Inside CrowdStrike Automated Leads: A Transformative Approach to Threat Detections
CrowdStrike
Archived May 12, 2026
✓ Full text saved
Full text archived locally
___
BLOG
Featured
Recent
Video
Category
Start Free Trial
Inside CrowdStrike Automated Leads: A Transformative Approach to Threat Detections
How analysts can use the Falcon platform’s new Automated Leads functionality to slash triage time and investigate attacks.
May 11, 2026
| Daniel Brown - Thomas Hobson - Amogh Pradeep | Endpoint Security & XDR• Engineering & Tech
Last summer we introduced Automated Leads, a transformative approach to threat detection designed to surface the subtle signs of an attack before it turns into a full-blown breach. It’s powered by CrowdStrike® Signal (distinct from SGNL) and delivered via the CrowdStrike Falcon® platform.
Since that launch, the goal has remained the same: to move beyond the limitations of traditional alerting and give analysts a head start on detecting the most sophisticated adversaries.
Today, we’re peeling back the curtain on how the new family of self-learning AI models that generates Automated Leads works, and announcing a powerful new capability to instantly isolate unusual processes and anomalous remote monitoring and management (RMM) tool usage that would otherwise be lost in the noise.
The Challenge: Why More Alerts Isn’t the Answer
Improving detection is a core driver for the CrowdStrike Advanced Research team, which is behind the development of the AI models powering Automated Leads. For years, the industry has followed a predictable cycle:
Create a rule for a known malicious feature.
Deploy it.
Triage the resulting alerts.
Tune out the high-volume noise.
The consequence? “Noisy” rules, which might actually trigger on real malicious activity, are suppressed because there are too many for human triage. Malicious activity can slip through the cracks.
On the Falcon platform, we see millions of indicators, or events that don’t quite reach the threshold of a traditional detection. In a complex environment, we might see 10,000 such indicators in a single hour. They are too numerous for a human to review, but with the right algorithmic approach, they are the key to finding the needle in the haystack.
How Automated Leads Works: Scoring and Correlation
The AI engine powering Automated Leads solves this by shifting the focus from individual alerts to entity-based scoring. Instead of treating every event as a binary “good” or “bad” alert, the engine assigns a score to every indicator and detection event. These scores are essentially an initial prioritization. The engine then links these events by entity (such as an endpoint).
When multiple positively scoring events occur on the same host, their scores are summed. This is best explained by visualizing how the engine views indicator occurrences over time:
Figure 1. Visualizing event scoring. While an indicator may be a regular occurrence on most endpoints (receiving a zero score), the engine identifies and scores instances that have never been seen on a specific host before.
By identifying and filtering down to just these anomalous examples, the engine can surface leads earlier in the attack chain and reveal special kinds of Automated Leads we refer to as “zero detect” leads. This is malicious activity that hasn't triggered a traditional alert but is clearly suspicious when viewed as a collective cluster of behaviors.
Real-World Analysis: The RMM Hunting Ground
To see this in action, consider how the engine powering Automated Leads handles RMM tools. Adversaries love RMM tools because they allow them to “live off the land,” essentially blending in with existing approved tools already on the endpoint. But for an analyst, sifting through every RMM execution in a large enterprise is impossible.
In a recent internal analysis, the engine monitored thousands of hosts. The vast majority of activity was the organization's standard IT RMM tool — a familiar, low-score constellation of legitimate work.
Figure 2. RMM executions in environment. Each color represents a different RMM tool. The score on the y-axis represents our level of suspicion of the execution.
The engine flagged a single execution of MeshAgent, a tool never seen before in that specific environment. While a lone RMM execution is hard to convict, the engine immediately correlated it with other “quiet” behaviors on that same host: a command prompt launch, registry queries, and local network probing.
Figure 3. Indicators of attack (IOAs) triggering on the victim host. IOAs above the line indicate a contribution to the Automated Lead’s confidence.
None of these events would have raised an alarm individually. The registry query, for instance, fired hundreds of times a day across the environment. But because it had never occurred on that specific host, the engine’s confidence score spiked.
Figure 4. IOA related to registry querying across hosts in this environment. Each point represents its occurrence on hosts in this environment.
New Innovation: Investigating Unusual Processes
Building on this logic, we are thrilled to announce a new capability integrated directly into Automated Leads: Investigate Unusual Processes.
