This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.

ACCEPT
Experienced a Breach?

NEED IMMEDIATE ASSISTANCE?

Contact Us for Pre and Post Incident Response Services

CONTACT US NOW

How to Hunt for Threat Activity with CrowdStrike Falcon Endpoint Protection


Read Video Transcript

In this video, we will demonstrate how to hunt for threat activity in your environment with CrowdStrike Falcon. First, we see how you can use Falcon to search for indicators of compromise (IOCs). Then we take a broader look at how we can use built-in dashboards to quickly uncover and investigate suspicious activity. Finally, we see how power users can craft precise queries to search for new and unique attacker tactics, techniques and procedures (TTPs) on data stored in the CrowdStrike Threat Graph.

 

More Resources:

CrowdStrike Falcon Tech Center

Request a CrowdStrike Falcon Endpoint Protection Demo

Take the CrowdStrike Falcon Endpoint Protection Tour

Register for CrowdStrike Falcon Endpoint Protection Live Demo

CrowdStrike Falcon Endpoint Protection

 

Stop Breaches With CrowdStrike Falcon request a demo