How to Detect and Prevent Malware-Free Attacks with CrowdStrike Falcon
Traditional antivirus products and even application whitelisting products are completely blind to attacks that do not use malware. It is possible for an attacker to compromise a machine without ever writing a file to disk, or by abusing a legitimate system tool like PowerShell or WMI. It is also common for attackers to exploit a public-facing web server, and then use a web shell to move laterally in the environment.
For technical information on installation, policy configuration and more, please visit the CrowdStrike Tech Center.Visit the Tech Center