Dashboards in Falcon provide real-time visual summaries of activity across your endpoints. They help teams track:
Detections
Sensor health
Policy enforcement
System coverage
Each dashboard includes graphs, charts, and key metrics that update automatically.
Provides high-level visibility for senior leadership.
Total detections over time
Detection severity breakdown (Low, Medium, High, Critical)
Active hosts and group count
Sensor deployment coverage
C-level briefings
Security KPIs
Audit preparation
Shows the volume and trends of detections, helping analysts focus on priority issues.
Detections by severity and type
Top affected hosts
Detection count over time
Common processes involved
SOC teams
Incident tracking
Identifying hotspots in the environment
Monitors host behavior and coverage, including sensor status.
Active vs inactive endpoints
Sensor version distribution
Host check-in status
Endpoint group activity
IT operations
Patch and deployment tracking
Ensuring sensor visibility
Focuses on the health and stability of sensors across devices.
Hosts with sensor errors
Hosts without policy
Hosts not seen in X days
Sensor installation failures
Troubleshooting
Sensor maintenance and auditing
Ensuring full deployment coverage
| Dashboard Name | Primary Use | Audience |
|---|---|---|
| Executive Summary | Strategic insights | Management |
| Detections Overview | Threat visibility | Analysts/SOC |
| Endpoint Activity | Endpoint behavior/tracking | IT Ops |
| Sensor Health | Sensor performance checks | Admins/Security |
Custom dashboards allow you to create your own views tailored to your team’s needs. This feature is especially useful in large organizations where different roles require different data.
A custom dashboard is a user-defined collection of widgets that present filtered data such as:
Detection trends
Host activity
Policy coverage
Sensor health indicators
Each dashboard can be saved, shared (depending on permissions), and reused.
Navigate to Dashboard → Manage Dashboards.
Click “Create Dashboard”.
Give it a name and optional description.
Choose to:
Start with a blank layout, or
Copy from an existing dashboard.
Click “Add Widget” to start building.
| Widget Type | What It Shows |
|---|---|
| Time Series Chart | Detection volume over time |
| Pie Chart | Detection severity or host distribution |
| Bar Graph | Top users, processes, host groups |
| Single Metric | Active hosts, sensor coverage rate |
| Table View | Detailed list of detections or hosts |
Widgets can be filtered by:
Time Range (e.g., last 7 days, custom window)
Severity Level (Critical, High, Medium, Low)
Group (e.g., only Finance or HR)
Host Tags
Detection Source (Custom IOA, ML, etc.)
Filters let you build role-specific dashboards (e.g., one for finance, another for executives).
Dashboards are saved per user by default.
Admins can assign or share dashboards with other roles (e.g., read-only viewers).
You can also set a dashboard as your home page.
| Audience | Dashboard Purpose |
|---|---|
| SOC Analyst | View only Critical and High detections in Production |
| IT Admin | Monitor sensor deployment and failures |
| Manager | Track total alerts, top infected hosts |
| Compliance Officer | Show policy assignment by group for audit review |
| Tip | Why It Helps |
|---|---|
| Name dashboards clearly | Makes it easier to navigate in large teams |
| Use consistent timeframes | Standardizes reporting and alerts |
| Clone and customize base dashboards | Saves time for department-specific views |
| Keep dashboards focused | Avoid clutter—use multiple dashboards if needed |
Reports in Falcon provide exportable, structured summaries of activity and configuration data. They support both on-demand insights and scheduled delivery, making them essential for:
Audit preparation
Weekly security reviews
Operational oversight
These are generated manually at the time of need.
| Report Name | Description |
|---|---|
| Host Inventory Report | List of all hosts, their group, status, OS, sensor version |
| Detection Report | Summary of detection events over a date range |
| Policy Assignment Report | Shows which hosts have which policies applied |
| Sensor Deployment Report | Devices without sensors, failed installations |
| Real Time Response Usage | Audit of RTR sessions per user/device |
PDF (best for presentation)
CSV (best for analysis)
JSON (for API parsing)
These are automatically generated and delivered at defined intervals.
