- At this point, your end-users should have already installed the sensor/agent/installer to their computer/pc/laptop and it is successfully running. If they haven't, this article might have the information on step by step guide on how to self-install the sensor/agent/installer package to their computer/pc/laptop.
- The Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike will automatically facilitate remediation and response to any detection of threats to your environment.
The Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike uses its endpoint sensor/agent/installer to detect ransomware/malware behaviors and then terminates the offending process before it can accomplish its goal of encrypting files.
This is done using CrowdStrike Indicator of Attack (IoA) patterns on the endpoint. These work both online and offline and are effective against new variants and polymorphic variants of ransomware that often bypass legacy antivirus.
From this Most Recent Detection reporting, you get to see in detail the most detection of the activities and tactics, techniques, and procedures (TTP) that are identified as malicious and produce an alarm. This report delivers contextualized information that includes attribution where relevant, providing details on the adversary and any other information known about the attack.
The report is also available in other views in your dashboard:-
To see the Most Recent Detection that has produced an alarm to your environment, in your ArmourZero platform navigate:
Step 1 - Open "Most recent detection".
Navigate: Activity > Most recent detection.
Step 2 - View "Tactic and Technique"
Hover your mouse to (!) to read more on the detection details
Step 3 - Scroll to the right and click on View to expand the detection for additional details.
A further details execution report will be open. The additional details will be shown on your screen for your reference.