Skip to main content

CrowdStrike Falcon Spotlight MCP Server

Create a powerful Model Context Protocol (MCP) server for CrowdStrike Falcon Spotlight in minutes with our AI Gateway. This guide walks you through setting up seamless vulnerability management integration with enterprise-grade security and instant OAuth authentication.

About CrowdStrike Falcon Spotlight API

CrowdStrike Falcon Spotlight provides real-time, comprehensive vulnerability management without requiring additional agents or scanners. It continuously assesses vulnerabilities, prioritizes risks, and provides actionable remediation guidance across your entire environment.

Key Capabilities

  • Vulnerability Assessment: Real-time CVE detection
  • Risk Prioritization: AI-powered risk scoring
  • Patch Management: Automated patch intelligence
  • Exploit Intelligence: Active exploit monitoring
  • Remediation Guidance: Actionable fix recommendations
  • Compliance Tracking: Regulatory compliance
  • Asset Context: Environmental risk factors
  • Threat Correlation: Link vulnerabilities to threats

API Features

  • Vulnerabilities API: CVE management
  • Remediations API: Patch and fix guidance
  • Risk Scoring API: Prioritization metrics
  • OAuth 2.0: Secure authentication
  • Spotlight Intel API: Exploit intelligence
  • Reports API: Vulnerability reporting
  • Dashboard API: Metrics and KPIs
  • Export API: Data extraction

What You Can Do with CrowdStrike Falcon Spotlight MCP Server

The MCP server transforms Falcon Spotlight API into a natural language interface, enabling AI agents to:

Vulnerability Discovery

  • CVE Detection

    • "Find all critical CVEs"
    • "Show vulnerabilities in production"
    • "List unpatched systems"
    • "Track new vulnerabilities today"
  • Exploit Monitoring

    • "Show actively exploited vulns"
    • "Find zero-day vulnerabilities"
    • "Track exploit kit usage"
    • "Monitor threat actor targeting"
  • Asset Vulnerability

    • "Scan Windows servers"
    • "Check application vulns"
    • "Assess cloud workloads"
    • "Review container security"

Risk Prioritization

  • Risk Scoring

    • "Calculate environment risk score"
    • "Show highest risk assets"
    • "Prioritize remediation efforts"
    • "Track risk trends"
  • Contextual Risk

    • "Assess business impact"
    • "Consider asset criticality"
    • "Evaluate exposure levels"
    • "Factor threat intelligence"
  • Risk Modeling

    • "Predict exploitation likelihood"
    • "Model attack scenarios"
    • "Calculate breach impact"
    • "Estimate remediation ROI"

Patch Management

  • Patch Intelligence

    • "Find available patches"
    • "Track patch supersedence"
    • "Identify missing updates"
    • "Monitor patch releases"
  • Patch Planning

    • "Create patch schedule"
    • "Group related patches"
    • "Plan maintenance windows"
    • "Coordinate deployments"
  • Patch Validation

    • "Test patch compatibility"
    • "Check dependencies"
    • "Verify patch success"
    • "Monitor rollback needs"

Remediation Management

  • Fix Recommendations

    • "Show remediation options"
    • "Provide workarounds"
    • "Suggest compensating controls"
    • "Offer configuration changes"
  • Remediation Tracking

    • "Monitor fix progress"
    • "Track SLA compliance"
    • "Measure MTTR"
    • "Verify remediation"
  • Automation Support

    • "Generate patch scripts"
    • "Create automation playbooks"
    • "Build deployment packages"
    • "Schedule remediations"

Analytics & Reporting

  • Vulnerability Metrics

    • "Show vuln trends"
    • "Calculate exposure time"
    • "Measure patch velocity"
    • "Track coverage gaps"
  • Compliance Reporting

    • "Generate PCI reports"
    • "Create HIPAA documentation"
    • "Build SOC 2 evidence"
    • "Track CIS benchmarks"
  • Executive Dashboards

    • "Risk posture summary"
    • "Remediation progress"
    • "Threat landscape view"
    • "KPI tracking"

Threat Intelligence

  • Exploit Intelligence

    • "Track exploit availability"
    • "Monitor exploit kits"
    • "Identify weaponization"
    • "Assess exploit reliability"
  • Threat Actor Mapping

    • "Link CVEs to actors"
    • "Track targeting patterns"
    • "Monitor campaigns"
    • "Predict targeting"
  • Attack Surface

