CrowdStrike
24 articles available
Guides for deploying and managing CrowdStrike Falcon endpoint protection
CrowdStrike Exchange Exclusions | Configure Falcon for Exchange Server
intermediateConfigure essential CrowdStrike exclusions for Microsoft Exchange Server. Protect database files, transaction logs, and processes to prevent corruption and ensure mail flow.
Deploy CrowdStrike Falcon via GPO | Active Directory Guide
advancedStep-by-step guide to deploy CrowdStrike Falcon sensors using Group Policy. Silent installation, startup scripts, troubleshooting tips for AD environments.
How to Configure CrowdStrike Exclusions for Hyper-V Hosts
intermediateOptimize CrowdStrike performance on Hyper-V hosts with proper exclusions
How to Configure CrowdStrike Exclusions for IIS (Internet Information Services)
intermediateConfigure exclusions for IIS web servers in CrowdStrike Falcon
CrowdStrike Exclusions for SCCM Configuration Manager | Complete Setup Guide
advancedPrevent SCCM deployment failures with optimized CrowdStrike Falcon exclusions. Step-by-step configuration for site servers, clients, and distribution points.
How to Configure CrowdStrike Exclusions for SharePoint Server
intermediateRecommended exclusions for Microsoft SharePoint Server in CrowdStrike Falcon
CrowdStrike Exclusions for SQL Server | Prevent Database Performance Issues
intermediateEssential CrowdStrike Falcon exclusions for SQL Server. Protect data files, processes, and AlwaysOn without performance degradation or corruption risks.
How to Install the CrowdStrike Falcon Sensor on Windows
beginnerStep-by-step guide to installing the CrowdStrike Falcon endpoint protection sensor on Windows workstations and servers
How to Install CrowdStrike Falcon Sensor on Windows 10/11 & Server (2025 Guide)
beginnerComplete step-by-step guide for installing CrowdStrike Falcon Sensor on Windows 10, 11, and Server. Includes GUI and command-line installation methods plus troubleshooting.
How to Run an On-Demand Scan in CrowdStrike Falcon (2025)
beginnerComplete guide to running CrowdStrike Falcon on-demand scans. Schedule scans, configure detection levels, optimize CPU usage, and detect threats fast.
How to Use Falcon X for Automated Threat Intelligence
advancedLeverage CrowdStrike Falcon X for malware analysis and threat intelligence