{"id":895,"date":"2024-07-31T09:51:03","date_gmt":"2024-07-31T09:51:03","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=895"},"modified":"2024-07-31T10:19:47","modified_gmt":"2024-07-31T10:19:47","slug":"idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/","title":{"rendered":"Idiot&#8217;s Guide to Crowdstike  &#8211; And How Monitoring Software Can Help Prevent the Worst"},"content":{"rendered":"<p style=\"text-align: center;\"><b>Idiot&#8217;s Guide to Crowdstike<\/b><\/p>\n<p style=\"text-align: center;\"><b>And How Monitoring Software Can Help Prevent the Worst<\/b><\/p>\n<p><span style=\"font-weight: 400;\">On July 19th, CrowdStrike, a leading cybersecurity firm, released a software update that inadvertently affected Microsoft Windows systems globally. Here\u2019s a simplified explanation of what happened and its impact:<\/span><\/p>\n<p><b>What Happened?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">CrowdStrike issued a software update for its Falcon platform, a cybersecurity tool used to protect against threats. This update unexpectedly caused issues with Microsoft Windows based systems, affecting users worldwide.<\/span><\/p>\n<p><b>Key Details of the Incident<\/b><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The Update:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">CrowdStrike released a routine software update to its Falcon platform, intended to improve security features and fix bugs.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Impact on Microsoft Systems:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Shortly after the update was deployed, users began reporting problems with their Microsoft systems, including crashes, slow performance, and connectivity issues.<\/span><\/li>\n<li aria-level=\"2\">Microsoft estimated that <a href=\"https:\/\/www.pcmag.com\/news\/microsoft-reveals-more-details-about-windows-crowdstrike-crash\">8.5 million Windows computers were disabled<\/a> by the CrowdStrike glitch.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The problems affected various Microsoft products, such as Windows operating systems, Office applications, and other related services.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detection and Response:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">CrowdStrike and Microsoft quickly identified that the update was the source of the issues.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Both companies immediately started working together to diagnose the problem and develop a solution.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Resolution:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">CrowdStrike quickly released a temporary workaround (delete a specific file and reboot), but not all users could implement this fix quickly.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">CrowdStrike rolled back the problematic update to prevent further issues.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">A new update was developed and thoroughly tested to ensure it would not cause additional problems before being re-released.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">How CrowdStrike and Microsoft Handled the Incident<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Rapid Identification:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The issues were quickly traced back to the recent CrowdStrike Falcon update.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Both companies used their monitoring tools and customer reports to pinpoint the cause.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Collaboration:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">CrowdStrike and Microsoft worked closely to understand the interaction between the Falcon update and Microsoft systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">This collaboration was essential in developing a fix and ensuring a smooth resolution.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Communication:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Both companies communicated promptly with their customers, providing updates on the situation and instructions for mitigating the impact.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">CrowdStrike issued detailed guidance on how to roll back the update and minimize disruptions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Crowstrike\u2019s initial \u201cworkaround\u201d guidance for dealing with the incident said Windows machines should be booted in a safe mode, a specific file should be deleted, and then rebooted. This required system admins to physically go to every machine.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lessons Learned:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The incident highlighted the importance of thorough testing, especially when updates could affect widely-used systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">It reinforced the need for strong collaboration between cybersecurity firms and software providers to quickly address and resolve issues.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Preventive Measures<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enhanced Testing:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">CrowdStrike committed to more extensive testing of updates in environments that simulate real-world conditions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">This includes testing updates on systems running various combinations of software to catch potential conflicts.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Better Communication Channels:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Improved communication protocols were established to ensure quicker dissemination of information to affected users.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">This includes setting up dedicated support channels for incident resolution.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incident Response Planning:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Both companies refined their incident response plans to handle similar situations more efficiently in the future.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">This involves regular drills and updates to response protocols.