CrowdStrike Falcon Spotlight MCP Server
Create a powerful Model Context Protocol (MCP) server for CrowdStrike Falcon Spotlight in minutes with our AI Gateway. This guide walks you through setting up seamless vulnerability management integration with enterprise-grade security and instant OAuth authentication.
About CrowdStrike Falcon Spotlight API
CrowdStrike Falcon Spotlight provides real-time, comprehensive vulnerability management without requiring additional agents or scanners. It continuously assesses vulnerabilities, prioritizes risks, and provides actionable remediation guidance across your entire environment.
Key Capabilities
- Vulnerability Assessment: Real-time CVE detection
- Risk Prioritization: AI-powered risk scoring
- Patch Management: Automated patch intelligence
- Exploit Intelligence: Active exploit monitoring
- Remediation Guidance: Actionable fix recommendations
- Compliance Tracking: Regulatory compliance
- Asset Context: Environmental risk factors
- Threat Correlation: Link vulnerabilities to threats
API Features
- Vulnerabilities API: CVE management
- Remediations API: Patch and fix guidance
- Risk Scoring API: Prioritization metrics
- OAuth 2.0: Secure authentication
- Spotlight Intel API: Exploit intelligence
- Reports API: Vulnerability reporting
- Dashboard API: Metrics and KPIs
- Export API: Data extraction
What You Can Do with CrowdStrike Falcon Spotlight MCP Server
The MCP server transforms Falcon Spotlight API into a natural language interface, enabling AI agents to:
Vulnerability Discovery
-
CVE Detection
- "Find all critical CVEs"
- "Show vulnerabilities in production"
- "List unpatched systems"
- "Track new vulnerabilities today"
-
Exploit Monitoring
- "Show actively exploited vulns"
- "Find zero-day vulnerabilities"
- "Track exploit kit usage"
- "Monitor threat actor targeting"
-
Asset Vulnerability
- "Scan Windows servers"
- "Check application vulns"
- "Assess cloud workloads"
- "Review container security"
Risk Prioritization
-
Risk Scoring
- "Calculate environment risk score"
- "Show highest risk assets"
- "Prioritize remediation efforts"
- "Track risk trends"
-
Contextual Risk
- "Assess business impact"
- "Consider asset criticality"
- "Evaluate exposure levels"
- "Factor threat intelligence"
-
Risk Modeling
- "Predict exploitation likelihood"
- "Model attack scenarios"
- "Calculate breach impact"
- "Estimate remediation ROI"
Patch Management
-
Patch Intelligence
- "Find available patches"
- "Track patch supersedence"
- "Identify missing updates"
- "Monitor patch releases"
-
Patch Planning
- "Create patch schedule"
- "Group related patches"
- "Plan maintenance windows"
- "Coordinate deployments"
-
Patch Validation
- "Test patch compatibility"
- "Check dependencies"
- "Verify patch success"
- "Monitor rollback needs"
Remediation Management
-
Fix Recommendations
- "Show remediation options"
- "Provide workarounds"
- "Suggest compensating controls"
- "Offer configuration changes"
-
Remediation Tracking
- "Monitor fix progress"
- "Track SLA compliance"
- "Measure MTTR"
- "Verify remediation"
-
Automation Support
- "Generate patch scripts"
- "Create automation playbooks"
- "Build deployment packages"
- "Schedule remediations"
Analytics & Reporting
-
Vulnerability Metrics
- "Show vuln trends"
- "Calculate exposure time"
- "Measure patch velocity"
- "Track coverage gaps"
-
