Steps to Whitelist Ultraviewer in CrowdStrike
From Notes_Wiki
Home > CrowdStrike > Steps to Whitelist Ultraviewer in CrowdStrike
Identify the UltraViewer Detection
- Go to Endpoint Security → Endpoint detections.
- Select the alert generated for UltraViewer and open the details view.
- Note the file path shown in the alert:
\Device\HarddiskVolume3\Program Files (x86)\UltraViewer\UltraViewer_Desktop.exe
- Copy the hash value shown on the same page:
****e3c02f083b**********************245033105******
Create File Path Exclusion
- Go to Endpoint Security → Configure → Exclusions.
- Under Machine learning (file path) exclusions, click Create exclusion.
- Select the Host Group where the affected system is added and click Next.
- Enable the following options:
- Detections and Prevents
- Uploads to CrowdStrike
- Under Exclusion pattern, paste the copied file path:
\Device\HarddiskVolume3\Program Files (x86)\UltraViewer\UltraViewer_Desktop.exe
- Click Create Exclusion.
- Note:
- If All hosts is selected, the exclusion may not be applied for unknown reasons.
- Always select the specific Host Group to ensure the exclusion is successfully created.
Create Hash Allow Rule (IOC Management)
- Go to Endpoint Security → Configure → IOC Management.
- Click Add hash.
- If the option is not visible:
- Click the three vertical dots (⋮) on the top-right corner.
- Select Add hashes.
- A new pop-up window will open.
- Click + Manually add hashes.
- Paste the copied hash value:
****e3c02f083b**********************245033105******
- Provide a description.
- Select the appropriate Host Group.
- Select Platform: Windows.
- Select Action: Allow, do not detect.
- Click Add hashes.
Steps to Create IOA Exclusion
- Go to Endpoint Security → Endpoint detections.
- Select the alert generated for UltraViewer and open the details view.
- In the detection details, verify the following:
Command Line
"C:\Program Files (x86)\UltraViewer\UltraViewer_Desktop.exe"
File Path
\Device\HarddiskVolume3\Program Files (x86)\UltraViewer\UltraViewer_Desktop.exe
- On the top-right corner of the detection page, click Action.
- Click on Create IOA exclusion.
- Select the appropriate Host Group where the host is present.
- Provide a Name for the exclusion.
- Complete the creation process.
Handling Repeated Detections (Command Line Variations)
- Some detections may still be triggered even after adding all exclusions.
- This usually happens when the Command line path or PID differs.
- While creating the IOA exclusion, edit the Command line field as shown below to cover all variations:
.*\\Program\s+Files\s+\(x86\)\\UltraViewer\\UltraViewer_Desktop.*
- This regex ensures all detections related to the UltraViewer executable are excluded.
Example of PID variations observed:
C:\Windows\system32\application.exe -u -p 13176 -s 268 C:\Windows\system32\application.exe -u -p 3936 -s 260 C:\Windows\system32\application.exe -u -p 17040 -s 268
- In the above examples, the -p value (Process ID) changes dynamically.
- Because PID changes for every execution, detections may reappear.
Verification
- Ensure the ML file path exclusion, IOC hash rule, and IOA exclusion are applied to the correct Host Group.
- Re-launch UltraViewer and confirm that no new detections are generated.