Manual step by step tutorial to deploy the EDR CrowdStrike
Executable
Download the Windows executable from Stoïk Protect or via this link.
Customer ID
Your Customer ID is necessary for the deployment of the EDR. This information is available on Stoïk Protect, tab Endpoints
then Settings
, in the Information
section.
Automatic deployment
If you have SCCM or Intune, simply deploy the downloaded executable directly on all workstations and servers. You can also use a GPO (see below for a guide to creating a GPO).
For automatic deployment, use the following command, replacing code_client with your Customer ID:<name of crowdstrike file>.exe /install /quiet /norestart CID=Customer ID
If necessary, you can also specify a tag associated with the agent during installation. This can be particularly useful for differentiating installations by site or geographical location:<name of crowdstrike file>.exe /install /quiet /norestart CID=Customer ID GROUPING_TAGS="INSERT_HERE_TAGS"
You can specify multiple tags, separated by commas.
Manual deployment
- Run the executable
- Insert your Customer ID in the case
Customer ID with Checksum
- Click on
Install
Uninstall of your antivirus
CrowdStrike replaces your current antivirus solution, so it is necessary to uninstall it.
Please note: Don't disable your firewall if it's a different solution. However, if your firewall is managed by the same solution and you've created custom rules, please transfer them to the Windows firewall.
Appendix - Creating an automated deployment GPO
To perform a GPO deployment, you can perform the following steps:
- Download the Windows executable from Stoïk Protect or via this link.
- Place this file in a network share accessible to all computers in the domain.
Example path:\\Server\Share\WindowsSensor.exe
.
Make sure the share has Read permissions for the computer groups concerned. - Create a PowerShell or batch script file that executes the install command.
For example, a batch script (InstallCrowdStrike.bat
) :@echo off
\\Server\Share\WindowsSensor.exe /install /quiet /norestart CID=Customer ID
If necessary, you can also specify a tag associated with the agent during installation. This is particularly useful for differentiating installations by site or geographical location@echo off
\\Server\Share\WindowsSensor.exe /install /quiet /norestart CID=Customer ID GROUPING_TAGS="INSERT_TAGS_HERE"
➡️ Replace\\Server\Share\WindowsSensor.exe
with the actual path, and code_client with your customer ID. - Test the script on a machine manually to check that it installs CrowdStrike correctly, by verifying the presence of this machine on your Stoïk Protect MDR space.
- Open the Group Policy Management console (GPMC):
- Press
Win + R
, typegpmc.msc
and press Enter.
- Press
- Create a new GPO :
- Right-click on the container where you want to apply the GPO (e.g. the domain or a specific OU).
- Click on Create a Group Policy object in this domain and link it here, and give it a name (e.g.
CrowdStrike Deployment
).
- Configure the starting script
- Right-click on the new GPO and select Modify.
- Go to Computer configuration > Policies > Windows settings > Scripts (Start/Stop).
- Double-click on Startup, then click on Add.
- In the window that opens, click on Browse, then select the
InstallCrowdStrike.bat
script.
Note: Copy the script into the folder\\<server_name>\SysVol\<domain_name>\Policies<GUID_of_the_GPO>\Machine\Scripts\Startup
so that it is accessible to all.
- Apply the GPO
- Make sure the GPO is linked to the right container (domain or OU containing the target machines).
- Use
gpupdate /force
on a domain controller to force policy updates.
- Verify the installation:
- Restart a target machine to trigger the script.
- Check that CrowdStrike is installed and running on this machine.
- In case of problems: consult the startup script log file on client machines:
C:\Windows\Debug\StartupLog.txt
. Make sure that :- The share path is correct and accessible.
- NTFS and network share permissions allow reading for target machines.
Apendix - Opening network flows
In the event of a network block, the following flows must be opened on the firewall at port 443:
IPv4
3.121.6.180
3.121.187.176
3.121.238.86
3.125.15.130
18.158.187.80
18.198.53.88
3.78.32.129
3.121.13.180
3.123.240.202
18.184.114.155
18.194.8.224
35.156.219.65
3.69.184.79
3.76.143.53
3.77.82.22
2a05:d014:45e:4e00::/56 (allow all addresses between 2a05:d014:45e:4e00:0000:0000:0000:0000 and
2a05:d014:45e:4eff:ffff:ffff:ffff:ffff)
2a05:d014:45e:4e00::/56 (allow all addresses between 2a05:d014:45e:4e00:0000:0000:0000:0000 and
2a05:d014:45e:4eff:ffff:ffff:ffff:ffff)
2a05:d014:45e:4e00::/56 (allow all addresses between 2a05:d014:45e:4e00:0000:0000:0000:0000 and
2a05:d014:45e:4eff:ffff:ffff:ffff:ffff)
ts01-lanner-lion.cloudsink.net
lfoup01-lanner-lion.cloudsink.net
lfodown01-lanner-lion.cloudsink.net
Please contact us at protect@stoik.io if you encounter any difficulties.