Falcon Sensor For Windows - Documentation - Support - Falcon
Falcon Sensor For Windows - Documentation - Support - Falcon
CROWDSTRIKE CONFIDENTIAL
Falcon Sensor for Windows
Contents:
System Requirements
Operating Systems
Services
Networking Requirements
Maintain Internet Access During Installation
Avoid Interference with Certificate Pinning
Allow TLS traffic
Standard Installation
Manual install
Automatic Sensor Installation
Advanced Installation Types
Uninstall Protection for the Falcon Sensor
Installing to a CID that requires installation tokens
Assigning Sensor Tags During Installation
Installing the Sensor with IE Proxy Detection
Installing the Falcon Sensor in a VDI Environment
Installing the Falcon Sensor on a Virtual Machine Template
Installing the Falcon sensor with Pay-As-You-Go billing
Uninstalling the Falcon Sensor for Windows
Uninstall from Control Panel
Uninstall from the Command Line
Validate the Uninstallation
Troubleshooting Sensor Installation
Issue: Installation Fails
Verify that the Sensor is Running
Troubleshooting General Sensor Issues
Issue: Sensor Installed, but Doesn't Run
Verify the Host's Connection to the CrowdStrike Cloud
Issue: Host Can't Connect to the CrowdStrike Cloud
Issue: Host Can't Establish Proxy Connection
Logs
Sensor Operational Logs
Normal Log Contents
Appendix A - Installer Parameters
Installation Parameters
Sensor Startup Parameters
Proxy Parameters
Troubleshooting Parameters
Reduced Functionality Mode
What is OSFM?
What is RFM?
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 1/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
CROWDSTRIKE CONFIDENTIAL
System Requirements
Operating Systems
Only these operating systems are supported for use with the Falcon sensor for Windows:
Windows 10 May 2020 Update v2004 aka 20H1 5.34.11603 and later
Windows 10 November 2019 Update v1909 aka 19H2 5.19.10102 and later
Windows 10 May 2019 Update v1903 aka 19H1 5.12.9302 and later
Windows 10 October 2018 Update v1809 aka RS5 4.17.8003 and later
Windows 10 April 2018 Update v1803 aka RS4 4.4.6711 and later
Windows 10 Fall Creators Update v1709 aka RS3 3.8.5906 and later
Windows 10 Anniversary Update v1607 aka RS1 All supported sensor versions
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 2/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
Windows 10 May 2020 Update v2004 aka 20H1* 5.34.11603 and later
Windows 10 November 2019 Update v1909 aka 19H2* 5.26.10806 and later
Windows 10 May 2019 Update v1903 aka 19H1* 5.26.10806 and later
*Additional User Mode Data (AUMD) and Script Control are not supported on Windows 10 32-bit operating systems.
Windows Server Core, all versions other than 2016 and 2019
Container-based Windows OS solutions – including but not limited to Docker – are not currently supported.
Services
LMHosts
LMHosts may be disabled on your host if the TCP/IP NetBIOS Helper service is disabled.
NETWORK PROTOCOLS
Falcon uses TLS 1.2 on Windows 7 and Windows Server 2008 R2 to communicate with the CrowdStrike cloud. If TLS 1.2 has been
disabled by the system administrator, Falcon negotiates TLS 1.1 or TLS 1.0, depending on the cloud.
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 3/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
US-GOV-1
WinHTTP AutoProxy
DHCP Client, if you use Web Proxy Automatic Discovery (WPAD) via DHCP
To use Falcon’s Next-Gen Antivirus policy settings on Windows Server 2016 or 2019, manually disable Windows
Defender.
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 4/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
CROWDSTRIKE CONFIDENTIAL
Networking Requirements
Hosts must remain connected to the CrowdStrike cloud throughout installation, which is generally 10 minutes. A host unable to
reach and retain a connection to the cloud within 10 minutes will not successfully install the sensor.
If your host requires more time to connect, you can override this by using the ProvWaitTime parameter in the command line to
increase the timeout to 1 hour.
