CrowdStrike
35 articles available
Guides for deploying and managing CrowdStrike Falcon endpoint protection
CrowdStrike Falcon RBAC Guide: User Roles, Permissions & Least Privilege Access
intermediateComplete guide to CrowdStrike Falcon RBAC and user permissions. Configure least privilege access, create SOC analyst roles, manage admin permissions, and troubleshoot access issues.
CrowdStrike Exchange Exclusions | Configure Falcon for Exchange Server
intermediateConfigure CrowdStrike exclusions for Exchange Server. Protect database files, logs, and processes to ensure mail flow.
Deploy CrowdStrike Falcon via GPO | Active Directory Guide
advancedStep-by-step guide to deploy CrowdStrike Falcon sensors using Group Policy. Silent installation, startup scripts, troubleshooting tips for AD environments.
How to Configure CrowdStrike Exclusions for Hyper-V Hosts
intermediateConfigure CrowdStrike exclusions for Hyper-V to prevent VM failures and improve performance. Covers VHDX files, processes, and cluster configurations with security controls.
How to Configure CrowdStrike Exclusions for IIS (Internet Information Services)
intermediateConfigure CrowdStrike Falcon exclusions for IIS web servers. Process, directory, and file type exclusions with best practices.
CrowdStrike Exclusions for SCCM Configuration Manager | Complete Setup Guide
advancedPrevent SCCM deployment failures with optimized CrowdStrike Falcon exclusions. Step-by-step configuration for site servers, clients, and distribution points.
How to Configure CrowdStrike Exclusions for SharePoint Server
intermediateConfigure CrowdStrike exclusions for SharePoint Server to prevent access denied errors and indexing failures. Covers all versions from 2007 to Subscription Edition.
CrowdStrike Exclusions for SQL Server | Prevent Database Performance Issues
intermediateEssential CrowdStrike Falcon exclusions for SQL Server. Protect data files, processes, and AlwaysOn without performance degradation or corruption risks.
How to Configure CrowdStrike Falcon Sensor Proxy Settings on Linux
intermediateLearn how to configure proxy settings for CrowdStrike Falcon Sensor on Linux. Route sensor traffic through HTTP proxies for environments without direct internet access.
How to Configure CrowdStrike Falcon Sensor Update Policies
intermediateLearn how to create and manage CrowdStrike Falcon sensor update policies. Control sensor versions, automate updates, and protect sensors from unauthorized uninstallation across Windows, Mac, and Linux hosts.
CrowdStrike Exclusions: Configure File, Folder & Process Exceptions
intermediateConfigure CrowdStrike Falcon exclusions for files, folders, and processes. Prevent false positives and whitelist applications.
CrowdStrike Custom IOCs: Create Indicators of Compromise for Threat Detection
advancedCreate custom IOCs (Indicators of Compromise) in CrowdStrike Falcon to detect specific threats. Step-by-step guide to add IP addresses, domains, file hashes, and custom detection rules.
How to Enable Uninstall Protection for CrowdStrike Falcon Sensor on Linux (Prevent Sensor Uninstall)
intermediateLearn how to enable the 'Prevent Sensor Uninstall' policy setting in CrowdStrike Falcon for Linux endpoints. Protect sensors from unauthorized removal with maintenance tokens and tamper prevention.
How to Install CrowdStrike Falcon Sensor on Linux with Secure Boot Enabled
advancedDeploy CrowdStrike Falcon Sensor on Linux hosts with Secure Boot enabled. Learn how to import the CrowdStrike signing key and avoid Reduced Functionality Mode (RFM).
How to Install CrowdStrike Falcon Sensor on Linux with Installation Tokens (Provisioning Token Guide)
intermediateLearn how to deploy CrowdStrike Falcon Sensor on Linux using installation tokens (provisioning tokens). Protect your CID from unauthorized hosts with token-based sensor deployment.
How to Install the CrowdStrike Falcon Sensor on Windows
beginnerInstall CrowdStrike Falcon sensor on Windows with our complete guide. Includes GUI and silent installation methods, verification steps, and troubleshooting tips.
Install CrowdStrike on Mac: Falcon Sensor Deployment Guide for macOS
beginnerInstall CrowdStrike Falcon sensor on macOS with step-by-step instructions. Includes sensor download, System Extension approval, Full Disk Access setup, and troubleshooting for Mac deployment.
How to Install CrowdStrike Falcon Sensor on Windows 10/11 & Server (2025 Guide)
beginnerDeploy CrowdStrike Falcon on Windows 10, 11, and Server with our 2025 guide. Covers GUI and silent installation, verification, and enterprise deployment best practices.
