According to the CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, IOA exclusions allow you to exclude files or directories from being detected or blocked by CrowdStrike’s indicators of attack (IOAs), which are behavioral rules that identify malicious activities2. This can reduce false positives and improve performance2. IOA exclusions only apply to IOA based detections, not other types of detections such as machine learning, custom IOA, or OverWatch2.
Question # 18
From a detection, what is the fastest way to see children and sibling process information?
A.
Select the Event Search option. Then from the Event Actions, select Show Associated Event Data (From TargetProcessld_decimal)
B.
Select Full Detection Details from the detection
C.
Right-click the process and select "Follow Process Chain"
D.
Select the Process Timeline feature, enter the AID. Target Process ID, and Parent Process ID
According to the CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, the Full Detection Details tool allows you to view detailed information about a detection, such as detection ID, severity, tactic, technique, description, etc1. You can also view the events generated by the processes involved in the detection in different ways, such as process tree, process timeline, or process activity1. The process tree view provides a graphical representation of the process hierarchy and activity1. You can see children and sibling processes information by expanding or collapsing nodes in the tree1.