Harness Falcon Log Collector for Seamless Third-Party Data Collection

January 8, 2025

| Tech HubNext-Gen SIEM


In cybersecurity, effective log collection and analysis are critical for identifying and mitigating threats. The Falcon Log Collector is a powerful tool designed to simplify and enhance log ingestion, enabling security teams to gain visibility and take decisive action. In this blog, we’ll explore the Falcon Log Collector, its key capabilities, and how it empowers organizations to stay ahead of sophisticated cyber threats.


 

What is the Falcon Log Collector?

The Falcon Log Collector is a lightweight, flexible application that simplifies log ingestion from various sources. It seamlessly integrates with CrowdStrike Falcon Next-Gen SIEM to ensure that logs from disparate systems are ingested and analyzed in a centralized location. This capability provides organizations with comprehensive visibility across their IT ecosystem and strengthens their ability to detect, investigate, and respond to threats.

Key Capabilities of the Falcon Log Collector

Data ingestion capabilities:

 The Falcon Log Collector supports a wide range of data sources, including but not limited to:
    – Firewall logs
    – Web proxy logs
    – Syslog (for Linux and other Unix-based systems)
    – Windows Event Logs
    – Custom application logs

This flexibility ensures that organizations can collect and analyze logs from virtually any part of their infrastructure.

Seamless Integration with CrowdStrike Falcon Next-Gen SIEM

The Falcon Log Collector integrates natively with CrowdStrike Falcon Next-Gen SIEM, targeting its ingest API to deliver actionable insights. By routing logs directly into Falcon Next-Gen SIEM, security teams gain access to powerful tools for data correlation, visualization, and threat detection.

Lightweight and Scalable by Design

The Falcon Log Collector is built for scalability. Its lightweight design ensures minimal resource consumption, allowing it to operate efficiently even in large, complex environments. This makes it ideal for enterprises with growing data ingestion needs.

Real-Time Log Ingestion

With the Falcon Log Collector, logs are ingested in real time, ensuring that security teams can respond to threats as they emerge. This capability significantly reduces the time it takes to detect and act on critical security events.

Customizable Data Filtering

Organizations want control over what is ingested into their SIEMs. With the Falcon Log Collector, events can be filtered at the edge. Edge filtering for logging refers to the practice of filtering log data closer to the source of its generation (e.g., on the endpoint device, IoT sensor, or edge server) before forwarding it to a centralized system. Amongst the benefits that may arise from filtering at the edge are:

  • Ensuring that only relevant data is collected, reducing noise. 
  • Reducing egress costs and saving bandwidth by compressing data before transmission.
  • Reducing data ingest, thereby reducing data volume license costs. 
  • Ensuring GDPR/privacy associated events don’t leave your infrastructure.

For Windows events, the Falcon Log Collector delivers a lot of configurability. Amongst the options available is the ability to choose which Windows event channels should be collected or which severity levels to collect. Events can also be included or excluded based on Windows event IDs. For all other events, using regular expression filters, events can be either included or excluded.

Secure and Reliable Data Transmission

The Falcon Log Collector uses secure protocols to transmit data, ensuring that sensitive log information remains protected during collection and transport. Additionally, built-in reliability features help ensure that logs are delivered without data loss, even in the event of network disruptions.

Benefits of Using the Falcon Log Collector

  • Enhanced Threat Detection
    By consolidating logs from diverse sources, FLC provides the data needed to identify and investigate threats that might otherwise go unnoticed.
  • Streamlined operations
    The centralized management and real-time processing capabilities reduce the workload on security teams, enabling them to focus on high-priority tasks.
  • Improved decision making
    With actionable insights generated from collected logs, security teams can make informed decisions quickly. The lightweight design and customizable log filtering reduce resource consumption and data storage costs.

Getting Started with Falcon Log Collector

Setting up the Falcon Log Collector is straightforward:

1. Install and Configure

Download the Falcon Log Collector (this may be listed as the LogScale collector) from the CrowdStrike Console and configure it to collect logs from your desired sources. To Download Navigate to: Support and resources > tools Downloads (make sure you download the latest version, see the FLC release notes for the latest version number and for information about what is new):

2. Send logs into Falcon Next-GEN SIEM

Set up the Falcon Log Collector to forward logs to CrowdStrike Falcon Next-Gen SIEM for analysis.

Sample configuration file for syslog collection:

#####
## Sample configuration file for Linux or Microsoft Windows.
## This is YAML, so structure and indentation is important.
## Lines can be uncommented by removing the #. You should not need to change the number of spaces after that.
## Config options have a single #, comments have a ##. Only uncomment the single # lines if you need them.
#####

sources:
  syslog_udp_1514:
    type: syslog
    mode: udp
    port: 1514
    sink: next-gen-siem
    ## Optional: Set the maximum event size (in bytes)
    # maxEventSize: 1048576  # 1 MB
    ## The default maxEventSize for syslog over UDP is 2048 bytes. Increase this value if you expect larger syslog messages.

   syslog_tcp_1514:
    type: syslog
    mode: tcp
    port: 1514
    sink: next-gen-siem

sinks:
  next-gen-siem:
    type: hec
    token: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
    url: https://XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX.ingest.YY-Y.crowdstrike.com
    proxy: none
    workers: 4

For additional syslog configuration options for the Falcon Log Collector, see:
https://library.humio.com/falcon-logscale-collector/log-collector-config-advanced-example.html#log_collector_config_example-syslog 

3. Monitor and Optimize

Continuously monitor log ingestion and make adjustments to ensure optimal performance and relevance.

The Falcon Log Collector and its ability to collect, filter, and securely transmit logs from a wide range of sources ensures that organizations have the data they need to maintain a robust security posture. Whether you’re looking to enhance visibility, streamline operations, or improve compliance, The Falcon Log Collector provides the tools to achieve your goals.

Ready to see how the Falcon Log Collector can transform your organization’s security operations? Contact us today or explore the documentation to get started!

 

Additional Resources

Watch demo videos: Learn how to detect, investigate and stop threats with Falcon Next-Gen SIEM by viewing fast-paced demos.

Related Content