    • "Map exposed vulnerabilities"
    • "Calculate attack paths"
    • "Identify weak points"
    • "Model breach scenarios"

Compliance Management

  • Regulatory Compliance

    • "Check PCI compliance"
    • "Verify HIPAA requirements"
    • "Track GDPR obligations"
    • "Monitor SOX controls"
  • Framework Alignment

    • "Map to NIST CSF"
    • "Align with ISO 27001"
    • "Track CIS controls"
    • "Monitor MITRE coverage"
  • Audit Support

    • "Generate audit evidence"
    • "Document controls"
    • "Track exceptions"
    • "Provide attestations"

Integration & Orchestration

  • Ticketing Integration

    • "Create Jira tickets"
    • "Update ServiceNow"
    • "Sync with ITSM"
    • "Track in ticketing"
  • Patch Deployment

    • "Integrate with SCCM"
    • "Connect to WSUS"
    • "Use Ansible playbooks"
    • "Deploy via Puppet"
  • SIEM Integration

    • "Enrich security events"
    • "Correlate with threats"
    • "Trigger responses"
    • "Update risk scores"

Prerequisites

  • Access to Cequence AI Gateway
  • CrowdStrike Falcon Spotlight subscription
  • API client credentials
  • Appropriate API scopes

Step 1: Create CrowdStrike API Client

1.1 Access Falcon Console

  1. Log in to CrowdStrike Falcon
  2. Navigate to Support > API Clients and Keys
  3. Click Create API Client

1.2 Configure API Client

  1. Fill in details:
    • Client Name: "AI Gateway Spotlight MCP"
    • Description: "Vulnerability management integration"
    • API Scopes: Select Spotlight scopes

1.3 Select API Scopes

Required scopes:

  • Spotlight Vulnerabilities: Read
  • Hosts: Read
  • Sensor Download: Read
  • Reports: Read

1.4 Save Credentials

  1. Click Create
  2. Copy Client ID
  3. Copy Client Secret
  4. Note your Base URL

Step 2-4: Standard Setup

Follow standard steps to access AI Gateway, find CrowdStrike Falcon Spotlight API, and create MCP server.

Step 5: Configure API Endpoints

  1. Base URL: https://api.crowdstrike.com
  2. Select endpoints:
    • Spotlight vulnerabilities endpoints
    • Remediation endpoints
    • Intel endpoints
  3. Click Next

Step 6: MCP Server Configuration

  1. Name: "CrowdStrike Falcon Spotlight"
  2. Description: "Vulnerability management and assessment"
  3. Configure production mode
  4. Click Next

Step 7: Configure Authentication

  1. Authentication Type: OAuth 2.0 (Client Credentials)
  2. Token URL:
    https://api.crowdstrike.com/oauth2/token
  3. Grant Type: client_credentials
  4. Enter Client ID and Secret

Available CrowdStrike Spotlight API Scopes

Vulnerability Management

  • Spotlight Vulnerabilities

    • spotlight-vulnerabilities:read - View vulnerabilities
  • Hosts

    • hosts:read - View host information

Intelligence & Reporting

  • Intel

    • intel:read - Access threat intelligence
  • Reports

    • reports:read - Generate reports

For Vulnerability Analysts:

spotlight-vulnerabilities:read
hosts:read
intel:read
reports:read

For Remediation Teams:

spotlight-vulnerabilities:read
hosts:read
reports:read

Step 8-10: Complete Setup

Configure security, choose deployment, and deploy.

Using Your CrowdStrike Falcon Spotlight MCP Server

With Claude Desktop

{
"servers": {
"crowdstrike-spotlight": {
"url": "your-mcp-server-url",
"auth": {
"type": "oauth2",
"client_id": "your-client-id",
"grant_type": "client_credentials"
}
}
}
}

Natural Language Commands

  • "Show all critical vulnerabilities being actively exploited"
  • "Find Windows servers missing security patches"
  • "Calculate risk score for production environment"
  • "Generate PCI compliance vulnerability report"
  • "List remediation options for CVE-2024-12345"

API Integration Example

// Initialize MCP client
const mcpClient = new MCPClient({
serverUrl: 'your-mcp-server-url',
auth: {
type: 'oauth2',
clientId: 'your-client-id',
clientSecret: 'your-client-secret',
grantType: 'client_credentials'
}
});

