Documentation Index
Fetch the complete documentation index at: https://docs.contraforce.com/llms.txt
Use this file to discover all available pages before exploring further.
Who is this for? Workspace Admins or Security Engineers who manage a workspace that uses CrowdStrike Falcon. This guide walks you through creating the CrowdStrike API clients, configuring both modules in ContraForce, and verifying that alerts flow end-to-end.
Before You Begin
What These Modules Do
CrowdStrike integrates with ContraForce through two separate modules:Detection Module
Detection ingestion and investigation
- Pulls Falcon detections from the CrowdStrike Alerts API
- Surfaces every detection as its own ContraForce incident
- Round-trips status changes and comments back to Falcon
Response Module
Gamebook response actions
- Powers Contain and Lift Containment Gamebooks
- Powers On-Demand Scan Gamebooks
- Required for any Gamebook that acts on a CrowdStrike-managed device
Prerequisites
CrowdStrike Falcon subscription
An active CrowdStrike Falcon subscription with at least one product line in scope (EPP, IDP, or any of the product lines listed in Select Alert Types below).
Falcon admin access
Access to API Clients and Keys under Support and resources → Resources and tools in the Falcon console. This typically requires the Falcon Administrator role.
ContraForce workspace
A ContraForce workspace created for the tenant, with your account assigned the Workspace Admin role.
CrowdStrike Cloud Base URLs
CrowdStrike has multiple regional clouds. Use the Base URL that matches your tenant:| Cloud | Base URL |
|---|---|
| US-1 (Commercial) | https://api.crowdstrike.com |
| US-2 | https://api.us-2.crowdstrike.com |
| EU-1 | https://api.eu-1.crowdstrike.com |
ContraForce does not currently support CrowdStrike’s US-GOV-1 cloud. Contact support@contraforce.com if you have a GovCloud tenant.
Step 1 — Create the Detection API Client in Falcon
The scopes you grant on the Detection API client depend on which Falcon tier the customer is licensed for. Pick the matching column below — the tier you choose here must match what you select on the ContraForce configuration page in Step 3.- Navigate to Support and resources → Resources and tools → API Clients and Keys in the Falcon console
- Click Create API client
- Set Client name to
ContraForce Detection - Set Description to
ContraForce alert ingestion and status writeback - Under API scopes, grant the scopes for the customer’s tier, then click Create:
- Falcon Insight (EDR)
- Falcon Insight XDR
- Falcon NG-SIEM
For tenants on Falcon Insight (EDR) only. Cases workbench is not available on this tier.
| Resource | Permission | Why |
|---|---|---|
| Alerts | Read + Write | Ingest detections and update their status |
| User Management | Read | Resolve assignee names on detections |
| Hosts | Read | Resolve device metadata on detections |
| IOCs (Indicators of Compromise) | Read | Resolve IOC context on alert entities |
Step 2 — Create the Response API Client in Falcon
Repeat the process for a second API client that ContraForce will use for Gamebook response actions.- In the same API Clients and Keys menu, click Create API client
- Set Client name to
ContraForce Response - Set Description to
ContraForce Gamebook response actions - Under API scopes, grant the scopes listed below, then click Create:
| Resource | Permission |
|---|---|
| Hosts | Read + Write |
| On-Demand Scans (ODS) | Read + Write |
Step 3 — Configure the CrowdStrike Falcon Module in ContraForce
- In the ContraForce portal, navigate to Workspaces → your workspace → Modules
- Locate the CrowdStrike Falcon card and click Configure
- Pick the Falcon licensing tier that matches the customer’s CrowdStrike SKU. The required-scopes list, the incidents-table preview copy, and the verification panel all update based on this selection:
| Tier | When to pick it | Effect on the platform |
|---|---|---|
| Falcon Insight (EDR) | Customer is on Falcon Insight (EDR) only — no Cases workbench, no NG-SIEM SKU | Each Falcon detection becomes its own incident in the table |
| Falcon Insight XDR | Customer is licensed for XDR with Cases workbench but no NG-SIEM SKU | Each Falcon detection becomes its own incident; case context is resolvable on detections that reference a case |
| Falcon NG-SIEM | Customer is licensed for NG-SIEM | Same detection-as-incident shape, plus LogScale-backed Process Tree ancestor walk and Events Timeline are unlocked |
- Fill in the following fields:
| Field | Value |
|---|---|
| Base URL | The Base URL for your CrowdStrike cloud (see table above) |
| Client ID | The Client ID from the Detection API client you created in Step 1 |
| Client Secret | The Client Secret from the Detection API client |
- Click Test Connection to verify the credentials reach CrowdStrike and have the scopes the selected tier requires
- Review the Verification panel that appears below the form:
- ✓ on a row means the API client has that scope and the tenant exposes the corresponding capability
- ✗ on a row means the scope or capability is missing for the tier you picked — fix it in the Falcon console before saving
- ℹ︎ on a row means the API client has more capability than the tier you picked uses (e.g. NG-SIEM is reachable but you picked Falcon Insight XDR) — pick a higher tier to unlock the advanced features
- Click Save
What You’ll See After Saving
The configuration page surfaces a “What you’ll see in the incidents table” preview directly under the tier dropdown, so you can confirm the choice before saving. After Save, the incidents table reflects that preview the next time the poller runs (typically within a few minutes).Tune Which Products Are Ingested (Optional)
After the credentials are saved, an Alert Types card appears as a sibling to the Configuration Information card. Use it to narrow which CrowdStrike products ContraForce ingests into the analyst queue — useful when you’re contracted to triage only a subset of the products the customer’s Falcon tenant emits.| Product | Wire form | Surfaces |
|---|---|---|
| Endpoint (EPP) | epp | Falcon Insight endpoint-protection detections |
| Identity (IDP) | idp | Falcon Identity Protection alerts |
| Mobile | mobile | Falcon for Mobile alerts |
| Data Protection | dp | Falcon Data Protection alerts |
| NG-SIEM | ngsiem | NG-SIEM correlation alerts |
| XDR | xdr | Cross-platform correlated detections |
| Cloud Workload (CWPP) | cwpp | Falcon Cloud Security workload-protection alerts |
| OverWatch | overwatch | Falcon OverWatch managed-threat-hunting alerts |
| Third-Party | thirdparty | Alerts ingested from integrated third-party tools |
| Tier | Default checkbox shortlist |
|---|---|
| Falcon Insight (EDR) | EPP |
| Falcon Insight XDR | EPP, IDP, XDR |
| Falcon NG-SIEM | All products |
Leaving every product checked, or unchecking every product, both fall through to “ingest all products.” This preserves backwards-compatibility for workspaces created before the per-product filter shipped, and acts as a friendly fallback if you accidentally clear every box.
