How much will it cost for your team to take over management, response and remediation? You’re not only switching technology, you’re losing 24/7 service. Answer from seismic1981 on reddit.com
🌐
Reddit
reddit.com › r/crowdstrike › switching from crowdstrike falcon complete to microsoft defender?
r/crowdstrike on Reddit: Switching from CrowdStrike Falcon Complete to Microsoft Defender?
September 20, 2024 -

I’m the most senior cybersecurity person in an organization of around 1,200 people. Our leadership is looking to cut costs due to recent financial issues, and they’re considering dropping CrowdStrike Falcon Complete MDR for Microsoft Defender for Endpoint.

CrowdStrike has been great for us, with 24/7 managed detection and response, proactive threat hunting, and fast incident response. I’m worried that switching to Defender, without those managed services, could leave us exposed to more risk.

I’m looking for help with two things:

  1. Feature Differences: What would we lose if we move from Falcon Complete to Defender? How do their EDR capabilities, threat hunting, and response compare?

  2. Risk Concerns: What are the biggest risks if we make this switch? Any real-world examples or data to back up the potential downsides?

I really want to make sure leadership understands what we’re giving up here. Any advice or experiences would be helpful.

Thanks!

Top answer
1 of 26
67
There are many organisations that have gone down this path, and lots of discussions regarding side-by-side comparisons that have been carried out. Your shop is probably too small to run a side-by-side so you’ll have to rely on reporting from those that have. I can tell you that, hands down, CS was the clear winner. The detection rates were far higher, the FP rates far lower, the level of control and configurability is much better with CS. I’m snr in a 10 person SOC looking after 5.5k users and 12k endpoints, nix, win and mac workstations and servers. The FP rate when we had defender was terrible, it was always late (it would alert on something seen x hours ago!) and you had to do the login dance to the portal, navigation hell to get the event details. This slows down response times. It is without doubt the most accurate CMDB we have because we have it on every endpoint. Once you get into the APIs of cs, some real magic can happen. Automated response, triage, containment, RTR on a single or hundreds of hosts (batch-session). Recently used it to restart a hung service on 400 servers after a bad update left the service locked by an orphaned kennel hook, and the only way to recover was a service restart or a server reboot. Initiated a batch rtr session on all 400, execute pkill then systemctl restart command, 2 minutes later job was done. MS don’t care about your tiny 1200 user base, CS does. Their support is excellent. If anything, ditch the E5+ licence cost, invest in upskilling your team and using the full capabilities of what you seat have in CS. I do not work for Crowdstrike, I just believe it is the best of breed and it keeps getting better with new capabilities coming online all the time.
2 of 26
46
How much will it cost for your team to take over management, response and remediation? You’re not only switching technology, you’re losing 24/7 service.
🌐
Reddit
reddit.com › r/crowdstrike › is falcon complete a suitable managed siem/soc replacement?
r/crowdstrike on Reddit: Is Falcon Complete a suitable managed siem/soc replacement?
June 25, 2024 -

Hi,

I know this subreddit might be a bit biased towards this question, but I'll ask anyway.

We need to decide between a managed SIEM/SOC solution and CrowdStrike's MDR, specifically the Falcon Complete solution. Unfortunately, due to budget limitations, we can't afford both.

From my perspective, after testing CrowdStrike for a month mostly the EDR and ITDR solutions and I think its amazing. I haven't tested the Falcon Complete solution yet, but I've heard very good things. However, if we choose the MDR route, we'll lose our managed SIEM/SOC solution entirely, which means we will have to find other solutions for the parts of our infrastructure that CrowdStrike doesn't cover, like network, VMware, NAC, etc.

The deal also includes the NG-SIEM, which I know is based on LogScale. This means I'll be blind to any system that doesn't have LogScale integration.

What's your opinion on this? What would you do?

🌐
Reddit
reddit.com › r/crowdstrike › anyone use cs falcon mdr and use defender?
r/crowdstrike on Reddit: Anyone use CS Falcon MDR and use Defender?
December 30, 2024 -

We currently use falcon and we also have access to Microsoft Defender for endpoint. Does any of you guys use CS plus use defender in detection mode only? Of course having two EDRs in block mode could be a problem.