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><b>How RecordTS Could Have Prevented the Worst of Crowdstrike\u00a0<\/b><\/p>\n<p><b>User Activity Monitoring<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Monitoring software can track user activities to detect insider threats or compromised accounts. This includes monitoring privileged accounts that have access to sensitive information.<\/span><\/p>\n<p><b>Example:<\/b><span style=\"font-weight: 400;\"> If an insider threat or a compromised admin account was involved in the CrowdStrike breach, monitoring software could have detected unusual access patterns or unauthorized data access, allowing for timely intervention.<\/span><\/p>\n<p><b>Forensic Analysis<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Post-incident, monitoring software can provide detailed logs and records of all activities that occurred on the network. This aids in forensic analysis to understand the scope of the breach, identify vulnerabilities, and develop strategies to prevent future incidents.<\/span><\/p>\n<p><b>Example:<\/b><span style=\"font-weight: 400;\"> Detailed logs could help CrowdStrike identify how the attackers gained access, what data was accessed, and how the breach evolved over time, providing crucial insights for remediation and strengthening defenses.<\/span><\/p>\n<p><b>Compliance and Reporting<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Monitoring software helps ensure compliance with various cybersecurity regulations and standards by providing necessary logging and reporting capabilities. This not only aids in preventing breaches but also in demonstrating due diligence in protecting data.<\/span><\/p>\n<p><b>Example: <\/b><span style=\"font-weight: 400;\">Maintaining compliance with standards like GDPR, HIPAA, or PCI DSS involves regular monitoring and reporting. This could have helped CrowdStrike in maintaining robust security practices and potentially avoiding regulatory fines or penalties.<\/span><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"><span style=\"font-weight: 400;\">Click here<\/span><\/a><span style=\"font-weight: 400;\"> to learn more about secure remote session recording.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Idiot&#8217;s Guide to Crowdstike And How Monitoring Software Can Help Prevent the Worst On July 19th, CrowdStrike, a leading cybersecurity firm, released a software update that inadvertently affected Microsoft Windows systems globally. Here\u2019s a simplified explanation of what happened and its impact: What Happened? CrowdStrike issued a software update for its Falcon platform, a cybersecurity [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":896,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Idiot&#039;s Guide to Crowdstike - And How Monitoring Software Can Help Prevent the Worst - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Idiot&#039;s Guide to Crowdstike - And How Monitoring Software Can Help Prevent the Worst - Blogs\" \/>\n<meta property=\"og:description\" content=\"Idiot&#8217;s Guide to Crowdstike And How Monitoring Software Can Help Prevent the Worst On July 19th, CrowdStrike, a leading cybersecurity firm, released a software update that inadvertently affected Microsoft Windows systems globally. Here\u2019s a simplified explanation of what happened and its impact: What Happened? CrowdStrike issued a software update for its Falcon platform, a cybersecurity [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-31T09:51:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-31T10:19:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/crowdstrike-cyber-security-picjumbo-com-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/\",\"name\":\"Idiot's Guide to Crowdstike - And How Monitoring Software Can Help Prevent the Worst - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/crowdstrike-cyber-security-picjumbo-com-2.jpg\",\"datePublished\":\"2024-07-31T09:51:03+00:00\",\"dateModified\":\"2024-07-31T10:19:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/crowdstrike-cyber-security-picjumbo-com-2.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/crowdstrike-cyber-security-picjumbo-com-2.jpg\",\"width\":1500,\"height\":1000,\"caption\":\"crowstrike\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Idiot&#8217;s Guide to Crowdstike &#8211; And How Monitoring Software Can Help Prevent the Worst\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Idiot's Guide to Crowdstike - And How Monitoring Software Can Help Prevent the Worst - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/","og_locale":"en_US","og_type":"article","og_title":"Idiot's Guide to Crowdstike - And How Monitoring Software Can Help Prevent the Worst - Blogs","og_description":"Idiot&#8217;s Guide to Crowdstike And How Monitoring Software Can Help Prevent the Worst On July 19th, CrowdStrike, a leading cybersecurity firm, released a software update that inadvertently affected Microsoft Windows systems globally. Here\u2019s a simplified explanation of what happened and its impact: What Happened? CrowdStrike issued a software update for its Falcon platform, a cybersecurity [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2024-07-31T09:51:03+00:00","article_modified_time":"2024-07-31T10:19:47+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/crowdstrike-cyber-security-picjumbo-com-2.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/","name":"Idiot's Guide to Crowdstike - And How Monitoring Software Can Help Prevent the Worst - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/crowdstrike-cyber-security-picjumbo-com-2.jpg","datePublished":"2024-07-31T09:51:03+00:00","dateModified":"2024-07-31T10:19:47+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/crowdstrike-cyber-security-picjumbo-com-2.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/crowdstrike-cyber-security-picjumbo-com-2.jpg","width":1500,"height":1000,"caption":"crowstrike"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/idiots-guide-to-crowdstike-and-how-monitoring-software-can-help-prevent-the-worst\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Idiot&#8217;s Guide to Crowdstike &#8211; And How Monitoring Software Can Help Prevent the Worst"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=895"}],"version-history":[{"count":4,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/895\/revisions"}],"predecessor-version":[{"id":900,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/895\/revisions\/900"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/896"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}