Skip to content

Configuration

Configure your CrowdStrike API credentials and server settings using environment variables.

VariableDescription
FALCON_CLIENT_IDCrowdStrike API client ID
FALCON_CLIENT_SECRETCrowdStrike API client secret
FALCON_BASE_URLAPI base URL for your region (e.g., https://api.crowdstrike.com)
VariableDefaultDescription
FALCON_MEMBER_CIDFlight Control child CID (MSSP)
FALCON_MCP_MODULESallComma-separated list of modules to enable
FALCON_MCP_TRANSPORTstdioTransport method: stdio, sse, streamable-http
FALCON_MCP_DEBUGfalseEnable debug logging
FALCON_MCP_HOST127.0.0.1Host for HTTP transports
FALCON_MCP_PORT8000Port for HTTP transports
FALCON_MCP_STATELESS_HTTPfalseStateless mode for scalable deployments (required for AWS AgentCore)
FALCON_MCP_API_KEYAPI key for HTTP transport authentication

The recommended approach for development is a .env file.

Terminal window
cp .env.example .env
Terminal window
curl -o .env https://raw.githubusercontent.com/CrowdStrike/falcon-mcp/main/.env.example
# Required Configuration
FALCON_CLIENT_ID=your-client-id
FALCON_CLIENT_SECRET=your-client-secret
FALCON_BASE_URL=https://api.crowdstrike.com
# Optional Configuration
#FALCON_MEMBER_CID=your-child-cid
#FALCON_MCP_MODULES=detections,incidents,intel
#FALCON_MCP_TRANSPORT=stdio
#FALCON_MCP_DEBUG=false
#FALCON_MCP_HOST=127.0.0.1
#FALCON_MCP_PORT=8000
#FALCON_MCP_STATELESS_HTTP=false
#FALCON_MCP_API_KEY=your-api-key

By default, all available modules are enabled. To restrict which modules load:

Terminal window
# Command line (highest priority)
falcon-mcp --modules detections,incidents,intel
Terminal window
# Environment variable (fallback)
export FALCON_MCP_MODULES=detections,incidents,intel
falcon-mcp

Priority order: CLI flag > FALCON_MCP_MODULES env var > all modules (default)

When running HTTP transports (sse or streamable-http), protect the endpoint with an API key:

Terminal window
falcon-mcp --transport streamable-http --api-key your-secret-key

This is a self-generated key (any secure string you create) that ensures only authorized clients with the matching key can access the MCP server. It is separate from your CrowdStrike API credentials.