HOW TO INSTALL CROWDSTRIKE FALCON SENSOR: EASY Guide

HOW TO INSTALL CROWDSTRIKE FALCON SENSOR
Image Credit: Crowdstrike

The Crowdstrike Falcon platform is a cloud-based, AI-powered, next-generation endpoint protection platform. With the aid of their lightweight agent called the Crowdstrike Falcon Sensor, you can easily protect your systems and begin to stop breaches in a matter of seconds, but how do you go about the installation? In this article, you’ll learn how to install or disable that complexity by setting up the Crowdstrike Falcon Sensor for Windows using its latest version.

How to Install Crowdstrike’s Falcon Sensor

Through the JumpCloud Admin Portal, you can download and install the CrowdStrike Falcon sensor on Windows and macOS devices. Thus, CrowdStrike is a security service that runs in the cloud and offers software for finding threats. JumpCloud for macOS devices must also install a policy that creates a Mobile Device Management (MDM) profile and sets the necessary permissions for the CrowdStrike Falcon sensor.

How to Install Crowdstrike Falcon Sensor: Requirements

Here’s what you need to get started:

  • A 15-day Crowdstrike trial is available here. To complete this guide, use a BID.
  • The Active Directory Domain Admin account For editing and managing Group policies, you will need this account.
  • Install the RSAT software on a domain-joined machine. A Domain Controller in Active Directory can also access Group Policy Management.
  • accessible file sharing for the Crowdstrike Falcon Sensor program. The path srv1-installers will be used for this tutorial.
  • Windows 7+ domains deployed the Crowdstrike Falcon Sensor.

How to Install Crowdstrike Falcon Sensor: Manually

Below is a step-by-step guide to manually installing the Crowdstrike Falcon sensor using its latest version,

  1. Check the MIT IS&T CrowdStrike Falcon product page for an installer. (This installer is available for MIT use. Avoid downloading directly from CrowdStrike.

2. Launch the downloaded file.

  • uncheckedThe OS name will be Falcon SensorWinOS.exe on Windows.
  • uncheckedFor OS X, the name will be Falcon SensorMacOSX.pkg.
  • uncheckedThe Linux distribution will determine the name: CrowdStrike_LinuxDeb_x86.tar.gz 

Note, Never install the package directly; instead, use the installer supplied after extracting the package.

3. Accept the Falcon License Agreement

4. Lastly, when prompted, click Yes or enter your computer password to give the installer permission to run.

On macOS 10.14 Mojave and greater, you will need to provide full disk access to the installer for it to function properly. So, open System Preferences -> Security & Privacy -> Privacy -> Full Disk Access. Click the plus sign.

Version 6: Open System Preferences -> Security & Privacy -> Privacy, -> Full Disk Access.

MacOS Big Sur and greater: Check the box next to Agent,” which will already be listed but unchecked. Additionally, on macOS 11 Big Sur, you will need to allow Falcon to filter network content. Then reboot your Mac after these changes

There you have it! You are done! After installation, the sensor will run silently.

How to Install Crowdstrike Falcon Sensor: Normal Operation

When installation is done, the sensor runs quietly (on Windows, you will not be informed). But, if it finds harmful apps, it can stop them. This means IS&T Security will let you know about suspicious texts. Install and check the sensor.

#1. Installing the CrowdStrike Falcon Agent: Via  MacOS

  1. Log into your CrowdStrike Portal.
  2. Create a new CrowdStrike API Client with Sensor Download. Read Scope by performing these steps:
  • Click on the hamburger menu.
  • select Support and Resources. 
  • Under Resources and Tools, click API clients and keys. Click Add new API Client.
  • Enter the client’s Name and Description.
  • Navigate to Sensor Download and select Read Scope.
  • Click Add
  1. Save the Client ID, Secret, and Base URL for future use.
  1. Access your Admin Portal at https://console.jumpcloud.com.
  1. Go to Device Management > Commands.
  1. On the Commands tab, click (+) and select Command from Template. 
  1. Locate the Mac and install the CrowdStrike OS Falcon sensor template.
  1. Click Get Started: Commands for details.
  1. Select Configure.: (Optional) Write a new name for this command or update the default.
  1. Click Run As, then Root.
  1. Click Mac under Type.
  1. Update the script using Step 3 data for CSBaseAddress, CSClientID, and CSClientSecret.
  1. Click Event and select another option to schedule or trigger the command. Manually runs by default.
  1. Increase the timeout under Options. Because the CrowdStrike default is 600 seconds.
  1. The command may time out with a 124 error. This is more prevalent on slower networks.
  1. Check Use Smart Defaults in TTL Settings.
  1. Put the Falcon sensor on your devices.
  1. To install the Falcon Agent on individual devices, pick the Devices tab and check the box next to each device.
  1. Assign the Falcon sensor to groups of devices and check the box next to each group to install the agent.
  1. Save once, then again.
  1. Download the command from the Commands page by checking the box and clicking Run Now. But, make sure you have root access if the command doesn’t run.

