CrowdStrike Falcon Intelligence integration overview
- UpdatedAug 1, 2024
- 2 minutes to read
- Xanadu
- Crowdstrike Falcon Intelligence integration
CrowdStrike Falcon Intelligence provides cyber security intelligence that easily integrating with Security Operations.
Threat Lookup - CrowdStrike Falcon Intelligence flows
The Threat Lookup - CrowdStrike Falcon Intelligence flow designer performs a lookup on selected observables. If the observables are of a type recognized by CrowdStrike Falcon Intelligence, the observables are scanned for malware, and the results are returned.
This flow is triggered by the Security Operations Integration - Threat Lookup capability when you publish one or more observables to a watchlist, and the CrowdStrike Falcon Intelligence implementation is selected. After they are published, the watchlists can be viewed in the CrowdStrike Falcon Host software.
Role required: admin

For information on the activities used by this flow designer, see Common Security Operations integration flows and orchestration Flow Actions.
Activate and configure the CrowdStrike Falcon Intelligence integration
The Integration Configuration feature allows you to quickly activate and set up third-party security integrations, including the CrowdStrike Falcon Intelligence integration. Before you can use the CrowdStrike Falcon Intelligence, you must download it from the ServiceNow Store and add the appropriate API key and ID.
Before you begin
Role required: admin
- The Threat Intelligence plugin must be installed and activated before you can use the CrowdStrike Falcon Intelligence integration.
- Obtain the API Client ID and API Client Secret under your CrowdStrike Falcon Intelligence profile.
- If you are upgrading CrowdStrike Falcon Intelligence integration from a previous version, then you must delete the existing configuration and set up a new configuration. The integration supports OAUTH2 authentication. This update requires you to enter the API Client ID and the API Client Secret to authenticate and complete the configuration.
- In the CrowdStrike Falcon Intelligence portal API Scopes, enable the Read setting for Indicators (Falcon X) or IOCs (Indicators of Compromise).
Procedure
Result
Related Content
- Perform lookups on observables
You can perform threat intelligence lookups on one or more observables to determine whether they’re associated with known security threats. The scanning implementations that run depend on the ones you’ve activated.