Skip to main content

CrowdStrike Falcon

This Integration is part of the CrowdStrike Falcon Pack.#

The CrowdStrike Falcon OAuth 2 API integration (formerly Falcon Firehose API), enables fetching and resolving detections, searching devices, getting behaviors by ID, containing hosts, and lifting host containment.

Configure CrowdStrike Falcon on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for CrowdStrike Falcon.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Server URL (e.g., https://api.crowdstrike.com)True
    Client IDTrue
    SecretTrue
    Source ReliabilityReliability of the source providing the intelligence data. Currently used for “CVE” reputation command.False
    First fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days)False
    Max incidents per fetchFalse
    Endpoint Detections fetch queryFalse
    Endpoint Incidents fetch queryFalse
    IDP Detections fetch queryFalse
    IOM fetch queryUse the Falcon Query Language. For more information, refer to the integration docs.False
    IOA fetch queryIn the format: cloud_provider=aws&aws_account_id=1234. The query must have the argument 'cloud_provider' configured. For more information, refer to the integration docs.False
    Fetch incidentsFalse
    Incident typeFalse
    Mirroring DirectionChoose the direction to mirror the detection: Incoming (from CrowdStrike Falcon to Cortex XSOAR), Outgoing (from Cortex XSOAR to CrowdStrike Falcon), or Incoming and Outgoing (to/from CrowdStrike Falcon and Cortex XSOAR).False
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
    Close Mirrored XSOAR IncidentWhen selected, closes the CrowdStrike Falcon incident or detection, which is mirrored in the Cortex XSOAR incident.False
    Close Mirrored CrowdStrike Falcon Incident or DetectionWhen selected, closes the Cortex XSOAR incident, which is mirrored in the CrowdStrike Falcon incident or detection, according to the types that were chosen to be fetched and mirrored.False
    Fetch typesChoose what to fetch - incidents, detections, IDP detections. You can choose any combination.False
    Incidents Fetch IntervalFalse
    Advanced: Time in minutes to look back when fetching incidents and detectionsUse this parameter to determine how long backward to look in the search for incidents that were created before the last run time and did not match the query when they were created.False
  1. Click Test to validate the URLs, token, and connection.

Required API client scope#

In order to use the CrowdStrike Falcon integration, your API client must be provisioned with the following scope and permissions:

  • Real Time Response - Read and Write
  • Alerts - Read and Write
  • IOC Manager - Read and Write
  • IOCs - Read and Write
  • IOA Exclusions - Read and Write
  • Machine Learning Exclusions - Read and Write
  • Detections - Read and Write
  • Hosts - Read and Write
  • Host Groups - Read and Write
  • Incidents - Read and Write
  • Spotlight Vulnerabilities - Read
  • User Management - Read
  • On-Demand Scans (ODS) - Read and Write
  • Identity Protection Entities - Read and Write
  • Identity Protection Detections - Read and Write
  • Identity Protection Timeline - Read
  • Identity Protection Assessment - Read

Incident Mirroring#

You can enable incident mirroring between Cortex XSOAR incidents and CrowdStrike Falcon incidents or detections (available from Cortex XSOAR version 6.0.0).

To setup the mirroring follow these instructions:

  1. Navigate to Settings > Integrations > Servers & Services.
  2. Search for CrowdStrike Falcon and select your integration instance.
  3. Enable Fetches incidents.
  4. In the Fetch types integration parameter, select what to mirror - incidents or detections or both.
  5. Optional: You can go to the Incidents fetch query or Detections fetch query parameter and select the query to fetch the incidents or detections from CrowdStrike Falcon.
  6. In the Mirroring Direction integration parameter, select in which direction the incidents should be mirrored:
    • Incoming - Any changes in CrowdStrike Falcon incidents (state, status, tactics, techniques, objectives, tags, hosts.hostname) or detections (status, severity, behaviors.tactic, behaviors.scenario, behaviors.objective, behaviors.technique, device.hostname) will be reflected in XSOAR incidents.
    • Outgoing - Any changes in XSOAR incidents will be reflected in CrowdStrike Falcon incidents (tags, status) or detections (status).
    • Incoming And Outgoing - Changes in XSOAR incidents and CrowdStrike Falcon incidents or detections will be reflected in both directions.
    • None - Turns off incident mirroring.
  7. Optional: Check the Close Mirrored XSOAR Incident integration parameter to close the Cortex XSOAR incident when the corresponding incident or detection is closed in CrowdStrike Falcon.
  8. Optional: Check the Close Mirrored CrowdStrike Falcon Incident or Detection integration parameter to close the CrowdStrike Falcon incident or detection when the corresponding Cortex XSOAR incident is closed.

Newly fetched incidents or detections will be mirrored in the chosen direction. However, this selection does not affect existing incidents.

Important Notes

  • To ensure the mirroring works as expected, mappers are required, both for incoming and outgoing, to map the expected fields in Cortex XSOAR and CrowdStrike Falcon.
  • When mirroring in incidents from CrowdStrike Falcon to Cortex XSOAR:
    • For the tags field, tags can only be added from the remote system.
    • When enabling the Close Mirrored XSOAR Incident integration parameter, the field in CrowdStrike Falcon that determines whether the incident was closed is the status field.
    • In case the look-back parameter is initialized with a certain value and during a time that incidents were fetched, if changing the lookback to a number that is greater than the previous value, then in the initial incident fetching there will be incidents duplications. If the integration was already set with lookback > 0, and the lookback is not being increased at any point of time, then those incident duplications would not occur.

Fetch Incidents#

IOM Incidents#

The FQL filter expression is used to configure the IOM fetch query. Available filter:

  • use_current_scan_ids (use this to get records for latest scans)
  • account_name
  • account_id
  • agent_id
  • attack_types
  • azure_subscription_id
  • cloud_provider
  • cloud_service_keyword
  • custom_policy_id
  • is_managed
  • policy_id
  • policy_type
  • resource_id
  • region
  • status
  • severity
  • severity_string

Exmample: cloud_provider: 'aws'+account_id: 'my_id'

IOA Incidents#

The IOA fetch query uses the following format: param1=val1&param2=val2 Multiple values for the same parameter is not supported. Available parameters:

  • cloud_provider (required in every query)
  • account_id
  • aws_account_id
  • azure_subscription_id
  • azure_tenant_id
  • severity
  • region
  • service
  • state

Exmample: cloud_provider=aws&region=eu-west-2 More information about the parameters can be found here.

1. Search for a device#


Searches for a device that matches the query.

Base Command#

cs-falcon-search-device

Input#

Argument NameDescriptionRequired
extended_dataWhether or not to get additional data about the device. Possible values are: Yes, No.Optional
filterThe query to filter the device.Optional
idsA comma-separated list of device IDs to limit the results.Optional
statusThe status of the device. Possible values are: "Normal", "containment_pending", "contained", and "lift_containment_pending". Possible values are: normal, containment_pending, contained, lift_containment_pending.Optional
hostnameThe host name of the device. Possible values are: .Optional
platform_nameThe platform name of the device. Possible values are: Windows, Mac, and Linux. Possible values are: Windows, Mac, Linux.Optional
site_nameThe site name of the device.Optional
limitThe maximum number of records to return. Default is 50.Optional
offsetThe offset to begin the list from. For example, start from the 10th record and return the list. Default is 0.Optional
sortThe property to sort by (e.g. status.desc or hostname.asc).Optional

Context Output#

PathTypeDescription
CrowdStrike.Device.IDStringThe ID of the device.
CrowdStrike.Device.LocalIPStringThe local IP address of the device.
CrowdStrike.Device.ExternalIPStringThe external IP address of the device.
CrowdStrike.Device.HostnameStringThe host name of the device.
CrowdStrike.Device.OSStringThe operating system of the device.
CrowdStrike.Device.MacAddressStringThe MAC address of the device.
CrowdStrike.Device.FirstSeenStringThe first time the device was seen.
CrowdStrike.Device.LastSeenStringThe last time the device was seen.
CrowdStrike.Device.PolicyTypeStringThe policy type of the device.
CrowdStrike.Device.StatusStringThe device status.
Endpoint.HostnameStringThe endpoint hostname.
Endpoint.OSStringThe endpoint operation system.
Endpoint.IPAddressStringThe endpoint IP address.
Endpoint.IDStringThe endpoint ID.
Endpoint.StatusStringThe endpoint status.
Endpoint.IsIsolatedStringThe endpoint isolation status.
Endpoint.MACAddressStringThe endpoint MAC address.
Endpoint.VendorStringThe integration name of the endpoint vendor.
Endpoint.OSVersionStringThe endpoint operation system version.

