X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
Digging Into BokBot’s Core Module

Digging into BokBot’s Core Module

Introduction BokBot, developed and operated by the actor named LUNAR SPIDER, was first observed in 2017 and the CrowdStrike’s Falcon®…

READ MORE
How To Automate Threat Intel With Falcon X

How to Automate Threat Intel with Falcon X

Introduction This document and video will demonstrate Falcon X and the benefits of automating threat intelligence. Video  Prerequisites Subscription:…

READ MORE
Threat Intelligence The CrowdStrike Way

Threat Intelligence the CrowdStrike Way

Introduction This document and video will provide an overview of CrowdStrike’s Intelligence services and the importance of consumable intelligence. Video…

READ MORE
How To Contain An Incident

How to Contain an Incident

Introduction This document and video will define breakout time and a challenge for companies to quickly detect, understand and eradicate…

READ MORE
How To Spot Your Vulnerabilities

How to Spot Your Vulnerabilities

Introduction This document and video will demonstrate how to use Falcon Spotlight to find vulnerabilities in your environment while overcoming…

READ MORE
How To Leverage Falcon Sandbox Analysis

How to Leverage Falcon Sandbox Analysis

Introduction This document and video will illustrate the power of Falcon Sandbox and how it differentiates itself from other solutions…

READ MORE
CrowdStrike For Security Operations

CrowdStrike for Security Operations

Introduction This document and video will demonstrate how the CrowdStrike solution empowers the Security Operations Center to detect and understand…

READ MORE
How To Remotely Remediate An Incident

How to Remotely Remediate an Incident

Introduction This document and video will demonstrate how to use Real Time Response to access and remediate an endpoint with…

READ MORE
Adversary Extends Persistence By Modifying System Binaries

Adversary Extends Persistence by Modifying System Binaries

At the end of September 2018, the CrowdStrike® Falcon OverWatch™ team identified suspicious interactive activity on a Linux host within…

READ MORE
How To Gain Full PowerShell Visibility With CrowdStrike Falcon

How to Gain Full PowerShell Visibility with CrowdStrike Falcon

Introduction PowerShell visibility is a necessity when investigating today's threats.  CrowdStrike provides the most comprehensive solution to detect, discover, and…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial