📢 Read the latest Release Notes to learn what's new on Hunters! 💡

CrowdStrike Spotlight

Prev Next

Overview

Table name: crowdstrike_spotlight

Spotlight logs contain detailed information about detected vulnerabilities in an organization's endpoints. These logs are essential for tracking, managing, and mitigating vulnerabilities effectively. The data includes specifics about each vulnerability, such as its severity, the affected software or system component, and recommendations for remediation.

Send data to Hunters

⚠️ Attention

The process below requires you to select the CrowdStrike API tile (and not CrowdStrike).

image.png

Step 1: Create an API client

Create a CrowdStrike API client with the Vulnerabilities: read scope and permissions (as specified here).

Step 2: Create a data source on Hunters

Complete the process on the Hunters platform, and supply the following keys following this process:

  • Client ID
  • Client Secret
  • Cloud Endpoint - This should only contain the domain name, without the https:// prefix. For example: api.crowdstrike.com.