Skip to content

Add Vaikora AI Agent Signals to CrowdStrike — Microsoft Sentinel Solution v1.0.0#13984

Open
mazamizo21 wants to merge 51 commits intoAzure:masterfrom
mazamizo21:feature/vaikora-crowdstrike-azure-v1.0.0
Open

Add Vaikora AI Agent Signals to CrowdStrike — Microsoft Sentinel Solution v1.0.0#13984
mazamizo21 wants to merge 51 commits intoAzure:masterfrom
mazamizo21:feature/vaikora-crowdstrike-azure-v1.0.0

Conversation

@mazamizo21
Copy link
Copy Markdown
Contributor

Vaikora AI Agent Signals to CrowdStrike — Microsoft Sentinel Solution v1.0.0

This PR adds a Logic App playbook solution that polls Vaikora AI agent behavioral signals and pushes high-severity indicators as Custom IOCs to CrowdStrike Falcon.

What's included

Logic App Playbook (VaikoraToCrowdStrike_Playbook.json)

  • Runs on a configurable schedule (default: every 6 hours)
  • Polls Vaikora GET /api/v1/actions for high-risk + anomalous agent actions
  • Authenticates to CrowdStrike via OAuth2 client credentials
  • Pushes Custom IOC indicators to POST /iocs/entities/indicators/v1

Signal Mapping

  • risk_level: critical → CS severity: critical, action: prevent
  • risk_level: high → CS severity: high, action: detect
  • risk_level: medium/low → CS severity: medium, action: detect
  • is_anomaly: true → tag: ai-agent-anomaly
  • threat_detected: true → tag: ai-threat-detected

Parameters

  • VaikoraApiKey (securestring)
  • VaikoraAgentId
  • CrowdStrike_ClientId (securestring)
  • CrowdStrike_ClientSecret (securestring)
  • CrowdStrike_BaseUrl (default: https://api.crowdstrike.com)

Publisher

Data443 Risk Mitigation, Inc. — support@data443.com

@mazamizo21 mazamizo21 requested review from a team as code owners April 3, 2026 06:54
@v-shukore v-shukore added the New Solution For new Solutions which are new to Microsoft Sentinel label Apr 3, 2026
@v-maheshbh
Copy link
Copy Markdown
Contributor

Hi @mazamizo21
Kindly package the solution with version 3.0.0.

Thanks!

@mazamizo21 mazamizo21 force-pushed the feature/vaikora-crowdstrike-azure-v1.0.0 branch from 7d68c28 to f3ea143 Compare April 3, 2026 14:59
@mazamizo21
Copy link
Copy Markdown
Contributor Author

Hi @v-maheshbh — done! Repackaged with version 3.0.0. Package/3.0.0.zip is now included. Thanks!

Taz Jack and others added 16 commits April 3, 2026 12:13
…ntId1), parentId bracket, arm-ttk clean (47-48/49 matching Cyren baseline)
…c App (playbook was invisible in Sentinel Automation tab)
Vaikora GET /api/v1/actions returns {actions:[...], total:N} not bare array.
Fix For_Each 'from' expression to extract ?['actions'].

Fixes VaikoraToCrowdStrike_Playbook.json + mainTemplate.json (PR Azure#13984).
Same fix applied to vaikora-sentinelone-azure cf4bfa8 and
vaikora-azure-security-center via separate commit.
@v-maheshbh
Copy link
Copy Markdown
Contributor

Hi @mazamizo21

Kindly review file changes and removed the solution not part of this PR.

Thanks!

PR Fixer added 3 commits April 8, 2026 07:17
Reverted Cyren-SentinelOne-ThreatIntelligence package files back to
upstream master. These changes were accidentally included and don't
belong in the Vaikora CrowdStrike solution PR.
These changes belong in a separate PR. Reverting Solution data,
Playbook, ReleaseNotes, and package zip back to upstream master.
Restoring Cyren-SentinelOne-ThreatIntelligence to the exact state
from before this branch. Removes 3.0.1.zip, reverts Solution data,
Playbook, mainTemplate, and ReleaseNotes. These changes belong in
their own separate PR.
@mazamizo21
Copy link
Copy Markdown
Contributor Author

Hi @v-maheshbh — removed the Cyren-SentinelOne-ThreatIntelligence files that were accidentally included. The PR now only contains the Vaikora-CrowdStrike-ThreatIntelligence solution (v3.0.0). Ready for re-review.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

New Solution For new Solutions which are new to Microsoft Sentinel

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants