This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.

ACCEPT
Experienced a Breach?

NEED IMMEDIATE ASSISTANCE?

Contact Us for Pre and Post Incident Response Services

CONTACT US NOW

How to Perform a Simple File Search with the CrowdStrike Falcon Investigate App


Read Video Transcript

Administrators often need to know their exposure to a given threat. One of the fastest and simplest ways to do this is to identify a risky file’s hash and then search for instances of that in your environment. CrowdStrike makes this simple by storing file information in the Threat Graph. This allows you to search for current and historical instances of that file in real-time, even if the system is offline.

 

Stop Breaches With CrowdStrike Falcon request a demo