Skip to content Skip to site navigation Skip to service navigation

Stanford Anti-Malware

Because this website uses an older two-step authentication method, when you download the software you might not see the updated version of the two-step authentication screens.

The Stanford anti-malware recommended solution is Crowdstrike Endpoint Antivirus for Windows (centrally deployed to BigFix-managed systems) and Mac (self-service installer)

CrowdStrike Falcon provides advanced defensive capabilities against modern computer and network threats. It replaces traditional signature-based antivirus with a sophisticated set of behavioral models, enabling it to detect advanced and novel threats. It has the following features/characteristics:

  • Low memory and performance impact.
  • Combines hash-based signature detections with behavioral detections based on both specific heuristics and machine learning models.
  • Includes multiple detections for and defenses against ransomware activity.

Note that CrowdStrike provides full Endpoint Detection and Response (EDR) capabilities. It uploads a transcript of system events like program launches and network connections to a cloud-based detection infrastructure, and those logs are used to detect threats. The CrowdStrike agent continues to protect systems even while they are off

Learn more »

 

System requirements

Supported Operating Systems:

  • Mac: Mac OS X 10.14 or later
  • Windows:  Windows 10, Windows Server 2012/2016/2019
  • Linux: Amazon Linux 2, Amazon Linux AMI, CentOS 6.7+, Debian 9.4,Oracle Linux 6/7,Red Hat 6.7+,SUSE Linux Enterprise 11.4+,Ubuntu 12.04+

Eligibility

  • Faculty, staff, and students on a Stanford-owned computer or a personal computer used for official Stanford work

Notes

May be used on systems that store Low, Moderate, and High Risk Data, as defined by the Information Security Office.

Current faculty, staff, School of Medicine students, and student-staff are eligible for CrowdStrike. Devices not used for Stanford work are not eligible for CrowdStrike. See the FAQ section for additional information and guidance. 

Get help by submitting a Help request to the Information Security Office.