

In order to be compliant with university policy and risk mitigation strategies developed in consultation with UD’s cyber insurance provider, enhanced endpoint protection is required on all University-owned devices. Why is CrowdStrike required for all UD-owned devices? Where is CrowdStrike data stored?ĬrowdStrike data is stored in a secure data center run by CrowdStrike, hosted by Amazon Web Services.

Administrators are given training and reminded to use Enhanced Endpoint Protection only for its intended purpose in accordance with UD policies. UDIT Information Security limits the information available in Enhanced Endpoint Protection to only what is needed to identify and halt malicious activity, and access is granted only to those who need it for their UD work. Can CrowdStrike data be used for anything beyond IT security purposes?ĭevice data that is logged by CrowdStrike will not be accessed by University employees unless there is an active cybersecurity incident involving the device. The appointed IT Professional(s) for each unit will also be able to manage the security policies applied to the devices in their unit, view threats that have been detected, and provide support for their users. UDIT Information Security has set up sub accounts for appointed college and administrative unit IT Professionals who are responsible for deploying CrowdStrike to University-owned devices in their respective units. The UDIT Information Security team manages the access controls and permissions within CrowdStrike. UD Information Technologies (UDIT) Information Security team, which is responsible for cybersecurity at UD, including threat detection and response, are the primary administrators of CrowdStrike. The University only analyzes data that has been identified in CrowdStrike to be malicious. When does the University analyze data collected by CrowdStrike? CrowdStrike collects additional information about the context of suspicious events to help our security professionals determine if the event is malicious. CrowdStrike does not scan the contents of email messages, websites, documents, instant message (IM) / chat messages, or video calls.

Crowdstrike falcon macos code#
If your unit does not have an IT Professional, send a message to Frequently Asked Questions (FAQs) What data does CrowdStrike analyze?ĬrowdStrike analyzes code as it runs on a device to detect suspicious events.
Crowdstrike falcon macos software#
The software does not access the contents of:Ĭontact your unit’s IT Professional for any questions or assistance. Record the file name "UD_example.docx," but will not access or provide any information about the contents of that file.Record that the program was run and gather some details about the program itself.Record the computer name and logged-in user name.UDIT takes unit and individual privacy and security very seriously and has precautions in place to protect and ensure that the data collected by CrowdStrike Falcon is used appropriately.įor example, if you log in and open a document called “UD_example.docx,” CrowdStrike Falcon will: Sends detection and incident data, in encrypted form, to a cloud-based account for UD.Identifies and prevents other cyber threats.Detects and defends against ransomware activity.Monitors for suspicious system events-processes, events, and activities-that indicate possible compromise, infection, or attack.It is designed to stop breaches via a unified set of cloud-delivered technologies that prevent all types of attacks - including malware, ransomware and much more. What devices are included? What is CrowdStrike?ĬrowdStrike Falcon is an enhanced endpoint protection software. Even if your desktop or laptop is not UD-managed, it is still required to have CrowdStrike installed if UD funds (including grant funds) were used to purchase the device. In order to be compliant with University policy and risk mitigation strategies developed in consultation with our cyber insurance provider, enhanced endpoint protection is required on all University-owned machines. Using an EDR solution is part of a multi-faceted approach to better protect the University from cybersecurity threats and to meet the requirements of UD’s cybersecurity insurance.

CrowdStrike Falcon software installed on these systems are managed by specific IT Professionals within each unit in partnership with UD Information Technologies. CrowdStrike Falcon provides Endpoint Detection and Response (EDR) protection to laptops and desktops owned by the University of Delaware.
