

They originate from outside or inside your organization.

PROTECTS YOUR MACS AGAINST ALL THREAT TYPESįalcon provides protection against both malware and malware-free, and known and unknown threats, whether Ğnsure seamless integration with your existing investments.Ěutomatically integrate with threat intelligence to maximize defenses and proactively respond to threats.Ğliminate ransomware Proactively hunt for threats.Gain unparalleled real-time and historical visibility on Mac events and activities.Protect your Mac environment against known and unknown malware, fileless attacks, adware and potentially unwanted programs (PUPs).They are integrated and delivered via a single lightweight agent to provide continuous breach prevention across all of your Mac endpoints. POWERFUL, EASY AND INTEGRATED MAC SECURITYĬrowdStrike Falcon endpoint protection for macOS unifies the technologies required to successfully stop breaches including next-generation antivirus, endpoint detection and response (EDR), IT hygiene, 24/7 threat hunting and threat intelligence.


For example, when creating or editing an exclusion, include info about what activity was excluded and why.Īfter you create, edit, or delete an exclusion, it can take up to 40 minutes for the changes to go into effect.Next-generation endpoint protection for Mac endpoints against malware and beyond In the audit log comment, include any info that would help other people in your organization understand what you changed and why. We recommend that you include a comment for the audit log whenever you create, edit, or delete an exclusion. Each exclusion type has its own audit log where you can view the revision history for exclusions of that type. Reviewing activity that’s being excluded helps you understand the actual effects of your IOA exclusions.ĬrowdStrike automatically records all changes to your exclusions. Previewing threats that you would no longer see helps you quickly understand the expected effect of an exclusion before you save it.įor IOA exclusions that are already in effect in your environment, you can view a log of activity that would have triggered a threat if an IOA exclusion hadn’t been in place. This list shows threats that wouldn’t have been generated if the current exclusion were live in your environment. When you're creating or editing an exclusion, Falcon displays a list of affected threats before you save it. If your exclusion is too broad, you might inadvertently permit malicious activity that should be detected or blocked. To maintain a strong security posture, create exclusions to be as specific as possible while meeting your exclusion needs. Consider the potential implications of an exclusion before you put it into effect in your environment.
