Falcon Forensics — Forensic Data Analysis

Extended visibility with preset dashboards

  • Provides incident responders a single solution to analyze large quantities of data both historically and in real-time to uncover vital information to triage an incident.
  • Identify attacker activity quickly with several preset dashboards to serve up specific information around an incident.
  • See trends for the past 24 hours with the Deployment Status Dashboard.
  • Examine a high-level view of telemetry within a single system with the Host Info Dashboard.
  • Use the Windows Hunting Leads to quickly identify potential misconfigurations and hacker activity with preset panel groupings.
  • Gather and analyze multiple artifacts for a single system and timeframe in the Host Timeline Dashboard. Use this dashboard to get a visual representation of artifacts for a specific timeline of events.
  • Augment expertise with full threat context
  • Automate data collection and eliminate lengthy queries with a convenient console to view relevant artifacts pertaining to your research.
  • Enrich forensic data automatically by correlating collected artifacts with intelligence data streams.
  • Track attacker activity by analyzing the Master File Table (MFT), shim cache, shellbags, and other artifacts within your organization.
  • Utilize query capabilities within preset dashboards to zero-in on specific attacker activity.
  • Uncover attacker activity that may have occurred before Falcon EDR monitoring.
  • Eliminate complex processes
  • Manage large scale deployments with ease. Deploy Falcon Forensics at any scale, from tens to hundreds of thousands of endpoints.
  • Falcon Fusion’s integrated SOAR framework automates scans, accelerating MTTR and simplifying operations.
  • Leverage the CrowdStrike Cloud for processing.
  • Utilize CrowdStrike Real Time Response for fast deployment and decisive remediation.
  • Robust artifact collection types
  • Falcon Forensics collects a comprehensive set of artifact types to support incident response teams’ investigations. Data types include: directory and file metadata, file hashes, network data, detailed process listings, services and drivers enumeration, environment variables, scheduled tasks, users and groups information.
  • Web browser data collection
  • Event log information
  • Registry information
  • Process execution artifacts
  • Common persistence mechanisms