This video illustrates how to use CrowdStrike Falcon® Identity Protection to proactively hunt for identity-based threats including suspicious lateral movement, domain replication, credential scanning etc before they can escalate to an attack.
This video illustrates how to use CrowdStrike Falcon® Identity Protection to proactively hunt for identity-based threats including suspicious lateral movement, domain replication, credential scanning etc before they can escalate to an attack.