Skip to content
Services
Menu Toggle
VCISO
Menu Toggle
Security Awareness Training
Vendor Risk Management
Compliance
Menu Toggle
HIPAA Compliance
NIST Compliance
SOC2 Compliance
PCI Compliance
Risk Assessments
Security Policies
CloudΒ Security Assessment
Managed Services
Menu Toggle
Managed Detection and Response (MDR)
Backup & Recovery
Incident Response
Security Operations Center (SOC)
Vulnerability Management
Email Security
Cloud Cost Optimization
Penetration Testing
Industries
Menu Toggle
Healthcare
Finance
Legal
MSP
SAAS
Tools
About
Contact
Resources
Newsletter
Contact
Contact
Main Menu
Services
Menu Toggle
VCISO
Menu Toggle
Security Awareness Training
Vendor Risk Management
Compliance
Menu Toggle
HIPAA Compliance
NIST Compliance
SOC2 Compliance
PCI Compliance
Risk Assessments
Security Policies
CloudΒ Security Assessment
Managed Services
Menu Toggle
Managed Detection and Response (MDR)
Backup & Recovery
Incident Response
Security Operations Center (SOC)
Vulnerability Management
Email Security
Cloud Cost Optimization
Penetration Testing
Industries
Menu Toggle
Healthcare
Finance
Legal
MSP
SAAS
Tools
About
Contact
Resources
Newsletter
Contact
Contact
Knowledge Base
Knowledge Base
Crowdstrike
Crowdstrike
How to investigate a Security Incident Using CrowdStrike Falcon
How to Quarantine and Contain a Compromised Endpoint in CrowdStrike Falcon
How to Use Falcon X for Automated Threat Intelligence
Creating and Managing User Roles in CrowdStrike Falcon
How to setup Multi-Factor Authentication (MFA) in CrowdStrike Falcon
Implementing CrowdStrike Zero Trust Assessment (ZTA)
How to Run an On-Demand Scan in CrowdStrike Falcon
How to Configure CrowdStrike Exclusions for SCCM (Configuration Manager)
How to Configure CrowdStrike Exclusions for SQL Server
How to Configure CrowdStrike Exclusions for Microsoft Exchange Server
1
2
3
Close
Close