CrowdStrike
24 articles available
Guides for deploying and managing CrowdStrike Falcon endpoint protection
CrowdStrike User Roles: Create Custom Roles & Manage Permissions
intermediateCreate and manage user roles in CrowdStrike Falcon with custom permissions. Step-by-step guide to configure role-based access control (RBAC), assign permissions, and restrict user access to Falcon console features.
CrowdStrike Exchange Exclusions | Configure Falcon for Exchange Server
intermediateConfigure essential CrowdStrike exclusions for Microsoft Exchange Server. Protect database files, transaction logs, and processes to prevent corruption and ensure mail flow.
Deploy CrowdStrike Falcon via GPO | Active Directory Guide
advancedStep-by-step guide to deploy CrowdStrike Falcon sensors using Group Policy. Silent installation, startup scripts, troubleshooting tips for AD environments.
How to Configure CrowdStrike Exclusions for Hyper-V Hosts
intermediateOptimize CrowdStrike performance on Hyper-V hosts with proper exclusions
How to Configure CrowdStrike Exclusions for IIS (Internet Information Services)
intermediateConfigure exclusions for IIS web servers in CrowdStrike Falcon
CrowdStrike Exclusions for SCCM Configuration Manager | Complete Setup Guide
advancedPrevent SCCM deployment failures with optimized CrowdStrike Falcon exclusions. Step-by-step configuration for site servers, clients, and distribution points.
How to Configure CrowdStrike Exclusions for SharePoint Server
intermediateRecommended exclusions for Microsoft SharePoint Server in CrowdStrike Falcon
CrowdStrike Exclusions for SQL Server | Prevent Database Performance Issues
intermediateEssential CrowdStrike Falcon exclusions for SQL Server. Protect data files, processes, and AlwaysOn without performance degradation or corruption risks.
CrowdStrike Exclusions: Configure File, Folder & Process Exceptions
intermediateConfigure CrowdStrike Falcon exclusions for files, folders, and processes. Step-by-step guide to create exceptions, prevent false positives, and whitelist applications without compromising endpoint security.
CrowdStrike Custom IOCs: Create Indicators of Compromise for Threat Detection
advancedCreate custom IOCs (Indicators of Compromise) in CrowdStrike Falcon to detect specific threats. Step-by-step guide to add IP addresses, domains, file hashes, and custom detection rules.
How to Install the CrowdStrike Falcon Sensor on Windows
beginnerStep-by-step guide to installing the CrowdStrike Falcon endpoint protection sensor on Windows workstations and servers
Install CrowdStrike on Mac: Falcon Sensor Deployment Guide for macOS
beginnerInstall CrowdStrike Falcon sensor on macOS with step-by-step instructions. Includes sensor download, System Extension approval, Full Disk Access setup, and troubleshooting for Mac deployment.
How to Install CrowdStrike Falcon Sensor on Windows 10/11 & Server (2025 Guide)
beginnerComplete step-by-step guide for installing CrowdStrike Falcon Sensor on Windows 10, 11, and Server. Includes GUI and command-line installation methods plus troubleshooting.
Connect CrowdStrike to SIEM: Splunk, QRadar, Sentinel
advancedIntegrate CrowdStrike Falcon with Splunk, QRadar, ArcSight, and Sentinel. Complete setup guide for SIEM Connector with API config and troubleshooting.
Investigate Security Incidents in CrowdStrike: Threat Hunting & RTR Guide
advancedInvestigate security incidents using CrowdStrike Falcon with step-by-step detection analysis, Real-Time Response (RTR), threat hunting, and incident response. Learn to analyze detections, hunt threats, and contain compromised endpoints.
CrowdStrike Quarantine Endpoint: Contain Host & Network Isolation Guide
intermediateQuarantine and contain compromised endpoints in CrowdStrike Falcon to isolate infected hosts from your network. Step-by-step guide to contain, verify, and lift containment with troubleshooting tips.
How to Run an On-Demand Scan in CrowdStrike Falcon (2025)
beginnerComplete guide to running CrowdStrike Falcon on-demand scans. Schedule scans, configure detection levels, optimize CPU usage, and detect threats fast.
CrowdStrike Device Control Setup: Block USB & Configure Falcon USB Blocking
intermediateConfigure CrowdStrike Falcon device control to block USB drives and removable media. Step-by-step guide for USB blocking, whitelisting specific devices, and creating device control policies.
Setup MFA in CrowdStrike Falcon: Step-by-Step Guide
intermediateEnable multi-factor authentication in CrowdStrike Falcon. Step-by-step guide to configure MFA with authenticator apps, security keys, and enforce for all users.
CrowdStrike Prevention Policy Setup: Configure Falcon Detection & Host Groups
intermediateConfigure CrowdStrike Falcon prevention policies to block malware and assign host groups. Step-by-step guide for detection levels, application control, and policy best practices.
Uninstall CrowdStrike Falcon Sensor: Remove with/without Maintenance Token
intermediateUninstall CrowdStrike Falcon sensor from Windows, Mac, and Linux using maintenance token. Step-by-step commands for removal (WindowsSensor.exe /uninstall, falconctl uninstall). Includes uninstalling without token and troubleshooting invalid token errors.
How to Use Falcon X for Automated Threat Intelligence
advancedLeverage CrowdStrike Falcon X for malware analysis and threat intelligence
Check CrowdStrike Falcon Sensor Status: Verify Sensor Running (Windows/Mac/Linux)
beginnerVerify CrowdStrike Falcon sensor is running with step-by-step commands for Windows (sc query csagent), Mac (falconctl stats), and Linux (systemctl status falcon-sensor). Check sensor version, service status, and troubleshoot connectivity issues.
CrowdStrike Zero Trust Assessment (ZTA): Implementation & Security Scoring
advancedImplement CrowdStrike Zero Trust Assessment (ZTA) to evaluate endpoint security posture. Step-by-step guide to enable ZTA scoring, assess device compliance, and enforce zero trust policies with Falcon.