A company uses a scheduled task to run a proprietary script, DailyReportGenerator.ps1, which is repeatedly flagged by CrowdStrike as suspicious. The security team has verified that the task is safe and wants to prevent further detections while ensuring monitoring remains active for all other scheduled tasks. How should the team add an appropriate detection exclusion in CrowdStrike?
Falcon Identity Protection introduces a log-free detection approach that differs from traditional Endpoint Detection and Response (EDR) solutions. Which of the following best describes a key advantage of Falcon Identity Protection’s log-free detection mechanism compared to traditional EDR solutions?
You are a security analyst reviewing an alert for suspicious user behavior in the CrowdStrike platform. Initially categorized as "Unusual Login", the incident was later reclassified to "Credential Theft." To understand the history and context of this incident, what is the most effective approach to investigate its progression and potential type changes?