IOA stands for Indicator of Attack. Unlike IOCs (which flag known threats), IOAs are designed to identify suspicious behaviors that might indicate an attack—even if the file or command is not yet recognized as malicious.
Custom IOA rules allow you to write your own behavioral detections using Falcon’s internal DSL (Domain-Specific Language).
Detect unique threats that aren’t covered by default protections.
Add business-specific protections (e.g., block certain scripts in finance).
Enforce internal security policies (e.g., block running curl from PowerShell).
They follow a logic-based syntax using:
Conditions (e.g., command_line contains "Base64").
Processes (e.g., parent_process_name = powershell.exe).
Actions (e.g., block, alert, or both).
Detect PowerShell using Base64 encoding (often used in obfuscated attacks):
process_name = "powershell.exe" AND command_line contains "Base64"
This would trigger if a process matches both conditions.
You can apply rules to specific:
Groups – using the same logic as dynamic host groups.
OS types – e.g., only apply a rule to Windows or Linux machines.
| Action Type | Description |
|---|---|
| Alert Only | Creates a detection, but allows the action to continue |
| Prevent | Blocks the behavior from completing |
| Alert + Prevent | Both alerts and blocks the action |
Go to Configuration → Custom IOA Rules.
Click “Create Rule”.
Choose:
Platform (Windows/macOS/Linux)
Rule Scope (group or global)
Write the rule logic using DSL syntax.
Set the Action (Alert, Prevent, or both).
Name and describe the rule (add comments for internal context).
Optionally assign tags or expiration dates.
Save and Deploy the rule to a test group first.
| Tip | Why It Matters |
|---|---|
| Start in alert-only mode | Prevents accidental disruptions |
| Test with small group | Minimizes business impact |
| Document each rule | Helps during audits and tuning |
| Avoid overly broad logic | Reduces false positives |
IOCs, or Indicators of Compromise, are known threat artifacts that security teams use to identify infections or malicious activity. These include:
File hashes (e.g., SHA256)
IP addresses
Domains or URLs
When Falcon sees any of these on an endpoint or in network traffic, it can:
Alert you
Block the connection or process
Trigger a custom workflow
Respond faster to threat intelligence (e.g., new malware hash from your SOC).
Block known-bad IPs/domains associated with phishing or malware.
Extend Falcon detection using your own or third-party intel feeds.
Navigate to IOC Management in the Falcon Console:
Click “Upload IOC”.
Fill out:
IOC Type (Hash, IP, Domain, etc.)
Value (the actual hash or domain)
Action (Alert, Prevent, or Both)
Expiration Date (optional)
Tags or Descriptions (for tracking or auto-assignment)
Each IOC can have:
Start and End dates
Optional auto-expiry
Tags (e.g., “APT29”, “Finance-Only”)
Group targeting (apply to only certain device groups)
This lets you automatically retire outdated intelligence or control where IOCs apply.
Falcon sensors match IOCs in real time against:
File system access (hashes)
Network connections (IPs and domains)
Process activity (command lines, file loads)
When a match is found, Falcon triggers:
A detection alert
A preventive action (if configured)
| Practice | Reason |
|---|---|
| Use tags to track source or campaign | Helps during investigations |
| Set expirations for time-sensitive intel | Keeps database clean |
| Test in alert-only mode first | Prevents false positives |
| Regularly review IOC hit data | Helps tune detection effectiveness |
Your threat intel team receives indicators of a phishing campaign:
SHA256 hash of payload
2 known malicious IPs
1 fake login domain
You:
Upload them as IOCs with Prevent action.
Assign them to your High-Risk Targets group.
Set auto-expiry for 30 days.
Monitor detection hits daily.
Detection Suppression allows you to intentionally suppress (hide) specific detection events from appearing in the Falcon console. This is useful for:
Known false positives
Legitimate activity that’s flagged repeatedly
Custom internal applications triggering alerts
Suppression does not stop the sensor from detecting the event—it simply prevents the alert from surfacing.
