Skip to main content
Install/Uninstall CrowdStrike Falcon
Updated over a week ago

CrowdStrike Falcon is a cloud-native endpoint protection platform developed by CrowdStrike, a leading cybersecurity company. CrowdStrike Falcon requires a paid subscription from CrowdStrike to enable the use of the software packages.

To install CrowdStrike, there are three required steps for the macOS package and two required step for the Windows package:

macOS

  1. Installer profiles: You can download the CrowdStrike-provided MDM profile for macOS at the support page.

    1. After the profile is downloaded, you can deploy the profile using Swif's custom policy function at Policy Management. Here is a sample CrowdStrike MDM profile for the M1 Macbook for your reference: Falcon Profile - no Kext.mobileconfig. For custom profiles, copy everything inside of the array tag you see right after the <key>PayloadContent</key> part of the file you download.

    2. Then add the custom profile to your device group to automate the deployment.

  2. Install the app: You can choose to deploy the package to any device group to automate the deployment in 2 ways:

    1. Download the pkg on the CrowdStrike download page and upload it to your team's software page on Swif.

    2. Or you can use our prebuilt CrowdStrike Falcon package on the Software page and Click "Add" to add to your team software.

  3. Run a scheduled command falconctl to configure the Falcon license. Running as a Command until then is fine for the first-time rollout to devices, but if you add a new device to a device group with all of this configured, there's no guarantee when the command will run, and may run before the software is installed, you could create a scheduled cron job Command to run every day or something to just check if the command is successful, and if not, re-execute the command too.

    1. Run a schedule command. To make the command work on all devices, you can make the scheduled command "Run as Swif admin" (Step 2). Swif admin password is available via Device Details > Account tab > Swif admin > Change password > Click to View.

    2. echo "password here" | sudo -S /Applications/Falcon.app/Contents/Resources/falconctl license XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX-YY
    3. Then add the command to your device group to automate the deployment.

    4. After the command is executed, you can use this command to verify on a device to see if it has been configured successfully.

      echo "password here" | sudo -S /Applications/Falcon.app/Contents/Resources/falconctl stats

      === CloudInfo === Cloud Info Host: ts01-gyr-maverick.cloudsink.net Port: 443 State: connected ...
  4. For #3, you can now (Jun 2024) use pre-install and post-install scripts on a macOS custom package to run such scripts.

Windows

  1. Install the app: You can choose to deploy the package to devices in 2 ways:

    1. Download the pkg on the CrowdStrike download page and upload it to your team's software page on Swif.

    2. Or you can use our prebuilt CrowdStrike Falcon package on the Software page and Click "Add" to add to your team software.

    3. For the Windows package, you can configure installer arguments like below to configure your package.

      1. Name: "CrowdStrike Windows Sensor" (So the package name will match the application name)

      2. Installer Arguments: /install /quiet /norestart CID="AB....-DC" (Enter each argument separately like the attached screenshot). To obtain your Falcon CID, you can follow this article.

  2. Uninstall the app: There is a way to do a silent uninstall by using their CSUninstallTool. The uninstaller should look like this:
    โ€‹CsUninstallTool.exe MAINTENANCE_TOKEN=<your token> /quiet

    1. You can also manually uninstall CrowdStrike. When you uninstall Falcon from devices or groups on Swif, Windows uninstaller for Falcon will require you to manually enter a maintenance token on the devices that are uninstalling Falcon.

Did this answer your question?