You must be logged into your CrowdStrike (Falcon) Management portal at the following URL to view CrowdStrike linked articles.
When adding Exclusions, make sure you are viewing the desired CID in your CrowdStrike Falcon console.
After you create, edit, or delete an exclusion, it can take up to 40 minutes for the changes to go into effect.
Occasionally, Falcon might detect or prevent activity that you expect and allow in your environment. By creating exclusions, you can stop seeing detections that you don’t want to see, and allow processes that would otherwise be prevented. The exclusions that you create effectively form an allowlist that explicitly defines your organization’s known trusted activity.
You can create the following types of exclusions:
| Exclusion type | Description | Events logged? |
| Machine learning (file path) exclusion | For trusted file paths, stop all ML-based detections and preventions, or stop files from being uploaded to the CrowdStrike cloud. | Yes |
| Machine learning (certificate) exclusion | For files signed by a specific certificate that is trusted on the target endpoint, stop all ML-based detections and preventions, or stop files from being uploaded. | Yes |
| Indicator of attack (IOA) exclusion | Stop all behavioral detections and preventions for an IOA that’s based on a CrowdStrike-generated detection. | Yes |
| Sensor visibility exclusion | For trusted file paths that you want to exclude from sensor monitoring, minimize sensor event collection, and stop all associated detections and preventions. Use sensor visibility exclusions with extreme caution. Potential attacks and malware associated with excluded files will not be recorded, detected, or prevented. | Most events are not logged |
Reduce false-positive detections by creating machine learning exclusions. Define file path patterns or select a certificate to exclude files from detections or preventions derived from machine learning techniques:
A machine learning exclusion has three configurable parts:
Detect/Prevent:
Any file matching the exclusion pattern or signed by an excluded certificate won’t be detected or blocked by the Falcon sensor. The activity is logged through events sent to the CrowdStrike cloud, but a detection is not generated.
The most common reason to create a Detect/Prevent exclusion is to minimize false-positive detections for trusted applications. For example, your organization might use an internal tool that's blocked by the Falcon sensor. You can create an exclusion to permit that tool to run without triggering a Detect or Prevent action.
Create Detect/Prevent exclusions to target very specific situations. If your exclusion is too broad, you might inadvertently permit malicious activity that should be detected or blocked.
Upload files to CrowdStrike:
Uploading files to CrowdStrike is disabled by default. To enable it, go to Support and resources > General settings, click Quarantined files, and turn on Upload quarantined files.
Any file matching the exclusion pattern or signed by an excluded certificate won't be available for download in Endpoint security > Monitor > Quarantined files, and those files aren't uploaded to the CrowdStrike cloud for analysis.
The most common reason to create this type of exclusion is to prevent certain executable files from being uploaded to the CrowdStrike cloud. For example, you might want to prevent uploads of self-extracting archives containing design files from the group of hosts that includes your engineering department's workstations.
IOA exclusions are created from within a detection, or by duplicating and then modifying an existing IOA exclusion.
You can exclude most types of IOA detections. However, the following types of detections cannot be excluded:
The Falcon console indicates whether you can exclude a specific IOA detection. If you want to exclude a detection that Falcon indicates cannot be excluded, open a Support case.
For trusted file paths that you want to exclude from sensor monitoring, sensor visibility exclusions minimize sensor event collection, and stop all associated detections and preventions.
Use sensor visibility exclusions with extreme caution. Potential attacks and malware associated with excluded files will not be recorded, detected, or prevented.
The most common reason to create a sensor visibility exclusion is to improve endpoint performance at the excluded file paths, where sensor event data collection might interfere with highly resource-sensitive tasks. When planning and configuring sensor visibility exclusions, balance performance and security considerations. We recommend using sensor visibility exclusions only on hosts for which the sensor’s performance overhead without exclusions is unacceptable, and we recommend choosing excluded paths with care.
Considerations for Sensor Visibility Exclusions
Use sensor visibility exclusions with extreme caution. If you create a sensor visibility exclusion for a file path, Falcon won’t record all events, won’t report any detections, and won’t perform any prevention actions. This means that you won’t have visibility into potential attacks or malware related to that file path.
When planning and configuring sensor visibility exclusions, balance performance and security considerations. We recommend using sensor visibility exclusions only on hosts for which the sensor’s performance overhead without exclusions is unacceptable, and we recommend choosing excluded paths with care.
Before creating sensor visibility exclusions, consider the potential security risks. If you do create sensor visibility exclusions, we recommend following these best practices:
Additional sensor visibility exclusion considerations:
When adding Exclusions, make sure you are viewing the desired CID in your CrowdStrike Falcon console.
Note: You must enable a new exclusion in order for it to take effect.