Step 4 — Configure the CrowdStrike Falcon Response Module
- On the same Modules page, locate the CrowdStrike Falcon Response card and click Configure
- Fill in the following fields:
| Field | Value |
|---|---|
| Base URL | Same Base URL as the Detection module |
| Client ID | The Client ID from the Response API client you created in Step 2 |
| Client Secret | The Client Secret from the Response API client |
- Click Test Connection to verify the credentials reach CrowdStrike and have the required scopes
- Click Save
Step 5 — Verify End-to-End
Wait for the first poll cycle
The Detection module polls CrowdStrike on a short interval. New alerts appear in ContraForce within a few minutes of being generated in Falcon.
Check the Command Dashboard
Navigate to the Command Dashboard. CrowdStrike incidents should appear alongside incidents from other sources.
Open an incident
Click into a CrowdStrike incident and verify that the Entities and Timeline tabs are populated with alert data.
What Each Module Unlocks
| Capability | Requires Detection | Requires Response |
|---|---|---|
| Ingest CrowdStrike Falcon detections as incidents | ✓ | |
| Round-trip status, assignment, and comments to Falcon | ✓ | |
| Receive real-time incident updates in the portal | ✓ | |
| Run Contain and Lift Containment Gamebooks | ✓ | |
| Run On-Demand Scan Gamebooks | ✓ | |
| Trigger Security Delivery Agents on new incidents | ✓ |
Troubleshooting
| Issue | Likely cause | Fix |
|---|---|---|
Test Connection fails with missing the 'Alerts: Read' scope | The Detection API client does not have Alerts: Read granted | Return to API Clients and Keys in Falcon, edit the Detection client, enable Alerts: Read, and save |
Test Connection fails with missing the 'Hosts: Write' scope | The Response API client does not have Hosts: Write granted | Edit the Response client and enable Hosts: Write |
| Test Connection fails with a generic OAuth error | The Base URL does not match the tenant’s actual CrowdStrike cloud | Verify the Base URL against the cloud table above; cross-check against the Falcon console URL |
| Verification panel shows ✗ on Cases workbench for XDR / NG-SIEM tier | The Detection API client does not have Cases: Read + Write granted | Edit the Detection client and add Cases: Read + Write, then re-run Test Connection. Without it, ContraForce can ingest detections normally but won’t be able to resolve case context on detections that reference a case |
| Verification panel shows ✗ on NG-SIEM for the NG-SIEM tier | The Detection API client does not have NGSIEM: Read + Write granted, or the tenant does not have the NG-SIEM SKU | Edit the Detection client and add NGSIEM: Read + Write; if the scope still doesn’t appear in the Falcon console it means the tenant isn’t licensed for NG-SIEM and you should pick the XDR tier instead |
| Process Tree shows only the triggering process (no ancestors) | Tenant tier was set to EDR or XDR, or the NG-SIEM scope is missing | Confirm the customer is licensed for NG-SIEM and the tier dropdown reflects that; verify the NGSIEM scope on the Detection client |
| Detection Events Timeline is empty on the NG-SIEM tier | NG-SIEM scope missing, or the alert’s process lifetime predates the base_sensor retention horizon | Check the verification panel for ✗ on NG-SIEM; if the scope is fine, the older detection’s events have aged out — see the retention disclosure |
| Incidents table is empty even though detections are firing in Falcon | Time filter or product filter on the queue is excluding everything; or the API client lost its Alerts: Read scope | Widen the date filter to a known-detection window, confirm Alerts: Read is still granted, and re-test the connection |
| Gamebook response actions are greyed out | The Response module is not configured | Complete Step 4 to configure the Response module |
| Agent comments do not appear in Falcon | The Detection API client does not have Alerts: Write | Add Alerts: Write to the Detection client |
| Incident owner you assigned in ContraForce isn’t reflected in Falcon | This is by design — owner assignments record to the ContraForce audit log only and are not pushed to Falcon | See CrowdStrike Falcon Integration → What the Integration Does for the rationale |
Rotating an API Secret
CrowdStrike secrets do not expire automatically, but some organizations rotate them on a schedule.- In Falcon, open the affected API client and click Reset secret
- Copy the new secret
- In ContraForce, reopen the affected module (Detection or Response)
- Paste the new secret into Client Secret and click Save
- Click Test Connection to verify
Related Documentation
CrowdStrike Falcon Integration
What the integration does, what each tier unlocks, and how Falcon’s retention shapes the data shown in the platform
What are Gamebooks?
Learn how Gamebook response actions work
Incident Management
Triage and resolve incidents in ContraForce
Entity Insights
Explore investigation context for an incident’s entities
Roles and Permissions
Detailed role reference for ContraForce users
Questions about connecting CrowdStrike Falcon to ContraForce? Contact us at support@contraforce.com.