CrowdStrike

24 articles available

Guides for deploying and managing CrowdStrike Falcon endpoint protection

CrowdStrike User Roles: Create Custom Roles & Manage Permissions

intermediate

Create and manage user roles in CrowdStrike Falcon with custom permissions. Step-by-step guide to configure role-based access control (RBAC), assign permissions, and restrict user access to Falcon console features.

12 minUpdated January 2025
Read Article

CrowdStrike Exchange Exclusions | Configure Falcon for Exchange Server

intermediate

Configure essential CrowdStrike exclusions for Microsoft Exchange Server. Protect database files, transaction logs, and processes to prevent corruption and ensure mail flow.

10 minUpdated January 2025
Read Article

Deploy CrowdStrike Falcon via GPO | Active Directory Guide

advanced

Step-by-step guide to deploy CrowdStrike Falcon sensors using Group Policy. Silent installation, startup scripts, troubleshooting tips for AD environments.

15 minUpdated January 2025
Read Article

How to Configure CrowdStrike Exclusions for Hyper-V Hosts

intermediate

Optimize CrowdStrike performance on Hyper-V hosts with proper exclusions

10 minUpdated January 2025
Read Article

How to Configure CrowdStrike Exclusions for IIS (Internet Information Services)

intermediate

Configure exclusions for IIS web servers in CrowdStrike Falcon

10 minUpdated January 2025
Read Article

CrowdStrike Exclusions for SCCM Configuration Manager | Complete Setup Guide

advanced

Prevent SCCM deployment failures with optimized CrowdStrike Falcon exclusions. Step-by-step configuration for site servers, clients, and distribution points.

12 minUpdated January 2025
Read Article

How to Configure CrowdStrike Exclusions for SharePoint Server

intermediate

Recommended exclusions for Microsoft SharePoint Server in CrowdStrike Falcon

10 minUpdated January 2025
Read Article

CrowdStrike Exclusions for SQL Server | Prevent Database Performance Issues

intermediate

Essential CrowdStrike Falcon exclusions for SQL Server. Protect data files, processes, and AlwaysOn without performance degradation or corruption risks.

10 minUpdated January 2025
Read Article

CrowdStrike Exclusions: Configure File, Folder & Process Exceptions

intermediate

Configure CrowdStrike Falcon exclusions for files, folders, and processes. Step-by-step guide to create exceptions, prevent false positives, and whitelist applications without compromising endpoint security.

8 minUpdated January 2025
Read Article

CrowdStrike Custom IOCs: Create Indicators of Compromise for Threat Detection

advanced

Create custom IOCs (Indicators of Compromise) in CrowdStrike Falcon to detect specific threats. Step-by-step guide to add IP addresses, domains, file hashes, and custom detection rules.

12 minUpdated January 2025
Read Article

How to Install the CrowdStrike Falcon Sensor on Windows

beginner

Step-by-step guide to installing the CrowdStrike Falcon endpoint protection sensor on Windows workstations and servers

10 minUpdated January 2025
Read Article

Install CrowdStrike on Mac: Falcon Sensor Deployment Guide for macOS

beginner

Install CrowdStrike Falcon sensor on macOS with step-by-step instructions. Includes sensor download, System Extension approval, Full Disk Access setup, and troubleshooting for Mac deployment.

5 minUpdated January 2025
Read Article

How to Install CrowdStrike Falcon Sensor on Windows 10/11 & Server (2025 Guide)

beginner

Complete step-by-step guide for installing CrowdStrike Falcon Sensor on Windows 10, 11, and Server. Includes GUI and command-line installation methods plus troubleshooting.

5 minUpdated January 2025
Read Article

Connect CrowdStrike to SIEM: Splunk, QRadar, Sentinel

advanced

Integrate CrowdStrike Falcon with Splunk, QRadar, ArcSight, and Sentinel. Complete setup guide for SIEM Connector with API config and troubleshooting.

20 minUpdated January 2025
Read Article

Investigate Security Incidents in CrowdStrike: Threat Hunting & RTR Guide

advanced

Investigate security incidents using CrowdStrike Falcon with step-by-step detection analysis, Real-Time Response (RTR), threat hunting, and incident response. Learn to analyze detections, hunt threats, and contain compromised endpoints.

20 minUpdated January 2025
Read Article

CrowdStrike Quarantine Endpoint: Contain Host & Network Isolation Guide

intermediate

Quarantine and contain compromised endpoints in CrowdStrike Falcon to isolate infected hosts from your network. Step-by-step guide to contain, verify, and lift containment with troubleshooting tips.

8 minUpdated January 2025
Read Article

How to Run an On-Demand Scan in CrowdStrike Falcon (2025)

beginner

Complete guide to running CrowdStrike Falcon on-demand scans. Schedule scans, configure detection levels, optimize CPU usage, and detect threats fast.

5 minUpdated January 2025
Read Article

CrowdStrike Device Control Setup: Block USB & Configure Falcon USB Blocking

intermediate

Configure CrowdStrike Falcon device control to block USB drives and removable media. Step-by-step guide for USB blocking, whitelisting specific devices, and creating device control policies.

12 minUpdated January 2025
Read Article

Setup MFA in CrowdStrike Falcon: Step-by-Step Guide

intermediate

Enable multi-factor authentication in CrowdStrike Falcon. Step-by-step guide to configure MFA with authenticator apps, security keys, and enforce for all users.

8 minUpdated January 2025
Read Article

CrowdStrike Prevention Policy Setup: Configure Falcon Detection & Host Groups

intermediate

Configure CrowdStrike Falcon prevention policies to block malware and assign host groups. Step-by-step guide for detection levels, application control, and policy best practices.

10 minUpdated January 2025
Read Article

Uninstall CrowdStrike Falcon Sensor: Remove with/without Maintenance Token

intermediate

Uninstall CrowdStrike Falcon sensor from Windows, Mac, and Linux using maintenance token. Step-by-step commands for removal (WindowsSensor.exe /uninstall, falconctl uninstall). Includes uninstalling without token and troubleshooting invalid token errors.

8 minUpdated January 2025
Read Article

How to Use Falcon X for Automated Threat Intelligence

advanced

Leverage CrowdStrike Falcon X for malware analysis and threat intelligence

15 minUpdated January 2025
Read Article

Check CrowdStrike Falcon Sensor Status: Verify Sensor Running (Windows/Mac/Linux)

beginner

Verify CrowdStrike Falcon sensor is running with step-by-step commands for Windows (sc query csagent), Mac (falconctl stats), and Linux (systemctl status falcon-sensor). Check sensor version, service status, and troubleshoot connectivity issues.

5 minUpdated January 2025
Read Article

CrowdStrike Zero Trust Assessment (ZTA): Implementation & Security Scoring

advanced

Implement CrowdStrike Zero Trust Assessment (ZTA) to evaluate endpoint security posture. Step-by-step guide to enable ZTA scoring, assess device compliance, and enforce zero trust policies with Falcon.

18 minUpdated January 2025
Read Article