Close Menu
Insurance Journal – Property Casualty Insurance News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How the Next Financial Crisis Starts

    July 4, 2025

    Insurance Underwriter Title Resources Group Appoints Natasha Branch as VP of Education and Underwriting Counsel

    July 4, 2025

    Supreme Court Rejects Challenge to Obamacare Preventive Care Coverage

    July 4, 2025
    Facebook X (Twitter) Instagram
    Insurance Journal – Property Casualty Insurance NewsInsurance Journal – Property Casualty Insurance News
    Facebook X (Twitter) Instagram
    SUBSCRIBE
    • Home
    • Business Insurance
    • Identity Protection
    • Life Insurance
    • Pets Insurance
    • Property Insurance
    • Vevehicle Insurance
    Insurance Journal – Property Casualty Insurance News
    Home » Proactive Threat Hunting with CrowdStrike Falcon Identity Protection
    Identity Protection

    Proactive Threat Hunting with CrowdStrike Falcon Identity Protection

    insurancejournalnewsBy insurancejournalnewsFebruary 27, 2025No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Reddit WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Proactive Threat Hunting with CrowdStrike Falcon Identity Protection

    Attackers are increasingly targeting identities, making identity protection a critical component of any robust cybersecurity strategy. In 2023, CrowdStrike saw a staggering 583% increase in Kerberoasting attacks alone, highlighting the growing threat to valid credentials. With the right credentials, attackers can bypass several stages of the attack lifecycle, dramatically accelerating their ability to reach their objectives.

    CrowdStrike Falcon Identity Protection enables organizations to proactively hunt for identity-related threats. Its user-friendly search capabilities simplify the threat hunting process, enabling quick identification of suspicious events and aiding in the prevention of breaches.

    Threat hunting dashboard
    Threat hunting dashboard

    Accessing the Threat Hunter

    To start threat hunting, navigate to the Identity Protection section of the Falcon console and select Threat Hunter from the main menu. The Threat Hunter page provides a comprehensive view of all identity events. These events include:

    • Access events (e.g., RDP – Remote Desktop Protocol)
    • User account events (e.g., password changes)
    • Identity detection events (e.g., honeytoken activity)
    Identity Protection Threat Hunter
    Identity Protection Threat Hunter

    To focus your search, use the filters located at the top of the screen. Filters can be combined to create highly specific threat hunting queries. These filters are divided into five categories:

    • Event Types: Authentication type, service, user account events, and more.
    • General: Sort order and time zone.
    • Identity: Username, department, privileges, and attributes.
    • Source Endpoint: Endpoint name, group, organizational unit (OU), and attributes.
    • Destination: Destination name, group, privileges, and attributes.

    Building a Threat Hunter Search

    One effective use case for threat hunting is to identify unusual activity. Let’s create a search to look for programmatic accounts that exhibit atypical access events, such as using Remote Desktop. Because programmatic, non-human accounts are unlikely to access resources using services like Remote Desktop, this can highlight anomalous behavior.

    Falcon Identity Protection automatically classifies identities, assigning attributes like “programmatic” or “human”. These attributes can then be used to filter threat hunting results, and even to create policy rules.

    Here’s how to build this search:

    1. Identity Filter: In the Identity filter, select the checkbox next to “programmatic” to filter for events involving a programmatic source identity.
    2. Event Types: In the Event Types category, expand the Service dropdown and select the checkbox next to “Remote Desktop (RDP)”.
    3. Time Filter: Set the time filter to “7 days”. You can also use a custom time frame if you want to investigate a specific range of events.
    Threat Hunter search filter options
    Threat Hunter search filter options

    Once you’ve set the filters, click Hunt in the upper right corner to apply the filters and see the results. This search will show you events where programmatic accounts accessed resources using Remote Desktop over the past seven days.

    Identity events list
    Identity events list

    By analyzing these events, you can uncover potential threats and take appropriate action.

    Threat Hunter search for 7 days
    Threat Hunter search for 7 days
    Threat Hunter filter example
    Threat Hunter filter example

    Investigating Events

    Within the Threat Hunter, you can click on any event to view detailed information, including the protocol used, the source, and the service that was accessed. For instance, you might find that a programmatic account named ‘Administrator’ accessed a domain controller via remote desktop.

    Further event investigation within the Threat Hunter
    Further event investigation within the Threat Hunter

    You can quickly respond to threats by taking actions on entities like users and endpoints directly from the Threat Hunter page. For example, clicking on the ‘Administrator’ account will show you more information and allow you to add the entity to a watchlist, flagging it for increased monitoring. The “watched” attribute can then be incorporated into policy rules.

    Entity details within the Threat Hunter
    Entity details within the Threat Hunter

    Saving Threat Hunter Searches

    You can save frequently used Threat Hunter searches for future use. To save a search, click the three dots and select Save As Custom Search. You can then access your saved searches by using the Saved Searches dropdown menu.

    Threat Hunter search save option
    Threat Hunter search save option
    Threat Hunter search save option
    Threat Hunter search save option

    Conclusion

    CrowdStrike Falcon Identity Protection offers strong, user-friendly capabilities for proactive threat hunting, providing comprehensive visibility into your identity environment and significantly improving your security posture.

    CrowdStrike cybersecurity Falcon identity protection threat hunting
    insurancejournalnews
    • Website

    Related Posts

    How the Next Financial Crisis Starts

    July 4, 2025

    Insurance Underwriter Title Resources Group Appoints Natasha Branch as VP of Education and Underwriting Counsel

    July 4, 2025

    Supreme Court Rejects Challenge to Obamacare Preventive Care Coverage

    July 4, 2025
    Leave A Reply Cancel Reply

    Don't Miss

    How the Next Financial Crisis Starts

    By insurancejournalnewsJuly 4, 20250

    The Financial Times offers various subscription plans to access quality journalism, including the FT Edit app and exclusive newsletters.

    Insurance Underwriter Title Resources Group Appoints Natasha Branch as VP of Education and Underwriting Counsel

    July 4, 2025

    Supreme Court Rejects Challenge to Obamacare Preventive Care Coverage

    July 4, 2025

    Pioneers in Autonomous Vehicle Insurance Poised for Growth as Industry Evolves

    July 4, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Our Picks

    How the Next Financial Crisis Starts

    July 4, 2025

    Insurance Underwriter Title Resources Group Appoints Natasha Branch as VP of Education and Underwriting Counsel

    July 4, 2025

    Supreme Court Rejects Challenge to Obamacare Preventive Care Coverage

    July 4, 2025

    Pioneers in Autonomous Vehicle Insurance Poised for Growth as Industry Evolves

    July 4, 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    New

    Montana Eyes Workers’ Comp for First Responders with PTSD

    February 24, 2025

    Best Home and Auto Insurance Deals for Veterans

    February 24, 2025

    Pennsylvania Insurance Department: Protecting Consumers and Regulating the Insurance Market

    February 24, 2025
    Categories
    • Business Insurance (1,819)
    • Identity Protection (522)
    • Life Insurance (1,725)
    • New (5,587)
    • Pets Insurance (517)
    • Property Insurance (985)
    • Vevehicle Insurance (463)

    How the Next Financial Crisis Starts

    By insurancejournalnewsJuly 4, 20250
    Facebook X (Twitter) Instagram Pinterest
    © 2025 Insurance Journal News. Designed by Insurance Journal New.

    Type above and press Enter to search. Press Esc to cancel.