Command Example#

!cs-falcon-search-device ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1,a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
"CrowdStrike.Device(val.ID === obj.ID)": [
{
"ExternalIP": "94.188.164.68",
"MacAddress": "8c-85-90-3d-ed-3e",
"Hostname": "154.132.82-test-co.in-addr.arpa",
"LocalIP": "192.168.1.76",
"LastSeen": "2019-03-28T02:36:41Z",
"OS": "Mojave (10.14)",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"FirstSeen": "2017-12-28T22:38:11Z",
"Status": "contained"
},
{
"ExternalIP": "94.188.164.68",
"MacAddress": "f0-18-98-74-8c-31",
"Hostname": "154.132.82-test-co.in-addr.arpa",
"LocalIP": "172.22.14.237",
"LastSeen": "2019-03-17T10:03:17Z",
"OS": "Mojave (10.14)",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"FirstSeen": "2017-12-10T11:01:20Z",
"Status": "contained"
}
],
"Endpoint(val.ID === obj.ID)": [
{
"Hostname": "154.132.82-test-co.in-addr.arpa",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"IPAddress": "192.168.1.76",
"OS": "Mojave (10.14)",
"Status": "Online",
"￿Vendor": "CrowdStrike Falcon",
"￿MACAddress": "1-1-1-1"
},
{
"Hostname": "154.132.82-test-co.in-addr.arpa",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"IPAddress": "172.22.14.237",
"OS": "Mojave (10.14)",
"Status": "Online",
"￿Vendor": "CrowdStrike Falcon",
"￿MACAddress": "1-1-1-1"
}
]
}

Human Readable Output#

Devices#

IDHostnameOSMac AddressLocal IPExternal IPFirst SeenLast SeenStatus
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1154.132.82-test-co.in-addr.arpaMojave (10.14)8c-85-90-3d-ed-3e192.168.1.7694.188.164.682017-12-28T22:38:11Z2019-03-28T02:36:41Zcontained
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1154.132.82-test-co.in-addr.arpaMojave (10.14)f0-18-98-74-8c-31172.22.14.23794.188.164.682017-12-10T11:01:20Z2019-03-17T10:03:17Zcontained

2. Get a behavior#


Searches for and fetches the behavior that matches the query.

Base Command#

cs-falcon-get-behavior

Input#

Argument NameDescriptionRequired
behavior_idThe ID of the behavior.Required

Context Output#

PathTypeDescription
CrowdStrike.Behavior.FileNameStringThe file name of the behavior.
CrowdStrike.Behavior.ScenarioStringThe scenario name of the behavior.
CrowdStrike.Behavior.MD5StringThe MD5 hash of the IOC in the behavior.
CrowdStrike.Behavior.SHA256StringThe SHA256 hash of the IOC in the behavior.
CrowdStrike.Behavior.IOCTypeStringThe type of the indicator of compromise.
CrowdStrike.Behavior.IOCValueStringThe value of the IOC.
CrowdStrike.Behavior.CommandLineStringThe command line executed in the behavior.
CrowdStrike.Behavior.UserNameStringThe user name related to the behavior.
CrowdStrike.Behavior.SensorIDStringThe sensor ID related to the behavior.
CrowdStrike.Behavior.ParentProcessIDStringThe ID of the parent process.
CrowdStrike.Behavior.ProcessIDStringThe process ID of the behavior.
CrowdStrike.Behavior.IDStringThe ID of the behavior.

Command Example#

!cs-falcon-get-behavior behavior_id=3206

Context Example#

{
"CrowdStrike.Behavior": [
{
"IOCType": "sha256",
"ProcessID": "197949010450449117",
"Scenario": "known_malware",
"CommandLine": "/Library/spokeshave.jn/spokeshave.jn.app/Contents/MacOS/spokeshave.jn",
"UserName": "user@u-MacBook-Pro-2.local",
"FileName": "spokeshave.jn",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "3206",
"IOCValue": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
},
{
"IOCType": "sha256",
"ProcessID": "197949016741905142",
"Scenario": "known_malware",
"ParentProcessID": "197949014644753130",
"CommandLine": "./xSf",
"UserName": "root@u-MacBook-Pro-2.local",
"FileName": "xSf",
"SensorID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "3206",
"IOCValue": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
]
}

Human Readable Output#

Behavior ID: 3206#

IDFile NameCommand LineScenarioIOC TypeIOC ValueUser NameSHA256MD5Process ID
3206spokeshave.jn/Library/spokeshave.jn/spokeshave.jn.app/Contents/MacOS/spokeshave.jnknown_malwaresha256a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1user@u-MacBook-Pro-2.locala1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1197949010450449117
3206xSf./xSfknown_malwaresha256a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1root@u-MacBook-Pro-2.locala1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1197949016741905142

3. Search for detections#


Search for details of specific detections, either using a filter query, or by providing the IDs of the detections.

