When a device is suspected of being compromised, CrowdStrike Falcon allows administrators to quarantine (contain) the host, isolating it from the network while maintaining a connection to the Falcon Console. This prevents further spread of threats while allowing security teams to investigate the issue.
This guide explains how to contain and uncontain a host in the Falcon Console.
Step 1: Log Into the Falcon Console
- Open a browser and go to https://falcon.crowdstrike.com.
- Sign in using your admin credentials.
Step 2: Find the Host to Contain
- In the left-hand menu, go to Hosts > Host Management.
- Use the search bar to find the endpoint by:
- Hostname
- IP Address
- Username
- Click on the Host Name to open its details.
Step 3: Contain (Quarantine) the Host
- On the Host Details page, click Actions in the top-right corner.
- Select Contain Host from the dropdown menu.
- Click Confirm to proceed.
📌 What Happens When a Host is Contained?
- The endpoint loses all network access, except for:
- Communication with CrowdStrike Falcon Cloud (to remain manageable).
- Whitelisted addresses (if configured in policy settings).
- Pre-approved remote administration tools (if allowed).
- The host is fully isolated from the internal network and internet.
Step 4: Verify Containment
- Return to Hosts > Host Management.
- Locate the contained endpoint and check the Containment Status:
- ✅ Contained – The host is successfully isolated.
- ❌ Failed – The containment request did not complete.
- Click on the host and look for the Containment Status under Device Details.
📌 Tip: If containment fails, check if the endpoint is offline or if there are network restrictions preventing execution.
Step 5: Lift Containment (Unquarantine the Host)
After the security team has resolved the issue, the host can be restored to full network access.
- In Host Management, search for the contained endpoint.
- Click Actions > Lift Containment.
- Click Confirm to remove isolation.
📌 Note: It may take a few minutes for the host to regain network access.
Best Practices for Host Containment
✅ Contain First, Investigate Second – Prevent lateral movement before deeper analysis.
✅ Verify That Containment Succeeded – Check the Falcon Console after issuing the command.
✅ Use Whitelisting for Critical Remote Tools – Ensure administrators can still access contained hosts if needed.