Unlock hundreds more features
Save your Form to the Dashboard
View and Export Results
Use AI to Create Forms and Analyse Results

Sign UpLogin With Facebook
Sign UpLogin With Google

CrowdStrike Cyber Attack Report Form Template

Streamline Your Cyber Incident Response with This Template

Experiencing a cyber attack can be overwhelming, and documenting the incident is crucial. This CrowdStrike Cyber Attack Report Form Template helps you effectively record and communicate important details about each attack, ensuring a thorough response. You'll benefit from streamlined documentation, clear impact analysis, enhanced team collaboration, improved compliance with reporting standards, and a structured approach to resolving incidents, all while meeting WCAG-aligned accessibility standards. Explore the live template to get started.

Your full name
Organization name
Business email
Phone number
Incident title or short description
Date first observed
Is the incident ongoing?
Yes
No
Primary suspected attack type
Types of assets affected
Estimated number of affected endpoints or accounts
Operating systems impacted
Windows
macOS
Linux
iOS or iPadOS
Android
Other or Unknown
Most likely initial access vector
Phishing email
Malicious link or website
Remote access compromise (e.g., VPN/RDP)
Supply chain or third-party
Exploited vulnerability
Insider action
Removable media
Unknown
Observed indicators of compromise (file names, hashes, domains, IPs, processes)
Is MFA enabled on affected accounts?
Yes on all
Yes on some
No
Unknown
Evidence of data access or exfiltration
No evidence
Suspected
Confirmed
Unknown
Data types potentially affected
Operational impact experienced
None
Minor performance issues
Partial outage
Major outage
Complete shutdown
Current incident priority
Critical
High
Medium
Low
Unknown
Actions taken so far
Please Specify:
Are affected systems isolated from the network?
All isolated
Some isolated
None isolated
In progress
Unknown
Backup availability and status
Available and tested
Available but untested
Not available
Unknown
Are regulatory notifications anticipated?
Yes
No
Unknown
Preferred response window
ASAP (critical)
Within 4 hours
Same business day
Next business day
Flexible
Authorized signatory name
Signature date
I am authorized to submit this report on behalf of the organization
Yes
No
{"name":"Your full name", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Your full name, Organization name, Business email","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Paper art illustration depicting a cyber attack report form for CrowdStrike and FormCreatorAI.

When to use this form

Use this form the moment you see a high-fidelity Falcon alert, unusual lateral movement, or a ransomware note on an endpoint. It helps your SOC, IT admins, and managers capture facts fast, triage risk, and kick off response without chasing emails. Submit one report per impacted asset to prevent gaps and speed containment. If it turns out to be a routine outage or misconfiguration, route it instead through the IT Incident report form. After submission, track follow-ups and ownership with the Incident report tracking form so nothing slips. If the attack involves theft, fraud, or threats, document the criminal aspect separately for law enforcement using a Police incident report form.

Must Ask CrowdStrike Cyber Attack Report Questions

  1. Which endpoint or account is affected (hostname, IP, user, and location)?

    Clear asset and user details let you scope the blast radius and contact the right owner fast. This speeds isolation and reduces the risk of lateral movement.

  2. What did CrowdStrike detect (alert name, detection ID, technique, and timestamp)?

    Precise alert data helps you validate severity and map to known tactics, techniques, and procedures. It also enables quick pivoting in your console and SIEM.

  3. What is the current business impact (systems down, data at risk, users affected)?

    Impact signals priority, escalation path, and stakeholders to notify. It guides decisions like executive comms, customer notices, and recovery steps.

  4. What immediate actions have you taken (isolation, kill process, quarantine, password reset)?

    Listing actions prevents duplicate work and shows what still needs doing. It also creates a clean audit trail for post-incident review.

  5. What evidence can you provide (screenshots, logs, hashes, file paths, ticket links)?

    Evidence accelerates triage, containment, and root-cause analysis. If you need to involve law enforcement, prepare a companion record using the Police incident report form.

More Forms

Copy/Edit Form Send to Recipients Make a Form w/AI Form Builder Must Ask Questions
  • 100% Free - No Catches
  • Collect Responses Today
  • Tailor to your Look & Feel