You are troubleshooting an issue with an Azure account registered in Falcon Cloud Security. The registration appeared to be successful, but certain CSPM operations—including asset inventories and IOM detection—are failing.
How can you securely test the hypothesis that these failed CSPM operations are related to your firewall configuration?
Which Fusion workflow trigger can be used to take an action when a vulnerability is found on one of your container images?
Your team wants to review container vulnerabilities on a weekly basis. Not all members of the team reviewing the information will have access to the Falcon console.
How can you automatically distribute the vulnerable container information from Cloud Security?
You are investigating potential data exfiltration by reviewing IOAs in Falcon Cloud Security. You must check for any evidence of Defense Evasion via Impair Defenses: Disable or Modify Tools activity in your Azure environment.
Which IOA filters meet those requirements to identify any related IOAs?
What Falcon Sensor could be used to provide security for an AWS EKS cluster running on Amazon Linux 2–based EC2 instances, including container-level visibility?
You want to deploy the Falcon sensor using 1-click sensor deployment when AWS Systems Manager is unavailable.
Which IT automation software can you use to generate an inventory of unmanaged workloads?
As a Falcon Administrator, you must add access for an analyst to review cloud control plane IOMs.
What least privilege role should you assign them?
You suspect that there is malware in one of your container images.
What can you investigate to confirm this?