Navigate to Reports → Scheduled Reports.
Click “Create Report”.
Choose:
Report type
Time range (e.g., daily, weekly, monthly)
Delivery method (Email, Download)
Recipients (specific users or teams)
Set delivery schedule (e.g., every Monday at 8:00 AM).
| Team | Report | Frequency |
|---|---|---|
| Security | Detection overview | Daily |
| Compliance | Host inventory by group | Weekly |
| IT Ops | Sensor update status | Monthly |
Reports can be customized by:
Timeframe
Group name
Detection source
Severity
Policy or platform
This allows you to create highly focused reports (e.g., “Critical detections in APAC servers during the past 72 hours”).
Only users with report generation or viewing rights can create/view reports.
Admins can restrict who sees which reports using role-based access control (RBAC).
Reports are downloadable from the Falcon UI or retrievable via API.
Archived reports can be stored for compliance or forensic review.
| Tip | Benefit |
|---|---|
| Use CSV for internal analysis | Easier to filter and graph in Excel or BI tools |
| PDF for leadership summaries | Visually clean and ready for presentation |
| Automate delivery via schedule | Reduces manual effort and ensures consistency |
| Match reports to user roles | Keeps information relevant and secure |
Scheduled reports are automatically generated and delivered reports that follow a defined timing pattern. This allows teams to:
Stay informed without logging into the Falcon console daily.
Track trends and anomalies proactively.
Meet audit or compliance reporting schedules.
Go to Reports → Scheduled Reports.
Click “Create Scheduled Report”.
Choose:
Report Type (e.g., Detection Summary, Host Inventory)
Time Range (e.g., past 24 hours, past week)
Delivery Schedule (daily, weekly, monthly, or custom)
Recipients (users with appropriate permissions)
Choose the file format:
PDF (easy to read, fixed layout)
CSV (data manipulation in Excel)
Optional: Add custom filters (e.g., severity ≥ High, group = Finance).
Reports can be:
Emailed to one or more Falcon users.
Stored for download from the console.
Pushed via API to SIEM or logging platforms.
Only users with the appropriate role permissions can:
Create scheduled reports
View and download existing reports
Admins can restrict who receives what report using RBAC.
| Role | Report Type | Frequency | Format |
|---|---|---|---|
| Security Analysts | Critical Detections Report | Daily | CSV |
| Compliance Officer | Policy Assignment Review | Monthly | |
| IT Operations | Sensor Deployment Gaps | Weekly | CSV |
| Executive | Executive Summary Report | Monthly |
You can:
Edit or delete reports at any time.
View a history of successful and failed deliveries.
Set expiration policies to auto-disable reports after a period (e.g., 6 months).
Rotate recipients as team members change roles or responsibilities.
| Tip | Benefit |
|---|---|
| Keep report scope tight | Avoid overwhelming recipients with too much data |
| Use PDF for non-technical roles | Provides clarity without needing tools |
| Use filters to isolate high-value data | Focus on what matters (e.g., only critical alerts) |
| Review delivery logs monthly | Ensure all reports are working as expected |
Reports generated in the Falcon console can be exported in different formats for:
Manual review
Presentation
Data analysis
Archival and compliance documentation
| Format | Best Use |
|---|---|
| Readable summaries, board or audit presentations | |
| CSV | Custom data analysis in Excel, Power BI, Tableau |
| JSON | Integration with automation scripts or external systems |
Go to Reports → Generated Reports or any dashboard view.
Select the report or data view.
Click “Export”.
Choose file format (PDF, CSV, JSON).
Download and distribute as needed.
CrowdStrike Falcon offers a robust REST API that enables:
Automated report generation
Integration with SIEM platforms (e.g., Splunk, QRadar)
Feeding data into internal dashboards or security platforms
Pulling detection data into a central threat dashboard
Exporting host inventory to CMDB tools
Sending alerts directly to a ticketing system (e.g., ServiceNow)
GET /devices/queries/devices-scroll/v1 – list hosts
GET /detects/queries/detects/v1 – retrieve detections
GET /reports/entities/report/v1 – download reports
These require API credentials with scoped permissions.
