Powered by the CrowdStrike , the Endpoint Protection with EDR and Threat Intelligence leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting.
The Crowdstrike-powered Endpoint Protection with EDR and Threat Intelligence utilises its sensor/agent/installer to identify malicious activities such as ransomware and malware. It intervenes to halt these actions before they can encrypt your files. Therefore, ensure that your employees have installed the agent on their devices. If they haven't, please read on;
This page showcases three sections featuring various widgets:
- Connect to Console
Connect to Console
While you have the option to request access to the Crowdstrike console, our SOC team takes charge of the administration and monitoring of your Endpoint Protection with EDR and Threat Intelligence, powered by Crowdstrike, console as part of our service package.
It's important to note that all the information on this page is sourced directly from the Crowdstrike console.
The Activity page provides a comprehensive overview of all detection activities within your environments. It includes detailed reporting on:
- New detections.
- Most recent detection.
- Prevented malware by user and host.
- Detections by tactics.
- SHA-Based detection.
Widgets available for custom dashboard :-
Host means devices. Read ; host overview.
This host page contains information all devices that have been equipped withEndpoint Protection with EDR and Threat Intelligence powered by Crowdstrike.
Widgets available for custom dashboard:-
If you have any questions regarding any of these technical terms, submit new SOC ticket.