Reduce alert fatigue for analysts.
Focus on true threats, not noise.
Avoid unnecessary escalations for benign but suspicious behavior.
There are three main ways to suppress detections:
Go to Activity → Detections.
Open the detection you want to suppress.
Click “Create Suppression Rule”.
Choose your suppression criteria (see below).
Go to Configuration → Detection Suppression Rules.
Click “Create Rule” and define the conditions manually.
You can suppress detections based on:
| Criterion | Example |
|---|---|
| Detection ID | Suppress one specific incident |
| SHA256 Hash | Ignore future detections for a known file |
| Process Name | Suppress actions by trusted internal tools |
| Command Line Pattern | Ignore known scripts that trigger alerts |
| File Path | Exclude a specific folder or directory |
You can combine multiple conditions for tighter control.
Suppression can be global or group-specific.
You can apply suppression to:
All hosts
Only hosts in a specific group
Suppress alerts from a custom finance tool only on Finance Dept machines.
| Practice | Benefit |
|---|---|
| Document each suppression | Prevents misconfiguration or abuse |
| Time-limit suppression rules | Forces periodic review (e.g., expire in 30 days) |
| Use tags on suppression rules | Helps organize and track purpose |
| Avoid suppressing critical detections | Confirm root cause before suppressing anything |
You have a homegrown script called cleanup_temp.bat that runs every night and triggers Falcon’s behavioral alerts.
You:
Open the detection for the script.
Create a suppression rule for:
command_line contains "cleanup_temp.bat"
Target group: IT Automation
Set the suppression to expire in 60 days.
Log the rationale in the rule description.
The whitelist (also called "allow list") tells Falcon to ignore or permit specific known files or applications—even if they look suspicious.
The blacklist (also called "block list") tells Falcon to automatically block or alert on specific files, regardless of normal behavior or AI scores.
These are typically managed within the Prevention Policy under Hash Control Settings.
Used to avoid false positives or prevent legitimate tools from being blocked.
Go to Configuration → Prevention Policies.
Edit the relevant policy and navigate to the "Hash Control" section.
Add a SHA256 hash of the file you want to allow.
Set the action to “Allow”.
Internal tools (e.g., legacy in-house software).
Automation scripts known to trigger false detections.
Software flagged by ML but verified as safe.
Be cautious—allowing a file disables ALL detection/prevention for that file across its group.
Used to proactively block known malicious files or prevent risky tools from executing.
Follow the same steps as for the allow list.
Add the file’s hash and set action to “Block”.
Optionally provide:
Description (e.g., “Known ransomware variant”)
Expiry date (if threat is temporary)
Tags for organizing entries
Blocking known malware not yet detected by Falcon ML/IOA.
Preemptively denying risky remote administration tools.
Quarantining leaked or stolen tools (e.g., Mimikatz).
| Tip | Reason |
|---|---|
| Always validate file hash before whitelisting | Avoid permitting disguised malware |
| Use a test group to trial new entries | Prevent mass rollout of mistakes |
| Document reason for adding/removing each hash | Helps with audits and response |
| Review and expire old entries regularly | Keeps the list accurate and lean |
You can combine:
IOA Rules → Behavioral detection
IOC Entries → External threat feeds
Hash Control Lists → Precise enforcement
Together, these tools offer multi-layered defense:
Behavior (IOA) catches unknown threats.
IOC/Hash lists catch known ones quickly.
Your red team uses a tool called payload.exe for internal testing. It keeps getting blocked.
You:
Add its SHA256 hash to the allow list for the Red Team group.
Exclude it from detection, only in test environments.
Add an expiry date for 7 days.
Monitor usage to ensure no abuse.