Base Command#

cs-falcon-search-detection

Input#

Argument NameDescriptionRequired
idsThe IDs of the detections to search. If provided, will override other arguments.Optional
filterFilter detections using a query in Falcon Query Language (FQL).
For example, filter="device.hostname:'CS-SE-TG-W7-01'"
For a full list of valid filter options, see: https://falcon.crowdstrike.com/support/documentation/2/query-api-reference#detectionsearch.
Optional
extended_dataWhether to get additional data such as device and behaviors processed. Possible values are: Yes, No.Optional

Context Output#

PathTypeDescription
CrowdStrike.Detection.Behavior.FileNameStringThe file name of the behavior.
CrowdStrike.Detection.Behavior.ScenarioStringThe scenario name of the behavior.
CrowdStrike.Detection.Behavior.MD5StringThe MD5 hash of the IOC of the behavior.
CrowdStrike.Detection.Behavior.SHA256StringThe SHA256 hash of the IOC of the behavior.
CrowdStrike.Detection.Behavior.IOCTypeStringThe type of the IOC.
CrowdStrike.Detection.Behavior.IOCValueStringThe value of the IOC.
CrowdStrike.Detection.Behavior.CommandLineStringThe command line executed in the behavior.
CrowdStrike.Detection.Behavior.UserNameStringThe user name related to the behavior.
CrowdStrike.Detection.Behavior.SensorIDStringThe sensor ID related to the behavior.
CrowdStrike.Detection.Behavior.ParentProcessIDStringThe ID of the parent process.
CrowdStrike.Detection.Behavior.ProcessIDStringThe process ID of the behavior.
CrowdStrike.Detection.Behavior.IDStringThe ID of the behavior.
CrowdStrike.Detection.SystemStringThe system name of the detection.
CrowdStrike.Detection.CustomerIDStringThe ID of the customer (CID).
CrowdStrike.Detection.MachineDomainStringThe name of the domain of the detection machine.
CrowdStrike.Detection.IDStringThe detection ID.
CrowdStrike.Detection.ProcessStartTimeDateThe start time of the process that generated the detection.

Command Example#

!cs-falcon-search-detection ids=ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1898376850347,ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1092318056279064902

Context Example#

{
"CrowdStrike.Detection(val.ID === obj.ID)": [
{
"Status": "false_positive",
"ProcessStartTime": "2019-03-21T20:32:55.654489974Z",
"Behavior": [
{
"IOCType": "domain",
"ProcessID": "2279170016592",
"Scenario": "intel_detection",
"ParentProcessID": "2257232915544",
"CommandLine": "C:\\Python27\\pythonw.exe -c __import__('idlelib.run').run.main(True) 1250",
"UserName": "josh",
"FileName": "pythonw.exe",
"SensorID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "4900",
"IOCValue": "systemlowcheck.com",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
},
{
"IOCType": "domain",
"ProcessID": "2283087267593",
"Scenario": "intel_detection",
"ParentProcessID": "2279170016592",
"CommandLine": "ping.exe systemlowcheck.com",
"UserName": "josh",
"FileName": "PING.EXE",
"SensorID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "4900",
"IOCValue": "systemlowcheck.com",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
],
"MaxSeverity": 70,
"System": "DESKTOP-S49VMIL",
"ID": "ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1898376850347",
"MachineDomain": "",
"ShowInUi": true,
"CustomerID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
},
{
"Status": "new",
"ProcessStartTime": "2019-02-04T07:05:57.083205971Z",
"Behavior": [
{
"IOCType": "sha256",
"ProcessID": "201917905370426448",
"Scenario": "known_malware",
"ParentProcessID": "201917902773103685",
"CommandLine": "./xSf",
"UserName": "user@u-MacBook-Pro-2.local",
"FileName": "xSf",
"SensorID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "3206",
"IOCValue": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
},
{
"IOCType": "sha256",
"ProcessID": "201917905370426448",
"Scenario": "known_malware",
"ParentProcessID": "201917902773103685",
"CommandLine": "./xSf",
"UserName": "user@u-MacBook-Pro-2.local",
"FileName": "xSf",
"SensorID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "3206",
"IOCValue": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
],
"MaxSeverity": 30,
"System": "u-MacBook-Pro-2.local",
"ID": "ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1092318056279064902",
"MachineDomain": "",
"ShowInUi": true,
"CustomerID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
]
}

Human Readable Output#

Detections Found:#

IDStatusSystemProcess Start TimeCustomer IDMax Severity
ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1898376850347false_positiveDESKTOP-S49VMIL2019-03-21T20:32:55.654489974Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a170
ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1092318056279064902newu-MacBook-Pro-2.local2019-02-04T07:05:57.083205971Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a130

4. Resolve a detection#


Resolves and updates a detection using the provided arguments. At least one optional argument must be passed, otherwise no change will take place. Note: IDP detections are not supported.