CrowdStrike integrates with:
SIEMs like Splunk, LogRhythm, QRadar, Sumo Logic
SOAR tools like Palo Alto Cortex XSOAR, IBM Resilient, and ServiceNow
These integrations typically use:
Prebuilt Falcon Connectors or
Custom API scripts and field mappings
Output includes logs, detections, alerts, and response events.
You can:
Schedule report generation in Falcon.
Use APIs to fetch and forward the data to:
Cloud storage
Email servers
Dashboards (e.g., Kibana, Grafana)
Trigger Fusion workflows to act on specific conditions (e.g., send data to a webhook if critical alerts spike)
| Tip | Benefit |
|---|---|
| Use consistent naming in exported files | Easier to track/report versions |
| Regularly review API credentials | Maintain security and prevent misuse |
| Rotate API keys and audit usage | Improve long-term maintainability |
| Test integrations in sandbox environments | Avoid production disruptions |
In exam items, the difference between a good and great answer is often whether you choose the right evidence source quickly (sensor posture vs audit evidence) and then state what you’ll do next with it.
Use this 3-step mental shortcut:
Question type: posture, change, or accountability?
Artifact: sensor posture reporting, dashboards, or audit logs?
Action: who owns follow-up and what’s the verification cue?
Examples (exam-friendly):
“Which hosts are unhealthy / not checking in?” → Sensor posture reporting → produce a host list with owners + “last seen” and a next check (connectivity/service/lifecycle).
“Why did detections spike after yesterday?” → Dashboards for the trend + audit logs for changes → correlate timestamps, identify configuration change, validate scope (which group/policy).
“Who ran a privileged action?” → Audit logs → identify actor/time/target + require ticket/change reference + governance follow-up.
Great answers include “how you confirm it’s true,” such as:
Sample 3 hosts from the report and confirm last seen/status in host details.
Compare trend window to the exact change timestamp in audit logs.
Confirm the action is tied to an approved ticket/change and the scope matches.
Which Falcon reporting feature helps administrators identify endpoints with outdated or malfunctioning sensors?
Sensor health reports.
Sensor health reports provide visibility into the operational status of Falcon sensors across endpoints. These reports help administrators identify systems with outdated sensor versions, communication failures, or operational errors. Reviewing these reports regularly ensures that endpoint protection remains active and up to date throughout the environment. Administrators can use this information to troubleshoot sensor issues, plan updates, or remediate endpoints that are not properly protected.
Demand Score: 69
Exam Relevance Score: 80
Why are Falcon audit logs important for security and compliance monitoring?
They provide a record of administrative and system activities within the platform.
Audit logs capture actions performed by users and automated processes in the Falcon console. These logs allow organizations to track configuration changes, administrative actions, and system events. Reviewing audit logs helps security teams investigate incidents, maintain accountability, and meet regulatory compliance requirements. They are particularly useful for verifying who performed specific actions such as policy changes or remote response operations.
Demand Score: 67
Exam Relevance Score: 82
Why do administrators regularly review Falcon dashboards?
To monitor security posture and operational status across endpoints.
Falcon dashboards aggregate security and operational metrics into visual summaries. These dashboards display key indicators such as detection trends, sensor health status, and endpoint coverage. Administrators rely on dashboards to quickly identify anomalies, investigate threats, and evaluate the effectiveness of security policies. By regularly reviewing these visual summaries, security teams maintain awareness of the overall security posture of their environment.
Demand Score: 64
Exam Relevance Score: 76
How can Falcon reports assist administrators during security investigations?
By providing historical visibility into system activity and detection events.
Falcon reports store historical telemetry and detection information that helps investigators analyze past security events. Administrators can review reports to identify affected hosts, analyze attack timelines, and evaluate the scope of an incident. This historical data helps security teams understand how an attack occurred and supports effective remediation and incident response efforts.
Demand Score: 60
Exam Relevance Score: 75