How To's
Charts
- Create a chart
- Copy a chart
- Edit a chart with the Metric Explorer
- Drill down
- Display a rate or count in a chart
- Display percentiles or a mean in a chart
- Edit metric labels in a chart legend
- Add a dynamic baseline to a chart
- Add a static threshold line to a chart
- Display device group members in a chart
- Create regular expression filters
- Find all devices talking to external IP addresses
- Monitor a device for external IP address connections
Dashboards
- Create a dashboard
- Copy a dashboard
- Display a dashboard in a NOC or SOC
- Create a dashboard with dynamic sources
- Edit a dashboard layout
- Edit a chart with the Metric Explorer
- Edit a text box widget
- Edit a dashboard region
- Change the time interval for a dashboard region
- Edit dashboard properties
- Create a dashboard collection
- Share a dashboard
- Share a dashboard collection
- Share a dashboard with a restricted user
- Present a dashboard
- Export data
- Create a PDF file
Detections
- Tune detections
- Filter and Tune Hardening Detections
- Optimizing detections
- Suppress detections with tuning parameters
- Hide detections with tuning rules
- Add a trusted domain
- Track a detection
- Create an investigation
- Acknowledge detections
- Create a detection notification rule
- Create a threat briefing notification rule
- Create a custom detection
- Contain CrowdStrike devices from a detection
- Investigate performance detections
- Investigate security detections
- Share a detection
- Configure ticket tracking for detections
- Enable or disable detection markers
Devices
- Find a device
- Create a device group
- Create a device group based on discovery time
- Change a device name
- Change a device role
- Change a device model
- Manually identify a device as high value
- Create a device tag
- Create a custom device
- Delete or disable a custom device
- Configure remote sites for custom devices
- Prioritize groups for Advanced Analysis
- Prioritize groups for Standard Analysis
- Add a device to the watchlist
- Remove a device from the watchlist
- Transfer management of analysis priorities
- Specify network localities and trusted domains