Base Command#

cs-falcon-resolve-detection

Input#

Argument NameDescriptionRequired
idsA comma-separated list of one or more IDs to resolve.Required
statusThe status to transition a detection to. Possible values are: new, in_progress, true_positive, false_positive, closed, reopened, ignored.Optional
assigned_to_uuidA user ID, for example: 1234567891234567891. username and assigned_to_uuid are mutually exclusive.Optional
commentOptional comment to add to the detection. Comments are displayed with the detection in CrowdStrike Falcon and provide context or notes for other Falcon users.Optional
show_in_uiIf true, displays the detection in the UI. Possible values are: true, false.Optional
usernameUsername to assign the detections to. (This is usually the user’s email address, but may vary based on your configuration). username and assigned_to_uuid are mutually exclusive.Optional

Context Output#

There is no context output for this command.

5. Contain a host#


Contains containment for a specified host. When contained, a host can only communicate with the CrowdStrike cloud and any IPs specified in your containment policy.

Base Command#

cs-falcon-contain-host

Input#

Argument NameDescriptionRequired
idsThe host agent ID (AID) of the host to contain. Get an agent ID from a detection.Required

Context Output#

There is no context output for this command.

6. Lift the containment for a host#


Lifts containment on the host, which returns its network communications to normal.

Base Command#

cs-falcon-lift-host-containment

Input#

Argument NameDescriptionRequired
idsThe host agent ID (AID) of the host you want to contain. Get an agent ID from a detection. Can also be a comma separated list of IDs.Required

Context Output#

There is no context output for this command.

7. cs-falcon-run-command#


Sends commands to hosts.

Base Command#

cs-falcon-run-command

Input#

Argument NameDescriptionRequired
queue_offlineAny commands run against an offline-queued session will be queued up and executed when the host comes online.Optional
host_idsA comma-separated list of host agent IDs to run commands for. (Can be retrieved by running the 'cs-falcon-search-device' command.).Required
command_typeThe type of command to run.Required
full_commandThe full command to run.Required
scopeThe scope to run the command for. Possible values are: "read", "write", and "admin". (NOTE: In order to run the CrowdStrike RTR put command, it is necessary to pass scope=admin.). Possible values are: read, write, admin. Default is read.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs. Default is 180.Optional
targetThe target to run the command for. Possible values are: "single" and "batch". Possible values are: batch, single. Default is batch.Optional
batch_idA batch ID to execute the command on.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.HostIDStringThe ID of the host the command was running for.
CrowdStrike.Command.SessionIDstringThe session ID of the host.
CrowdStrike.Command.StdoutStringThe standard output of the command.
CrowdStrike.Command.StderrStringThe standard error of the command.
CrowdStrike.Command.BaseCommandStringThe base command.
CrowdStrike.Command.FullCommandStringThe full command.
CrowdStrike.Command.TaskIDstring(For single host) The ID of the command request which has been accepted.
CrowdStrike.Command.Completeboolean(For single host) True if the command completed.
CrowdStrike.Command.NextSequenceIDnumber(For single host) The next sequence ID.
CrowdStrike.Command.BatchIDStringThe Batch ID that the command was executed on.

Command Example#

cs-falcon-run-command host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 command_type=ls full_command="ls C:\\"

Context Example#

{
'CrowdStrike': {
'Command': [{
'HostID': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'Stdout': 'Directory listing for C:\\ -\n\n'
'BatchID': 'batch_id'
'Name Type Size (bytes) Size (MB) '
'Last Modified (UTC-5) Created (UTC-5) \n---- '
' ---- ------------ --------- --------------------- -------'
'-------- \n$Recycle.Bin <Directory> -- '
' -- 11/27/2018 10:54:44 AM 9/15/2017 3:33:40 AM \nITAYDI '
' <Directory> -- -- 11/19/2018 1:'
'31:42 PM 11/19/2018 1:31:42 PM ',
'Stderr': '',
'BaseCommand': 'ls',
'Command': 'ls C:\\'
}]
}

