Back to Tech Center

Getting Started with EDR

January 15, 2021

Tech Center
CrowdStrike Tech Center

Welcome to CrowdStrike Falcon
How to Get Better Visibility with Falcon Insight
Five Second Enterprise Visibility
How to Contain an Incident
How to Remotely Remediate an Incident

Expanding Visibility

Assessing the Sunburst Vulnerability with CrowdStrike
Lateral Movement Detection with a Remote Workforce
Securing Mobile Devices for a Remote Workforce
Reducing the Attack Surface with Custom Indicators of Attack
How to Gain Full PowerShell Visibility with CrowdStrike Falcon
How to Hunt for Threat Activity with Falcon Endpoint Protection
How to Network Contain an Endpoint with Falcon Endpoint Protection
How to use Falcon Indicator Graph
How to Hunt with CrowdStrike Falcon
How to use Falcon Insight to get Additional USB Device Visibility
How to Create Custom Rules with CrowdStrike
How CrowdStrike Increases Container Visibility
PowerShell Hunting with CrowdStrike Falcon
How to Use CrowdStrike Dashboards
How to Leverage Scheduled Searches
Flexible Policy Management for Remote Systems

Real Time Response

Remediating Incidents with a Remote Workforce
System Recovery using Real Time Response
Vulnerability Patching for a Remote Workforce
Expanding Protection with Remote System Control
Container Security with Real Time Response
Process and File Remediation with Real Time Response
Registry Modification with Real time Response
Enable Security Services with Real Time Response
How Spotlight and Real Time Response Facilitate Emergency Patching

Beyond EDR

CrowdStrike for Security Operations
How to Navigate Falcon Discover
Using Falcon Spotlight for Vulnerability Management
How to Consume Threat Feeds
How to Manage USB Devices
How to Automate Threat Intel with Falcon X
It is Time to Replace Your Existing AV
How to Gain Visibility into Mobile Devices
Installing Falcon for Mobile on iOS Devices
Installing Falcon for Mobile on Android Devices
Protecting Users from Malicious Sites with Falcon for Mobile
How CrowdScore Increases Efficiency
How CrowdStrike’s Container Security Works
How CrowdStrike’s Automated Remediation Works
How to Create Workflows with Falcon Fusion
How to Automate Workflows with Falcon Spotlight

More Resources

Related Content

TRY CROWDSTRIKE FREE FOR 15 DAYS

GET STARTED WITH A FREE TRIAL