What is a User Account in Falcon?
A User Account allows a person to log into the Falcon platform. Each account is tied to an email address, and it defines what that person can do within the system based on assigned roles.
Login to the Falcon Console:
Go to falcon.crowdstrike.com and sign in using your administrator credentials.
Navigate to User Management:
On the left-hand menu, go to:
“Settings” → “User Management” → “Users”.
Click “Add User”:
You will be asked to enter:
Email address (this becomes their username)
First and last name (optional)
Role (we’ll explain roles next)
Expiration date (optional – can auto-disable the account later)
Enforce MFA (Multi-Factor Authentication – highly recommended)
Send Invitation:
Once the user is added, they receive an email invitation to set up their password and MFA, and then access the platform.
Each user must have a unique email address. No sharing.
Don’t give everyone the Admin role. It’s safer to use the minimum necessary permissions.
If a user leaves the company, go to User Management and disable or delete their account.
What is RBAC?
RBAC stands for Role-Based Access Control. This means that what a user can do in Falcon depends on their role. Each role has a list of permissions—what parts of the platform they can see, and what actions they can perform.
CrowdStrike provides some built-in roles that you can use right away:
Administrator:
Full access to everything.
Can manage users, policies, detections, and configurations.
Should be given only to trusted senior users.
Analyst:
Can view and investigate detections.
Cannot change user settings or policies.
Investigator:
Similar to Analyst, but with slightly fewer permissions.
Focused on viewing, not editing.
Real Time Response (RTR) Admin:
Can access and use the Real Time Response shell.
This is a powerful role—RTR lets you run commands on machines remotely.
Dashboard Viewer / Read-only Roles:
Can view dashboards and reports but can’t make changes.
Useful for auditors or managers.
If the built-in roles don’t fit your needs, you can create a custom role.
Go to: Settings → User Management → Roles
Click "Create Role"
Select or deselect permissions. Examples:
“Can edit detection policies”
“Can manage user accounts”
“Can use Real Time Response”
Name your role and save it.
You might want to create a role called “Policy Manager” that allows users to edit policies but not change user settings or access API keys.
RBAC is critical for security and compliance:
Limits mistakes by junior staff.
Prevents sensitive data exposure.
Meets audit requirements (especially in regulated industries like finance and healthcare).
What is MFA (Multi-Factor Authentication)?
MFA is a security feature that requires a user to provide two or more pieces of evidence (factors) to verify their identity when logging in.
In Falcon, the two factors are usually:
Something you know – your password.
Something you have – like a code from an authenticator app (e.g., Google Authenticator or Microsoft Authenticator).
MFA protects your environment from:
Phishing attacks (if a password is stolen, it’s not enough on its own).
Unauthorized access to the Falcon console.
Compliance issues, especially for SOC 2, HIPAA, or GDPR.
There are two ways to require MFA:
In the "Add User" screen, check the box “Require MFA”.
The user must then set up MFA during their first login.
Go to User Management → Users → Edit User.
Check the “Enforce MFA” option and save.
In addition to MFA, Falcon offers other important settings:
You can define how complex passwords must be:
Minimum length
Must include numbers/symbols
Cannot reuse recent passwords
Falcon can log users out after a period of inactivity.
This reduces the risk of someone accessing an unattended workstation.
Even if MFA is optional for some users, it is highly recommended to make it mandatory for:
All admins
Anyone with access to policies or sensitive data
Users with RTR privileges
What are Audit Logs?
Audit logs are records of user actions within the Falcon console. They are essential for tracking activity, investigating incidents, and ensuring accountability.
Audit logs help you:
See who did what and when (e.g., user logins, policy changes).
Detect unauthorized or suspicious activity (e.g., a user changing API keys unexpectedly).
Meet compliance and regulatory requirements (e.g., for SOC 2, ISO 27001).
Reconstruct a timeline during a security investigation.
Log into the Falcon Console.
Go to “Audit Logs”, usually found under:
Settings → Audit Logs, or
Activity → Audit Log (depending on your role and console version).
Each entry in the audit log includes:
Timestamp – exact date and time of the action.
Username – who performed the action.
Action Taken – e.g., “Created a new policy”, “Generated an API key”.
Target Resource – what was affected, such as a user account, sensor policy, or host group.
Result – success or failure of the action.
IP Address – location from which the user performed the action.
Logins and logout activity (including failed attempts)
Changes to user roles or accounts
API credential creation or deletion
Policy edits or assignments
Detection suppression rule changes
RTR session start and end times
The Falcon audit log interface allows you to:
Filter by time range, user, or action type
Search for specific keywords (e.g., “API key”, “policy”)
Export logs for long-term storage or external analysis (CSV or via API)
Imagine a detection was suppressed unexpectedly. You can:
Go to the audit logs.
Search for "Suppression".
Find out who added the rule, when, and what detection ID was affected.
What Are API Credentials in Falcon?
API credentials allow external systems (like SIEM tools, custom scripts, or security automation platforms) to communicate securely with the Falcon platform.
These credentials are like “digital user accounts” for software, not people.
They are used to:
Automate threat detection or response workflows.
Pull data (like host inventory, detection details, or audit logs).
Integrate Falcon with tools like Splunk, ServiceNow, or custom dashboards.