After the command is complete, click Results on the Command page. An exit code of 0 means the command is completed. But only the final exit code is displayed when numerous commands are handled at runtime.

#2. Installing the CrowdStrike Falcon Agent: Via Windows

To install the CrowdStrike Falcon sensor on a Windows device, make sure to use its latest version,

1. Sign in to CrowdStrike.

2. Develop a CrowdStrike API Client with Sensor Download. Then, read Scope by the following:

  • Touch the hamburger then click menu.
  • Choose Support and Resources.
  • API clients and keys are under Resources and Tools.
  • Add an API Client.
  • List and describe the client.
  • Visit Sensor. Download, then read the scope.
  • Tap Add.

3. For future use, save the Client ID, Secret, and Base URL.

4. The Jumpcloud Admin Portal is https://console.jumpcloud.com.

5. Select Device Management > Commands.

6. Click (+) and select Command from Template on the Commands tab. 

7. Launch Windows and find the CrowdStrike Falcon sensor template. For further information, see Get Started: Commands.

8. Then configure. (Optional) Use a new name for this command or update the default.

9. Under Type. click windows

10. Edit the script to update the CSBaseAddress, CSClientID, and CSClientSecret with data from Step 3.

11. Running the command at the top of each hour requires clicking Launch Event and selecting Run as Repeating.

12. Set the interval to 3600 seconds (1 hour) under Options.

13. If the command times out, it may throw 124. So, on slower networks, this is more likely. 

14. Alternatively, IT Pros can remove an endpoint from the CrowdStrike cloud console via the Host Management panel, or the endpoint will be automatically disabled after 45 days of inactivity.

15. Click the Save button twice.

16. Open the Commands page and click Run Now. Then do this by checking the box next to the command. Ensure root permissions if the command doesn’t run.

17. Select the Commands page Results tab when the command is complete. However, if the command exits with 0, it is executed successfully. At runtime, only the final exit code is reported for numerous instructions. Then, view exit codes at Understand Command Results. 

18. Click View for details on the findings.

#2. macOS

  • Version 6.11 and above:
  • The Falcon binary now lives in the Applications folder at /Applications/Falcon.app
  • The output of sudo /Applications/Falcon.app/Contents/Resources/falconctl stats will provide more detailed information, including the connection state to the CrowdStrike cloud.

#3. Linux

Use one of the following commands to verify the service is running:

  • $sudo ps -e | grep falcon-sensor 108019? 00:00:58 falcon-sensor
  • $ sudo systemctl is-active falcon-sensor active
  • $ sudo service falcon-sensor status

Eventually, an installed sensor on all target machines will appear in the Falcon console. After successful installation, the sensors will appear after five minutes. But, to know if the deployment was effective, select Hosts > Hosts Management in the Crowdstrike Falcon console. If the service runs, the Falcon Sensor is installed and working!

How to Disable Crowdstrike Falcon Sensor

CrowdStrike developed the CrowdStrike Falcon Sensor software application in July 2015. The setup package normally takes 1.48 MB (1,556,480 bytes) and installs roughly 5 files. This means users that have this installed on their PCs use Windows 10 and Windows 7 (SP1). Also, CrowdStrike Falcon Sensor is popular in Russia and the US, where 95% of users are from.

How to Disable Crowdstrike Falcon Sensor: In Different Categories

Below are instructions to disable the Crowdstrike Falcon sensor in the section 

#1. How to Disable Crowdstrike Falcon Sensor: Windows Uninstallation

CrowdStrike protects the sensor by demanding a maintenance token before disabling it. What’s more, your token will be needed to uninstall if uninstall protection is set.

