Crowdstrike Falcon Identity Protection Modules Solution Brief
Crowdstrike Falcon Identity Protection Modules Solution Brief
CROWDSTRIKE FALCON
IDENTITY PROTECTION
MODULES
Active Directory (AD) security for your
Zero Trust architecture
See all organizational service accounts, privileged users and user credentials
Add the context of “who” to network attack discovery and investigation, with behavioral analysis for
each credential
Track every authentication transaction, and alert when the risk is elevated (e.g., accessing new
systems or being granted additional privileges), or if the traffic is abnormal (varies from normal
patterns of the user behavior)
Expand understanding for both architecture and security teams by combining context of
authentication-level events with recommended best practices for network security
Seeing user authentication activity everywhere, from local legacy apps to your cloud environment
stack, is the first step toward effectively managing AD security for identity and access.
With a nebulous enterprise perimeter, internal applications that were previously considered secure for
authenticated users are now open to access from compromised systems and compromised users.
Falcon ZT:
Provides unified visibility and control of access to applications, resources and identity stores in
hybrid environments
Improves alert fidelity and reduces noise by recognizing and auto-resolving genuine access
incidents through identity verification
Enforces consistent risk-based policies across cloud and legacy systems to enable Zero Trust
architecture with zero friction — actions include block, allow, audit and step-up using MFA
Saves overhead of log storage costs by storing only relevant authentication logs
More mature security operations may be looking for controls for a hybrid environment in real time, in
a way that prevents user fatigue and simultaneously secures service and privileged accounts. Falcon
Zero Trust provides that level of control without sacrificing end-user MFA fatigue by providing risk-
based adaptive authentication.
CrowdStrike Solutions
Real-time threat detection for authentication and authorization access requests Yes Yes
Real-time cloud activity visibility, baselining and monitoring for federated access
Yes Yes
via AD FS and Okta or PingFederate
Near real-time cloud activity visibility, baselining and monitoring using events
Yes Yes
analysis from Okta, Azure AD and Ping
Real-time enforcement and secured access to Microsoft AD (e.g., block, MFA) No Yes
Custom threat detection — create real-time alerts from policy rules No Yes
Partly — includes
report for incidents,
Reports (including custom) Yes
activity and Threat
Hunter (custom)
Improved security posture with extended MFA: Extend identity verification/MFA tools
to any resource or application, including legacy/proprietary systems and legacy systems
traditionally not integrated with MFA — such as desktops, tools like PowerShell, and protocols
like RDP over NTLM — to reduce the attack surface.
Improved security posture and significantly reduced attack surface by extending MFA:
Extend identity verification/MFA tools to any resource or application, including legacy
systems like desktops, tools Ike PowerShell, and protocols like RDP over NTLM.
CrowdStrike Solutions
Both solutions provide Active Directory Both solutions provide visibility to “rogue
attack detections: credential” or behavior anomalies:
Schedule a Demo