CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◐ Insider Threat & DLP Mar 16, 2026

Falcon IDP Innovations Stop Insider Risk - CrowdStrike

CrowdStrike Archived Mar 16, 2026 ✓ Full text saved

Falcon IDP Innovations Stop Insider Risk CrowdStrike

Full text archived locally
✦ AI Summary · Claude Sonnet


    ___ BLOG Featured Recent Video Category Start Free Trial Falcon Identity Protection Innovations Stop Insider Risk, Secure Non-Human Identities, and Lock Down Privileged Access New capabilities deliver unified protection across all human and machine identities to close critical security gaps and stop attacks in real time. June 03, 2025 | Ryan Terry - Kendra Kendall | Next-Gen Identity Security How do you stop identity-based attacks in real time — across both human and non-human identities? CrowdStrike Falcon® Identity Protection now delivers powerful new capabilities to answer that question. The innovations announced today address urgent challenges facing security teams: unprotected non-human identities (NHIs) such as service accounts, insider risk during employee offboarding, and standing privileges in hybrid Microsoft environments. Adversaries like SCATTERED SPIDER, COZY BEAR, and FAMOUS CHOLLIMA are exploiting identity blind spots such as NHIs, insider threats, and privileged access. These attacks thrive in hybrid identity environments, where disconnected tools and processes allow fast-moving adversaries to enter and move through organizations undetected. CrowdStrike’s latest identity security capabilities are built to close these gaps with real time detection, risk-based enforcement, and unified visibility — and they’re all delivered through the unified CrowdStrike Falcon® cybersecurity platform. Stop Non-Human Identity Attacks in Microsoft Active Directory and Entra ID Service accounts and other NHIs often operate with high privileges and minimal oversight, making them a prime adversary target. CrowdStrike is expanding its industry-leading protection for non-human identities with new dedicated risk and activity dashboards that provide: Instant visibility to quickly identify NHIs and their associated risks Access activity monitoring to identify deviations from baseline behavior Context-rich investigation workflows, supported by 15+ new security checks for service principal permissions and NHI attack paths These enhancements complement our AI-powered detection and response capabilities for NHIs to stop identity-based attacks across hybrid environments. How Falcon Identity Protection Secures NHIs Falcon Identity Protection uses AI to automatically establish a behavioral baseline for non-human accounts across Microsoft Active Directory and Entra ID. This baseline establishes normal activity for an account, including endpoints used, services accessed, and more. The new non-human identities dashboard, now generally available in Falcon Identity Protection, instantly surfaces access activity, deviations, and service principal risks. This interactive dashboard enables analysts to quickly drill down into events, accounts, and detections of interest. Figure 1. Falcon Identity Protection’s interactable non-human identities dashboard surfaces access activity, deviations, and service principal risks. Find and Fix Risky NHIs Before Adversaries Exploit Them Analysts can use the dashboard to find high-risk non-human identities and close security gaps before adversaries take advantage. This may include, for example, privileged service accounts with inadequate password policies that could make it easy for adversaries to gain valid credentials. We have expanded the number of security checks for Entra ID and AD to identify excessive permissions and misconfigurations across service principals. These expanded checks spotlight risks like over-permissioned NHIs with unnecessary access to applications such as Microsoft Teams, which adversaries could exploit for lateral movement or data exfiltration. With visibility into these risks, analysts can use the NHI dashboard to ensure non-human identities are only accessing what they are permitted to access. Further, this visibility enables analysts to create prescriptive identity protection policy rules to stop unwanted and/or malicious activity — for example, blocking access from rarely used source endpoints the moment malicious activity is detected. Key Takeaway: Falcon Identity Protection gives analysts immediate visibility into non-human identity risk and actionable insights to prevent identity-based attacks. Stop Insider Threats During Employee Departures Security teams often lack proactive visibility when employees depart, creating a dangerous gap that can lead to data theft or sabotage. CrowdStrike fuses HR signals with real-time identity and data behavior analytics to detect and stop insider risk by helping customers: Add departing employees to a watchlist and continuously monitor their activity Automatically flag high-risk activity like privilege escalation or unusual data transfers Dynamically enforce policy actions, extend risk-based conditional access, and leverage MFA to stop malicious activity in real time Falcon Identity Protection integrates with Workday through Falcon Foundry to leverage HR-driven lifecycle events, such as employee resignations, to proactively tag users as leavers before risk escalates. These watchlisted users are then continuously monitored for unusual data access or account activity, enabling early detection of potential insider threats. When suspicious behavior is detected, adaptive enforcement policies automatically respond with actions like requiring multifactor authentication (MFA), revoking sessions, or blocking access entirely — mitigating risk in real time. Key Takeaway: Falcon Identity Protection proactively stops insider threats during offboarding by combining HR signals and real-time behavioral