Human Readable Output#

Command ls C:\ results#

BaseCommandCommandHostIDStderrStdoutBatchID
lsls C:\ a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1Directory listing for C:\ -

Name Type Size (bytes) Size (MB) Last Modified (UTC-5) Created (UTC-5)
---- ---- ------------ --------- --------------------- ---------------
$Recycle.Bin <Directory> -- -- 11/27/2018 10:54:44 AM 9/15/2017 3:33:40 AM
ITAYDI <Directory> -- -- 11/19/2018 1:31:42 PM 11/19/2018 1:31:42 PM
batch_id

8. cs-falcon-upload-script#


Uploads a script to Falcon.

Base Command#

cs-falcon-upload-script

Input#

Argument NameDescriptionRequired
nameThe script name to upload.Required
permission_typeThe permission type for the custom script. Possible values are: "private", which is used only by the user who uploaded it, "group", which is used by all RTR Admins, and "public", which is used by all active-responders and RTR admins. Possible values are: private, group, public. Default is private.Optional
contentThe content of the PowerShell script.Required

Command Example#

!cs-falcon-upload-script name=greatscript content="Write-Output 'Hello, World!'"

Human Readable Output#

The script was uploaded successfully.

9. cs-falcon-upload-file#


Uploads a file to the CrowdStrike cloud. (Can be used for the RTR 'put' command.)

Base Command#

cs-falcon-upload-file

Input#

Argument NameDescriptionRequired
entry_idThe file entry ID to upload.Required

Command Example#

!cs-falcon-upload-file entry_id=4@4

Human Readable Output#

The file was uploaded successfully.

10. cs-falcon-delete-file#


Deletes a file based on the provided ID. Can delete only one file at a time.

Base Command#

cs-falcon-delete-file

Input#

Argument NameDescriptionRequired
file_idThe ID of the file to delete. (The ID of the file can be retrieved by running the 'cs-falcon-list-files' command).Required

Command Example#

!cs-falcon-delete-file file_id=le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Human Readable Output#

File le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 was deleted successfully.

11. cs-falcon-get-file#


Returns files based on the provided IDs. These files are used for the RTR 'put' command.

Base Command#

cs-falcon-get-file

Input#

Argument NameDescriptionRequired
file_idA comma-separated list of file IDs to get. (The list of file IDs can be retrieved by running the 'cs-falcon-list-files' command.).Required

Context Output#

PathTypeDescription
CrowdStrike.File.IDStringThe ID of the file.
CrowdStrike.File.CreatedByStringThe email address of the user who created the file.
CrowdStrike.File.CreatedTimeDateThe date and time the file was created.
CrowdStrike.File.DescriptionStringThe description of the file.
CrowdStrike.File.TypeStringThe type of the file. For example, script.
CrowdStrike.File.ModifiedByStringThe email address of the user who modified the file.
CrowdStrike.File.ModifiedTimeDateThe date and time the file was modified.
CrowdStrike.File.NameStringThe full name of the file.
CrowdStrike.File.PermissionStringThe permission type of the file. Possible values are: "private", which is used only by the user who uploaded it, "group", which is used by all RTR Admins, and "public", which is used by all active-responders and RTR admins.
CrowdStrike.File.SHA256StringThe SHA-256 hash of the file.
File.TypeStringThe file type.
File.NameStringThe full name of the file.
File.SHA256StringThe SHA-256 hash of the file.
File.SizeNumberThe size of the file in bytes.

Command Example#

!cs-falcon-get-file file_id=le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
'CrowdStrike.File(val.ID === obj.ID)': [
{
'CreatedBy': 'spongobob@demisto.com',
'CreatedTime': '2019-10-17T13:41:48.487520845Z',
'Description': 'Demisto',
'ID': 'le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'ModifiedBy': 'spongobob@demisto.com',
'ModifiedTime': '2019-10-17T13:41:48.487521161Z',
'Name': 'Demisto',
'Permission': 'private',
'SHA256': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'Type': 'script'
}
]
}

Human Readable Output#

CrowdStrike Falcon file le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1#

CreatedByCreatedTimeDescriptionIDModifiedByModifiedTimeNamePermissionSHA256Type
spongobob@demisto.com2019-10-17T13:41:48.487520845ZDemistole10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1spongobob@demisto.com2019-10-17T13:41:48.487521161ZDemistoprivatea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1script

12. cs-falcon-list-files#


Returns a list of put-file ID's that are available for the user in the put command.

