diff --git a/docs/xdr/features/collect/integrations/endpoint/crowdstrike_falcon.md b/docs/xdr/features/collect/integrations/endpoint/crowdstrike_falcon.md index f49f541535..e0442250cc 100644 --- a/docs/xdr/features/collect/integrations/endpoint/crowdstrike_falcon.md +++ b/docs/xdr/features/collect/integrations/endpoint/crowdstrike_falcon.md @@ -9,7 +9,7 @@ This setup guide explains how to forward and collect the detections and activity CrowdStrike Falcon integration gathers EDR logs. Below is a concise list of activities that can be monitored using CrowdStrike Falcon logs: -- Alerts raised by the EDR, with limited informations like hash, command line, IP. +- Alerts raised by the EDR, with limited informations like hash, command line, IP... - Crowdstrike Falcon Audit logs - Crowdstrike Falcon Incident logs - Identity protection events diff --git a/docs/xdr/features/collect/integrations/endpoint/crowdstrike_falcon_telemetry.md b/docs/xdr/features/collect/integrations/endpoint/crowdstrike_falcon_telemetry.md index a8afcf22ab..7126170935 100644 --- a/docs/xdr/features/collect/integrations/endpoint/crowdstrike_falcon_telemetry.md +++ b/docs/xdr/features/collect/integrations/endpoint/crowdstrike_falcon_telemetry.md @@ -11,11 +11,11 @@ CrowdStrike provides cloud workload and endpoint security, threat intelligence, CrowdStrike Falcon Telemetry gathers raw system logs, legitimate and suspicious activities. Below is a non-exhaustive list of activities that can be monitored using CrowdStrike Telemetry logs: --Process creation and termination --File path creation and deletion --Events related to processes --DNS requests --HTTP connections +- Process creation and termination +- File path creation and deletion +- Events related to processes +- DNS requests +- HTTP connections {!_shared_content/operations_center/detection/generated/suggested_rules_10999b99-9a8d-4b92-9fbd-01e3fac01cd5_do_not_edit_manually.md!}