// Get critical vulnerabilities
const criticalVulns = await mcpClient.crowdstrike.spotlight.getVulnerabilities({
filter: "cve.severity:'CRITICAL'+cve.exploit_status:['AVAILABLE','ACTIVE']",
sort: "cve.exploit_status_probability|desc",
limit: 100
});

console.log(`Found ${criticalVulns.meta.pagination.total} critical vulnerabilities`);
for (const vuln of criticalVulns.resources) {
console.log(`\nCVE: ${vuln.cve.id}`);
console.log(`Severity: ${vuln.cve.severity} (Score: ${vuln.cve.base_score})`);
console.log(`Exploit Status: ${vuln.cve.exploit_status}`);
console.log(`Affected Hosts: ${vuln.host_info.count}`);
console.log(`Published: ${vuln.cve.published_date}`);
console.log(`Description: ${vuln.cve.description}`);
}

// Get vulnerability details with remediation
const vulnDetails = await mcpClient.crowdstrike.spotlight.getVulnerabilityDetails({
ids: ['CVE-2024-12345', 'CVE-2024-12346'],
include: ['remediations', 'host_info', 'exploit_intel']
});

for (const vuln of vulnDetails.resources) {
console.log(`\n=== ${vuln.cve.id} ===`);
console.log(`Remediation Available: ${vuln.remediation.available}`);

if (vuln.remediation.patch) {
console.log(`Patch: ${vuln.remediation.patch.title}`);
console.log(`KB: ${vuln.remediation.patch.kb}`);
console.log(`Superseded: ${vuln.remediation.patch.superseded_by || 'No'}`);
}

if (vuln.remediation.workaround) {
console.log(`Workaround: ${vuln.remediation.workaround.description}`);
}

if (vuln.exploit_intel) {
console.log(`\nExploit Intelligence:`);
console.log(`- In the Wild: ${vuln.exploit_intel.in_the_wild}`);
console.log(`- Exploit Kits: ${vuln.exploit_intel.exploit_kits.join(', ')}`);
console.log(`- Threat Actors: ${vuln.exploit_intel.threat_actors.join(', ')}`);
}
}

// Risk-based prioritization
const riskPrioritization = await mcpClient.crowdstrike.spotlight.calculateRisk({
include_factors: [
'exploit_availability',
'asset_criticality',
'exposure_level',
'business_impact',
'compensating_controls'
],
environment: 'production'
});

console.log("\nTop Priority Vulnerabilities:");
for (const item of riskPrioritization.prioritized_vulnerabilities.slice(0, 10)) {
console.log(`${item.rank}. ${item.cve_id}`);
console.log(` Risk Score: ${item.risk_score}/100`);
console.log(` Factors: ${item.risk_factors.join(', ')}`);
console.log(` Recommended Action: ${item.recommended_action}`);
console.log(` Expected Risk Reduction: ${item.risk_reduction}%`);
}

// Patch management
const patchPlan = await mcpClient.crowdstrike.spotlight.createPatchPlan({
target: 'critical_systems',
strategy: 'risk_based',
constraints: {
maintenance_windows: [
{ start: '2025-02-01T02:00:00Z', duration: '4h' },
{ start: '2025-02-08T02:00:00Z', duration: '4h' }
],
max_hosts_per_window: 50,
require_rollback_plan: true
}
});

console.log("\nPatch Plan Created:");
console.log(`Total Patches: ${patchPlan.total_patches}`);
console.log(`Affected Hosts: ${patchPlan.affected_hosts}`);
console.log(`Estimated Duration: ${patchPlan.estimated_duration}`);
console.log(`\nSchedule:`);
for (const window of patchPlan.maintenance_schedule) {
console.log(`- ${window.date}: ${window.patch_count} patches on ${window.host_count} hosts`);
console.log(` Critical Patches: ${window.critical_patches}`);
}

// Compliance reporting
const complianceReport = await mcpClient.crowdstrike.spotlight.generateComplianceReport({
framework: 'PCI_DSS_v4',
scope: {
include_hosts: { tags: ['payment_processing', 'cardholder_data'] },
exclude_hosts: { tags: ['test', 'development'] }
},
report_sections: [
'vulnerability_summary',
'patch_compliance',
'configuration_compliance',
'remediation_timeline'
]
});

console.log("\nPCI DSS Compliance Report:");
console.log(`Overall Compliance: ${complianceReport.compliance_percentage}%`);
console.log(`Critical Findings: ${complianceReport.critical_findings}`);
console.log(`\nRequirement Status:`);
for (const req of complianceReport.requirements) {
console.log(`- ${req.id}: ${req.status} (${req.compliance}%)`);
if (req.gaps) {
console.log(` Gaps: ${req.gaps.join(', ')}`);
}
}