Replacing <installer_filename> with the name of the install file you downloaded, and <CCID> with the CCID from Hosts > Sensor
Downloads.
The Falcon sensor uses certificate pinning to defend against man-in-the-middle attacks. Some network configurations, such as
deep packet inspection, interfere with certificate validation.
Disable deep packet inspection (also called "HTTPS interception," or "TLS interception") or similar network configurations.
Common sources of interference with certificate pinning include antivirus systems, firewalls, or proxies.
Depending on your network environment, you may need to allow ("whitelist") TLS traffic on port 443 between your network and
our cloud's network addresses:
ts01-b.cloudsink.net
lfodown01-b.cloudsink.net
US-GOV-1:
ts01-laggar-gcw.cloudsink.net
lfodown01-laggar-gcw.cloudsink.net
EU-1:
ts01-lanner-lion.cloudsink.net
lfodown01-lanner-lion.cloudsink.net
US-2:
ts01-gyr-maverick.cloudsink.net
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 5/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
lfodown01-gyr-maverick.cloudsink.net
If your network requires allowing by IP address instead of FQDN, see Cloud IP Addresses for a list of IP addresses we use.
We use AWS for some communications between hosts and the CrowdStrike cloud.
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 6/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
CROWDSTRIKE CONFIDENTIAL
Standard Installation
In most cases, you can simply install the Falcon sensor for Windows using either a manual GUI install or an automated command-
line install.
Manual install
Use this installation path if you want to point and click on an installer file.
. Download the sensor installer from Hosts > Sensor Downloads. Use the Chrome browser.
After installation, the sensor will run silently and will be invisible to the user. To validate that the sensor is running on the host,
run this command at a command prompt:
sc query csagent
SERVICE_NAME: csagent
TYPE : 2 FILE_SYSTEM_DRIVER
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
Use this installation path if you want to automate silent installations on many devices, including installations via a deployment
tool such as Windows System Center Configuration Manager (SCCM).
. Download the sensor installer from Hosts > Sensor Downloads. Use the Chrome browser.
. Run or configure your deployment tool to use this command, replacing <installer_filename> with the name of the install file
you downloaded, and <CCID> with the CCID from step 2 :
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 7/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 8/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
CROWDSTRIKE CONFIDENTIAL
Advanced Installation Types
Protect sensors from unauthorized uninstallation by enabling Uninstall and maintenance protection. This requires a maintenance
token when unloading, uninstalling, repairing, or manually upgrading the sensor. For more info, read our Sensor Update Policies
guide.
In sensor version 6.11.12502 and later, you can also stop users or processes from performing actions that tamper with
key sensor components on the endpoint, such as deleting or renaming sensor files. The Sensor tampering protection
setting is enabled by default for new installations.
Use this upgrade path if you don’t use cloud updates and want to automate silent sensor upgrades on uninstall-protected
devices. You might manage installations via a deployment tool like Windows System Center Configuration Manager (SCCM).
. Download the sensor installer from Hosts > Sensor Downloads. Use the Chrome browser.
. In the sensor update policy you want to update, turn on Bulk maintenance mode. Make sure the Sensor version updates off
build version is selected and Uninstall and maintenance protection is turned on.
. Retrieve the bulk maintenance token to include in the deployment package. This token doesn't change, so you don't need to
modify your deployment package each time you enter bulk maintenance mode.
. Run or configure your deployment tool to use this command, replacing <installer_filename> with the name of the install file
you downloaded:
. For increased security, turn off bulk maintenance mode after completing your upgrades. This restores the per-sensor
maintenance token and disables the bulk maintenance token.
Installation tokens prevent unauthorized hosts from being accidentally or maliciously added to your customer ID (CID).
Installation tokens are an optional security measure for your CID. To use installation tokens, you create one or more tokens in the
Falcon console or via the API, enable the token requirement, and then provide the tokens to sensors at installation time.