Each API credential consists of:
Client ID – like a username.
Client Secret – like a password (only shown once, so store it securely).
Permission Scopes – these define what the API can access or do.
Log into the Falcon console.
Go to Support → API Clients and Keys.
Click “Create API Client”.
Give it a name and optionally a description.
Assign permission scopes. Examples:
Read Detections
Write to Host Groups
Read Audit Logs
Click “Create”. The Client ID and Client Secret will appear—copy them immediately (you cannot view the secret again).
Save them securely (e.g., in a password manager or environment variable).
Use minimum permissions needed. Don’t give full access unless required.
Rotate API keys regularly. This improves security and helps prevent misuse.
Assign each system a unique API credential. This makes auditing easier.
If a key is compromised, immediately delete and recreate it.
API actions (like detection queries or host updates) are recorded in the Audit Logs just like user actions.
You can track who used an API key, from what IP, and what actions they performed.
API keys are for software access, not human users.
Always limit scopes and store secrets safely.
Regularly review and rotate credentials.
Audit usage through the Falcon console.
In real Falcon operations, the risk isn’t only “unauthorized access”—it’s mis-scoped access: someone can see what they need but can’t complete a workflow, or someone can change something they shouldn’t. The exam often expects you to choose the smallest permission set that still completes the task.
Use a two-step mapping method that avoids “make them admin” shortcuts:
Step 1: Write the task list in verbs (view detections, investigate host, run RTR command, edit policy, manage users, create API client).
Step 2: Assign permissions to the verbs, not the title. Titles vary by org; verbs are stable.
A simple “starter mapping” you can reuse:
SOC Analyst (triage/investigate): view detections/incidents, pivot to host details, run investigation actions allowed by policy; avoid policy-edit and user-management rights.
Threat Hunter (deep investigation): broad visibility/search and investigation tooling; still avoid tenant-wide settings changes unless explicitly required.
Falcon Admin (platform changes): policy creation/tuning, sensor update control, configuration settings; keep this group small.
IT / Endpoint Ops (deployment health): sensor deployment visibility, host health, troubleshooting views; avoid security tuning capabilities unless needed.
Auditor / Read-only: reporting and visibility only; no change capability.
Integration Engineer (API): API client permissions limited to the integration’s read/write needs; no interactive console admin rights unless required.
A safe validation routine:
Ask: “What is the single action they must perform that currently fails?” (view vs change vs execute).
Confirm role assignment and re-test the exact action.
If adding permissions, add the narrowest missing capability, then re-test—do not jump to broad roles.
Record the reason and the change owner (auditability).
Trap pattern: Correct task, wrong scope (granting a role that can edit policy when the scenario only needs investigation).
Trap pattern: Confusing visibility with execution (a user can see an RTR panel but cannot run a command; the fix is role capability, not reinstalling sensors).
Your best answer usually mentions least privilege + validation (“grant only what’s needed and confirm via the exact failing action”).
A Falcon administrator wants to automate host inventory queries using the CrowdStrike API but receives authorization errors when using the API key. What is the most likely configuration issue?
The API key does not have the required scope permissions assigned.
Falcon API keys are created with specific scopes that determine which API endpoints they can access. If an automation script attempts to query hosts but the key lacks permissions such as Hosts: Read, the request will fail with authorization errors. Administrators must ensure the API key includes all scopes required by the automation workflow. This issue commonly occurs when administrators create API keys with minimal permissions or overlook required scopes during setup. Proper practice is to review the intended API usage and grant only the necessary scopes while validating access through test queries before deploying automation scripts.
Demand Score: 70
Exam Relevance Score: 80
A security engineer can view Falcon dashboards but cannot create or modify users. What is the most likely cause?
The user’s assigned role does not include user management permissions.
Falcon roles define what actions a user can perform in the console. Dashboard viewing privileges are commonly included in analyst-level roles, but administrative functions such as creating users or modifying roles require higher privilege permissions such as User Management: Write. If a user lacks these permissions, they can access monitoring features but cannot perform administrative tasks. Administrators must assign a role that includes the appropriate permissions for user management. Role-based access control ensures least-privilege access while preventing unauthorized configuration changes in the environment.
Demand Score: 68
Exam Relevance Score: 78
When creating API keys for automation, what is the recommended practice for assigning permissions?
Grant only the minimum scopes required for the automation task.
API keys should follow the principle of least privilege. Each key can be configured with scopes that determine which API endpoints are accessible. Granting excessive permissions increases risk if the key is compromised or misused. Administrators should identify the exact API functions required by the automation process—such as host queries, detection retrieval, or policy changes—and assign only those scopes. This reduces the blast radius of potential misuse while maintaining operational functionality.
Demand Score: 62
Exam Relevance Score: 72
Why might an administrator create multiple API keys instead of using a single key for all integrations?
To isolate permissions and limit operational risk across integrations.
Using separate API keys for different integrations allows administrators to assign unique scopes and revoke access without affecting other systems. If a single key is reused across multiple services, disabling that key due to compromise or rotation requirements will disrupt all dependent integrations. By issuing distinct keys with specific scopes, administrators maintain better operational control, simplify auditing, and reduce the impact of credential exposure.
Demand Score: 60
Exam Relevance Score: 70