Compliance Reporting
- "Generate PCI reports"
- "Create HIPAA documentation"
- "Build SOC 2 evidence"
- "Track CIS benchmarks"
-
Executive Dashboards
- "Risk posture summary"
- "Remediation progress"
- "Threat landscape view"
- "KPI tracking"
Threat Intelligence
-
Exploit Intelligence
- "Track exploit availability"
- "Monitor exploit kits"
- "Identify weaponization"
- "Assess exploit reliability"
-
Threat Actor Mapping
- "Link CVEs to actors"
- "Track targeting patterns"
- "Monitor campaigns"
- "Predict targeting"
-
Attack Surface
- "Map exposed vulnerabilities"
- "Calculate attack paths"
- "Identify weak points"
- "Model breach scenarios"
Compliance Management
-
Regulatory Compliance
- "Check PCI compliance"
- "Verify HIPAA requirements"
- "Track GDPR obligations"
- "Monitor SOX controls"
-
Framework Alignment
- "Map to NIST CSF"
- "Align with ISO 27001"
- "Track CIS controls"
- "Monitor MITRE coverage"
-
Audit Support
- "Generate audit evidence"
- "Document controls"
- "Track exceptions"
- "Provide attestations"
Integration & Orchestration
-
Ticketing Integration
- "Create Jira tickets"
- "Update ServiceNow"
- "Sync with ITSM"
- "Track in ticketing"
-
Patch Deployment
- "Integrate with SCCM"
- "Connect to WSUS"
- "Use Ansible playbooks"
- "Deploy via Puppet"
-
SIEM Integration
- "Enrich security events"
- "Correlate with threats"
- "Trigger responses"
- "Update risk scores"
Prerequisites
- Access to Cequence AI Gateway
- CrowdStrike Falcon Spotlight subscription
- API client credentials
- Appropriate API scopes
Step 1: Create CrowdStrike API Client
1.1 Access Falcon Console
- Log in to CrowdStrike Falcon
- Navigate to Support > API Clients and Keys
- Click Create API Client
1.2 Configure API Client
- Fill in details:
- Client Name: "AI Gateway Spotlight MCP"
- Description: "Vulnerability management integration"
- API Scopes: Select Spotlight scopes
1.3 Select API Scopes
Required scopes:
- Spotlight Vulnerabilities: Read
- Hosts: Read
- Sensor Download: Read
- Reports: Read
1.4 Save Credentials
- Click Create
- Copy Client ID
- Copy Client Secret
- Note your Base URL
Step 2-4: Standard Setup
Follow standard steps to access AI Gateway, find CrowdStrike Falcon Spotlight API, and create MCP server.
Step 5: Configure API Endpoints
- Base URL:
https://api.crowdstrike.com
- Select endpoints:
- Spotlight vulnerabilities endpoints
- Remediation endpoints
- Intel endpoints
- Click Next
Step 6: MCP Server Configuration
- Name: "CrowdStrike Falcon Spotlight"
- Description: "Vulnerability management and assessment"
- Configure production mode
- Click Next
Step 7: Configure Authentication
- Authentication Type: OAuth 2.0 (Client Credentials)
- Token URL:
https://api.crowdstrike.com/oauth2/token
- Grant Type:
client_credentials
- Enter Client ID and Secret
Available CrowdStrike Spotlight API Scopes
Vulnerability Management
-
Spotlight Vulnerabilities
spotlight-vulnerabilities:read
- View vulnerabilities
-
Hosts
hosts:read
- View host information
Intelligence & Reporting
-
Intel
intel:read
- Access threat intelligence
-
Reports
reports:read
- Generate reports
Recommended Scope Combinations
For Vulnerability Analysts:
spotlight-vulnerabilities:read
hosts:read
intel:read
reports:read
For Remediation Teams:
spotlight-vulnerabilities:read
hosts:read
reports:read
Step 8-10: Complete Setup
Configure security, choose deployment, and deploy.