When you install a sensor after enabling Require tokens, the installation command must include an additional parameter and an
active token, such as:
This argument is supported with any other Windows installer argument, as well as the installation wizard:
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 9/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
Sensor tags are user-selected identifiers you can use to group and filter hosts. You can assign one or more tags to a host using
the GROUPING_TAGS parameter. This parameter is case sensitive.
. alphanumeric characters
. hyphens ( - )
. underscores ( _ )
. forward slashes ( / )
To use multiple tags, separate each tag with commas. All tags for a host, including comma separators, cannot exceed 256
characters.
Replace <installer_filename> with the name of the install file you downloaded, and <CCID> with the CCID from Hosts > Sensor
Downloads.
This command assigns two tags to the host: Washington/DC_USA and Production .
Assign tags during installation to make them immediately available when the sensor first connects to the CrowdStrike cloud. Tags
can be added or changed after sensor installation by editing a registry key, but the host needs to be restarted for the changes to
take effect.
For information see Manually adding or modifying Falcon Sensor tags on Windows.
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 10/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
On hosts using IE proxy detection, install the sensor from the command line using the ProvNoWait parameter. The sensor acquires
proxy settings from the user registry hive with the next user login.
Replacing <installer_filename> with the name of the install file you downloaded, and <CCID> with the CCID from Hosts > Sensor
Downloads.
CROWDSTRIKE CONFIDENTIAL
Choosing the best virtual installation method
When you install the sensor on a VM, use the correct installation method to ensure that each host ends up with a unique agent ID
(AID). If the same AID is inadvertently assigned to more than one VM, events and detections from your various VMs would appear
to be from a single host.
Use the VDI=1 parameter during installation if your VM meets all of the following criteria:
It is non-persistent
It is domain-joined
For VMs that don’t meet all of those criteria, use the Virtual Machine Template installation.
When you install the sensor in a Virtual Desktop Infrastructure (VDI) environment, the sensor runs from a shared, read-only OS
image. The CrowdStrike cloud assigns a unique AID based on the host's fully qualified domain name (FQDN) and other
characteristics.
To install the Falcon sensor for Windows on your VDI master image:
Replacing <installer_filename> with the name of the install file you downloaded, and <CCID> with the CCID from Hosts >
Sensor Downloads.
After the installation is complete, the sensor communicates with the cloud and updates to the sensor version defined in
the host’s assigned Sensor Update policy. You can check the update status by finding the host in Host Management.
. After the sensor is on the proper version, switch your template system back to read-only mode and save the image.
Use a Virtual Machine template when your virtual hosts are built off of an image, or a template is being cloned.
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 11/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
Do not use a standard installation on a virtual machine. If you perform a standard install on a template, all VMs
created from that template will be assigned the same Agent ID (AID). If the same AID is inadvertently assigned to
more than one VM, events and detections from your various VMs would appear to be from a single host.
. Complete all steps required to generalize the VM template, such as sysprep or installing Windows and software updates.
After installation, the sensor does not attempt to communicate with the CrowdStrike cloud.
Don't reboot the host, or it will attempt to communicate with the CrowdStrike cloud on reboot.
TROUBLESHOOTING VM TEMPLATES
When a VM created from this template first starts up, the CrowdStrike cloud assigns it a unique AID.
After the sensor has been installed using the NO_START=1 parameter, if you inadvertently restart the VM template before you
convert the VM to a template image, hosts created with that template will all share an AID. If the same AID is inadvertently
assigned to more than one VM, events and detections from your various VMs would appear to be from a single host. You can
resolve this by removing the following registry keys:
HKEY_LOCAL_MACHINE\SYSTEM\CrowdStrike{9b03c1d9-3138-44ed-9fae-d9f4c034b88d}\{16e0423f-7058-48c9-a204-
725362b67639}\Default\AG
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CSAgent\Sim\AG
MODIFYING A VM TEMPLATE
HKEY_LOCAL_MACHINE\SYSTEM\CrowdStrike\{9b03c1d9-3138-44ed-9fae-d9f4c034b88d}\{16e0423f-7058-48c9-a204-
725362b67639}\Default\AG
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CSAgent\Sim\AG
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 12/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
See Falcon for Cloud Workloads for full information about Pay-As-You-Go billing.
To create a new master image template with no agent ID and Pay-As-You-Go billing enabled:
. Prepare your master image instance, including any software configuration or updates.
. Download the Falcon sensor installer from Hosts > Sensor Downloads or via sensor download APIs.
. Install the Falcon sensor using the NO_START=1 and BILLINGTYPE=Metered parameters (case-sensitive):
After installation, the sensor does not attempt to communicate with the CrowdStrike cloud.
Don't reboot the host, or it will attempt to communicate with the CrowdStrike cloud on reboot.
. Configure your cloud workloads to create ephemeral images based on this master image.
. According to your organization's update policies, plan to regularly re-create this master image using an up-to-date Falcon
sensor installer.
To automate this more effectively, consider using sensor download APIs to automatically retrieve new versions
of the Falcon sensor. Then, use your organization's existing automation tools to install the newer version on
your master image without an agent ID.
To change an existing Falcon sensor to use Pay-As-You-Go billing, you must uninstall the sensor and reinstall it with the
BILLINGTYPE=Metered parameter.
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 13/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
CROWDSTRIKE CONFIDENTIAL
Uninstalling the Falcon Sensor for Windows
. Click Uninstall a Program.
. Choose CrowdStrike Windows Sensor and uninstall it, providing the maintenance token via the installer if necessary.
CsUninstallTool.exe /quiet
If the sensor is online, move the host into a sensor update policy with Uninstall and maintenance protection disabled, then
uninstall using one of the two uninstall methods.
If the sensor is offline and Uninstall and maintenance protection is enabled, open the host's summary panel in Hosts > Host
Management page and click Reveal Maintenance Token to get the single-use maintenance token needed to uninstall the sensor.
Use this token in this command line script to uninstall the sensor:
If the sensor is offline and bulk maintenance mode is enabled, go to the host's sensor update policy and click Reveal Token to get
the bulk maintenance token needed to uninstall the sensor. Use the token in this command line script to uninstall the sensor:
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 14/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
CROWDSTRIKE CONFIDENTIAL
Troubleshooting Sensor Installation
If the sensor installation fails, confirm that the host meets our system requirements, including required Windows services. If
required services are not installed or running, you may see an error message: A required Windows service is disabled, stopped, or
missing. Please see the installation log for details.
SERVICE_NAME: csagent
TYPE : 2 FILE_SYSTEM_DRIVER
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 15/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
CROWDSTRIKE CONFIDENTIAL
Troubleshooting General Sensor Issues
If the sensor doesn't run, confirm that the host meets our system requirements, including required Windows services. If required
services are not installed or running, you may see an error message in the sensor's logs: A required Windows service is disabled,
stopped, or missing. Please see the installation log for details.
The sensor can install, but not run, if any of these services are disabled or stopped:
LMHosts*
DHCP Client, if you use Web Proxy Automatic Discovery (WPAD) via DHCP
DNS Client
The sensor can install, but not run, if the WinHTTP AutoProxy service is disabled.
* - LMHosts may be disabled on your host if the TCP/IP NetBIOS Helper service is disabled.
You can verify that the host is connected to the cloud using the Falcon console or a command line on the host.
Host: Run this command from a command line with administrative privileges:
netstat -f
The following output is displayed if the sensor can connect to the CrowdStrike cloud:
Active Connections
In this example, ec2-54-219-145-181 indicates a connection to a specific IP address in the CrowdStrike cloud, 54.219.145.181 . See
Cloud IP Addresses for a full list of CrowdStrike cloud IPs.
If your host uses a proxy, the Foreign Address shows the proxy address, such as proxy.example.com , instead of the
CrowdStrike Cloud address.
If your host can't connect to the CrowdStrike Cloud, check these network configuration items:
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 16/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
. If your host uses an endpoint firewall, configure it to permit traffic to and from the Falcon sensor.
