Software example

Example of CrowdStrike software



How to navigate the CrowdStrike software

Falcon Discover enables IT hygiene by providing organizations with robust visibility into the computers, applications and accounts used in their environment. This visibility helps prepare organizations against attacks, improve overall security posture, and prevent breaches.


video 

(Scobey, 2021)


(CrowdStrike, 2021)



The main dashboard provides a high-level overview with clickable charts for digging into support details.(Scobey, 2021)

(Scobey, 2021)


Application Visibility
The Application Usage dashboard reveals a detailed list of applications that have recently run in the environment including details such as vendor, application, version, and file name. The data can be filtered on attributes like vendor and file name to identify potential issues around version control and licensing. There are also options to search used applications based on a specific user or host. (Scobey, 2021)
(Scobey, 2021)

From the top menu, there is also an option to report on all installed applications. Filtering this list by operating system yields a more focused view of the application information.(Scobey, 2021)

(Scobey, 2021)


Account Monitoring
Falcon Discover also provides visibility into the user accounts being leveraged. The Account Monitoring dashboard reflects an overview of the number of domain and local accounts in the environment. It also illustrates when the account passwords were last reset – helping to identify and address areas of concern around password management.(Scobey, 2021)

(Scobey, 2021)

Additional insights
In addition to applications, resources and accounts, Falcon Discover provides insights into many other important device metrics, including these two examples.(Scobey, 2021)

(Scobey, 2021)



Additionally, the System Resource Dashboard includes processor, core, and memory information for managed systems. Like other dashboards, filters are available to focus on attributes such as operating system, organizational unit, and domain.(Scobey, 2021)
(Scobey, 2021)





The overall goal is to provide a comprehensive approach using a single agent to manage cybersecurity. That approach will ultimately reduce costs by eliminating the need for cybersecurity teams to integrate multiple-point products, noted Sentonas.(Vizard, 2022)


(Vizard, 2022)


reference

CrowdStrike (2023) Crowdstrike: Stop breaches. drive business., crowdstrike.com. Available at: https://www.crowdstrike.com/?utm_campaign=brand&utm_content=crwd-treq-en-x-tct-uki-psp-x-trl-brnd-x_x_x_x-corephrase&utm_medium=sem&utm_source=goog&utm_term=crowdstrike+services&gclid=CjwKCAjwpuajBhBpEiwA_ZtfhSP1iR3UBR_hQbd5cvrUy4TRPM3TeGodmAu5lEAJOjooqmmwrYHX6xoCRfoQAvD_BwE (Accessed: 02 June 2023).

Monitoring File Changes with Falcon FileVantage (2021) YouTube. YouTube. Available at: https://www.youtube.com/watch?v=GVtA3-cddKs (Accessed: 02 June 2023).

Scobey, R. (2021) How to navigate Falcon discover, crowdstrike.com. Available at: https://www.crowdstrike.com/blog/tech-center/navigate-falcon-discover/ (Accessed: 02 June 2023).

Vizard, M. (2022) CrowdStrike adds attack Surface Management module, Security Boulevard. Available at: https://securityboulevard.com/2022/12/crowdstrike-adds-attack-surface-management-module/ (Accessed: 02 June 2023).



Comments

Popular Posts