Back to Tech Center

Security Operations

January 15, 2021

CrowdStrike Tech Center

Falcon For Security Operations

CrowdStrike for Security Operations
CrowdStrike Message Center for Falcon Complete and OverWatch
Assessing the Sunburst Vulnerability with CrowdStrike
Fast Response to Sophisticated Threats: OverWatch Incidents
How to Integrate with your SIEM
Five Second Enterprise Visibility
How to Contain an Incident
How to Remotely Remediate an Incident
How to Hunt with CrowdStrike Falcon
How to Manage a Host Firewall with CrowdStrike
How CrowdStrike Supports MSSPs and Large Organizations
Application Hygiene for a Remote Workforce
Host Firewall Protection for a Remote Workforce
How to Manage USB Devices
How to Speed Investigations with Falcon Forensics
How to Navigate Falcon Discover

Falcon Spotlight

Using Falcon Spotlight for Vulnerability Management
How Spotlight and Real Time Response Facilitate Emergency Patching
Prioritize Patching with Spotlight’s Exploited Vulnerabilities Feature
Vulnerability Management for a Remote Workforce
Vulnerability Patching for a Remote Workforce
How to Use Custom Filters in Falcon Spotlight
How to Use Scheduled Reports with Falcon Spotlight

Cloud Security

How to Get Visibility into AWS
How Falcon for AWS Protects Cloud Workloads
How CrowdStrike Increases Container Visibility
How CrowdStrike Secures Cloud Workloads
How CrowdStrike Provides Visibility for Cloud Security
Cloud Security Posture Management with CrowdStrike
How CrowdStrike’s Container Security Works
How Identity Analyzer Improves Cloud Security
How Falcon Horizon Secures Cloud Storage
How to Monitor Compliance with Falcon Horizon
How to Secure Identity Services with Falcon Horizon
How to Secure Amazon EC2 with Falcon Horizon
How to Operationalize Falcon Horizon
How to Avoid Identity Service Misconfigurations
How to Monitor Virtual Machine Security

Expanding Security Operations

How to Automate Threat Intel with Falcon X
Threat Intelligence the CrowdStrike Way
How to Find the Spectre and Meltdown Vulnerabilities Using Falcon Insight
How to use Falcon Indicator Graph
How to Leverage the CrowdStrike Store
How to Use CrowdStrike with IBM’s QRadar
How to Integrate CrowdStrike with ServiceNow
How to Leverage CrowdStrike Integration with TrueFort
How to Integrate CrowdStrike with AWS Security Hub
How CrowdScore Increases Efficiency
Custom Alerts for IT Hygiene
How to Leverage Falcon Sandbox Analysis

More resources

Related Content