home / mcp / falcon mcp server
Connect AI agents to CrowdStrike Falcon for automated security analysis and threat hunting
Configuration
View docs{
"mcpServers": {
"crowdstrike-falcon-mcp": {
"command": "falcon-mcp",
"args": [],
"env": {
"FALCON_BASE_URL": "https://api.crowdstrike.com",
"FALCON_MCP_HOST": "127.0.0.1",
"FALCON_MCP_PORT": "8000",
"FALCON_CLIENT_ID": "your-client-id",
"FALCON_MCP_DEBUG": "false",
"FALCON_MCP_API_KEY": "your-api-key",
"FALCON_MCP_MODULES": "detections,incidents,intel",
"FALCON_CLIENT_SECRET": "your-client-secret",
"FALCON_MCP_TRANSPORT": "stdio",
"FALCON_MCP_STATELESS_HTTP": "false"
}
}
}
}Falcon MCP Server connects AI agents to the CrowdStrike Falcon platform, enabling programmatic access to detections, incidents, and behaviors so you can automate security workflows and perform rapid analysis within agentic systems.
You will run the Falcon MCP Server as a local process and connect your MCP client (such as uvx or another integration) to it. Start the server using the stdio transport for a quick, self-contained setup, then switch transports or enable remote HTTP access as your deployment needs evolve. Use the available modules to tailor capabilities like detections, incidents, intel, and more to your environment.
Prerequisites: ensure you have Python 3.11 or higher and either uv or pip installed on your system.
Install the Falcon MCP Server using the recommended tool for your environment.
# Install using uv (recommended for development and quick start)
uv tool install falcon-mcp
# Or install using pip (production-friendly with Python)
pip install falcon-mcpAPI credentials and scopes are required to access CrowdStrike Falcon resources. You create a CrowdStrike API client, assign the necessary scopes for the modules you plan to use, and then configure those credentials in the server environment or a .env file. The Falcon MCP Server supports a range of modules such as Cloud Security, Detections, Discover, Hosts, Incidents, Intel, and more. You enable modules at startup with the --modules flag or via the FALCON_MCP_MODULES environment variable. For HTTP-style transports, consider enabling an API key for the transport to improve security.
Configuration of credentials can be done via a .env file or environment variables. Example contents include Client ID, Client Secret, and the base API URL for CrowdStrike. Optional settings include the modules you want to enable, the transport type (stdio, sse, or streamable-http), and transport-level options like host, port, and stateless HTTP mode. The CrowdStrike API regions provide different base URLs depending on your region.
Running a local server with the default, stdio transport is the simplest way to start. If you need remote access or scalable deployment, you can run with SSE or streamable HTTP and adjust host/port and stateless settings as needed. When using HTTP transports, protect the endpoint with an API key by passing it through --api-key or FALCON_MCP_API_KEY.
Start with the default stdio transport (no arguments): the command is falcon-mcp.
Start with the SSE transport: falcon-mcp --transport sse.
Start with streamable-http transport: falcon-mcp --transport streamable-http --host 0.0.0.0 --port 8080.
Enable stateless HTTP mode for scalable deployments: falcon-mcp --transport streamable-http --stateless-http.
Protect HTTP transports with an API key: falcon-mcp --transport streamable-http --api-key your-secret-key.
You can run example scripts or integrate with your editor/assistant. For example, you might run a basic usage script or an integration test to validate connectivity and module availability.
Check connectivity to the Falcon API to verify you can reach the service with your credentials.
List the modules currently enabled in the Falcon MCP Server based on startup configuration.
List all available modules that the server can enable.
Search for detections and analyze potentially malicious activity.
Retrieve detailed information for specific detections by ID.
Find and analyze security incidents to understand coordinated activity.
View CrowdScore and security posture metrics for your environment.
Execute a CQL query against CrowdStrike Next-Gen SIEM repositories.
Research threat actors and adversary groups from Falcon Intelligence.
Search for indicators of compromise from Falcon Intelligence.
Access intelligence publications and threat reports.
Generate MITRE ATT&CK reports for threat actors.
Search weekly sensor usage data.
Search for scheduled reports and searches.
Launch a scheduled report on demand.
Download generated scheduled report files.
Search for vulnerabilities in serverless functions.
Search for vulnerabilities in the Falcon environment.