Where are quarantined files stored on Windows hosts?
How long does detection data remain in the CrowdStrike Cloud before purging begins?
What is an advantage of using a Process Timeline?
What action is used when you want to save a prevention hash for later use?
You receive an email from a third-party vendor that one of their services is compromised, the vendor names a specific IP address that the compromised service was using. Where would you input this indicator to find any activity related to this IP address?
Where can you find hosts that are in Reduced Functionality Mode?