CrowdStrike Falcon is a cloud-native endpoint protection platform developed by CrowdStrike, a leading cybersecurity company. CrowdStrike Falcon requires a paid subscription from CrowdStrike to enable the use of the software packages.
To install CrowdStrike, there are three required steps for the macOS package and two required steps for the Windows package:
macOS
1. Use the Prebuilt CrowdStrike Falcon package
Use our prebuilt CrowdStrike Falcon package on the Software page and click "Add" to add it to your team's software.
2. Upload the installer
Upload the installer to the template to continue the app template creation. Download the pkg on the CrowdStrike download page and upload it here:
3. Post-install script
Change your license key at CID_KEY="XXX."
Here is the post-install script on a macOS custom package to load the license key.
#!/bin/bash
CID_KEY="XXX"
FALCONCTL_PATH="/Applications/Falcon.app/Contents/Resources/falconctl"
"$FALCONCTL_PATH" license "$CID_KEY"
"$FALCONCTL_PATH" load
# Verify connection
if "$FALCONCTL_PATH" stats | grep -q "State: connected"; then
exit 0
else
exit 1
fi
4. Validation file path
Here is the install check file path to validate whether Crowdstrike was installed successfully or not.
5. A custom profile will be automatically created
The app template automatically created the CrowdStrike-provided MDM profile for macOS, which is the same one you would find on the CrowdStrike support page.
The custom profile will be automatically created at Swif's custom policy function at Policy Management.
Here is a sample CrowdStrike MDM profile for the M1 MacBook for your reference: Falcon Profile - no Kext.mobileconfig.
Then add the newly created custom profile to your device group to automate the deployment.
Windows
1. Install the app
You can choose to deploy the package to devices in 2 ways:
Download the pkg on the CrowdStrike download page and upload it to your team's software page on Swif.
Or you can use our prebuilt CrowdStrike Falcon package on the Software page and Click "Add" to add to your team software.
For the Windows package, you can configure installer arguments like below to configure your package.
Name: "CrowdStrike Windows Sensor" (So the package name will match the application name)
Installer Arguments: /install /quiet /norestart CID="AB....-DC" (Enter each argument separately like the attached screenshot). To obtain your Falcon CID, you can follow this article.
2. Uninstall the app
There is a way to do a silent uninstall by using their CSUninstallTool. The uninstaller should look like this:
CsUninstallTool.exe MAINTENANCE_TOKEN=<your token> /quiet
You can also manually uninstall CrowdStrike. When you uninstall Falcon from devices or groups on Swif, the Windows uninstaller for Falcon will require you to manually enter a maintenance token on the devices that are uninstalling Falcon.
DEB-Based Linux Devices
This guide explains how to deploy the CrowdStrike Falcon Sensor on DEB-based (x64/amd64) Linux devices using the Swif platform’s custom application feature.
1. Overview
Deployment Method: Use Swif’s custom application upload to install the CrowdStrike Falcon Sensor.
Why this method? Direct installation via APT package manager may not be reliable or available in all environments. The custom app upload ensures consistent deployment and management.
2. Prepare the Custom Application Package
Download the DEB File:
Obtain the correct Falcon-sensor DEB package for your device architecture.
Example download:
falcon-sensor_7.28.0-18108_amd64.debVerify the File Hash:
SHA256:023a9000731420bd489de8f60c7ad0e8a8d10de36ae2394c58e6167cae73901b
3. Configure the Application in Swif
When creating the custom application, use the following configuration fields:
a. Installation Item
DEB: You can download the .deb installer from Crowdstrike
b. Post-Install Script
This script sets the CID key, restarts the service, and validates the installation.
#!/bin/bash
CID_KEY="XXX"
sudo /opt/CrowdStrike/falconctl -s --cid="$CID_KEY"
sudo systemctl restart falcon-sensor
sudo /opt/CrowdStrike/falconctl -g --cid | grep -q "$CID_KEY"
if [ $? -eq 0 ]; then
exit 0
else
exit 1
fi
c. Check Script
This script checks if the package is installed and the service is running.
#!/bin/bash
if dpkg -l | grep -qw falcon-sensor && systemctl is-active --quiet falcon-sensor; then
exit 1
else
exit 0
fi
Note: Depending on your system’s convention, you may need to swap exit 1 and exit 0 in the check script.
d. Uninstall Script
This script fully removes the sensor and its files.
#!/bin/bash
if dpkg -l | grep -q falcon-sensor; then
sudo systemctl stop falcon-sensor
sudo dpkg --purge falcon-sensor
sudo rm -rf /opt/CrowdStrike
sudo rm -rf /var/log/falcon-sensor
sudo rm -f /etc/opt/CrowdStrike/falcon.cfg
if ! dpkg -l | grep -q falcon-sensor && [ ! -d /opt/CrowdStrike ] && [ ! -d /var/log/falcon-sensor ]; then
exit 0
else
exit 1
fi
else
exit 0
fi
4. Assign the Application to Devices
In the Swif platform, assign the custom CrowdStrike application to your target DEB-based devices.
The system will push the DEB file and execute the scripts as configured.
5. Validation
After the assignment, check the device status in Swif to confirm installation.
Optionally, verify on the device:
Service status:
sudo systemctl status falcon-sensorFalconctl presence:
sudo /opt/CrowdStrike/falconctl -hRunning process:
ps ax | grep falcond | grep -v grep