analytics, seamlessly integrating with third-party applications through Falcon Foundry, our low-code application development platform. Lock Down Privileged Access in Hybrid Microsoft Environments Standing privileges are a standing risk for organizations. CrowdStrike Falcon Privileged Access, recently announced, provides just-in-time access so users can only access what they need, when they need it, as security conditions allow. This capability is being expanded to enforce just-in-time privileged access across Microsoft Entra ID and Active Directory. This is now available for Microsoft Entra ID; early access for Active Directory support will be available in the coming weeks. With this, organizations now have additional protection for their hybrid Microsoft environments. They gain continuous risk-based monitoring, real-time access revocation, and simpler privileged access enforcement with faster time-to-value.  When just-in-time policy conditions are met, such as a user having a low identity protection risk score, privileged access can be automatically granted or available upon request. Risk scores are continuously authenticated so elevated access can be revoked in real time if risk levels change. This helps ensure elevated privileges are only assigned under secure, policy-driven conditions. With this enforcement model, privileged access is always temporary, always contextual, and always secure. Watch this video to see how Falcon Privileged Access stops adversaries with just-in-time privileges. Key Takeaway: Falcon Privileged Access delivers real-time, risk-based enforcement for just-in-time access across hybrid Microsoft environments. CrowdStrike Leads in Unified Identity Protection With these innovations, CrowdStrike strengthens its position as a leader in unified identity protection. Falcon Identity Protection now delivers: Real-time prevention for insider threats and employee turnover Comprehensive NHI protection across hybrid identity environments Just-in-time privileged access with continuous risk monitoring for hybrid Microsoft environments CrowdStrike’s momentum in identity protection continues to earn recognition from leading analysts and, more importantly, our customers. We were recently named a Leader and Outperformer in the 2025 GigaOm Identity Threat Detection and Response Radar Report, which praised our “continued rapid development” and “strong roadmap.” As adversaries get smarter, CrowdStrike gets faster. By unifying identity, data, and threat protection, we give security teams the power to stop attacks before they start — and the visibility to investigate what others miss. Learn how to build a comprehensive identity protection strategy that stops breaches. Tweet Share CrowdStrike 2026 Global Threat Report AI threats have reached a critical turning point. Access the definitive look at the cyber threat landscape. Download report Related Content CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security CrowdStrike Named a Customers’ Choice in 2026 Gartner® Peer Insights™ Voice of the Customer for User Authentication CrowdStrike to Acquire Seraphic to Secure Work in Any Browser CATEGORIES Agentic SOC 48 Cloud & Application Security 139 Data Protection 21 Endpoint Security & XDR 351 Engineering & Tech 86 Executive Viewpoint 177 Exposure Management 116 From The Front Lines 198 Next-Gen Identity Security 67 Next-Gen SIEM & Log Management 111 Public Sector 40 Securing AI 25 Threat Hunting & Intel 210 CONNECT WITH US FEATURED ARTICLES October 01, 2024 CrowdStrike Named a Leader in 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms September 25, 2024 Recognizing the Resilience of the CrowdStrike Community September 25, 2024 CrowdStrike Drives Cybersecurity Forward with New Innovations Spanning AI, Cloud, Next-Gen SIEM and Identity Protection September 18, 2024 SUBSCRIBE Sign up now to receive the latest notifications and updates from CrowdStrike. Sign Up CrowdStrike Leads in GigaOm Radar for Identity Threat Detection and Response CrowdStrike Named a Customers’ Choice in 2025 Gartner® Peer Insights™ Voice of the Customer for User Authentication Report Copyright © 2026 CrowdStrike Privacy Request Info Blog Contact Us 1.888.512.8906 Accessibility Privacy Preference Center Privacy Preference Center Your Privacy Strictly Necessary Cookies Performance Cookies Functional Cookies Targeting Cookies Your Privacy When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They may be set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies may process limited personal information, such as technical or device identifiers, where necessary to ensure the security, functionality, and integrity of the website or web portal. Such processing is strictly limited to what is required for these purposes and is not used for advertising or marketing. Cookies Details Performance Cookies Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore does not identify you. If you do not allow these cookies, your visit to our website will not be included in our analytics, and our ability to monitor website performance and make improvements will be reduced. Cookies Details Functional Cookies Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details Targeting Cookies Targeting Cookies These cookies may be set on our site by our advertising partners. They assign a unique identifier to your browser or device and may track your activity across sites to build a profile of your interests and show you relevant adverts on other sites. If you do not allow these cookies, you will still see ads, but they may be less relevant to you. Cookies Details Cookie List Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Allow All
    💬 Team Notes
    Article Info
    Source
    CrowdStrike
    Category
    ◐ Insider Threat & DLP
    Published
    Mar 16, 2026
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