Obtaining the Maintenance Token

  1. In the CrowdStrike cloud console, pick the endpoint to obtain further details for the host.
  1. Highlight the maintenance token.
  1. Give a rationale for utilizing the token and click Reveal Token. Note the maintenance token.
Option 1. Disable via Windows Control Panel

Typically, you can uninstall CrowdStrike Falcon Sensor from your computer by using the Add/Remove Program feature in the Windows Control Panel.

  1. On the Start menu (for Windows 8, right-click the screen’s bottom-left corner), click Control Panel, and then, under Programs, do one of the following:
  • Windows Vista/7/8/10: Click Uninstall a Program.
  • Windows XP: Click Add or Remove Programs.
  1. When you find the program CrowdStrike Falcon Sensor, click it, and then do one of the following:
  • Windows Vista/7/8/10: Click Uninstall.
  • Windows XP: Click the Remove or Change/Remove tab (to the right of the program).
  1. Follow the prompts. A progress bar shows you how long it will take to disable the CrowdStrike Falcon Sensor.
Option 2: Disable via Command Line
  • Download CSUninstallTool from the Tool Downloads page in the CrowdStrike cloud console: https://falcon.crowdstrike.com/support/tool-downloads
  • Open an administrative Command Prompt window and run one of the following commands (depending on whether uninstall protection is enabled), replacing “your token” with the endpoint’s maintenance token:
  1. CsUninstallTool.exe /quiet
  2. CsUninstallTool.exe MAINTENANCE_TOKEN=your token> /quiet

#2. How to Disable Crowdstrike Falcon Sensor: macOS Uninstallation

CrowdStrike protects the sensor by demanding a maintenance token before uninstalling. Depending on whether uninstall protection is activated, the steps to disable the CrowdStrike sensor vary.

Option 1. To uninstall CrowdStrike manually on a macOS computer with install protection enabled. follow these steps,

  1. In the CrowdStrike cloud console, pick the endpoint to obtain further details for the host.
  1. Highlight the maintenance token.
  1. Give reasons for utilizing the token and click Reveal Token. Note the maintenance token.
  1. Run the following Terminal command:

falconctl uninstall –maintenance-token /Applications/Falcon.app/Contents/Resources

  1. Enter the endpoint’s maintenance token when asked.
  1. It will disable the sensor.

Option 2. To uninstall CrowdStrike manually on a macOS computer with install protection disabled, follow these steps:

  1. Open a Terminal window and run the following command:
  • sudo /Applications/Falcon.app/Contents/Resources/falconctl uninstall
  1. The sensor will uninstall itself

Alternatively, IT Pros can remove an endpoint from the CrowdStrike cloud console via the Host This means the management panel or endpoint will be automatically removed after 45 days of inactivity.

#3. How to Disable Crowdstrike Falcon Sensor: Linux Uninstallation

To uninstall CrowdStrike manually on a Linux system, run one of the following commands based on your Linux distribution:

  • Ubuntu: sudo apt-get purge falcon-sensor
  • RHEL, CentOS, and Amazon Linux: sudo yum remove falcon-sensor
  • SLES: sudo zypper remove falcon-sensor

Crowdstrike Falcon Sensor Latest Version 

To identify the Crowdstrike Falcon sensor’s latest version for Windows:

  • Right-click the Windows start menu, and then click Run
  • In the Run UI, type cmd, and then press OK
  • In the Command Prompt, type wmic path win32_product where (caption like ‘%crowdstrike sensor%’) get version, and then press Enter.

Record the latest version of Falcon Crowdstrike sensor

What can CrowdStrike be installed on?

It can be installed on any supported system, whether that system is in an AWS cloud, on a desktop, or in a data center.

How do I know if CrowdStrike is installed on Windows? 

Follow these step-by-step guides.

  • Type: Add or Remove Programs in the Windows search bar.
  • Click On Add or Remove Programs.
  • Scroll down the list of installed programs, and you should see one that is called “CrowdStrike Windows Sensor.”

Is CrowdStrike a firewall?

CrowdStrike Falcon Firewall ManagementTM eliminates the complexity associated with native firewalls

Is CrowdStrike an antivirus?

CrowdStrike is a web- or cloud-based anti-virus that also uses very little storage space on your machine.

Does CrowdStrike disable Windows Defender?

No, CrowdStrike Falcon only works with Windows Defender

Does CrowdStrike have a home version?

Yes, Fast, easy protection for home-based employees

References

0 Shares:
Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like