CrowdStrike Falcon’s rule engine is powerful, but improper configuration can lead to:
False positives (interrupting legitimate operations)
False negatives (failing to detect actual threats)
Overblocking, which could impact productivity
Testing helps you:
Confirm your logic is sound
Minimize operational risk
Build stakeholder confidence before rollout
Before applying a new rule widely:
Set up a dedicated test host group (e.g., Policy Test Devices)
Assign it:
A test policy (clone of production, with new rules added)
Access to representative endpoints (e.g., Windows, macOS, servers)
Prevents mistakes from affecting production systems.
Lets you observe real-world behavior.
For:
Custom IOA rules
IOC entries
Hash lists (optional)
Set the action to:
This lets you observe:
What would have been blocked
Whether the match criteria is too broad or too narrow
For IOA rules, test with controlled activity such as:
Running a PowerShell script with a Base64 string
Executing a fake malware dropper with a known hash
Creating test files/domains to trigger IOC rules
Ensure simulation does not violate company policies or trigger unnecessary escalations.
Go to Activity → Detections and filter by:
Source = Custom IOA
IOC Match = True
Target Group = Your Test Group
Look for:
Expected detections
Unexpected or excessive matches
Host behavior and performance impact
Based on your test results:
Refine rule conditions (e.g., use starts with instead of contains)
Add exclusions for known good apps
Document what changed and why
Repeat this cycle until:
You achieve high accuracy
No critical disruptions are observed
Once validated:
Roll out to a pilot group (e.g., 10–20% of production)
Continue monitoring
Expand to full deployment
| Step | Action |
|---|---|
| 1 | Clone policy, assign to test group |
| 2 | Set rules to alert-only |
| 3 | Simulate and monitor |
| 4 | Tune and iterate |
| 5 | Pilot in real groups |
| 6 | Finalize production rollout |
What is the primary purpose of creating custom IOA rules in Falcon?
To detect behaviors that are suspicious but not inherently malicious.
Indicators of Attack (IOA) focus on behavioral patterns rather than specific file signatures. Custom IOA rules allow administrators to monitor activities that may indicate misuse or policy violations, even if those actions are not inherently malicious. Organizations often use these rules to detect insider threats, unauthorized administrative actions, or suspicious automation activities. By defining behavioral conditions, security teams gain visibility into risky activity without relying solely on predefined detections.
Demand Score: 86
Exam Relevance Score: 90
How do administrators reduce false positives generated by Falcon detections?
By adjusting IOA rules or creating exclusions for trusted activity.
False positives may occur when legitimate applications perform actions that resemble malicious behavior. Administrators can tune IOA rules or create exclusions for trusted processes to prevent repeated alerts. This tuning process helps maintain accurate detection results while avoiding unnecessary operational disruptions.
Demand Score: 82
Exam Relevance Score: 86
What is the difference between an Indicator of Compromise (IOC) and an Indicator of Attack (IOA)?
IOCs identify known malicious artifacts, while IOAs detect suspicious behavior patterns.
Indicators of Compromise focus on specific evidence such as malicious file hashes, domains, or IP addresses associated with known threats. Indicators of Attack analyze behavioral patterns that indicate malicious activity regardless of the specific tools used. IOA-based detection is effective against new or unknown threats because it focuses on attacker techniques rather than static indicators.
Demand Score: 80
Exam Relevance Score: 90
Why might organizations create IOA rules that monitor activity but do not block it?
To observe suspicious behavior without disrupting legitimate operations.
Some behaviors may be unusual but still legitimate within certain environments. Monitoring-only rules allow administrators to gather intelligence about potentially risky activities before enforcing blocking actions. This approach helps organizations validate rule accuracy and reduce the risk of false positives before implementing stronger enforcement policies.
Demand Score: 75
Exam Relevance Score: 82
Why must administrators understand CID-wide settings when configuring rules?
Because these settings affect rule behavior across the entire environment.
Certain Falcon configuration options apply globally at the CID level. When administrators modify these settings, the changes can influence rule behavior, detection policies, and system-wide configuration. Understanding these settings ensures that rule changes align with the organization’s overall security strategy and do not unintentionally affect other parts of the environment.
Demand Score: 70
Exam Relevance Score: 80