Base Command#

cs-falcon-list-files

Context Output#

PathTypeDescription
CrowdStrike.File.IDStringThe ID of the file.
CrowdStrike.File.CreatedByStringThe email address of the user who created the file.
CrowdStrike.File.CreatedTimeDateThe date and time the file was created.
CrowdStrike.File.DescriptionStringThe description of the file.
CrowdStrike.File.TypeStringThe type of the file. For example, script.
CrowdStrike.File.ModifiedByStringThe email address of the user who modified the file.
CrowdStrike.File.ModifiedTimeDateThe date and time the file was modified.
CrowdStrike.File.NameStringThe full name of the file.
CrowdStrike.File.PermissionStringThe permission type of the file. Possible values are: "private", which is used only by the user who uploaded it, "group", which is used by all RTR Admins, and "public", which is used by all active-responders and RTR admins.
CrowdStrike.File.SHA256StringThe SHA-256 hash of the file.
File.TypeStringThe file type.
File.NameStringThe full name of the file.
File.SHA256StringThe SHA-256 hash of the file.
File.SizeNumberThe size of the file in bytes.

Command Example#

!cs-falcon-list-files

Context Example#

{
'CrowdStrike.File(val.ID === obj.ID)': [
{
'CreatedBy': 'spongobob@demisto.com',
'CreatedTime': '2019-10-17T13:41:48.487520845Z',
'Description': 'Demisto',
'ID': 'le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'ModifiedBy': 'spongobob@demisto.com',
'ModifiedTime': '2019-10-17T13:41:48.487521161Z',
'Name': 'Demisto',
'Permission': 'private',
'SHA256': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'Type': 'script'
}
]
}

Human Readable Output#

CrowdStrike Falcon files#

CreatedByCreatedTimeDescriptionIDModifiedByModifiedTimeNamePermissionSHA256Type
spongobob@demisto.com2019-10-17T13:41:48.487520845ZDemistole10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1spongobob@demisto.com2019-10-17T13:41:48.487521161ZDemistoprivatea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1script

13. cs-falcon-get-script#


Returns custom scripts based on the provided ID. Used for the RTR 'runscript' command.

Base Command#

cs-falcon-get-script

Input#

Argument NameDescriptionRequired
script_idA comma-separated list of script IDs to return. (The script IDs can be retrieved by running the 'cs-falcon-list-scripts' command.).Required

Context Output#

PathTypeDescription
CrowdStrike.Script.IDStringThe ID of the script.
CrowdStrike.Script.CreatedByStringThe email address of the user who created the script.
CrowdStrike.Script.CreatedTimeDateThe date and time the script was created.
CrowdStrike.Script.DescriptionStringThe description of the script.
CrowdStrike.Script.ModifiedByStringThe email address of the user who modified the script.
CrowdStrike.Script.ModifiedTimeDateThe date and time the script was modified.
CrowdStrike.Script.NameStringThe script name.
CrowdStrike.Script.PermissionStringPermission type of the script. Possible values are: "private", which is used only by the user who uploaded it, "group", which is used by all RTR Admins, and "public", which is used by all active-responders and RTR admins.
CrowdStrike.Script.SHA256StringThe SHA-256 hash of the script file.
CrowdStrike.Script.RunAttemptCountNumberThe number of times the script attempted to run.
CrowdStrike.Script.RunSuccessCountNumberThe number of times the script ran successfully.
CrowdStrike.Script.PlatformStringThe list of operating system platforms on which the script can run. For example, Windows.
CrowdStrike.Script.WriteAccessBooleanWhether the user has write access to the script.

Command Example#

!cs-falcon-get-script file_id=le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
'CrowdStrike.Script(val.ID === obj.ID)': [
{
'CreatedBy': 'spongobob@demisto.com',
'CreatedTime': '2019-10-17T13:41:48.487520845Z',
'Description': 'Demisto',
'ID': 'le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'ModifiedBy': 'spongobob@demisto.com',
'ModifiedTime': '2019-10-17T13:41:48.487521161Z',
'Name': 'Demisto',
'Permission': 'private',
'SHA256': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'RunAttemptCount': 0,
'RunSuccessCount': 0,
'WriteAccess': True
}
]
}

Human Readable Output#

CrowdStrike Falcon script le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1#

CreatedByCreatedTimeDescriptionIDModifiedByModifiedTimeNamePermissionSHA256
spongobob@demisto.com2019-10-17T13:41:48.487520845ZDemistole10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1spongobob@demisto.com2019-10-17T13:41:48.487521161ZDemistoprivatea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

14. cs-falcon-delete-script#


Deletes a custom-script based on the provided ID. Can delete only one script at a time.

