X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >

Getting Started with Next-Gen Antivirus

Installation

Welcome to CrowdStrike Falcon
How the Falcon Platform Simplifies Deployment and Enhances Security
How to Install the Falcon Agent
How to Install the Falcon Agent – Mac
How to Install the Falcon Agent – Linux
How to Install Falcon in the Data Center
How to Generate Your First Detection
It is time to replace your existing AV
5 second enterprise visibility
CrowdStrike for security operations
Threat intelligence the CrowdStrike way
Getting access to the Falcon APIs

Hands-on Configuration

How to Manage Policies in CrowdStrike Falcon
How to Manage Updates in Falcon
How to Enable Exploit Preventions
How to Prevent Malware Infections with Falcon Endpoint Protection
How to Block Malicious PowerShell Activity: Bypassing Traditional AV
How to Detect and Prevent Fileless Webshell Attacks with Falcon
How CrowdStrike Falcon Protects Off-line Endpoints
How to Prevent Malware with Custom Blocking in CrowdStrike Falcon Endpoint Protection
How to Prevent Ransomware with CrowdStrike Falcon Endpoint Protection
How to Prevent Malware Infections with Machine Learning in CrowdStrike Falcon
How to Prevent Malware-Free Attacks with CrowdStrike Falcon Endpoint Protection
How to Prevent Malware Infections with Falcon Endpoint Protection
How to Manage USB Devices

Next-Gen Features

How to Gain Full PowerShell Visibility with CrowdStrike Falcon
How to Automate Threat Intel with Falcon X
How to Remotely Remediate an Incident
Introduction to the Falcon Data Replicator
How to Contain an Incident

More resources

 

CrowdStrike Falcon Free Trial
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial