What is a Sensor?
In CrowdStrike Falcon, a sensor is a small software agent that runs on an endpoint (computer, laptop, server). Its job is to monitor, detect threats, and report data back to the Falcon cloud platform.
You must install this sensor on every machine you want Falcon to protect.
Without a sensor:
Falcon cannot see the endpoint.
You don’t get protection from malware or attacks.
No alerts, detections, or remote response is possible.
CrowdStrike Falcon supports:
Windows (Workstations and Servers)
macOS
Linux (multiple distributions, e.g., RHEL, Ubuntu, Amazon Linux)
Each OS has a different sensor installer.
Visit falcon.crowdstrike.com.
Navigate to “Host Setup and Management → Sensor Downloads”.
Select your OS type (Windows, macOS, Linux).
Download the installer file.
Every sensor must be linked to your organization’s account using a CID (Customer ID).
It’s shown on the download page. Copy it securely.
There are different deployment options:
Windows: Run the installer like this:
falcon-sensor.exe /install /quiet /norestart CID=your-customer-id
macOS: Use the .pkg installer and MDM approval (Jamf, Intune).
Linux: Run shell commands and configure required kernel modules.
Use tools like:
GPO (Group Policy) for Windows domain environments.
SCCM (System Center Configuration Manager).
Jamf for macOS MDM environments.
Scripts or Ansible for Linux.
Always install the latest sensor version unless instructed otherwise.
For macOS, you may need to approve system extensions manually or through MDM after installation.
Use silent install flags for automated or large-scale deployment.
Why Use the Command Line?
The command line gives you more control over how the sensor is installed. It’s essential for:
Silent installs (no user prompts).
Adding custom settings (like proxy servers).
Automating deployment across many endpoints.
The Windows installer is typically called falcon-sensor.exe. Below are important options you can use:
falcon-sensor.exe /install /quiet /norestart CID=<your-customer-id>
/install – tells the program to install.
/quiet – installs silently, with no dialogs.
/norestart – prevents automatic reboot after install.
CID=... – links the sensor to your Falcon console.
falcon-sensor.exe /install /quiet CID=... PROXY="http://proxy.company.com:8080"
falcon-sensor.exe /install /quiet CID=... /log install_log.txt
falcon-sensor.exe /install /quiet /norestart CID=abc123xyz456 PROXY="http://proxy.local:8080" /log sensor_install.log
On macOS, the installer is a .pkg file. You install it using the Terminal with sudo:
sudo installer -pkg CrowdStrike.pkg -target /
You also need to:
Approve system extensions via MDM (Jamf or Intune).
Allow full disk access for the sensor (can be scripted or done via MDM).
Linux sensors are typically installed with a .sh script. Example:
sudo bash falcon-sensor-linux.sh --cid=<your-customer-id>
You might also:
Use systemctl to enable/start the service.
Add kernel headers if required by your distribution.
Always test your command-line options on a few machines before wide deployment.
Store your CID securely—it identifies your organization’s Falcon instance.
Use a log file to help debug if the sensor fails to appear in the Falcon UI.
Proper sensor deployment depends on ensuring the endpoint environment supports the sensor. This involves checking OS compatibility, system requirements, and understanding the supported features for each platform.
CrowdStrike provides different sensor builds for:
Windows:
Workstations: Windows 10, 11 (most editions).
Servers: Windows Server 2012 R2, 2016, 2019, 2022.
macOS:
Typically supports the last 3–4 major macOS versions.
Sensors are quickly updated after each new macOS release.
Linux:
Supported distributions include:
RHEL, CentOS, AlmaLinux
Ubuntu, Debian
Amazon Linux
SUSE, Fedora (limited)
Check the official CrowdStrike Sensor Support Matrix for current supported OS versions.
Each OS has its own requirements to run the sensor successfully:
.NET Framework is not required.
Disk space: ~50–100 MB for installation.
RAM: Minimal additional usage (lightweight).
Must run as Administrator during install.
Needs Full Disk Access (FDA) and System Extension approvals.
Requires Apple Silicon support for newer Macs (via universal binary).
