Getting Started with EDR

Welcome to CrowdStrike Falcon
How to Get Better Visibility with Falcon Insight
Five Second Enterprise Visibility
How to Contain an Incident
How to Remotely Remediate an Incident

Expanding Visibility

How to Navigate Falcon Discover
How to Gain Full PowerShell Visibility with CrowdStrike Falcon
How to Get Visibility into AWS
How to Hunt for Threat Activity with Falcon Endpoint Protection
How to Network Contain an Endpoint with Falcon Endpoint Protection
How to Find the Spectre and Meltdown Vulnerabilities Using Falcon Insight
How to use Falcon Indicator Graph
How to Hunt with CrowdStrike Falcon
How to use Falcon Insight to get Additional USB Device Visibility
How to Create Custom Rules with CrowdStrike
How CrowdStrike Increases Container Visibility
Vulnerability Patching for a Remote Workforce
PowerShell Hunting with CrowdStrike Falcon

Beyond EDR

CrowdStrike for Security Operations
How to Spot Your Vulnerabilities
How to Consume Threat Feeds
How to Manage USB Devices
How to Automate Threat Intel with Falcon X
It is Time to Replace Your Existing AV
How to Gain Visibility into Mobile Devices
How Falcon for AWS Protects Cloud Workloads
How CrowdScore Increases Efficiency

More Resources

CrowdStrike Falcon Free Trial

Try CrowdStrike Free for 15 Days Get Started with A Free Trial