- CrowdStrike Named a Leader in 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
CrowdStrike Falcon®
Free Trial FAQ
Contact the Trial team for assistance
falcontrial@crowdstrike.com
1. Prepare for installation: For optimal performance, uninstall or disable other antivirus solutions before installing the Falcon sensor.
2. Activate your account via an email you should’ve received.
3. Log in and install sensors to your devices by following the instructions on the mainview once you log in. It includes video guides on how to install for your particular OS. You can also find instructions here.
You will know you’ve successfully installed the sensor when you log into falcon and see the shield on the mainview lit up green. You will also see below the number of devices with successfully installed sensors and if there are any detections.
There are three CrowdStrike Falcon modules automatically included in the trial: CrowdStrike Falcon® Prevent, CrowdStrike Falcon® Device Control, and CrowdStrike Falcon® for Mobile. There are ten additional modules you can enable to customize your trial experience:
- Falcon Identity Threat Protection
- Falcon Discover
- Falcon Data Protection
- Falcon File Vantage
- Falcon Firewall Management
- Falcon for IT Trial
- Falcon Forensics
- Falcon Insight XDR
- Falcon Sandbox
- Falcon Cloud Security with Containers
To test individual modules, open the console menu, select CrowdStrike Store → CrowdStrike Apps → Select your desired module → Try it for free. Note that some modules require another module to function properly. You can see dependencies for each module on the page under Falcon Requirements. It may take up to 30 minutes for all modules to become fully functional.
Yes. The CrowdStrike Falcon Prevent module is a fully certified AV replacement solution and allows organizations to confidently replace their existing legacy AV.
Falcon Prevent incorporates identification and prevention of known malware, machine learning for unknown malware, exploit blocking and advanced Indicator of Attack (IOA) behavioral techniques to protect against attacks whether your endpoints are online or offline. Falcon Prevent also features integration with Windows System Center, for organizations that need to prove compliance with appropriate regulatory requirements.
Falcon Prevent uses an array of complementary prevention and detection methods to protect against ransomware:
- Blocking of known ransomware
- Exploit blocking to stop the execution and spread of ransomware via unpatched vulnerabilities
- Machine learning for detection of previously unknown “zero-day” ransomware
- Indicators of attack (IOAs) through behavioral analysis to identify and block additional unknown ransomware, as well as new categories of ransomware that do not use files to encrypt victims’ data
- Log in to your CrowdStrike account
- Select Host management and setup → Sensor downloads → Tool Downloads
- Download the installation tool that corresponds with your OS
- You will need your “maintenance token” to validate the approval to uninstall
- Navigate to Host setup and management and select the Host that you want to remove. A sidebar will open. Click on Reveal maintenance token to obtain the single-use maintenance token needed to uninstall the sensor.