Using Your CrowdStrike Falcon Spotlight MCP Server
With Claude Desktop
{
"servers": {
"crowdstrike-spotlight": {
"url": "your-mcp-server-url",
"auth": {
"type": "oauth2",
"client_id": "your-client-id",
"grant_type": "client_credentials"
}
}
}
}
Natural Language Commands
- "Show all critical vulnerabilities being actively exploited"
- "Find Windows servers missing security patches"
- "Calculate risk score for production environment"
- "Generate PCI compliance vulnerability report"
- "List remediation options for CVE-2024-12345"
API Integration Example
// Initialize MCP client
const mcpClient = new MCPClient({
serverUrl: 'your-mcp-server-url',
auth: {
type: 'oauth2',
clientId: 'your-client-id',
clientSecret: 'your-client-secret',
grantType: 'client_credentials'
}
});
// Get critical vulnerabilities
const criticalVulns = await mcpClient.crowdstrike.spotlight.getVulnerabilities({
filter: "cve.severity:'CRITICAL'+cve.exploit_status:['AVAILABLE','ACTIVE']",
sort: "cve.exploit_status_probability|desc",
limit: 100
});
console.log(`Found ${criticalVulns.meta.pagination.total} critical vulnerabilities`);
for (const vuln of criticalVulns.resources) {
console.log(`\nCVE: ${vuln.cve.id}`);
console.log(`Severity: ${vuln.cve.severity} (Score: ${vuln.cve.base_score})`);
console.log(`Exploit Status: ${vuln.cve.exploit_status}`);
console.log(`Affected Hosts: ${vuln.host_info.count}`);
console.log(`Published: ${vuln.cve.published_date}`);
console.log(`Description: ${vuln.cve.description}`);
}
// Get vulnerability details with remediation
const vulnDetails = await mcpClient.crowdstrike.spotlight.getVulnerabilityDetails({
ids: ['CVE-2024-12345', 'CVE-2024-12346'],
include: ['remediations', 'host_info', 'exploit_intel']
});
for (const vuln of vulnDetails.resources) {
console.log(`\n=== ${vuln.cve.id} ===`);
console.log(`Remediation Available: ${vuln.remediation.available}`);
if (vuln.remediation.patch) {
console.log(`Patch: ${vuln.remediation.patch.title}`);
console.log(`KB: ${vuln.remediation.patch.kb}`);
console.log(`Superseded: ${vuln.remediation.patch.superseded_by || 'No'}`);
}
if (vuln.remediation.workaround) {
console.log(`Workaround: ${vuln.remediation.workaround.description}`);
}
if (vuln.exploit_intel) {
console.log(`\nExploit Intelligence:`);
console.log(`- In the Wild: ${vuln.exploit_intel.in_the_wild}`);
console.log(`- Exploit Kits: ${vuln.exploit_intel.exploit_kits.join(', ')}`);
console.log(`- Threat Actors: ${vuln.exploit_intel.threat_actors.join(', ')}`);
}
}
// Risk-based prioritization
const riskPrioritization = await mcpClient.crowdstrike.spotlight.calculateRisk({
include_factors: [
'exploit_availability',
'asset_criticality',
'exposure_level',
'business_impact',
'compensating_controls'
],
environment: 'production'
});
console.log("\nTop Priority Vulnerabilities:");
for (const item of riskPrioritization.prioritized_vulnerabilities.slice(0, 10)) {
console.log(`${item.rank}. ${item.cve_id}`);
console.log(` Risk Score: ${item.risk_score}/100`);
console.log(` Factors: ${item.risk_factors.join(', ')}`);
console.log(` Recommended Action: ${item.recommended_action}`);
console.log(` Expected Risk Reduction: ${item.risk_reduction}%`);
}
// Patch management
const patchPlan = await mcpClient.crowdstrike.spotlight.createPatchPlan({
target: 'critical_systems',
strategy: 'risk_based',
constraints: {
maintenance_windows: [
{ start: '2025-02-01T02:00:00Z', duration: '4h' },
{ start: '2025-02-08T02:00:00Z', duration: '4h' }
],
max_hosts_per_window: 50,
require_rollback_plan: true
}
});
console.log("\nPatch Plan Created:");
console.log(`Total Patches: ${patchPlan.total_patches}`);
console.log(`Affected Hosts: ${patchPlan.affected_hosts}`);
console.log(`Estimated Duration: ${patchPlan.estimated_duration}`);
console.log(`\nSchedule:`);
for (const window of patchPlan.maintenance_schedule) {
console.log(`- ${window.date}: ${window.patch_count} patches on ${window.host_count} hosts`);
console.log(` Critical Patches: ${window.critical_patches}`);
}
// Compliance reporting
const complianceReport = await mcpClient.crowdstrike.spotlight.generateComplianceReport({
framework: 'PCI_DSS_v4',
scope: {
include_hosts: { tags: ['payment_processing', 'cardholder_data'] },
