Under active development Content is continuously updated and improved

CrowdStrike Falcon

by CrowdStrike

Endpoint detection and response (EDR) platform with threat intelligence

Official Docs

Under Construction: This guidance is being actively developed and verified. Content may change.

Authoritative Sources

Key guidance documents from authoritative organizations. Click to view the original source.

NIST SP 800-83 §3.4.1: "Antivirus software should be configured to perform real-time scans of each file as it is downloaded, opened, or executed, which is known as on-access scanning." §3.4.1: "Antivirus software should be configured to attempt to disinfect infected files and to either quarantine or delete files that cannot be disinfected." §3.4.2: "Organizations should use centrally managed antivirus software that is controlled and monitored regularly by antivirus administrators. Centrally managed antivirus software makes it possible for administrators to push antivirus configuration and signature updates to hosts throughout the enterprise." CrowdStrike implements these requirements through cloud-native, behavior-based detection with centralized policy management.

Configuration Examples(2)

·

Control 10.1: "Deploy and maintain anti-malware software." Control 10.2: "Configure automatic anti-malware signature updates." Control 10.7: "Use behavior-based anti-malware software." NIST SP 800-83 §3.4.1: "Organizations should use centrally managed antivirus software that is controlled and monitored regularly by antivirus administrators."

Configuration Examples(2)

·

Covers sensor deployment, prevention policies, detection tuning, and threat hunting capabilities.

Configuration Examples(4)

·

NIST SP 800-61r2 Executive Summary: "Incident response capability is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring IT services." §2.3: "The incident response team should work quickly to analyze and validate each incident, following a pre-defined process and documenting each step taken." §3.2.4: "Organizations should profile networks and systems to measure the characteristics of expected activity so that changes to it can be more easily identified."

Configuration Examples(2)

·

NIST SP 800-86 §3.1: "Collection involves identifying, labeling, recording, and acquiring data from the possible sources of relevant data, while following procedures that preserve the integrity of the data." §5.1.2: "Volatile data is data that would be lost if the computer were powered down...includes information on running processes, open network connections, and contents of memory." CrowdStrike Falcon provides real-time endpoint telemetry and forensic data collection aligned with NIST forensic processes.

Configuration Examples(2)

·

SOC 2 CC6.8: "The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity objectives." CC7.2: "The entity monitors system components and the operation of those components for anomalies that are indicative of malicious acts." CrowdStrike Falcon provides EDR capabilities aligned with SOC 2 malware protection and monitoring requirements. Source: AICPA Trust Services Criteria.

ISO 27001:2022 A.8.7: "Protection against malware shall be implemented and supported by appropriate user awareness." This includes detection, prevention, and recovery controls. Organizations should use a combination of technology-based controls (antivirus, behavior monitoring) and operational procedures. CrowdStrike provides next-generation malware protection supporting ISO 27001 requirements. Source: ISO/IEC 27001:2022 Annex A.

CCM TVM-01: "Policies and procedures shall be established for timely detection, reporting, and handling of malicious software or other potentially hostile code." CCM TVM-04: "The entity shall verify that protection mechanisms are deployed for endpoints." CCM SEF-02: "Establish policies and procedures for security incident management." CrowdStrike Falcon provides EDR, threat intelligence, and incident response capabilities directly implementing CCM TVM and SEF domain controls. Source: CSA Cloud Controls Matrix v4.0.

Verification Commands

Commands and queries for testing and verifying security configurations.

Get detection events via API API
GET /detects/queries/detects/v1?filter=status:"new"
List hosts with sensor API
GET /devices/queries/devices/v1
Query indicator of compromise API
GET /iocs/queries/indicators/v1?types=sha256
Get host vulnerability assessment API
GET /spotlight/queries/vulnerabilities/v1

Related Controls

Security controls from various frameworks that relate to CrowdStrike Falcon.

Related Technologies