CrowdStrike leverages advanced endpoint detection and response (EDR) applications and techniques to provide an industry-leading next-generation anti-virus (NGAV) offering that is powered by machine learning to ensure that breaches are stopped before they occur. This guide gives a brief description on the functions and features of CrowdStrike.
Not applicable
The following are common questions that are asked about CrowdStrike:
CrowdStrike contains various product modules that connect to a single SaaS environment. Endpoint Security Solutions are enacted on the endpoint by a single agent, known as the CrowdStrike Falcon Sensor. The Falcon Platform is broken out into Endpoint Security Solutions, Security IT & Operations, Threat Intelligence, Cloud Security Solutions, and Identity Protection Solutions. More information about these products is below:
Dell and CrowdStrike may include CrowdStrike with the purchase of your Dell device, or you may purchase a volume flex bundle. For more information about what CrowdStrike products are included, reference the list of Volume Flex Bundles or On-The-Box (OTB) Offers.
CrowdStrike is an agent-based sensor that can be installed on Windows, Mac, or Linux operating systems for desktop or server platforms. These platforms rely on a cloud-hosted SaaS Solution, to manage policies, control reporting data, manage, and respond to threats.
CrowdStrike can work offline or online to analyze files as they attempt to run on the endpoint. This is done using:
Click the appropriate method for more information.
Predefined Prevention hashes are lists of SHA256 hashes that are known to be good or bad. The hashes that are defined may be marked as Never Block or Always Block.
SHA256 hashes defined as Never Block may be a list of items that have come from a previous anti-virus solution for internal Line of Business applications. Importing a list of predefined prevention hashes for internal applications is the quickest method to allowlist known good files in your environment.
SHA256 hashes defined as Always Block may be a list of known malicious hashes that your environment has seen in the past, or that are provided to you by a trusted third party.
Prevent hashes are not required to be uploaded in batches, and manually defined SHA256 hashes can be set. When singular or multiple hashes are provided, any detail on those hashes is requested from the CrowdStrike back-end. Ancillary information (such as file names, vendor information, file version numbers) for those hashes (if they are present in your environment on any devices) are populated based on information from your environment.
Any item defined as an attack (based on its behavior) is typically indicated as such based on the Machine Learning values. This can be set for either the Sensor or the Cloud. CrowdStrike’s Falcon platform leverages a two-step process for identifying threats with its Machine Learning model. This is done initially on the local endpoint for immediate response to a potential threat on the endpoint. This threat is then sent to the cloud for a secondary analysis. Based on the prevention policies defined for the device, additional action may be required by the endpoint if the cloud analysis differs from the local sensor’s analysis of the threat.
More Indicators are being added constantly into the product to strengthen the detection of threats and potentially unwanted programs.
CrowdStrike’s centralized intelligence offers a wide array of information about threats and threat actors that work globally. This list is leveraged to build in protections against threats that have already been identified.
Various vulnerabilities may be active within an environment at any time. If a critical patch has not yet been released for a known vulnerability that affects an environment, CrowdStrike monitors for exploits against that vulnerability and will prevent and protect against malicious behaviors using those exploits.
An invite from falcon@crowdstrike.com contains an activation link for the CrowdStrike Falcon Console that is good for 72 hours. After 72 hours, you will be prompted to resend a new activation link to your account by a banner at the top of the page:
Customers who have purchased CrowdStrike through Dell may get support by contacting Dell Data Security ProSupport. For more information, reference How to Get Support for CrowdStrike.
CrowdStrike Falcon Console requires an RFC 6238 Time-Based One-Time Password (TOTP) client for two-factor authentication (2FA) access.
For information about setup, reference How to Configure Two-Factor Authentication (2FA) for the CrowdStrike Falcon Console.
CrowdStrike is supported on various Windows, Mac, and Linux operating systems in both Desktop and Server platforms. All devices will communicate to the CrowdStrike Falcon Console by HTTPS over port 443.
For a complete list of requirements, reference CrowdStrike Falcon Sensor System Requirements.
For a walkthrough on the download process, reference How to Download the CrowdStrike Falcon Sensor.
Administrators may be added to the CrowdStrike Falcon Console as needed. For more information, reference How to Add CrowdStrike Falcon Console Administrators.
A maintenance token may be used to protect software from unauthorized removal and tampering. For more information, reference How to Manage the CrowdStrike Falcon Sensor Maintenance Token.
CrowdStrike Falcon Sensor can be installed on:
For a walkthrough on the installation process, reference How to Install CrowdStrike Falcon Sensor.
CrowdStrike uses the customer identification (CID) to associate the CrowdStrike Falcon Sensor to the proper CrowdStrike Falcon Console during installation.
The CID is located within the CrowdStrike Falcon Console (https://falcon.crowdstrike.com) by selecting Host setup and management and then Sensor Downloads.
For more information, reference How to Obtain the CrowdStrike Customer Identification.
The CrowdStrike Falcon Sensor version may be required to:
Since no product UI is available, the version must be identified by command-line (Windows) or Terminal (Mac and Linux).
For a walkthrough on these commands, reference How to Identify the CrowdStrike Falcon Sensor Version.
A secure hash algorithm (SHA)-256 may be used in CrowdStrike Falcon Sensor exclusions. For more information, reference How to Identify a File's SHA-256 Hash for Security Applications.
Basic operational logs are stored in:
/var/log/messages
/var/log/syslog
/var/log/rsyslog
/var/log/daemon
For more information, reference How to Collect CrowdStrike Falcon Sensor Logs.
CrowdStrike Falcon Sensor can be removed on:
For more information, reference How to Uninstall CrowdStrike Falcon Sensor.
CrowdStrike Falcon Sensor Uninstall Tool is available to download within the CrowdStrike Falcon Console. For more information, reference How to Download the CrowdStrike Falcon Sensor Windows Uninstall Tool.
Yes! Though it is not typically recommended to run multiple anti-virus solutions, CrowdStrike is tested with multiple anti-virus vendors and found to layer without causing end-user issues. Exclusions are not typically necessary for CrowdStrike with additional anti-virus applications.
If issues arise, exclusions can be added to CrowdStrike Falcon Console (https://falcon.crowdstrike.com) by selecting Configuration and then File Exclusions. Exclusions for these additional anti-virus applications come from the third-party anti-virus vendor.
Many Windows compatibility issues that are seen with CrowdStrike and third-party applications can be resolved by modifying how CrowdStrike operates in User Mode.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.