Administrators often need to know their exposure to a given threat. One of the fastest and simplest ways to do this is to identify a risky file’s hash and then search for instances of that in your environment. CrowdStrike makes this simple by storing file information in the Threat Graph. This allows you to search for current and historical instances of that file in real-time, even if the system is offline.