-
Notifications
You must be signed in to change notification settings - Fork 82
Get FalconDetection
bk-cs edited this page Apr 28, 2023
·
23 revisions
Search for detections
Requires 'Detections: Read'.
| Name | Type | Description | Min | Max | Allowed | Pipeline | PipelineByName |
|---|---|---|---|---|---|---|---|
| Id | String[] | Detection identifier | X | X | |||
| Filter | String |
Falcon Query Language expression to limit resultsbehaviors.parent_details.parent_md5behaviors.parent_details.parent_process_graph_idbehaviors.parent_details.parent_cmdlinebehaviors.parent_details.parent_sha256behaviors.parent_details.parent_process_idbehaviors.confidencebehaviors.severitybehaviors.triggering_process_idbehaviors.filenamebehaviors.sha256behaviors.user_namebehaviors.user_idbehaviors.behavior_idbehaviors.timestampbehaviors.allebehaviors.objectivebehaviors.tacticbehaviors.techniquebehaviors.pattern_dispositionbehaviors.cmdlinebehaviors.triggering_process_graph_idbehaviors.ioc_typebehaviors.ioc_sourcebehaviors.ioc_valuebehaviors.device_iddevice.first_seendevice.last_seendevice.modified_timestampdevice.site_namedevice.config_id_platformdevice.system_manufacturerdevice.bios_manufacturerdevice.platform_namedevice.hostnamedevice.config_id_builddevice.os_versiondevice.bios_versiondevice.agent_load_flagsdevice.release_groupdevice.statusdevice.product_type_descdevice.machine_domaindevice.agent_local_timedevice.device_iddevice.system_product_namedevice.product_typedevice.ciddevice.external_ipdevice.major_versiondevice.minor_versiondevice.platform_iddevice.config_id_basedevice.oudevice.agent_versiondevice.local_ipdevice.mac_addressdevice.cpu_signaturedevice.reduced_functionality_modedevice.serial_numberhostinfo.domainhostinfo.active_directory_dn_displayquarantined_files.pathsquarantined_files.statequarantined_files.sha256quarantined_files.idqdate_updatedassigned_to_namemax_confidencedetection_idmax_severitymax_severity_displaynameseconds_to_triagedseconds_to_resolvedstatusadversary_idscidfirst_behaviorlast_behavior
|
|||||
| Query | String | Perform a generic substring search across available fields | |||||
| Sort | String | Property and direction to sort results |
adversary_id.ascadversary_id.descdevices.hostname.ascdevices.hostname.descfirst_behavior.ascfirst_behavior.desclast_behavior.asclast_behavior.descmax_confidence.ascmax_confidence.descmax_severity.ascmax_severity.desc
|
||||
| Limit | Int32 | Maximum number of results per request | 1 |
5000 |
|||
| Offset | Int32 | Position to begin retrieving results | |||||
| Detailed | Switch | Retrieve detailed information | |||||
| All | Switch | Repeat requests until all available results are retrieved | |||||
| Total | Switch | Display total result count instead of results |
Get-FalconDetection [[-Filter] <String>] [[-Query] <String>] [[-Sort] <String>] [[-Limit] <Int32>] [-Offset <Int32>] [-Detailed] [-All] [-Total] [-WhatIf] [-Confirm] [<CommonParameters>]Get-FalconDetection -Id <String[]> [-WhatIf] [-Confirm] [<CommonParameters>]GET /detects/queries/detects/v1
POST /detects/entities/summaries/GET/v1
QueryDetects
GetDetectSummaries
Get-FalconDetection -Filter "status:'new'+first_behavior:>'2020-01-01'" -Sort first_behavior.desc [-Detailed] [-All]Get-FalconDetection -Filter "assigned_to_uid:null" [-All]2023-04-25: PSFalcon v2.2.5

- Using PSFalcon
-
Commands by Permission
- Actors (Falcon Intelligence)
- Alerts
- API integrations
- App Logs
- Assets
- CAO Hunting
- Case Templates
- Cases
- Channel File Control Settings
- Cloud Security API Assets
- Configuration Assessment
- Content Update Policies
- Correlation Rules
- CSPM registration
- Custom IOA rules
- Device Content
- Device control policies
- Event streams
- Falcon Complete Dashboards
- Falcon Container Image
- Falcon Data Replicator
- Falcon FileVantage
- Falcon FileVantage Content
- Firewall management
- Flight Control
- Host groups
- Host Migration
- Hosts
- Identity Protection Entities
- Identity Protection GraphQL
- Identity Protection Policy Rules
- Incidents
- Indicators (Falcon Intelligence)
- Installation tokens
- Installation token settings
- IOA Exclusions
- IOC Manager APIs
- IOCs
- IT Automation - Policies
- IT Automation - Task Executions
- IT Automation - Tasks
- IT Automation - User Groups
- Kubernetes Protection
- Machine Learning exclusions
- MalQuery
- Malware Families (Falcon Intelligence)
- Message Center
- Mobile Enrollment
- Monitoring rules (Falcon Intelligence Recon)
- NGSIEM
- NGSIEM Dashboards
- NGSIEM Lookup Files
- NGSIEM Parsers
- NGSIEM Saved Queries
- On demand scans (ODS)
- OverWatch Dashboard
- Prevention Policies
- Quarantined Files
- QuickScan Pro
- Real time response
- Real time response (admin)
- Reports (Falcon Intelligence)
- Response policies
- Rules (Falcon Intelligence)
- Sample uploads
- Sandbox (Falcon Intelligence)
- Scheduled Reports
- Sensor Download
- Sensor update policies
- Sensor Usage
- Sensor Visibility Exclusions
- Snapshot
- Snapshot Scanner Image Download
- Tailored Intelligence
- Threatgraph
- User management
- Vulnerabilities
- Vulnerabilities (Falcon Intelligence)
- Workflow
- Zero Trust Assessment
- Other Commands
- Examples
-
CrowdStrike SDKs
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust