In Falcon, policies define how the sensor behaves. They control:
What types of threats are blocked or monitored.
What data is collected.
Which user actions are allowed or restricted (e.g., USB use, firewall access).
How and when the sensor updates.
There are four main types of policies in Falcon:
This is the core policy that controls:
Real-time protection (against malware, ransomware, fileless attacks).
Detection modes (block or monitor).
Cloud Lookup behavior (query threat intelligence).
IOA (Indicators of Attack) rules enforcement.
Behavioral protections, like PowerShell monitoring.
Detection mode: Disabled, Detect, or Prevent
Options for each threat category: Malware, Exploit, Ransomware, etc.
Granular rules for file operations, memory usage, scripts, etc.
This governs host-based firewall settings and integrates with Windows Firewall (on Windows devices).
Enable/disable Windows Firewall integration.
Define rules for:
Allowed/blocked applications.
Ports and protocols.
Inbound/outbound traffic rules.
Apply settings based on network profile: domain, public, private.
Note: This policy does not replace Windows Firewall—it controls it remotely.
This controls USB devices and peripherals on endpoints.
Block USB storage (flash drives, external HDDs).
Allow exceptions (e.g., corporate-issued encrypted drives).
Monitor device usage for audit/compliance.
Block, Allow, or Monitor access by:
Device class (e.g., USB Mass Storage).
Specific vendor/device IDs (for granular exceptions).
Option to log all device connection events.
This manages how and when the Falcon sensor updates itself.
Auto-update on/off.
Allowed update windows (e.g., only update after business hours).
Delay updates on certain groups (e.g., test group vs production).
Use separate update policies for:
Test systems (get updates early).
Production systems (delay updates slightly after validation).
| Policy Type | Purpose |
|---|---|
| Prevention | Core detection/prevention behavior |
| Firewall | Controls network traffic rules |
| Device Control | Manages USB and device permissions |
| Sensor Update | Governs automatic updates of sensors |
In CrowdStrike Falcon, policies are always applied to groups, not directly to individual hosts. This design helps enforce consistency, scalability, and reduces configuration errors in large environments.
Every host must be part of a group to receive a policy.
If a host is not in a group with a policy, it may not be protected properly.
You have a group called Finance Department. You can assign:
A Prevention Policy for strict detection.
A Device Control Policy to block USB drives.
A Firewall Policy to block risky ports.
A Sensor Update Policy to allow updates only at night.
These policy types are all assigned separately, even though they apply to the same group.
Each group can have one policy of each type assigned:
1 Prevention Policy
1 Firewall Policy
1 Device Control Policy
1 Sensor Update Policy
| Group Name | Prevention Policy | Firewall Policy | Device Control | Sensor Update |
|---|---|---|---|---|
HR Workstations |
HR-Protection-Policy | HR-Firewall-Rules | HR-USB-Block | Default |
Dev Servers |
Dev-Secure | Dev-Firewall-Strict | None | Delay-Updates |
If you don’t assign a certain policy type, the hosts in that group will not receive any behavior from that category (e.g., no firewall control).
You can change the policy assigned to a group at any time.
The update is pushed to all hosts in the group immediately or during the next heartbeat.
This is useful for:
Testing new policy settings.
Rolling out stricter rules in stages.
Responding to incidents (e.g., enabling USB block policy temporarily).
There is no layered or inherited precedence in Falcon. A host receives:
Exactly one policy per type, based on its current group.
There is no merging of policy settings across groups.
| Concept | Description |
|---|---|
| Group-based Assignment | Policies apply only to groups. |
| Multiple Policy Types | Each group can have one of each policy type. |
| No Inheritance | Each group functions independently. |
| Dynamic Reassignment | Policies can be swapped out live. |
Each policy type (Prevention, Firewall, Device Control, Sensor Update) includes configurable rules and settings toggles that define how Falcon behaves on the endpoint.
This is the most detailed policy. It controls the core of Falcon’s threat prevention capabilities.
Malware Protection
Real-time protection toggle (on/off)
Detection mode: Detect Only or Prevent
Machine Learning levels: Aggressive, Moderate, Cautious
Exploit Prevention
Protects against memory-based attacks (e.g., buffer overflows)
Script protection: PowerShell, WScript, JavaScript blocking
IOA (Indicator of Attack) Rules
Custom or default logic-based rules to detect suspicious behavior
Example: Detect Office apps spawning cmd.exe
Cloud Lookup
Sensor Behavior Settings
This policy enables centralized control of host-based firewalls (mainly on Windows).
Enable/Disable firewall integration
Network Profile-specific rules:
Rule Types:
Allow/block by application path
Allow/block by port or IP range
Direction:
Protocol-specific controls (e.g., TCP, UDP, ICMP)
Block all outbound traffic from unknown applications on Public networks.
Designed to manage USB and external device access.
Device Access Control:
Granular Rules:
Allow or deny by:
Vendor ID (VID)
Product ID (PID)
Serial Number
Logging Settings:
Track device connection/disconnection
Alert on unapproved device usage
Allow only corporate-issued encrypted USB drives; block everything else.
Manages when and how the Falcon sensor updates on endpoints.
Auto-Update Toggle (on/off)
Update Window:
Set specific days/times when updates are allowed
Example: Only update between 1 AM – 4 AM, Monday to Friday
Sensor Version Controls (for advanced scenarios):
Delay rollout to groups until tested
Manually push versions to test groups
Some settings are simple toggles (on/off).
Others use JSON-based configuration, especially for IOA rules or firewall advanced rules.
Changes take effect as soon as hosts sync with the cloud (typically within a few minutes).
| Task | Best Practice |
|---|---|
| Malware Detection | Set to "Prevent" for production systems |
| Firewall Control | Use test groups to validate rules |
| USB Management | Use audit mode (monitor) before enforcing block |
| Policy Testing | Clone existing policy → make edits → assign to small group |
Unlike some endpoint protection platforms that use layered policies with inherited settings, CrowdStrike Falcon follows a flat policy model. This design avoids complexity and makes behavior more predictable—but it also comes with certain trade-offs.
In Falcon:
Policies are not layered or nested.
There’s no “parent policy” or “base template” that others inherit from.
Each group is assigned a full policy of each type (Prevention, Firewall, etc.).
That policy stands alone—there’s no cumulative effect from other policies.
You must fully define each policy.
If you want multiple groups to share a common setting (e.g., USB blocking), you must replicate that setting in each relevant policy.
Each host belongs to only one group, and that group entirely controls:
Which policy it gets.
What rules are enforced.
There is no fallback or override based on other group memberships.
A host cannot “partially” inherit settings from another group or policy.
Here’s what happens under the hood:
Host joins group → Group has policy assigned → Policy applies 100%
If the host changes groups, it instantly adopts the new group’s policy.
This makes policy switching easy, but means you must manage group membership carefully.
| Benefit | Description |
|---|---|
| Simplicity | No merging conflicts or inheritance chains |
| Predictability | Hosts always run exactly one policy per type |
| Speed | Less logic to evaluate means faster policy resolution |
| Transparency | Easy to audit which policy a host is using |
| Limitation | How to Address It |
|---|---|
| No layered enforcement | Use tags + dynamic groups to simulate context |
| Manual duplication of shared settings | Use policy cloning (see next part) |
| No exceptions per-host | Apply local overrides via host settings when needed |
You have:
A base policy for most employees
A stricter policy for executives
Instead of layering a "base + executive" policy, you must:
Create two separate full policies: one for All Staff, another for Executive Devices.
Assign each group their respective complete policy set.
In Falcon, policies are frequently updated to adapt to:
New threats or security requirements.
Operational feedback (e.g., false positives).
Business changes (e.g., new device types or workflows).
To avoid mistakes and maintain reliability, Falcon supports policy cloning and versioning—a best practice for secure change management.
Cloning creates an exact copy of an existing policy. You can edit the clone without affecting the original.
To test new settings before rolling them out.
To create a specialized version for a subset of hosts.
To update policy content without impacting production machines.
Go to Configuration → Policies.
Find the policy you want to copy.
Click “Clone” or “Duplicate”.
Name your new policy (e.g., “Prevention-Strict-v2-Test”).
Make your edits and save.
Note: The cloned policy is not active until it’s assigned to a group.
Falcon does not track version numbers automatically, so you need to manage versions through naming.
Include:
Policy function (Prevention, Firewall, etc.)
Risk level or audience (Strict, Standard, Developers)
Version or date (v1.3, 2025-07, etc.)
Example: Prevention-Finance-Strict-v1.2
This helps:
Track changes across environments.
Communicate policy versions in documentation or during incidents.
Revert safely if something breaks.
A safe policy rollout strategy often looks like this:
| Phase | Group | Purpose |
|---|---|---|
| Test | Small IT/dev team | Evaluate new settings |
| Pilot | Selected departments | Watch real-world effects |
| Production | All applicable hosts | Full enforcement |
You move hosts between groups or assign the policy to more groups as confidence grows.