Top answer
1 of 8
22
So I have both E5 and Falcon. So MDE won't go into active while CrowdStrike is also active, you can try to make it but it will cause you problems. Some features like ASR will not be available in passive mode (Real time protection turned off). We use MDE for vuln mgmt and to store device telemetry to a cheap Azure storage blob. I refuse to pay for the privilege of exporting my logs off the platform. MDE captures a fraction of what CS does (about 30-50%) but stores it for way longer (Sauce: EDR Telemetry project and exporting both Falcon EDR logs and MDE logs to Splunk. MDE is 5 MB/endpoint, CS is like 10-40MB/endpoint however you can allegedly request the MDE limit to be raised per MS support). The MDE telemetry also ties in better with the M365 ecosystem which is a big deal because it makes MDO smarter as well as MDI/Sentinel. We prefer Falcon over MDE due to CS's better threat intel and lower CPU and memory usage. When you have MDE full blast with all ASR rules on, Web traffic inspection, all recommended settings it's not uncommon for MDE to use between 16-25% CPU. MS recommends you let it spike up to 50% CPU but our execs complained. We ended up having to issue larger laptops in a previous life due to how many resources MDE chews up compared to CS.
2 of 8
4
idk why people are putting these comments in without actually doing it lmao. we have E5s and we run MDE/CS parallel with one another and have not seen performance issues with one another. MDE actually ends up catching more stuff than crowdstrike does due to the zeek inline packet sniffing. read this page for some cool detections. https://isc.sans.edu/diary/30088
🌐
Reddit
reddit.com › r/ciso › effectively communicating risk of switching from crowdstrike mdr to microsoft defender?
r/ciso on Reddit: Effectively Communicating Risk of Switching from CrowdStrike MDR to Microsoft Defender?
March 21, 2024 -

I’m currently the most senior cybersecurity professional in an organization of 1,200 employees. Due to a recent financial downturn, executive leadership is considering cutting costs by replacing CrowdStrike Falcon Complete MDR with Microsoft Defender. CrowdStrike has been an effective solution for us, providing robust threat detection and 24/7 managed response, and I believe switching to Defender would increase our risk.

If leadership is willing to accept that additional risk for cost savings, I understand their position, but I want to ensure they are fully aware of what we’re giving up.

My question is: How can I best communicate the specific features and protections we’ll be losing, and quantify the additional risk this change would bring to the organization?

Find elsewhere
🌐
Reddit
reddit.com › r/crowdstrike › crowdstrike mxdr vs local soc service providers - which socaas should we choose?
r/crowdstrike on Reddit: CrowdStrike MXDR vs Local SOC Service Providers - Which SOCaaS Should We Choose?
July 14, 2024 -

Hello Everyone

We currently use CrowdStrike as our Managed XDR solution but do not have an SIEM in place for log aggregation from various third-party sources. CrowdStrike is now offering SOC as a Service (SOCaaS), and we're trying to decide between using their service or opting for another SOC service provider.

Can anyone provide a technical explanation of the benefits of choosing CrowdStrike's SOCaaS over SOC service providers?

Any input or experiences you can share would be greatly appreciated!

Thanks in advance!

Top answer
1 of 6
6
We currently use Falcon Complete and Expel. The reason is CrowdStrike goes way further in the remediation side than any SOC/MDR we evaluated. However we have certain regulatory requirments that require us to have a full SOC. In the real world red teaming - CrowdStrike Complete is leaps and bounds ahead in the response side and disrupting attacks. The SOC on the other hand does basic blocks and most of the time uses CrowdStrike to trigger alerts on the SOC side. I prefere getting the Complete notifications because they have usually stopped the problem and remediated the issue instead of just a notification.
2 of 6
5
Hey u/DENY_ANYANY - I think there definitely some confusion in the industry between what qualifies as a MDR (for XDR) and a full on SOC-aaS vendor based on the expectations of the person you're asking. CrowdStrike is entirely focused on detections generated by the Falcon platform with NG SIEM extending response actions via third party tools. This excludes alerting activities I'd commonly expect from a SOC such as 24*7 network (FW, VPN, R/S, CASB, etc) monitoring, IT/Line of Business App abnormality, or non-log based infrastructure monitoring. CrowdStrike may be equipped, however the operating model for our MDR service defines exactly what our analysts will and will not do. Many SOCaaS partners OEM the Falcon platform or sensor related data in order to achieve their objectives. We highly recommend discussing this first with your preferred SOCaaS vendor and seeing what endpoint/cloud/log solution platform they prefer.
🌐
Reddit
reddit.com › r/cybersecurity › crowdstrike complete or microsoft defender
r/cybersecurity on Reddit: Crowdstrike complete or Microsoft Defender
October 24, 2025 -

