Overview
Table name: crowdstrike_spotlight
Spotlight logs contain detailed information about detected vulnerabilities in an organization's endpoints. These logs are essential for tracking, managing, and mitigating vulnerabilities effectively. The data includes specifics about each vulnerability, such as its severity, the affected software or system component, and recommendations for remediation.
Send data to Hunters
⚠️ Attention
The process below requires you to select the CrowdStrike API tile (and not CrowdStrike).

Step 1: Create an API client
Create a CrowdStrike API client with the Vulnerabilities: read scope and permissions (as specified here).
Step 2: Create a data source on Hunters
Complete the process on the Hunters platform, and supply the following keys following this process:
- Client ID
- Client Secret
- Cloud Endpoint - This should only contain the domain name, without the
https://prefix. For example:api.crowdstrike.com.