CrowdStrike is an agent-based sensor that prevents breaches and malware attacks. It provides Endpoint Detection and Response (EDR) services to all endpoints by a single agent, commonly known as the CrowdStrike Falcon Sensor.

This document contains the best practices that ensure smooth interoperability between CrowdStrike and Netskope Client.


This document was created using the following components:

  • Falcon Sensor Version: 6.36.15005
  • Netskope Client version:
  • OS: Windows 10

Interoperability Configuration Requirements

Specific configurations in Netskope tenant web UI can ensure that the processes or traffic from either of the applications are not blocked and directed to the Netskope Cloud. You must add exceptions to the Netskope Steering Configuration. To learn more, view Exceptions.

Configurations In Netskope Client

Add steering configuration exceptions (Certificate Pinned Application exception type) on the Netskope tenant WebUI to allow CrowdStrike traffic to bypass Netskope and reach its destination.

To add CrowdStrike as a Certificate Pinned Application on the Netskope UI:

  1. Go to Settings > Security Cloud Platform > Steering Configuration and select a configuration.
  2. On the configuration page, click EXCEPTIONS > NEW EXCEPTION > Certificate Pinned Applications.
  3. In the New Exception window, do the following:
    1. From Certificate Pinned App, select the application. To add a new certificate pinned application in the New Certificate Pinned Application window, do the following:
      • Application Name: Enter the name of the application.
      • Platform: Select the operating system where the application is managed.
      • Definition: Provide the processes and .exe(s) list that you want to bypass. Here, add the following processes:
        • CSFalconService.exe
        • CSFalconContainer.exe
    2. From Custom App Domains, add the URL: that you want to exclude.
    3. From Actions, select Bypass for all operating systems that you want to allow directly to the destination.
    4. Click ADD.

Verifying Interoperability

Netskope Client Functions

Refer to the list of validated use cases that you can use to verify Client operations.

CrowdStrike Validation

To validate CrowdStrike Falcon Sensor, open a Command Prompt(cmd.exe) and run the following command: choice /M crowdstrike_sample_detection.


This triggers a detection and reviews your recent detection using Activity > Detections to inspect the new alert on the Falcon console.

Share this Doc


Or copy link

In this topic ...