Connect CrowdStrike to SIEM: Splunk, QRadar, Sentinel
advancedIntegrate CrowdStrike Falcon with Splunk, QRadar, ArcSight, and Sentinel. Complete setup guide for SIEM Connector with API config and troubleshooting.
Investigate Security Incidents in CrowdStrike: Threat Hunting & RTR Guide
advancedInvestigate security incidents using CrowdStrike Falcon with step-by-step detection analysis, Real-Time Response (RTR), threat hunting, and incident response. Learn to analyze detections, hunt threats, and contain compromised endpoints.
How to Manage CrowdStrike Falcon Sensor Grouping Tags on Linux
intermediateLearn how to configure and manage sensor grouping tags for CrowdStrike Falcon on Linux. Use tags for dynamic host grouping and policy assignment in the Falcon Console.
How to Manage CrowdStrike Falcon Sensor Versions (Auto-Latest, N-1, N-2 Explained)
intermediateLearn how to manage CrowdStrike Falcon sensor versions using Auto-Latest, N-1, and N-2 update strategies. Understand fixed vs automated versioning and test sensor builds as an early adopter.
How to Prepare a CrowdStrike Falcon Master Image for Linux Cloning and Virtualization
intermediateLearn how to create a CrowdStrike Falcon master image template for Linux VMs and clones. Remove the Agent ID to prevent duplicate hosts in the Falcon Console.
CrowdStrike Quarantine Endpoint: Contain Host & Network Isolation Guide
intermediateQuarantine and contain compromised endpoints in CrowdStrike Falcon to isolate infected hosts from your network. Step-by-step guide to contain, verify, and lift containment with troubleshooting tips.
How to Run an On-Demand Scan in CrowdStrike Falcon
beginnerComplete guide to CrowdStrike Falcon on-demand scans. Schedule scans, configure detection levels, troubleshoot scan failures, and optimize CPU usage for threat detection.
How to Schedule CrowdStrike Falcon Sensor Update Exclusions (Block Update Windows)
intermediateLearn how to schedule sensor update exclusion windows in CrowdStrike Falcon. Block cloud updates during maintenance windows and critical business hours to prevent disruption.
CrowdStrike Device Control Setup: Block USB, Find Device IDs & Configure Policies
intermediateComplete guide to CrowdStrike Falcon device control. Find USB Vendor ID and Product ID, block or whitelist USB drives, and configure USB policies with step-by-step instructions.
Setup MFA in CrowdStrike Falcon: Step-by-Step Guide
intermediateEnable multi-factor authentication in CrowdStrike Falcon. Step-by-step guide to configure MFA with authenticator apps, security keys, and enforce for all users.
CrowdStrike Prevention Policies: Reduce False Positives & Block Ransomware
intermediateConfigure CrowdStrike Falcon prevention policies to balance security and performance. Optimize detection levels, enable ransomware protection, control USB devices, and reduce alert fatigue with host group targeting.
How to Throttle CrowdStrike Falcon Sensor and Channel File Updates
intermediateLearn how to throttle CrowdStrike Falcon sensor updates and channel file downloads to conserve network bandwidth. Adjust update rates for slower networks and large deployments.
Uninstall CrowdStrike Falcon Sensor With or Without Token
intermediateStep-by-step guide to remove CrowdStrike Falcon sensor on Windows, Mac, Linux. Get maintenance token, fix access denied errors, or uninstall without token.
How to Use CrowdStrike Falcon Bulk Maintenance Mode for Multiple Hosts
intermediateLearn how to use CrowdStrike Falcon bulk maintenance mode to uninstall or upgrade sensors on multiple hosts using a single token. Manage large-scale sensor maintenance operations efficiently.
How to Use Falcon X for Automated Threat Intelligence
advancedMaster CrowdStrike Falcon X for automated malware analysis, threat intelligence reports, and IOC enrichment. Learn sandbox analysis and threat investigation workflows.
Check CrowdStrike Falcon Sensor Status: Verify Sensor Running (Windows/Mac/Linux)
beginnerVerify CrowdStrike Falcon sensor is running with step-by-step commands for Windows (sc query csagent), Mac (falconctl stats), and Linux (systemctl status falcon-sensor). Check sensor version, service status, and troubleshoot connectivity issues.
CrowdStrike Zero Trust Assessment (ZTA): Implementation & Security Scoring
advancedImplement CrowdStrike Zero Trust Assessment (ZTA). Enable ZTA scoring, assess device compliance, and enforce zero trust policies.