If something goes wrong with a new policy:
Simply reassign the group to the older, stable policy.
You don’t need to undo changes—just swap policy assignments in the group configuration.
Document who created or changed policies (track via audit logs).
Use policy descriptions in the console to explain purpose or changes.
Set internal review dates to reevaluate policies regularly.
| Practice | Benefit |
|---|---|
| Clone before editing | Protects live systems |
| Use clear naming | Aids tracking and rollback |
| Test in small groups | Reduces risk of mass disruption |
| Document changes | Supports audit and troubleshooting |
“Choose the right prevention setting” is rarely about memorizing toggles. It’s about risk trade-offs + staged rollout + evidence. Exam prompts commonly include: critical servers, business disruption, and pressure to “turn it down.”
Use a predictable progression so you can attribute impact:
Baseline: stable, broadly acceptable posture for the workload type (workstations vs servers).
Pilot harden: raise posture for a small, representative pilot group (include “weird” hosts).
Measure: capture outcomes (detection volume, false positives, performance complaints, app stability).
Broaden: expand to the next ring only after evidence is acceptable.
Refine: if issues appear, adjust narrowly (specific exclusions/rules) rather than lowering everything.
If a critical server group breaks after a change, the safest response is usually:
Reduce blast radius first: move affected hosts into a temporary “stabilization” group with a safer policy.
Preserve evidence: record what changed, when, and which hosts were affected (for audit and learning).
Re-stage: reintroduce hardening gradually after narrowing the cause (app-specific exception, targeted tuning).
Trap: “Lower prevention everywhere.” Better: scope to affected group + fix root cause + re-stage.
Trap: “If it’s noisy, it must be false.” Better: validate a sample before tuning.
Why might a Falcon prevention policy block legitimate applications on endpoints?
Because prevention settings are configured with aggressive detection levels that classify benign behavior as malicious.
Falcon prevention policies control how aggressively the sensor blocks suspicious behaviors. High sensitivity settings may detect behaviors that resemble malicious techniques even when performed by legitimate applications. This can result in false positives where approved software is blocked. Administrators must evaluate the prevention policy configuration and adjust detection levels or create exclusions to reduce operational disruption while maintaining strong security controls.
Demand Score: 90
Exam Relevance Score: 88
What is the primary purpose of a Falcon containment policy?
To isolate compromised hosts from the network while allowing limited communication for management.
Containment policies enable administrators to restrict network connectivity for potentially compromised systems. When a host is contained, it cannot communicate with most network resources but remains able to communicate with the Falcon cloud for management and remediation activities. This prevents lateral movement by attackers while allowing administrators to investigate and respond to the threat.
Demand Score: 85
Exam Relevance Score: 90
Why would administrators configure IP address exclusions in a containment policy?
To allow contained hosts to communicate with essential internal resources.
During containment, a host is isolated from most network communication. However, organizations may require access to specific services such as domain controllers, patch servers, or forensic tools during remediation. IP address or subnet exclusions allow communication with these approved resources while maintaining overall network isolation. Properly configured exclusions ensure investigation and remediation activities can proceed without restoring full network access.
Demand Score: 82
Exam Relevance Score: 88
What is the purpose of Falcon sensor update policies?
To control how and when sensors receive software updates.
Sensor update policies determine the rollout of new sensor versions across endpoints. Administrators can configure update channels or staged deployment groups to ensure stability and compatibility with organizational environments. Controlled updates allow testing in limited environments before broader rollout, reducing risk associated with new versions. This approach ensures that sensors remain current while minimizing operational disruptions.
Demand Score: 80
Exam Relevance Score: 84
Why do administrators review Real Time Response (RTR) audit logs?
To track user activity and verify administrative actions performed on endpoints.
RTR audit logs record actions taken by administrators when using Real Time Response capabilities. These logs provide visibility into commands executed on endpoints, helping organizations maintain accountability and compliance. Security teams use RTR audit logs to investigate administrative actions, confirm remediation steps, and detect potential misuse of elevated privileges. Regular review helps maintain operational transparency within the Falcon environment.
Demand Score: 75
Exam Relevance Score: 82
Why must administrators carefully manage quarantined files in Falcon?
Because improper handling may restore malicious files or disrupt legitimate applications.
Falcon can quarantine files identified as malicious or suspicious. Administrators must review quarantined files carefully to determine whether they represent real threats or false positives. Releasing a malicious file may reintroduce threats, while deleting a legitimate file may disrupt application functionality. Proper evaluation ensures security incidents are handled correctly without impacting normal system operations.
Demand Score: 70
Exam Relevance Score: 78