Hi Karl, Thanks for the response. Much Appreciated.
Sure, using Crowdstrike (CS) App, managed to get the event stream coming. Also, created a custom rule to trigger offense for every detection received from CS.
Looks like the rule works fine, however, can see events associated with "Custom Rule Engine-8" log source type are also part of the offense, along with "CrowdStrike Detection" log source. This keeps me thinking what is the other log source is about ? as most of them are "Stored" category. Also worried is that it may eat up our EPS.
Any advise here. Thanks.
#QRadar#Support#SupportMigration