Skip to content

CrowdStrike Integration

Stream detection events to CrowdStrike Falcon LogScale (formerly Humio) for centralized SIEM analysis, threat correlation, and security monitoring.

  • CrowdStrike Falcon LogScale account
  • Ingest Token (from LogScale)
  • LogScale repository configured
  1. Log into CrowdStrike Falcon LogScale (or your regional URL)
  2. Navigate to your repository
  3. Go to Settings → Ingest Tokens
  4. Click Add Token
  5. Name it “WebDecoy Integration”
  6. Copy the token
RegionLogScale URL
UScloud.us.humio.com
EUcloud.humio.com
US-2cloud.community.humio.com
  1. Go to Integrations → CrowdStrike

  2. Click Add CrowdStrike Integration

  3. Enter:

    FieldDescription
    NameFriendly name for this integration
    LogScale URLYour LogScale instance URL
    Ingest TokenToken from LogScale
    SourceEvent source name (default: webdecoy)
    Source TypeEvent source type (default: webdecoy:detection)
  4. Configure trigger conditions:

    TriggerDescription
    On DetectionSend every detection event
    On High RiskOnly send high-risk detections (score ≥ 75)
    On Rule EnforcedSend when blocking rules are triggered
  5. Configure optional filters:

    FilterDescription
    Minimum Bot ScoreOnly send detections above this score
    Specific DecoysLimit to specific decoy IDs
  6. Click Save

WebDecoy sends events using the HTTP Event Collector (HEC) format:

{
"time": 1704067200,
"host": "webdecoy",
"source": "webdecoy",
"sourcetype": "webdecoy:detection",
"event": {
"detection_id": "det_abc123",
"detection_type": "decoy_link",
"ip_address": "192.168.1.100",
"threat_score": 85,
"threat_level": "critical",
"bot_score": 92,
"is_bot": true,
"is_vpn": false,
"user_agent": "Mozilla/5.0...",
"path": "/admin/backup.zip",
"method": "GET",
"country": "US",
"city": "New York",
"asn": "AS12345",
"isp": "Example ISP",
"mitre_tactic": "reconnaissance",
"mitre_technique": "T1595",
"property_id": "prop_def456",
"property_name": "Production Site",
"decoy_id": "dec_ghi789",
"decoy_name": "Admin Backup Link",
"created_at": "2025-01-15T10:30:00Z"
},
"fields": {
"property": "Production Site",
"threat_level": "critical",
"detection_type": "decoy_link"
}
}
FieldDescriptionExample
detection_idUnique detection IDdet_abc123
detection_typeType of detectiondecoy_link, bot_scanner, endpoint
ip_addressSource IP192.168.1.100
threat_scoreRisk score (0-100)85
threat_levelRisk levelminimal, low, medium, high, critical
bot_scoreBot likelihood (0-100)92
is_botBot detectiontrue, false
is_vpnVPN detectedtrue, false
mitre_tacticMITRE ATT&CK tacticreconnaissance
mitre_techniqueMITRE technique IDT1595
countrySource country codeUS
property_nameProperty nameProduction Site
sourcetype="webdecoy:detection"
| table([@timestamp, event.ip_address, event.threat_level, event.detection_type, event.path])
sourcetype="webdecoy:detection" event.threat_level="critical" OR event.threat_level="high"
| sort(@timestamp, order=desc)
sourcetype="webdecoy:detection"
| groupBy(event.detection_type, function=count())
sourcetype="webdecoy:detection"
| groupBy(event.ip_address, function=[count(), avg(event.threat_score)])
| sort(_count, order=desc)
| head(20)
sourcetype="webdecoy:detection"
| groupBy(event.country, function=count())
| sort(_count, order=desc)
sourcetype="webdecoy:detection"
| case {
event.is_bot=true | detection_source := "Bot";
* | detection_source := "Human";
}
| groupBy(detection_source, function=count())
sourcetype="webdecoy:detection"
| groupBy(event.mitre_tactic, function=count())
| sort(_count, order=desc)

Detection Timeline:

  • Time chart of detections over time
  • Group by threat_level for color coding

Threat Level Breakdown:

  • Pie chart by event.threat_level
  • Shows distribution of severity

Top IPs:

  • Table of attacking IPs
  • Include count and average score

Geographic Map:

  • World map visualization
  • Color by detection count per country

MITRE Coverage:

  • Bar chart of MITRE tactics
  • Shows attack types detected

Create a dashboard with these panels:

  1. Detections Over Time - Timechart grouped by threat_level
  2. Threat Level Distribution - Pie chart
  3. Top 10 Attacking IPs - Table with count
  4. Detection Types - Bar chart
  5. Bot vs Human - Pie chart
  6. Countries - World map or table

Create LogScale alerts for WebDecoy events:

sourcetype="webdecoy:detection" event.threat_level="critical"
| count()
  • Trigger: count > 0
  • Window: 5 minutes
  • Action: Notify security team
sourcetype="webdecoy:detection"
| bucket(span=5m)
| count()
  • Trigger: count > 100 (adjust based on baseline)
  • Action: Alert on anomaly
sourcetype="webdecoy:detection"
| groupBy(event.ip_address, function=count())
| _count > 10
  • Trigger: Any result
  • Window: 1 hour
  • Action: Block IP / investigate

WebDecoy detections can be correlated with CrowdStrike Falcon endpoint data:

  1. Use IP address to find matching endpoint alerts
  2. Correlate by timestamp for attack timeline
  3. Link web reconnaissance to endpoint compromise attempts

Add WebDecoy detections to your threat graph:

  1. Create custom IOC from detected IPs
  2. Track attack progression from web to endpoint
  3. Build attack timelines across data sources

WebDecoy tracks integration activity:

MetricDescription
Trigger CountTotal events sent
Failure CountFailed delivery attempts
Last TriggeredMost recent event sent
Last ErrorMost recent error message

View these in the integration details page.

  • ✅ Use descriptive source/sourcetype names
  • ✅ Start with “On High Risk” to reduce volume
  • ✅ Create dashboards for visibility
  • ✅ Set up alerts for critical detections
  • ✅ Correlate with endpoint data
  • ✅ Use MITRE fields for threat intelligence
  • ❌ Forward all events without filtering first
  • ❌ Use overly broad ingest tokens
  • ❌ Ignore integration error metrics
  • ❌ Skip dashboard creation
  1. Verify Ingest Token is correct
  2. Check LogScale URL matches your region
  3. Ensure integration is active (toggle enabled)
  4. Check the integration’s failure count
  5. Query LogScale: sourcetype="webdecoy:detection" | head(10)
  1. Regenerate Ingest Token in LogScale
  2. Verify token has write permissions
  3. Check token hasn’t expired
  4. Ensure correct repository selected
  1. Check trigger conditions match your detections
  2. Verify minimum bot score filter
  3. Check decoy ID filter if configured
  4. Review last error message in integration details
  1. Check LogScale service status
  2. Verify network connectivity
  3. Check rate limits on your account
  4. Review error messages in integration