icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading CrowdStrike Falcon Devices Technical Add-On
SHA256 checksum (crowdstrike-falcon-devices-technical-add-on_211.tgz) efbc8a91b4aa92266fc19d561b745eaa949550d40a0779ca38beaf07a94736dc
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

CrowdStrike Falcon Devices Technical Add-On

Splunk Cloud
This app is NOT supported by Splunk. Please read about what that means for youhere.
The CrowdStrike Falcon Sensor is able to collect an extensive amount of data about the endpoint that it resides on. This information is valuable not only to the security team but the IT organization as a whole. This add-on is designed to allow CrowdStrike customers to pull that data into Splunk so that it can be leveraged for use cases such as:
Data Enrichment: Use the device data to enrich other data sets to get a more complete picture of the environment and the situation
CMDB: Ensure that endpoint information (such as OS, BIOS and last seen data) in configuration management platforms is up to date and track which OS versions are running on what endpoint
CrowdStrike Host configuration: Maintain a history of device policy configurations, monitor for changes and ensure proper policy alignment

This technical add-on enables periodic connections to CrowdStrike's Hosts API to retrieve detailed data that the CrowdStrike Falcon sensor has collected about the device.

Inputs can be filtered by the "platform_name" API field, enabling seperate indexing of Windows, Mac and Linux devices. In addition inputs can be configured to only collect device details for devices where the "last_seen" field value is later than the last successful data collection. This feature can be especially helpful for customers running large VDI environments with constant turnover.

This Technical Add-On supports:

Splunk v8+ with Python 3
CrowdStrike OAuth2 Authentication
CrowdStrike US based, EU and GovCloud environments
Multiple customer environments

Offical Documentation can be found here:

CrowdStrike Resource Center: CrowdStrike Falcon Devices Add-On Guide

Release Notes

Version 2.1.1
June 17, 2021

Corrects an error in a logging line that may impede the add-ons ability to pull large amounts of device IDs.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.