleshooting

Useful Commands

Check real-time service logs:

sudo journalctl -u crowdstrike-siem.service -f

Start / Stop / Restart:

sudo systemctl start crowdstrike-siem.service
sudo systemctl stop crowdstrike-siem.service
sudo systemctl restart crowdstrike-siem.service
sudo systemctl status crowdstrike-siem.service

Enable / Disable Auto-Start on Boot:

sudo systemctl enable crowdstrike-siem.service
sudo systemctl disable crowdstrike-siem.service

Review Installation Logs:

ls -la /opt/superna/sca/logs/crowdstrike-siem-fpk-install-20260115-163142.log

View last 100 log lines:

sudo journalctl -u crowdstrike-siem.service -n 100

Save logs to a file for review:

sudo journalctl -f -n 250 -u crowdstrike-siem.service > /tmp/crowdstrike-siem.log
nano /tmp/crowdstrike-siem.log

View webhook registration:

sudo cat /opt/superna/sca/data/eventWebhook.json | jq .

Common Misconfigurations

IssueLikely CauseResolution
Service fails to startMissing or invalid config.env valuesCheck config.env; verify CROWDSTRIKE_COLLECTOR_URL and CROWDSTRIKE_API_KEY are correct. Restart service.
Webhook returns non-200 responseService not running or port mismatchRun: systemctl status crowdstrike-siem.service. Check the webhook URL port matches WEBHOOK_PORT in config.env.
Events not appearing in Next-Gen SIEMWrong Collector API URL or stale API keyVerify CROWDSTRIKE_COLLECTOR_URL matches the URL from the Superna data source in Next-Gen SIEM. Regenerate the API key if expired.
HTTP 401 from Collector APIInvalid or expired API KeyRegenerate the API key in Next-Gen SIEM Data Sources, update config.env, and restart the service.
HTTP 403 from Collector APIAPI key lacks permission or wrong data sourceEnsure the API key was generated from the correct Superna data source connector in Next-Gen SIEM.
Cannot reach Collector API endpointFirewall blocking outbound HTTPS from VMVerify outbound port 443 is open from the Eyeglass VM. Proxy is not supported.
Wrong region in Collector API URLURL does not match your Falcon tenant regionConfirm your Falcon tenant region (e.g., us-2, eu-1) and use the matching ingest URL from Next-Gen SIEM Data Sources.
Port conflict during installationRequested webhook port already in useThe installer auto-detects and assigns the next available port. Check the installation log and verify WEBHOOK_PORT in config.env.

Debugging Steps

  1. Verify the service is running: systemctl status crowdstrike-siem.service.
  2. Check service logs for errors: journalctl -u crowdstrike-siem.service -n 50.
  3. Validate config.env contains the correct Collector API URL and API Key.
  4. Test Collector API connectivity using the curl command.
  5. Send a manual test webhook and verify the service log shows HTTP 200 with successCount: 1.
  6. Log in to CrowdStrike Next-Gen SIEM and search for vendor=Superna to confirm events are arriving.
  7. Contact Superna support with service logs if the issue persists.

FAQs

What's required to enable this?

A Next-Gen SIEM data connector in Falcon (to obtain the API URL and API key), an Eyeglass VM with outbound HTTPS, and Superna webhook configuration. Installation takes approximately 15-20 minutes using the automated installer.

Which fields are forwarded?

Common fields include eventid, host (from clientIPs[0]), severity, state, nes, user, userName, shares[], detected (seconds), protocol, and files[]. Events are mapped to CrowdStrike Parsing Standard (CPS) format for native compatibility.

Is there a performance impact?

Minimal. The service makes small HTTPS posts to the collector API. Scope webhooks to critical/meaningful findings (Critical and Major severities recommended) to minimize event volume and avoid alert fatigue.

Any common pitfalls?

Using the wrong ingest URL/region, stale API key, blocking outbound HTTPS, or sending low-signal alarms instead of high-confidence findings. Always verify the API URL region matches your Falcon tenant region.

Can I use an HTTP proxy?

No. HTTP/HTTPS proxy routing is not supported. The integration requires direct outbound HTTPS connectivity from the Eyeglass VM to CrowdStrike.

How do I upgrade the integration?

Upgrade and rollback functionality is not available. To modify the configuration, run the installer again with updated settings.

What happens if the service stops?

Events will not be forwarded to CrowdStrike until the service is restarted. The service is configured to auto-start on boot via systemd. Check service status with systemctl status crowdstrike-siem.service.

How do I build correlation rules in Next-Gen SIEM?

Use the Event Search interface to build saved searches based on Superna event fields. Examples: vendor=Superna severity=CRITICAL or vendor=Superna state=LOCKED_OUT. You can create alerts from saved searches to trigger notifications or automated response actions.