CONTAINMENT POLICIES Flashcards

1
Q

What do containment policies do?

A

-Can allow list IP Addresses over which your host will always be allowed to communicate, even if a host is contained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to configure an allowlist of appropriate IP Addresses, while network is under containment?

A
  • Go to Containment Policy Page
  • Click Add Rule
  • Provide a name, enter an IP, and click Apply
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What user roles are required to contain a host or remove it from containment?

A

User must have the:

-Falcon Administrator role

-Falcon Security Lead role

**All users can see which hosts are contained as well as host – specific containment history using the Host App

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can a host do when its contained?

A

-The host can still send and receive information to CrowdStrike Cloud

-Using CS Cloud, you can remediate and remove host from active containment

-Host under containment remains contained even if the connection to the cloud is severed or if the host is rebooted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a Network Containment Request do?

A

– Falcon Sensor blocks all incoming/outgoing network connections to and from the host other than the sensor’s connection to the cloud.

-All existing connections will be terminated except those that you have allowed using IP Allow Listing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to configure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly