CrowdStrike Falcon allows administrators to run on-demand scans on selected hosts or host groups to detect and analyze potential security threats. On-demand scans can be executed immediately or scheduled for future or recurring runs.
This guide provides step-by-step instructions on how to initiate and configure an on-demand scan using the Falcon Console.
Step 1: Navigate to On-Demand Scans
- Log into the CrowdStrike Falcon Console at: https://falcon.crowdstrike.com or https://falcon.us-2.crowdstrike.com/ (Varies by tenant).
- In the left-hand menu, go to Endpoint Security > On-Demand Scans.
- Click Create a Scan.
Step 2: Configure Scan Scheduling
Option 1: Run Scan Immediately
- Select "Now" to start the scan immediately.
- Enter the hostnames or host groups to be scanned.
Option 2: Schedule a Future or Recurring Scan
- Select "In the Future" to schedule a scan at a later date/time.
- Choose a start date and time.
- Set the repeat frequency (e.g., daily, weekly, or never for a one-time scan).
- Specify how long each scan occurrence will run (default: 2 hours).
📌 Tip: Scheduled scans can be recurring for ongoing security monitoring.
Step 3: Select Scan Target
- Enter at least one hostname or host group to be scanned.
- (Optional) Specify file paths to scan:
- Use glob syntax to define patterns (e.g.,
C:\Users\Public\*to scan all files in the Public folder). - Click Upload File or Test Pattern to verify the path format.
- Use glob syntax to define patterns (e.g.,
- (Optional) Exclude specific file paths from the scan using the same format.
Step 4: Configure Scan Aggressiveness
- Under Sensor Anti-Malware, choose a Detection & Prevention Level:
- Disabled – No scanning.
- Cautious – Low sensitivity, minimal false positives.
- Moderate (Recommended) – Balanced security and performance.
- Aggressive – Higher sensitivity but may increase false positives.
- Extra Aggressive – Maximum sensitivity but can impact system performance.
- Configure Cloud Anti-Malware Settings (same aggressiveness options).
📌 Tip: Moderate is recommended for most environments to balance detection accuracy and system impact.
Step 5: Adjust Performance & User Notifications
- Maximum CPU Utilization:
- Set to Low (up to 25%) for minimal performance impact.
- Adjust if higher CPU usage is acceptable.
- End-User Notifications:
- Enable "Show notifications to end users" to inform them when a scan is running.
- Set a pause duration (hours) to allow users to temporarily pause scans if needed.
Step 6: Start the Scan
- Review all scan settings.
- Click Create Scan to execute the scan immediately or schedule it for later.
- Monitor scan progress under Endpoint Security > On-Demand Scans.
Expected Scan Duration and Performance
Understanding typical scan times helps set expectations and identify potential issues:
| Aggressiveness Level | Typical Duration* | CPU Impact | Best For |
|---|---|---|---|
| Cautious | 3-5 hours | 5-15% | Background scans during work hours |
| Moderate | 1-3 hours | 15-30% | Routine scheduled scans |
| Aggressive | 30-90 min | 30-50% | Post-incident verification |
| Extra Aggressive | 15-45 min | 50-75% | Active threat response |
*Duration varies based on disk size, file count, and system specifications. A typical 500GB drive with 200,000 files takes approximately 2 hours at Moderate level.
Factors Affecting Scan Duration
- Disk size and file count: More files = longer scans
- File types: Compressed archives and executables take longer to analyze
- System resources: SSD vs HDD, available RAM, CPU cores
- Network connectivity: Cloud lookups require internet access
- Exclusions: Proper exclusions significantly reduce scan time
Troubleshooting On-Demand Scans
Scan Fails to Start
Symptoms: Scan status shows "Failed" or never progresses from "Pending"
Solutions:
-
Verify sensor connectivity:
- Check sensor status in Host Management
- Ensure endpoint is online and communicating with cloud
-
Check user permissions:
- User must have Falcon Administrator or Endpoint Manager role
- Navigate to Users & Roles to verify permissions
-
Verify Prevention Policy allows scans:
- Some policies may restrict on-demand scan capabilities
- Check the assigned Prevention Policy settings
Scan Times Out or Stops Early
Symptoms: Scan ends before completing all files, or shows timeout error
Solutions:
- Extend scan duration: When creating the scan, increase "how long each scan occurrence will run"
- Reduce scope: Scan specific directories instead of entire drive
- Lower aggressiveness: Higher levels require more time per file
- Schedule during off-hours: Reduce resource contention
Scan Runs But Finds Nothing (Suspected False Negative)
Symptoms: Known test files not detected, or post-incident scan shows no threats
Solutions:
- Verify cloud connectivity: Scans require cloud analysis for full effectiveness
- Check sensor version: Update to latest sensor version for newest detections
- Increase aggressiveness: Try Aggressive or Extra Aggressive for suspicious cases
- Review exclusions: Ensure excluded paths don't contain threats
High False Positive Rate
Symptoms: Legitimate applications flagged as threats
Solutions:
- Add targeted exclusions: Create path or hash exclusions for known-good files
- Lower aggressiveness: Reduce to Moderate or Cautious
- Submit false positive: Use the Falcon Console to report false detections to CrowdStrike
- Review before quarantine: Enable confirmation prompts for critical systems
Scan Causing System Performance Issues
Symptoms: Endpoint becomes slow or unresponsive during scan
Solutions:
- Lower CPU utilization: Set to Low (up to 25%) in scan settings
- Schedule during off-hours: Run scans outside business hours
- Enable user pause: Allow end users to temporarily pause scans
- Exclude performance-critical paths: Add exclusions for database files, VMs, etc.
Common Use Cases
Post-Malware Incident Scan
After detecting and remediating malware, run a verification scan:
- Set aggressiveness to Aggressive or Extra Aggressive
- Target the affected host specifically
- Include the entire system drive
- Review results for any remaining artifacts
- Check related hosts in the same network segment
Compliance Scanning
For regulatory compliance (PCI DSS, HIPAA, etc.):
- Create a recurring scan (weekly recommended)
- Use Moderate aggressiveness for balance
- Target all endpoints in compliance scope
- Export scan reports for audit documentation
- Document any exclusions with business justification
Pre-Deployment Baseline
Before deploying new systems or images:
- Scan the golden image or template
- Use Aggressive settings for thorough analysis
- Document scan results as baseline
- Re-scan after any image updates
Best Practices for On-Demand Scans
- ✅ Use Scheduled Scans for Routine Security Checks – Automate scanning for continuous protection.
- ✅ Select Specific File Paths When Possible – Reduces scan duration and system impact.
- ✅ Balance Detection Sensitivity & Performance – Use Moderate settings unless dealing with an active threat.
- ✅ Monitor Falcon Console for Scan Results – Check Activity > Detections for scan findings.
- ✅ Document Scan Exceptions – Keep records of why certain paths are excluded.
- ✅ Test Scan Settings – Run scans on test systems before organization-wide deployment.
Related Guides
- How to Verify CrowdStrike Sensor Status - Ensure sensor is running before scanning
- Creating User Roles - Permissions required for on-demand scans
- CrowdStrike Exclusions for SQL Server - Prevent scan interference with databases