
Supercharge your Abnormal Security Data with CrowdStrike’s Falcon LogScale
Abnormal Security blocks socially engineered email threats, BEC and account takeovers, but the real story lives in the logs. Those records describe campaigns, targets and how each threat was handled. Left as raw JSON they are noisy and hard to correlate. When LogConnector streams Abnormal Security events into Falcon LogScale with a clean schema, your SOC gets fast searches, dashboards that make sense and investigations that do not depend on one person remembering every field name.
Abnormal Security gives you a strong layer against socially engineered email attacks, business email compromise and account takeover. Like most modern security platforms though, the real value is locked up in detailed logs. Those logs show which users are targeted, which attacks are landing and how remediation plays out over time. The Abnormal Security package for Falcon LogScale focuses on turning that feed into a structured data set your SOC can pivot on, correlate with other tools and summarize for leadership without wrestling raw events every time.
Abnormal Security parser
At the core of the integration is the Abnormal Security parser inside LogConnector. It reshapes campaign, threat and case logs into a consistent format and enriches the threat stream with MITRE ATT&CK technique matching. That means you can quickly align detections with known adversary behavior instead of manually tagging each record.
- Handles campaign logs so you can see active attack waves, top targeted users and how campaigns evolve over time without building custom queries from scratch.
- Normalizes threat logs with fields for sender, recipient, threat category, ATT&CK technique and decision, giving analysts a single pattern for hunting and reporting.
- Captures case logs so you can track investigations, case status and remediation outcomes, making it easier to measure efficiency and dwell time.
Dashboards that matter
To keep teams out of the query editor for common questions, the package ships with a focused set of dashboards. They are opinion driven enough to be useful on day one and simple enough to clone and tune for your own environment.
The standard dashboards cover:
- ✓Overview - a high level view of Abnormal activity.
- ✓Campaign - lets you follow coordinated attack efforts over time and see which users or departments are hit hardest.
- ✓Emails - drills into message level data so analysts can review specific threats and patterns without leaving LogScale.
- ✓Cases - tracks investigations and outcomes so your team can triage smarter and report on remediation progress.
Using these dashboards your security team can gain access to a wealth of actionable insights and proactively address threats and issues. The Abnormal Security dashboards provide efficient visualization and insights as shown in the example views.
Why this matters
Many teams already ship Abnormal Security logs to some central store but still struggle to answer simple questions. The data is scattered across consoles, structures vary and queries are slow. With LogConnector and Falcon LogScale you get structured, enriched events and the ability to mix Abnormal data with identity, endpoint and proxy signals. That shortens investigation time and gives better context for policy and user awareness decisions.
Conclusion
Parsing logs without context leads to missed insights and slow response. This Abnormal Security package transforms raw events into intuitive visuals and enriched records aligned with MITRE standards. Whether you are chasing phishing campaigns or watching your broader email threat landscape, this integration gives your team a complete view of Abnormal activity inside Falcon LogScale instead of scattered screenshots and exports.
Ready to dive deeper?
Every organization uses Abnormal Security a little differently. On projects we help teams decide which log types to ingest, how to tune retention and how to connect Abnormal dashboards with identity, endpoint and SIEM views. The goal is a setup that delivers answers without constant vendor tuning or manual data pulls.
Get in touch with us today
We work with messaging and security teams that already trust Abnormal Security but want better visibility into what it is doing for them. That usually means quicker answers during incidents, fewer blind spots in mail flows and clearer reporting on email threats.
Once ingestion and parsing are stable you can track concrete improvements like reduced time to understand new campaigns, better attribution of risky patterns and easier justification of email security spend.
Talk to the team
Want Abnormal logs to actually drive decisions?
We design and support LogConnector pipelines that bring Abnormal Security data into Falcon LogScale with tested parsers, dashboards and alerting patterns that match your environment.
Get in touch with us today
to learn more about:
- ›LogConnector features and benefits
- ›Abnormal Security package for Falcon LogScale
- ›How LogConnector and Falcon LogScale can enhance your IT and security operations
Related Articles
Explore more integration guides where LogConnector streams security data into Falcon LogScale and Splunk with normalized fields and ready to use dashboards.





