CrowdStrike

35 articles available

Guides for deploying and managing CrowdStrike Falcon endpoint protection

CrowdStrike Falcon RBAC Guide: User Roles, Permissions & Least Privilege Access

intermediate

Complete guide to CrowdStrike Falcon RBAC and user permissions. Configure least privilege access, create SOC analyst roles, manage admin permissions, and troubleshoot access issues.

15 minUpdated January 2026
Read Article

CrowdStrike Exchange Exclusions | Configure Falcon for Exchange Server

intermediate

Configure CrowdStrike exclusions for Exchange Server. Protect database files, logs, and processes to ensure mail flow.

10 minUpdated January 2026
Read Article

Deploy CrowdStrike Falcon via GPO | Active Directory Guide

advanced

Step-by-step guide to deploy CrowdStrike Falcon sensors using Group Policy. Silent installation, startup scripts, troubleshooting tips for AD environments.

15 minUpdated January 2026
Read Article

How to Configure CrowdStrike Exclusions for Hyper-V Hosts

intermediate

Configure CrowdStrike exclusions for Hyper-V to prevent VM failures and improve performance. Covers VHDX files, processes, and cluster configurations with security controls.

10 minUpdated January 2026
Read Article

How to Configure CrowdStrike Exclusions for IIS (Internet Information Services)

intermediate

Configure CrowdStrike Falcon exclusions for IIS web servers. Process, directory, and file type exclusions with best practices.

10 minUpdated January 2026
Read Article

CrowdStrike Exclusions for SCCM Configuration Manager | Complete Setup Guide

advanced

Prevent SCCM deployment failures with optimized CrowdStrike Falcon exclusions. Step-by-step configuration for site servers, clients, and distribution points.

12 minUpdated January 2026
Read Article

How to Configure CrowdStrike Exclusions for SharePoint Server

intermediate

Configure CrowdStrike exclusions for SharePoint Server to prevent access denied errors and indexing failures. Covers all versions from 2007 to Subscription Edition.

10 minUpdated January 2026
Read Article

CrowdStrike Exclusions for SQL Server | Prevent Database Performance Issues

intermediate

Essential CrowdStrike Falcon exclusions for SQL Server. Protect data files, processes, and AlwaysOn without performance degradation or corruption risks.

10 minUpdated January 2026
Read Article

How to Configure CrowdStrike Falcon Sensor Proxy Settings on Linux

intermediate

Learn how to configure proxy settings for CrowdStrike Falcon Sensor on Linux. Route sensor traffic through HTTP proxies for environments without direct internet access.

5 minUpdated January 2026
Read Article

How to Configure CrowdStrike Falcon Sensor Update Policies

intermediate

Learn how to create and manage CrowdStrike Falcon sensor update policies. Control sensor versions, automate updates, and protect sensors from unauthorized uninstallation across Windows, Mac, and Linux hosts.

8 minUpdated January 2026
Read Article

CrowdStrike Exclusions: Configure File, Folder & Process Exceptions

intermediate

Configure CrowdStrike Falcon exclusions for files, folders, and processes. Prevent false positives and whitelist applications.

8 minUpdated January 2026
Read Article

CrowdStrike Custom IOCs: Create Indicators of Compromise for Threat Detection

advanced

Create custom IOCs (Indicators of Compromise) in CrowdStrike Falcon to detect specific threats. Step-by-step guide to add IP addresses, domains, file hashes, and custom detection rules.

12 minUpdated January 2026
Read Article

How to Enable Uninstall Protection for CrowdStrike Falcon Sensor on Linux (Prevent Sensor Uninstall)

intermediate

Learn how to enable the 'Prevent Sensor Uninstall' policy setting in CrowdStrike Falcon for Linux endpoints. Protect sensors from unauthorized removal with maintenance tokens and tamper prevention.

6 minUpdated January 2026
Read Article

How to Install CrowdStrike Falcon Sensor on Linux with Secure Boot Enabled

advanced

Deploy CrowdStrike Falcon Sensor on Linux hosts with Secure Boot enabled. Learn how to import the CrowdStrike signing key and avoid Reduced Functionality Mode (RFM).

7 minUpdated January 2026
Read Article

How to Install CrowdStrike Falcon Sensor on Linux with Installation Tokens (Provisioning Token Guide)

intermediate

Learn how to deploy CrowdStrike Falcon Sensor on Linux using installation tokens (provisioning tokens). Protect your CID from unauthorized hosts with token-based sensor deployment.

5 minUpdated January 2026
Read Article

How to Install the CrowdStrike Falcon Sensor on Windows

beginner

Install CrowdStrike Falcon sensor on Windows with our complete guide. Includes GUI and silent installation methods, verification steps, and troubleshooting tips.

10 minUpdated January 2026
Read Article

Install CrowdStrike on Mac: Falcon Sensor Deployment Guide for macOS

beginner

Install CrowdStrike Falcon sensor on macOS with step-by-step instructions. Includes sensor download, System Extension approval, Full Disk Access setup, and troubleshooting for Mac deployment.

5 minUpdated January 2026
Read Article

How to Install CrowdStrike Falcon Sensor on Windows 10/11 & Server (2025 Guide)

beginner

Deploy CrowdStrike Falcon on Windows 10, 11, and Server with our 2025 guide. Covers GUI and silent installation, verification, and enterprise deployment best practices.