// Exploit monitoring
const exploitWatch = await mcpClient.crowdstrike.spotlight.monitorExploits({
watch_list: ['CVE-2024-1234', 'CVE-2024-5678'],
alert_on: ['new_exploit', 'exploit_weaponized', 'active_campaigns']
});

exploitWatch.on('alert', (alert) => {
console.log(`\nEXPLOIT ALERT: ${alert.cve_id}`);
console.log(`Type: ${alert.alert_type}`);
console.log(`Details: ${alert.description}`);
console.log(`Affected Systems: ${alert.affected_count}`);
console.log(`Recommended Action: ${alert.action}`);

// Auto-trigger emergency patching
if (alert.severity === 'critical' && alert.affected_count > 0) {
triggerEmergencyPatching(alert);
}
});

// Vulnerability trending
const vulnTrends = await mcpClient.crowdstrike.spotlight.getVulnerabilityTrends({
period: 'last_90_days',
metrics: [
'new_vulnerabilities',
'remediated_vulnerabilities',
'mean_time_to_remediate',
'exploit_availability',
'risk_score_trend'
],
group_by: 'week'
});

// Generate remediation scripts
const remediationScript = await mcpClient.crowdstrike.spotlight.generateRemediationScript({
vulnerabilities: ['CVE-2024-1111', 'CVE-2024-2222'],
target_os: 'windows',
script_type: 'powershell',
options: {
pre_checks: true,
rollback_support: true,
logging: true,
test_mode: false
}
});

console.log("\nGenerated Remediation Script:");
console.log(`Script Type: ${remediationScript.type}`);
console.log(`Target Systems: ${remediationScript.target_count}`);
console.log(`Estimated Duration: ${remediationScript.estimated_duration}`);
console.log(`\nScript Preview:`);
console.log(remediationScript.script.substring(0, 500) + '...');

// Attack surface analysis
const attackSurface = await mcpClient.crowdstrike.spotlight.analyzeAttackSurface({
perspective: 'external_attacker',
include_vectors: [
'network_services',
'web_applications',
'exposed_credentials',
'vulnerable_software',
'misconfigurations'
]
});

console.log("\nAttack Surface Analysis:");
console.log(`Total Attack Vectors: ${attackSurface.total_vectors}`);
console.log(`Critical Exposures: ${attackSurface.critical_exposures}`);
console.log(`\nTop Attack Paths:`);
for (const path of attackSurface.attack_paths.slice(0, 5)) {
console.log(`- ${path.description}`);
console.log(` Likelihood: ${path.likelihood}`);
console.log(` Impact: ${path.impact}`);
console.log(` Mitigation: ${path.mitigation}`);
}

Common Use Cases

Vulnerability Management

  • CVE tracking and assessment
  • Risk-based prioritization
  • Remediation planning
  • Patch management

Compliance Management

  • Regulatory compliance
  • Framework alignment
  • Audit preparation
  • Evidence generation

Risk Assessment

  • Environmental risk scoring
  • Business impact analysis
  • Threat correlation
  • Exposure assessment

Security Operations

  • Exploit monitoring
  • Emergency patching
  • Threat hunting support
  • Incident context

Security Best Practices

  1. API Security:

    • Use minimal scopes
    • Rotate credentials
    • Monitor API usage
    • Implement rate limiting
  2. Vulnerability Data:

    • Classify vuln data
    • Restrict access
    • Audit data usage
    • Secure exports
  3. Remediation Safety:

    • Test patches first
    • Plan rollbacks
    • Monitor impacts
    • Document changes

Troubleshooting

Common Issues

  1. Data Accuracy

    • Verify host inventory
    • Check scan coverage
    • Review agent status
    • Validate CVE data
  2. Performance Issues

    • Optimize queries
    • Use pagination
    • Implement caching
    • Monitor API limits
  3. Integration Problems

    • Verify endpoints
    • Check authentication
    • Review permissions
    • Test connectivity

Getting Help