exclude_hosts: { tags: ['test', 'development'] }
},
report_sections: [
'vulnerability_summary',
'patch_compliance',
'configuration_compliance',
'remediation_timeline'
]
});
console.log("\nPCI DSS Compliance Report:");
console.log(`Overall Compliance: ${complianceReport.compliance_percentage}%`);
console.log(`Critical Findings: ${complianceReport.critical_findings}`);
console.log(`\nRequirement Status:`);
for (const req of complianceReport.requirements) {
console.log(`- ${req.id}: ${req.status} (${req.compliance}%)`);
if (req.gaps) {
console.log(` Gaps: ${req.gaps.join(', ')}`);
}
}
// Exploit monitoring
const exploitWatch = await mcpClient.crowdstrike.spotlight.monitorExploits({
watch_list: ['CVE-2024-1234', 'CVE-2024-5678'],
alert_on: ['new_exploit', 'exploit_weaponized', 'active_campaigns']
});
exploitWatch.on('alert', (alert) => {
console.log(`\nEXPLOIT ALERT: ${alert.cve_id}`);
console.log(`Type: ${alert.alert_type}`);
console.log(`Details: ${alert.description}`);
console.log(`Affected Systems: ${alert.affected_count}`);
console.log(`Recommended Action: ${alert.action}`);
// Auto-trigger emergency patching
if (alert.severity === 'critical' && alert.affected_count > 0) {
triggerEmergencyPatching(alert);
}
});
// Vulnerability trending
const vulnTrends = await mcpClient.crowdstrike.spotlight.getVulnerabilityTrends({
period: 'last_90_days',
metrics: [
'new_vulnerabilities',
'remediated_vulnerabilities',
'mean_time_to_remediate',
'exploit_availability',
'risk_score_trend'
],
group_by: 'week'
});
// Generate remediation scripts
const remediationScript = await mcpClient.crowdstrike.spotlight.generateRemediationScript({
vulnerabilities: ['CVE-2024-1111', 'CVE-2024-2222'],
target_os: 'windows',
script_type: 'powershell',
options: {
pre_checks: true,
rollback_support: true,
logging: true,
test_mode: false
}
});
console.log("\nGenerated Remediation Script:");
console.log(`Script Type: ${remediationScript.type}`);
console.log(`Target Systems: ${remediationScript.target_count}`);
console.log(`Estimated Duration: ${remediationScript.estimated_duration}`);
console.log(`\nScript Preview:`);
console.log(remediationScript.script.substring(0, 500) + '...');
// Attack surface analysis
const attackSurface = await mcpClient.crowdstrike.spotlight.analyzeAttackSurface({
perspective: 'external_attacker',
include_vectors: [
'network_services',
'web_applications',
'exposed_credentials',
'vulnerable_software',
'misconfigurations'
]
});
console.log("\nAttack Surface Analysis:");
console.log(`Total Attack Vectors: ${attackSurface.total_vectors}`);
console.log(`Critical Exposures: ${attackSurface.critical_exposures}`);
console.log(`\nTop Attack Paths:`);
for (const path of attackSurface.attack_paths.slice(0, 5)) {
console.log(`- ${path.description}`);
console.log(` Likelihood: ${path.likelihood}`);
console.log(` Impact: ${path.impact}`);
console.log(` Mitigation: ${path.mitigation}`);
}
Common Use Cases
Vulnerability Management
- CVE tracking and assessment
- Risk-based prioritization
- Remediation planning
- Patch management
Compliance Management
- Regulatory compliance
- Framework alignment
- Audit preparation
- Evidence generation
Risk Assessment
- Environmental risk scoring
- Business impact analysis
- Threat correlation
- Exposure assessment
Security Operations
- Exploit monitoring
- Emergency patching
- Threat hunting support
- Incident context
Security Best Practices
-
API Security:
- Use minimal scopes
- Rotate credentials
- Monitor API usage
- Implement rate limiting
-
Vulnerability Data:
- Classify vuln data
- Restrict access
- Audit data usage
- Secure exports
-
Remediation Safety:
- Test patches first
- Plan rollbacks
- Monitor impacts
- Document changes
Troubleshooting
Common Issues
-
Data Accuracy
- Verify host inventory
- Check scan coverage
- Review agent status
- Validate CVE data
-
Performance Issues
- Optimize queries
- Use pagination
- Implement caching
- Monitor API limits
-
Integration Problems
- Verify endpoints
- Check authentication
- Review permissions
- Test connectivity
Getting Help
- Documentation: AI Gateway Docs
- Support: support@cequence.ai
- CrowdStrike Support: supportportal.crowdstrike.com