Skip to main content

Set up the CrowdStrike Falcon MCP server

The CrowdStrike Falcon MCP server connects AI agents to the Falcon platform for security operations — querying detections, incidents, threat intelligence, host inventory, vulnerabilities, and more. This guide covers creating a Falcon API client with the right scopes and adding it to MintMCP using the Advanced hosted connector setup with per-user credentials.

Prerequisites

  • A MintMCP admin account
  • A CrowdStrike Falcon subscription with API access

Create a Falcon API client

Because FALCON_CLIENT_ID and FALCON_CLIENT_SECRET are per-user credentials, each team member needs to create their own Falcon API client. Share these steps with your team.

  1. Go to falcon.crowdstrike.com and sign in.

  2. Navigate to Support > API Clients and Keys.

  3. Click Add new API client.

  4. Enter a name (e.g., "MintMCP Falcon") and an optional description.

  5. Select scopes under API scopes based on the modules you want to enable. The table below maps each module to its required scopes.

ModuleRequired API scopes
DetectionsAlerts:read
IncidentsIncidents:read
HostsHosts:read
IntelActors (Falcon Intelligence):read, Indicators (Falcon Intelligence):read, Reports (Falcon Intelligence):read
SpotlightVulnerabilities:read
Custom IOACustom IOA Rules:read, Custom IOA Rules:write
Identity ProtectionIdentity Protection Entities:read, Identity Protection Timeline:read, Identity Protection Detections:read, Identity Protection Assessment:read, Identity Protection GraphQL:write
Firewall ManagementFirewall Management:read, Firewall Management:write
NGSIEMNGSIEM:read, NGSIEM:write
Cloud SecurityFalcon Container Image:read
DiscoverAssets:read
IOCIOC Management:read, IOC Management:write
Scheduled ReportsScheduled Reports:read
Sensor UsageSensor Usage:read
ServerlessFalcon Container Image:read
  1. Click Add.

  2. Copy the Client ID and Client Secret. The secret is shown only once — store it in a secrets manager before closing.

Add CrowdStrike Falcon to MintMCP

  1. In MintMCP, go to MCP store > Manage store.
  2. Click + Add an MCP to your registryHost an open source or custom MCP.
  3. Click Advanced.
  4. Enter uvx falcon-mcp in the Command field.
  5. Under Global Environment Variables, add FALCON_BASE_URLhttps://api.crowdstrike.com.
  6. Under User Specific Environment Variables, add FALCON_CLIENT_ID and FALCON_CLIENT_SECRET.
  7. Click Create.

If your Falcon environment is not in US-1, set FALCON_BASE_URL to the appropriate regional URL:

RegionBase URL
US-1 (default)https://api.crowdstrike.com
US-2https://api.us-2.crowdstrike.com
EU-1https://api.eu-1.crowdstrike.com
US-GOVhttps://api.laggar.gcw.crowdstrike.com

To limit which modules are active, add FALCON_MCP_MODULES as a Global Environment Variable with a comma-separated list of module names (e.g., detections,incidents,intel). If omitted, all modules are enabled.

Security considerations

  • The client secret is shown only once at creation — store it immediately in a secrets manager.
  • Grant only the API scopes your use case requires. Each module maps to specific scopes in the table above.
  • Each user's Falcon API client is scoped to their own account — actions are tied to the individual's identity and permissions.
  • This server is in public preview and CrowdStrike advises against production deployments until the stable 1.0 release.

Next steps