Skip to main content

Detection Summaries

Fetches detection summaries from CrowdStrike Falcon, providing near real-time detection data for alert triage.

Sync Type: Incremental

Requirements

  • Before you connect Monad to CrowdStrike, you need a Client ID and Client Secret. Log in to your CrowdStrike portal, and under Support & Resources, click on 'API Client and Keys' to create your credentials.
  • Enter a Client Name, Description and API Scopes to define the API client. Ensure read roles for Detections are enabled.
  • Click Done.
  • Copy the ClientID and ClientSecret key. You'll need them when you set up the Monad connector.

Details

Monad uses the created_timestamp as a part of the filter on the CrowdStrike API to determine what summaries to display. This field is updated every time a request to get detection summaries is successful with the last time a request to get summaries was initiated. If this was the first time requesting for detection summaries, a full sync of the data is performed.

Configuration

The following configuration defines the input parameters. Each field's specifications, such as type, requirements, and descriptions, are detailed below.

Settings

SettingTypeRequiredDescription
Cloud TypestringNoYour cloud type for CrowdStrike. Ex: 'autodiscover', 'us-1', 'us-2', 'eu-1', 'us-gov-1'.

Secrets

SecretTypeRequiredDescription
Client IDstringYesClient ID for the CrowdStrike API. This is required to authenticate requests.
Client SecretstringYesClient Secret for the CrowdStrike API. This is required to authenticate requests.

Custom Schema Handling

If the source data doesn't align with any of the OpenSecurityControlFramework (OSCF) schemas, you can create a custom transformation using our JQ transform pipeline. For example:

{
metadata: {
schema_version: "1.0.0",
custom_framework: "my_framework"
},
controls: .[]
}

For more information on JQ and how to write your own JQ transformations see the JQ docs here.

If you believe this data source should be included in the standard OSCF schema set, please reach out to our team at support@monad.com. We're always looking to expand our coverage of security control frameworks based on community needs.

Sample Record

{
"adversary_ids": [
123,
456
],
"assigned_to_name": "Tom Miller",
"behaviors": [
{
"behavior_id": 1,
"description": "Unauthorized access attempt"
},
{
"behavior_id": 2,
"description": "Data exfiltration detected"
}
],
"behaviors_processed": [
"Unauthorized access attempt",
"Data exfiltration detected"
],
"cid": "abcd-1234",
"created_timestamp": "2025-08-11T23:46:30.062Z",
"date_updated": "2025-08-11T23:46:30.062Z",
"detection_id": "ccb0c4fd-c9c4-7853-8ffd-71b2992f6715",
"device": {
"device_id": "device-001",
"device_name": "Workstation-1"
},
"email_sent": true,
"first_behavior": "2025-08-11T23:46:30.062Z",
"hostinfo": {
"hostname": "server-xyz",
"ip_address": "172.173.178.66"
},
"last_behavior": "2025-08-11T23:46:30.062Z",
"max_confidence": "88",
"max_severity": "4",
"max_severity_displayname": "Medium",
"overwatch_notes": "et id irure consectetur occaecat aute aliquip commodo culpa et",
"quarantined_files": [
{
"file_id": "file-001",
"file_name": "malware.exe"
},
{
"file_id": "file-002",
"file_name": "suspicious.doc"
}
],
"seconds_to_resolved": "3300",
"seconds_to_triaged": "2366",
"show_in_ui": true,
"status": "resolved"
}