Falcon Flashcards
(118 cards)
What causes an incident?
Detections, associated processes and the connections between them
What generates a Detection?
suspicious files and behaviors
IOC and IOA
Where do you find the crowdscore?
Activity Dashboard
What is the crowdscore?
Likelihood that hostile activity is going on against your org
Examples of the types of information that might be shown in the summary panel
- General; information about the detection and host involved
- The commands, executables and files involved, including an explanation of the commands behaviour and effects, powered by charlotte AI
- The tactics, techniques and objectives that were used
- the associated hashes
- which prevention actions if any were taken
- which files were quarantined
- Network-based indicators and DNS requests
- Vulnerabilities that are present on an associated host. View the host’s risk posture at a high level alongside detection-specific info. Pivot to view more detailed vulnerability info from Falcon Spotlight.
- Misconfigurations that are present on a specific cloud-based host. Pivot to view more detailed vulnerability info from Cloud Security Posture Management.
What is shown in the “see full detections” view?
- Details: More detailed information about the detection. This view also includes a status log for the detection.
- Process table: A table view of the processes associated with the detection, with the first associated process shown at the top of the table. Refine the view by showing and hiding layers. You can show and hide the legend and summary panel.
- Process tree: A graph view of the processes associated with the detection. Each node in the process tree represents a process. Hover over or click a node to see additional details. Refine the view by showing and hiding layers. You can show and hide the legend and summary panel.
- Events timeline: A list of all relevant events in chronological order. Refine the view by showing and hiding layers. You can show and hide the legend and summary panel.
What is AID?
Agent ID (AID): Every sensor in your environment is uniquely identified by its Agent ID, or AID. If you have 5,000 sensors, you will have 5,000 unique AlDs.
AlDs are globally unique across all customer environments.
what is CID?
Customer ID (CID): Used to identify customer environments. Every environment has a unique CID.
What is a pattern ID?
Pattern ID: Every detection is associated with a pattern, and each pattern has a unique ID.
What is RFM?
Reduced functionality mode
Explain what RFM does?
RFM is a safe mode for the sensor that prevents compatibility issues if the host kernel is uncertified. Most common during windows updates
What is OSFM?
OS Feature monitor
Monitors changes in in the windows kernel so the sensor can adapt accordingly
How can I tell if my system is in RFM?
Host management page
or
Dashboards > Executive summary
Click on the RFM widget
or
From investigate
SensorStateBitmap_decimal is 2 =RFM
SensorStateBitmap_decimal is 0 = Not RFM
How to use run scripts RTR?
Running scripts from the Run Commands tab
On the Run Commands tab, you have two options to populate the command field to run a Falcon script or a custom script:
* Expand the session details panel from the right to see available Falcon scripts and custom scripts under the Scripts tab. Click the name of any script or select Insert script from the three-dot menu to populate the command field. You can search and sort the scripts lists and select View details to see the script content and provide Falcon script arguments.
* For custom scripts, run the runscript command with one of the following flags:
* CloudFile: Enter the name of an existing custom script already saved in the CrowdStrike cloud directly into the command line
* Raw: Enter the script content directly into the command line. (RTR Administrator only). Enclose the entire script contents in triple backticks.
* HostPath: Enter the file path of an existing custom script stored locally on the remote host (RTR Administrator only)
* For Falcon scripts, Run the falconscript command with the following flags:
* Name: Enter the name of the Falcon script. For example, “Fileinfo”.
* Jsoninput: Enter the JSON input for the Falcon script. Enclose it in single quotes and triple backticks. For example: * * ““Path”“C:||myfile.txt** . .
Real Time Response commands and platforms
cat
cd
clear
cp
csrutil
cswindiag
encrypt
env
eventlog
falconscript
filehash
get
getsid
help
history
ifconfig
ipconfig
kill
ls
map
memdump
mkdir
mount
mv
netstat
ps
put
put-and-run
reg query
reg set
reg delete
reg load
reg unload
restart
rm
run
runscript
shutdown
tar
umount
unmap
update
users
xmemdump
zip
What is cswindiag?
Command gathers log files and information about the state of a windows host and packages them into zip file that you can send to support
Who can change the containment status of a host?
A user must have the Falcon Administrator role or Falcon Security Lead role to contain a host or remove it from containment. However, all users can see which hosts are contained as well as host-specific containment history using the Hosts App.
What kind of hosts can be contained?
You can contain any host running the Falcon sensor, regardless of whether the host generated a detect or not.
How does containment affect a host’s
connectivity to the CrowdStrike cloud?
When a host is under containment, it can still send and receive information to the CrowdStrike cloud. Using the cloud, you can remediate and remove a host from active containment. A host under containment remains contained even if the connection to the cloud is severed or if the host is rebooted.
Note: If an Android or iOS host is automatically contained due to a man-in-the-middle attack, the sensor is unable to connect to the CrowdStrike cloud due to the ongoing attack. Sensors reconnect to the cloud as soon as a trustworthy network connection can be established.
How does
containment work at the sensor level?
Upon receiving the Network Containment request, the Falcon sensor blocks all incoming and outgoing network connections to and from the host other than the sensor’s connection to the cloud. All existing connections will be terminated, except those that you have allowed using network traffic allowlisting If the Falcon sensor receives a request to remove a host from containment, the sensor lifts all network restrictions that it previously enforced. Hosts can only be contained and removed from containment one at a time. After containing a host or removing a host from containment, the host’s status will change to Pending containment or Lift Containment Pending. Note that if you want access to a host after it’s contained, CrowdStrike advises that you work with your internal IT/networking team in a test environment to ensure that you allowed everything necessary before using the machine in production.
Note: If an Android or iOS host is automatically contained due to a man-in-the-middle attack, the sensor doesn’t allow these connections.
How does
containment work at the sensor level?
Upon receiving the Network Containment request, the Falcon sensor blocks all incoming and outgoing network connections to and from the host other than the sensor’s connection to the cloud. All existing connections will be terminated, except those that you have allowed using network traffic allowlisting If the Falcon sensor receives a request to remove a host from containment, the sensor lifts all network restrictions that it previously enforced. Hosts can only be contained and removed from containment one at a time. After containing a host or removing a host from containment, the host’s status will change to Pending containment or Lift Containment Pending. Note that if you want access to a host after it’s contained, CrowdStrike advises that you work with your internal IT/networking team in a test environment to ensure that you allowed everything necessary before using the machine in production.
Note: If an Android or iOS host is automatically contained due to a man-in-the-middle attack, the sensor doesn’t allow these connections.
Host containment, what if I’m using a proxy?
The Falcon sensor caches information about what proxy it can connect to. As long as nothing in your network environment or proxy configuration changes, a host that is behind a proxy can be contained and removed from containment. However, if for some reason the network environment or proxy endpoint changes while a host is contained, there is a risk that the host will not be able to discover a new proxy and communicate with the cloud, and will therefore be unable to be removed from containment.
I contained a host but it still has network connectivity. What do I do?
First, check if the status of the hoft is Containment pending. This status means that the request is still pending. If the status persists, reissue the containment request and wait several minutes. If the status persists after reissuing the request, visit the
I contained a host but it still has network connectivity. What do I do?
First, check if the status of the hoft is Containment pending. This status means that the request is still pending. If the status persists, reissue the containment request and wait several minutes. If the status persists after reissuing the request, visit the