. Verify that your host's LMHost service is enabled. LMHosts may be disabled if you've disabled the TCP/IP NetBIOS
Helper on your host.
ENDPOINT FIREWALLS
If you're using an endpoint firewall on your host, it must be configured to allow access to the CrowdStrike domains. Customers
have reported that these products require additional configuration when used with the Falcon sensor:
Hosts must remain connected to the CrowdStrike cloud throughout installation. A host unable to reach the cloud within 10
minutes will not successfully install the sensor.
If your host requires more time to connect, you can override this by using the ProvNoWait parameter in the command line. This also
provides additional time to perform additional troubleshooting measures.
Replacing <installer_filename> with the name of the install file you downloaded, and <CCID> with the CCID from Hosts > Sensor
Downloads.
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 17/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
The Falcon sensor requires your host to have the DigiCertHighAssuranceRootCA and DigiCertAssuredIDRootCA certs in your
Trusted Root CA store.
. Follow Microsoft's documentation for the Microsoft Management Console (MMC) to:
Manually specifying a global proxy URL through Group Policy or manual input
Connection happens in two phases: (1) proxy discovery and (2) connection. The order is as follows:
. Try to use the CS Sensor application-specific proxy which is specified via the installer (APP_PROXYNAME=<Proxy server hostname
. Use proxy settings from the Local Area Network (LAN) Settings under "Proxy Servers" (also called IE Proxy Settings), if
available.
. Use PAC file URL provided via the installer (PACURL=<PAC file URL>) .
. Use PAC file URLs from Local Area Network (LAN) Settings > "Use automatic configuration script". Use if you want to use
Windows AutoProxy with a PAC File.
. Use persisted proxy settings (of any type). Any time the sensor successfully connects to a proxy (via connection methods
1-6, excluding 5), the sensor will cache the host name and port.
. DnsLookup Fallback. This tries to use config-driven DNS lookup table to connect.
When PROXYDISABLE=1 is passed to the installer, the installer will skip 1-6 and proceed directly to 7 (Direct Connection) and then
proceed to step 8 above.
CrowdStrike does not support Proxy Authentication. If connection to the CrowdStrike cloud through the specified proxy server
fails, or no proxy server is specified, the sensor will attempt to connect directly. For more assistance on proxy configurations,
contact your proxy vendor or CrowdStrike Support.
This will put the proxy settings in the registry under the CsProxyHostname and CsProxyPort keys located here:
HKEY_LOCAL_MACHINE\SYSTEM\CrowdStrike\{9b03c1d9-3138-44ed-9fae-d9f4c034b88d}\{16e0423f-7058-48c9-a204-725362b67639}\Default
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 18/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
CROWDSTRIKE CONFIDENTIAL
Logs
Providing logs to our support team can help diagnose sensor issues.
Export your logs in their native directory structure and format (such as .evtx for sensor operations logs). This helps our support
team diagnose sensor issues accurately and efficiently.
The sensor's operational logs are disabled by default. To enable or disable logging on a host, you must update specific Windows
registry entries.
ENABLE LOGGING
[HKEY_LOCAL_MACHINE\SYSTEM\CrowdStrike\{9b03c1d9-3138-44ed-9fae-d9f4c034b88d}\{16e0423f-7058-48c9-a204-725362b67639}\Default]
"AFLAGS"=hex:03,00,00,00
. Open a command prompt and run the following command to enable logging:
regedit myfile.reg
DISABLE LOGGING
[HKEY_LOCAL_MACHINE\SYSTEM\CrowdStrike\{9b03c1d9-3138-44ed-9fae-d9f4c034b88d}\{16e0423f-7058-48c9-a204-725362b67639}\Default]
"AFLAGS"=hex:00,00,00,00
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 19/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
. Open a command prompt and run the following command to disable logging:
regedit myfile.reg
. The sensor is checking communications (whether to use proxy or not and on which host/port).
. The sensor connected and is sending its first message to CrowdStrike cloud.
. The sensor received a response from cloud. All startup tasks are complete.
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 20/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
CROWDSTRIKE CONFIDENTIAL
Appendix A - Installer Parameters
This is a complete index of all parameters that the Falcon sensor installer accepts.
Some parameters require a leading slash, and some require no leading slash.
Installation Parameters
Parameter Description
CID=0123456789ABCDEFGHIJKLMNOPQRSTUV-
Your Customer ID Checksum, which is required when installing.
WX
/norestart Prevents the host from restarting at the end of the sensor installation.
GROUPING_TAGS= Assigns user-selected identifiers you can use to group and filter hosts.
Parameter Description
Prevents the sensor from starting up after installation. The next time the host boots, the sensor will start
NO_START=1 and be assigned a new agent ID (AID). This parameter is usually used when preparing master images for
cloning.
Proxy Parameters
APP_PROXYNAME=<proxy
FQDN or IP> Configure a proxy connection using both a proxy address (by Cannot be used with
APP_PROXYPORT=<Proxy FQDN or IP) and a proxy port. the PACURL parameter.
server port>
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 21/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
The sensor does not abort installation if it can't connect to the Use this parameter when upgrading to
CrowdStrike cloud within 10 minutes. (By default, if the host version 3.5 or later if you use IE proxy
ProvNoWait=1 can't contact our cloud, it will retry the connection for 10 detection for Falcon, because proxy
minutes. After that, the host will automatically uninstall its data will not be available until another
sensor.) user logs into the machine.
Troubleshooting Parameters
MAINTENANCE_TOKEN An optional single-use security token used when uninstalling or installing sensors.
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 22/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
CROWDSTRIKE CONFIDENTIAL
Reduced Functionality Mode
What is OSFM?
OS Feature Manager (OSFM) monitors changes in the Windows kernel so the sensor can adapt accordingly. This includes allowing
the sensor to certify new kernels without updating the sensor version, and placing the sensor in Reduced Functionality Mode
(RFM) if the current host kernel is uncertified.
What is RFM?
Reduced Functionality Mode (RFM) is a safe mode for the sensor that prevents compatibility issues if the host’s kernel is
uncertified. RFM is most common during Windows updates. Without full kernel support, your sensor could experience severe
compatibility issues, potentially resulting in system crashes and other performance issues.
Both Windows and Linux sensors can enter RFM, but RFM behaves differently on each platform.
When a Windows sensor enters RFM, it still actively monitors your system, reports events, and trigger detections, but at a
reduced capacity. Sensors in RFM temporarily unhook from some kernel elements. Without these elements, some detection
patterns and a small number of preventions will not be triggered.
The most likely reason your Windows hosts are in RFM is due to Microsoft updates. Not all Windows updates alter the kernel, but
when they do, there is a brief delay while we certify the kernel to work with the sensor.
The Executive Summary under Dashboards in the Falcon console lists a count of sensors in RFM.
Alternatively, in Investigate you can see SensorHeartBeat events generated by the sensor which contain the value
SensorStateBitMap_decimal. Use this value to see if the sensor is in RFM.
You can use the following EAM query to report a list of hosts in RFM.
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 23/24
11/3/2020 Falcon Sensor for Windows | Documentation | Support | Falcon
If you apply Windows updates that alter the Windows kernel before CrowdStrike certifies the kernel, your sensor receives an
OSFM certification file from the CrowdStrike cloud when the file becomes available. That file allows your sensor to resume full
functionality.
Subscribe to the Release Notes mailing list in the Support Portal to get emails when new patches are certified. These emails
include the name of the current OSFM certification file so you can verify your hosts have received the file.
Verify that your sensors have the current certification in one of these ways:
On the Investigate page, use this EAM query to verify your sensors have the current OSFM certification file. Replace OSFM-
*.bin with the current certification file provided by the email.
latest=now
| dedup aid
| sort -timestamp
https://falcon.eu-1.crowdstrike.com/support/documentation/23/falcon-sensor-for-windows 24/24