5 minUpdated January 2026
Read Article

Connect CrowdStrike to SIEM: Splunk, QRadar, Sentinel

advanced

Integrate CrowdStrike Falcon with Splunk, QRadar, ArcSight, and Sentinel. Complete setup guide for SIEM Connector with API config and troubleshooting.

20 minUpdated January 2026
Read Article

Investigate Security Incidents in CrowdStrike: Threat Hunting & RTR Guide

advanced

Investigate security incidents using CrowdStrike Falcon with step-by-step detection analysis, Real-Time Response (RTR), threat hunting, and incident response. Learn to analyze detections, hunt threats, and contain compromised endpoints.

20 minUpdated January 2026
Read Article

How to Manage CrowdStrike Falcon Sensor Grouping Tags on Linux

intermediate

Learn how to configure and manage sensor grouping tags for CrowdStrike Falcon on Linux. Use tags for dynamic host grouping and policy assignment in the Falcon Console.

5 minUpdated January 2026
Read Article

How to Manage CrowdStrike Falcon Sensor Versions (Auto-Latest, N-1, N-2 Explained)

intermediate

Learn how to manage CrowdStrike Falcon sensor versions using Auto-Latest, N-1, and N-2 update strategies. Understand fixed vs automated versioning and test sensor builds as an early adopter.

7 minUpdated January 2026
Read Article

How to Prepare a CrowdStrike Falcon Master Image for Linux Cloning and Virtualization

intermediate

Learn how to create a CrowdStrike Falcon master image template for Linux VMs and clones. Remove the Agent ID to prevent duplicate hosts in the Falcon Console.

6 minUpdated January 2026
Read Article

CrowdStrike Quarantine Endpoint: Contain Host & Network Isolation Guide

intermediate

Quarantine and contain compromised endpoints in CrowdStrike Falcon to isolate infected hosts from your network. Step-by-step guide to contain, verify, and lift containment with troubleshooting tips.

8 minUpdated January 2026
Read Article

How to Run an On-Demand Scan in CrowdStrike Falcon

beginner

Complete guide to CrowdStrike Falcon on-demand scans. Schedule scans, configure detection levels, troubleshoot scan failures, and optimize CPU usage for threat detection.

10 minUpdated January 2026
Read Article

How to Schedule CrowdStrike Falcon Sensor Update Exclusions (Block Update Windows)

intermediate

Learn how to schedule sensor update exclusion windows in CrowdStrike Falcon. Block cloud updates during maintenance windows and critical business hours to prevent disruption.

6 minUpdated January 2026
Read Article

CrowdStrike Device Control Setup: Block USB, Find Device IDs & Configure Policies

intermediate

Complete guide to CrowdStrike Falcon device control. Find USB Vendor ID and Product ID, block or whitelist USB drives, and configure USB policies with step-by-step instructions.

15 minUpdated January 2026
Read Article

Setup MFA in CrowdStrike Falcon: Step-by-Step Guide

intermediate

Enable multi-factor authentication in CrowdStrike Falcon. Step-by-step guide to configure MFA with authenticator apps, security keys, and enforce for all users.

8 minUpdated January 2026
Read Article

CrowdStrike Prevention Policies: Reduce False Positives & Block Ransomware

intermediate

Configure CrowdStrike Falcon prevention policies to balance security and performance. Optimize detection levels, enable ransomware protection, control USB devices, and reduce alert fatigue with host group targeting.

10 minUpdated January 2026
Read Article

How to Throttle CrowdStrike Falcon Sensor and Channel File Updates

intermediate

Learn how to throttle CrowdStrike Falcon sensor updates and channel file downloads to conserve network bandwidth. Adjust update rates for slower networks and large deployments.

5 minUpdated January 2026
Read Article

Uninstall CrowdStrike Falcon Sensor With or Without Token

intermediate

Step-by-step guide to remove CrowdStrike Falcon sensor on Windows, Mac, Linux. Get maintenance token, fix access denied errors, or uninstall without token.

8 minUpdated January 2026
Read Article

How to Use CrowdStrike Falcon Bulk Maintenance Mode for Multiple Hosts

intermediate

Learn how to use CrowdStrike Falcon bulk maintenance mode to uninstall or upgrade sensors on multiple hosts using a single token. Manage large-scale sensor maintenance operations efficiently.

6 minUpdated January 2026
Read Article

How to Use Falcon X for Automated Threat Intelligence

advanced

Master CrowdStrike Falcon X for automated malware analysis, threat intelligence reports, and IOC enrichment. Learn sandbox analysis and threat investigation workflows.

15 minUpdated January 2026
Read Article

Check CrowdStrike Falcon Sensor Status: Verify Sensor Running (Windows/Mac/Linux)

beginner

Verify CrowdStrike Falcon sensor is running with step-by-step commands for Windows (sc query csagent), Mac (falconctl stats), and Linux (systemctl status falcon-sensor). Check sensor version, service status, and troubleshoot connectivity issues.

5 minUpdated January 2026
Read Article

CrowdStrike Zero Trust Assessment (ZTA): Implementation & Security Scoring

advanced

Implement CrowdStrike Zero Trust Assessment (ZTA). Enable ZTA scoring, assess device compliance, and enforce zero trust policies.

18 minUpdated January 2026
Read Article