Looking for a opinions from people that have used both products, we are currently using CrowdStrike Complete and we like the product and the 24 X 7 SOC has been outstanding, we are being pushed to migrate to Defender and I would like to hear some opinions if you have used both products.

Why would you move to Defender, or why you would not move to Defender.

Thank you in advanced!

🌐
Reddit
reddit.com › r/crowdstrike › cs mdr and ir
r/crowdstrike on Reddit: CS MDR and IR
May 29, 2021 -

My Org has a number of Crowdstrike EP solutions that a small remote internal team manages while the management/policy of core FW, Office are outsourced to 3rd party. We are looking at Expel MDR and CS MDR and Services. Current CS limitation is that they're endpoint only - do they partner with other providers for non-EP solutions? IN terms of services looking at Mandiant retainer, does CS offer Business Email Compromise investigation?

🌐
Reddit
reddit.com › r/sysadmin › managed detection and response (mdr) crowdstrike vs sentinelone
r/sysadmin on Reddit: Managed Detection and Response (MDR) Crowdstrike vs SentinelOne
July 24, 2024 -

Long time lurker looking for your input on the managed offering from both Crowdstrike and Sentinelone. I know there are lots of opinions on these two vendors in the MSP community and a few older threads here in sysadmin, but thought I'd ask again.

We have pricing for both S1 and CS fully managed offerings in their government clouds and due to CS destroying the internet we have significantly cheaper pricing for CS vs S1 with rate locks so we don't have to worry about renewals in the future.

So, my question to my fellow sysadmins is if price wasn't an issue, which product is better in your eyes?

What were the pros/cons for each vendor?

I've done demos and hands on POV/POC in both platforms, but I want to know what people think about the tools when they are at scale in production.

Thanks!

Edit: I wanted to say we currently have Defender (E5) but we are looking at CS or S1 for the 24x7 managed SOC since our team is stretched thin.

🌐
Reddit
reddit.com › r/cybersecurity › how are you actually using mdrs in your org? are they worth it beyond edr alert triage?
r/cybersecurity on Reddit: How are you actually using MDRs in your org? Are they worth it beyond EDR alert triage?
March 16, 2025 -

Curious how folks are really using MDR providers day-to-day.

  • Do you trust them to handle detection/response in cloud and SaaS apps (like Okta, M365, AWS, etc), or is it mostly just endpoint/network stuff? Why or why not?

  • Can they actually respond to incidents on your behalf, or do they just escalate to your internal IR team?

  • How deep do they go on investigations? Can they reach out to employees directly (e.g., Slack messages to verify behavior) or are they limited to log review?

  • And how do you evaluate whether your MDR is doing a good job? What are the red/yellow/green flags?

🌐
Reddit
reddit.com › r/cybersecurity › mdr solutions
r/cybersecurity on Reddit: MDR Solutions
November 17, 2023 -

Hello, my company is currently looking for a new MDR vendor. We are looking at Crowdstrike and Arctic Wolf. The big difference I see between these two companies is that Crowdstrike uses host-based IDS/IPS, and Arctic Wolf uses network-based.

Arctic Wolf keeps making it sound like Crowdstrike would not be sufficient in keeping our network secure due to their solution being host-based. We currently have Next Generation Firewalls that have the IDS/IPS solutions built in, so would we need the physical devices that Arctic Wolf provides, or would Crowdstrikes host-based solution be sufficient?

Any input on experiences with these vendors would be greatly appreciated!