- At this point, your end-users should have already installed the sensor/agent/installer to their computer/pc/laptop and it is successfully running. If they haven't, this article might have the information on step by step guide on how to self-install the sensor/agent/installer package to their computer/pc/laptop.
- The Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike will automatically facilitate remediation and response to any detection of threats to your environment.
The Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike uses its endpoint sensor/agent/installer to detect ransomware/malware behaviors and then terminates the offending process before it can accomplish its goal of encrypting files.
This is done using CrowdStrike Indicator of Attack (IoA) patterns on the endpoint. These work both online and offline and are effective against new variants and polymorphic variants of ransomware that often bypass legacy antivirus.
The report is also available in other views in your dashboard:-
From this report, you get the see in action, what has been prevented either by the host or by users.
View prevented malware by user and host
Activity > "Prevented malware by the user "or "Prevented malware by the host".
Step 1 - Open "Prevented malware by user " and "Prevented malware by user".