Figure 5. Example of an Automated Lead
Analyzing every process created during a suspicious window is a massive time sink. A typical endpoint creates tens of thousands of processes per day. A key observation is the vast majority of this process creation activity is from routine, repetitive, and benign activity. This typically holds true even for endpoints that are compromised by adversaries. The malicious processes created are a small fraction intertwined with benign, largely automated creations.
In order to rapidly analyze process creations during suspected attacks at scale, we needed a way to filter out this routine activity. To solve this, we’ve introduced the ProcessAncestryInformation (PAI) event. This feature uses historical observations of an endpoint to flag only the most unusual process creations — typically just 1-3% of all process creations. For example, during a recent attack spanning two hours, we observed approximately 5,000 processes created, of which 75 were flagged as unusual, triggering PAI events. These select processes contained subtle but unusual attacker activity including a legitimate RMM tool, a command prompt, and the ping utility.
Figure 6. ProcessAncestryInformation event triggered for unusual process creations
How to Use It
This feature is available now for all customers within the Automated Leads dashboard:
Locate a Lead: Click on the three-dot menu (⋮) next to the Status of any Automated Lead.
Pivot to Advanced Event Search: Select “Investigate unusual processes.”
Figure 7. Click “Investigate unusual processes” from within the menu of any Automated Lead in order to see the unusual processes that were created during that lead
This will take you to Advanced Event Search (AES), pre-populated with PAI events joined with ProcessRollup2 data. This gives you the full picture — including command lines and ancestor processes — without forcing you to sift through thousands of benign events.
Always-On Intelligence
Investigate Unusual Processes is available across Windows, macOS, and Linux. Best of all, it is always active. While it’s integrated into Automated Leads for ease of use, you can search for the ProcessAncestryInformation event in Advanced Event Search for any endpoint at any time to see what’s truly out of the ordinary in your environment.
By automating the "boring" work of filtering routine noise, we’re empowering teams to quickly focus on the activity that’s unusual in their environment.
Tweet
Share
CrowdStrike 2026 Global Threat Report
AI threats have reached a critical turning point. Access the definitive look at the cyber threat landscape.
Download
Related Content
CrowdStrike Falcon Platform Achieves 441% ROI in Three Years
Falcon for IT Supports Windows Secure Boot Certificate Lifecycle Management
Enhanced Network Visibility: A Dive into the Falcon macOS Sensor's New Capabilities
CATEGORIES
Agentic SOC
51
Cloud & Application Security
143
Data Protection
22
Endpoint Security & XDR
354
Engineering & Tech
87
Executive Viewpoint
180
Exposure Management
118
From The Front Lines
204
Next-Gen Identity Security
68
Next-Gen SIEM & Log Management
113
Public Sector
42
Securing AI
29
Threat Hunting & Intel
216
CONNECT WITH US
FEATURED ARTICLES
May 06, 2026
May 05, 2026
April 30, 2026
April 22, 2026
SUBSCRIBE
Sign up now to receive the latest notifications and updates from CrowdStrike.
Sign Up
CrowdStrike Falcon Platform Achieves 441% ROI in Three Years
Copyright © 2026 CrowdStrike
Privacy
Request Info
Blog
Contact Us
1.888.512.8906
Accessibility
Privacy Preference Center
Privacy Preference Center
Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies
Your Privacy
When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device, and is mostly used to make the site work as you expect. The information does not usually identify you directly, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to learn more and change our default settings. Blocking some types of cookies may impact your experience of the site and the services we are able to offer.
More information
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They may be set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies may process limited personal information, such as technical or device identifiers, where necessary to ensure the security, functionality, and integrity of the website or web portal. Such processing is strictly limited to what is required for these purposes and is not used for advertising or marketing.
Cookies Details
Performance Cookies
Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore does not identify you. If you do not allow these cookies, your visit to our website will not be included in our analytics, and our ability to monitor website performance and make improvements will be reduced.
Cookies Details
Functional Cookies
Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
Targeting Cookies
These cookies may be set on our site by our advertising partners. They assign a unique identifier to your browser or device and may track your activity across sites to build a profile of your interests and show you relevant adverts on other sites. If you do not allow these cookies, you will still see ads, but they may be less relevant to you.
Cookies Details
Cookie List
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label
Clear
checkbox label label
Apply Cancel
Confirm My Choices
Allow All