Endpoint Protection: Data Collection, Sensitive Data, and Privacy (2024)

CrowdStrike Falcon provides enhanced endpoint protection to laptops, desktops, and servers owned by U-M. CrowdStrike Falcon software installed on these systems is managed by ITS Information Assurance (IA) in partnership with unit IT. U-M takes many precautions to protect unit and individual privacyand security, and to ensure that the data collected by CrowdStrike Falcon is used appropriately.

What CrowdStrike Falcon Monitors and Records

CrowdStrike Falcon looks for suspicious processes and programs. To do this, it records details about who has logged in on a machine, what programs are run, and the names of files that are read or written.

For example, if you log in and open a Microsoft Word document called “example.doc,” CrowdStrike Falcon will:

  • Record the computer name and logged-in user name.
  • Record that Word was run and gather some details about the Word program itself.
  • Record the file name “example.doc,” but will not access or provide any information about the contents of that file.

CrowdStrikeuses this information to detectand remediatepotentially malicious activity in the U-Menvironment. Executable files identified as malicious may be uploaded to CrowdStrike servers.Documents and data files are not uploaded.

What CrowdStrike Falcon Does Not Record

The software does not record keystrokes. The software does not access or record the contents of:

  • Documents
  • Email messages
  • IM/chat communications.

CrowdStrike Falcon and Internet Access

CrowdStrike Falcon analyzes connections to and from the internet to determine if there is malicious behavior. It may record the addresses of websites visited but will not log the contents of the pages transmitted. This data is used to help detect and prevent malicious actions involving websites.

Where is CrowdStrike Falcon Data Stored

CrowdStrike provides secure storage on its cloud servers for the data it collects, and U-M retains ownership of the data. In some cases, IA staff members may store data collected for the purpose of investigating potential and actual IT security incidents.

Access to Data Collected by CrowdStrike Falcon

CrowdStrike uses Enhanced Endpoint Protection data to extract anonymized data about computer processes and malicious techniques to identify new patterns of malicious behaviors in order to dynamically protect customers. CrowdStrike limits its own employees’ access to customer data to those with a business need. (More detail can be found in the CrowdStrike Privacy Notice.)

ITS limits the information available in Enhanced Endpoint Protection to only what is needed to identify and halt malicious activity, and access is granted only to those who need it for their U-M work. Administrators are given training and reminded to use Enhanced Endpoint Protection only for its intended purpose in accordance with U-M policies.

Access to the data is governed primarily by the Privacy and the Need to Monitor and Access Records (SPG 601.11) and Information Security (601.27). Additional U-M policies and laws & regulations may apply.

Endpoint Protection: Data Collection, Sensitive Data, and Privacy (2024)
Top Articles
ETF-Entnahmeplan: Monatliche Auszahlungen erreichen
Useful GPG commands
Global Foods Trading GmbH, Biebesheim a. Rhein
Safety Jackpot Login
Quick Pickling 101
Faint Citrine Lost Ark
OSRS Fishing Training Guide: Quick Methods To Reach Level 99 - Rune Fanatics
877-668-5260 | 18776685260 - Robocaller Warning!
Khatrimaza Movies
Mawal Gameroom Download
Produzione mondiale di vino
Kostenlose Games: Die besten Free to play Spiele 2024 - Update mit einem legendären Shooter
Bed Bath And Body Works Hiring
Danielle Longet
No Credit Check Apartments In West Palm Beach Fl
Aces Fmc Charting
Patrick Bateman Notebook
Nhl Tankathon Mock Draft
Airrack hiring Associate Producer in Los Angeles, CA | LinkedIn
zom 100 mangadex - WebNovel
How Taraswrld Leaks Exposed the Dark Side of TikTok Fame
Suspiciouswetspot
Booknet.com Contract Marriage 2
Kabob-House-Spokane Photos
Cfv Mychart
Tinyzonehd
CohhCarnage - Twitch Streamer Profile & Bio - TopTwitchStreamers
Uncovering the Enigmatic Trish Stratus: From Net Worth to Personal Life
Babydepot Registry
Helpers Needed At Once Bug Fables
Mia Malkova Bio, Net Worth, Age & More - Magzica
Scat Ladyboy
Grandstand 13 Fenway
Quality Tire Denver City Texas
What Happened To Father Anthony Mary Ewtn
Shaman's Path Puzzle
Aliciabibs
Body Surface Area (BSA) Calculator
The Transformation Of Vanessa Ray From Childhood To Blue Bloods - Looper
Bella Thorne Bikini Uncensored
Www.craigslist.com Waco
Ladyva Is She Married
3 Zodiac Signs Whose Wishes Come True After The Pisces Moon On September 16
National Weather Service Richmond Va
Hk Jockey Club Result
Toomics - Die unendliche Welt der Comics online
The Horn Of Plenty Figgerits
Mother Cabrini, the First American Saint of the Catholic Church
Xre 00251
Erica Mena Net Worth Forbes
Mawal Gameroom Download
Latest Posts
Article information

Author: Rev. Leonie Wyman

Last Updated:

Views: 6803

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Rev. Leonie Wyman

Birthday: 1993-07-01

Address: Suite 763 6272 Lang Bypass, New Xochitlport, VT 72704-3308

Phone: +22014484519944

Job: Banking Officer

Hobby: Sailing, Gaming, Basketball, Calligraphy, Mycology, Astronomy, Juggling

Introduction: My name is Rev. Leonie Wyman, I am a colorful, tasty, splendid, fair, witty, gorgeous, splendid person who loves writing and wants to share my knowledge and understanding with you.