Requires kernel headers that match your OS version.
On some distros (like Ubuntu), you may need to run:
sudo apt install linux-headers-$(uname -r)
Must enable and start the falcon-sensor service.
CrowdStrike regularly publishes new sensor versions to:
Add support for new OS builds.
Patch vulnerabilities.
Improve detection performance.
Go to “Sensor Downloads” in the Falcon console.
Check the release notes for each version.
Apply updates in a controlled rollout (e.g., test group → full deployment).
Installing a sensor on an unsupported OS version – sensor may install but won’t function.
Missing Linux kernel headers – sensor fails silently or logs errors.
On macOS, failing to approve system extensions – sensor won’t start properly.
Outdated versions – may lack detection capability for new threats or OS support.
After installing the CrowdStrike sensor, it’s critical to verify that:
The installation was successful.
The sensor is communicating with the Falcon cloud.
The endpoint appears in your Falcon Console.
Log into the Falcon Console.
Go to “Host Management” → “Hosts”.
Look for the endpoint:
It may take a few minutes to appear.
It should show the hostname, OS, sensor version, and last seen timestamp.
Status = “Online” or recently “Checked In”
Correct Group Membership
Policy Applied is visible
Use the Command Prompt or PowerShell.
Check the service:
sc query csagent
Output should show:
STATE: 4 RUNNING – means the sensor is active.Optional: Check registry or service logs (advanced use).
Use Terminal.
Check status:
sudo /Applications/Falcon.app/Contents/Resources/falconctl stats
Confirm connectivity:
sudo /Applications/Falcon.app/Contents/Resources/falconctl status
Look for keys like:
Sensor operational: true
Cloud connection: established
Use Terminal commands.
Check the service:
sudo systemctl status falcon-sensor
For deeper stats:
sudo /opt/CrowdStrike/falconctl -g --status
You should see:
Sensor operational = true
Sensor active = true
No major errors in /var/log/messages
If you don’t see the host in the console:
Make sure the endpoint has internet access.
Check firewall settings (sensor must reach Falcon cloud).
Verify you used the correct CID during installation.
On macOS/Linux, ensure you enabled/started the service.
CrowdStrike Falcon sensors are designed to be secure and tamper-resistant. Uninstalling or reinstalling a sensor is intentionally controlled and requires specific permissions or tokens.
Prevents attackers or rogue users from disabling protection.
Ensures only authorized admins can remove or modify sensors.
Helps maintain compliance in regulated environments (e.g., PCI, HIPAA).
Admin rights are required.
Uninstallation usually needs a maintenance token (optional depending on policy).
"%ProgramFiles%\CrowdStrike\uninstall.exe" /uninstall
If a maintenance token is required, you must first:
Log into the Falcon Console.
Go to Support → Maintenance Tokens.
Generate a token (valid for a limited time).
Run:
uninstall.exe /uninstall /maintenancetoken=<your-token>
sudo /Applications/Falcon.app/Contents/Resources/uninstall.sh
If MDM was used to deploy, also remove the MDM profile afterward.
May need token if tamper protection is enabled.
sudo /opt/CrowdStrike/falcon-uninstall
Sometimes a sensor may need to be reinstalled due to:
OS reimaging or upgrades.
Corrupted installation.
CID change or testing a different policy set.
Uninstall the current sensor properly (with token if needed).
Reboot the machine (recommended but not always required).
Reinstall using the latest sensor version and correct CID.
Token errors: Ensure the token is still valid (they expire quickly).
Sensor won’t start: Check system logs and verify all dependencies (e.g., kernel headers on Linux).
Endpoint doesn’t appear in console: Ensure internet access and that no proxy/firewall is blocking traffic.
Uninstalling a sensor is restricted for security.
Use maintenance tokens to authorize removal.
Always uninstall before reinstalling.
Keep track of token usage and expiry time.
Verify the sensor appears in the Falcon Console after reinstalling.
Most large sensor rollouts fail for predictable reasons (privileges, OS support, connectivity/proxy, and “registration step not actually completed”). The exam tends to reward answers that prevent problems via a checklist/gate, not answers that “fix it later.”
Before broad rollout, validate these categories for each target population (workstations, servers, VDI, cloud):
Platform support: OS version and architecture are within supported ranges; the correct sensor package is selected for that platform.
Install authority: local admin/root (or equivalent managed install capability) exists for the deployment method.
Reboot expectations: your rollout plan accounts for any “needs reboot to fully load protections” behavior (treat as an operational constraint even if the installer appears successful).
Egress path: endpoints can reach the Falcon cloud through the real network path they will use (direct or via proxy).
Proxy handling: proxy auth and allowlisting are addressed before rollout; you have a validation host per network segment.
Baseline stability: you pilot on representative “weird” hosts (hardened servers, legacy apps, restricted subnets) so the pilot actually predicts production.
Trap pattern: “Installer ran, so deployment is done.” Best answers mention registration + check-in verification.
Trap pattern: treating connectivity as afterthought. Best answers include egress/proxy validation per segment.
A Falcon sensor is successfully installed on a host but the host does not appear in the Falcon console. What is the most likely reason?
The sensor cannot communicate with the CrowdStrike cloud.
After installation, the Falcon sensor must establish outbound communication with the CrowdStrike cloud to register the host. If network restrictions block required outbound connections—such as firewall rules preventing access to CrowdStrike domains—the host will not appear in the console. Administrators should verify DNS resolution, outbound HTTPS connectivity, and network proxy configurations. This is a common deployment issue when sensors are installed in restricted corporate networks.
Demand Score: 88
Exam Relevance Score: 85
Why must administrators verify system prerequisites before installing a Falcon sensor?
Because unsupported operating system versions or missing dependencies can prevent proper sensor operation.
Falcon sensors support specific operating system versions and kernel levels. Installing the sensor on unsupported systems can result in failed installation, limited functionality, or communication errors. Administrators must verify compatibility requirements such as OS version, architecture, and necessary system libraries before deployment. Pre-deployment validation helps ensure successful sensor installation and avoids troubleshooting issues after rollout.
Demand Score: 80
Exam Relevance Score: 78
What is a common reason a Falcon sensor uninstall attempt fails on Windows systems?
Tamper protection or uninstall protection is enabled.
Falcon sensors may be protected by uninstall protection settings that prevent unauthorized removal. If an administrator attempts to remove the sensor without using the correct maintenance token or without disabling protection in the console, the uninstall process will fail. The protection mechanism prevents attackers or unauthorized users from disabling endpoint security.
Demand Score: 75
Exam Relevance Score: 80
Why are default policies typically reviewed before large-scale Falcon sensor deployment?
To ensure endpoints receive appropriate protection and configuration settings upon installation.
Default policies determine how sensors behave immediately after installation. If these policies are not reviewed or adjusted beforehand, endpoints may receive overly permissive or restrictive configurations that affect security posture or performance. Administrators should validate prevention settings, update policies, and group assignments before deploying sensors broadly.
Demand Score: 72
Exam Relevance Score: 75
What network requirement must be satisfied for Falcon sensors to function correctly?
Outbound connectivity to CrowdStrike cloud services over HTTPS.
Falcon sensors rely on cloud communication for telemetry reporting, detection analysis, and policy updates. If network policies block outbound HTTPS connections to CrowdStrike service endpoints, the sensor cannot transmit telemetry or receive configuration updates. Administrators should confirm firewall rules allow outbound connections to the required domains and verify DNS resolution. Failure to meet this requirement commonly results in hosts appearing inactive or missing in the console.
Demand Score: 70
Exam Relevance Score: 82
Why might administrators deploy sensors in a staged rollout instead of deploying to all endpoints simultaneously?
To validate compatibility and detect deployment issues before organization-wide rollout.
A phased deployment allows administrators to test sensor functionality across representative systems before scaling deployment. This helps identify issues such as application conflicts, unsupported configurations, or performance impacts. By validating installation results with a limited group of endpoints first, administrators reduce the risk of widespread operational disruption.
Demand Score: 66
Exam Relevance Score: 72