Base Command#

cs-falcon-delete-script

Input#

Argument NameDescriptionRequired
script_idThe script ID to delete. (Script IDs can be retrieved by running the 'cs-falcon-list-scripts' command.).Required

Command Example#

!cs-falcon-delete-script script_id=le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Human Readable Output#

Script le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 was deleted successfully.

15. cs-falcon-list-scripts#


Returns a list of custom script IDs that are available for the user in the 'runscript' command.

Base Command#

cs-falcon-list-scripts

Context Output#

PathTypeDescription
CrowdStrike.Script.IDStringThe ID of the script.
CrowdStrike.Script.CreatedByStringThe email address of the user who created the script.
CrowdStrike.Script.CreatedTimeDateThe date and time the script was created.
CrowdStrike.Script.DescriptionStringThe description of the script.
CrowdStrike.Script.ModifiedByStringThe email address of the user who modified the script.
CrowdStrike.Script.ModifiedTimeDateThe date and time the script was modified.
CrowdStrike.Script.NameStringThe script name.
CrowdStrike.Script.PermissionStringPermission type of the script. Possible values are: "private", which is used only by the user who uploaded it, "group", which is used by all RTR Admins, and "public", which is used by all active-responders and RTR admins.
CrowdStrike.Script.SHA256StringThe SHA-256 hash of the script file.
CrowdStrike.Script.RunAttemptCountNumberThe number of times the script attempted to run.
CrowdStrike.Script.RunSuccessCountNumberThe number of times the script ran successfully.
CrowdStrike.Script.PlatformStringThe list of operating system platforms on which the script can run. For example, Windows.
CrowdStrike.Script.WriteAccessBooleanWhether the user has write access to the script.

Command Example#

!cs-falcon-list-scripts

Context Example#

{
'CrowdStrike.Script(val.ID === obj.ID)': [
{
'CreatedBy': 'spongobob@demisto.com',
'CreatedTime': '2019-10-17T13:41:48.487520845Z',
'Description': 'Demisto',
'ID': 'le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'ModifiedBy': 'spongobob@demisto.com',
'ModifiedTime': '2019-10-17T13:41:48.487521161Z',
'Name': 'Demisto',
'Permission': 'private',
'SHA256': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'RunAttemptCount': 0,
'RunSuccessCount': 0,
'WriteAccess': True
}
]
}

Human Readable Output#

CrowdStrike Falcon scripts#

CreatedByCreatedTimeDescriptionIDModifiedByModifiedTimeNamePermissionSHA256
spongobob@demisto.com2019-10-17T13:41:48.487520845ZDemistole10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1spongobob@demisto.com2019-10-17T13:41:48.487521161ZDemistoprivatea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

16. cs-falcon-run-script#


Runs a script on the agent host.

Base Command#

cs-falcon-run-script

Input#

Argument NameDescriptionRequired
script_nameThe name of the script to run.Optional
host_idsA comma-separated list of host agent IDs to run commands. (The list of host agent IDs can be retrieved by running the 'cs-falcon-search-device' command.).Required
rawThe PowerShell script code to run.Optional
timeoutTimeout for how long to wait for the request in seconds. Maximum is 600 (10 minutes). Default is 30.Optional
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.HostIDStringThe ID of the host for which the command was running.
CrowdStrike.Command.SessionIDStringThe ID of the session of the host.
CrowdStrike.Command.StdoutStringThe standard output of the command.
CrowdStrike.Command.StderrStringThe standard error of the command.
CrowdStrike.Command.BaseCommandStringThe base command.
CrowdStrike.Command.FullCommandStringThe full command.

Command Example#

cs-falcon-run-script host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 raw="Write-Output 'Hello, World!"

Context Example#

{
'CrowdStrike': {
'Command': [{
'HostID': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'Stdout': 'Hello, World!',
'Stderr': '',
'BaseCommand': 'runscript',
'Command': "runscript -Raw=Write-Output 'Hello, World!"
}]
}

Human Readable Output#

Command runscript -Raw=Write-Output 'Hello, World! results#

BaseCommandCommandHostIDStderrStdout
runscriptrunscript -Raw=Write-Output 'Hello, World!a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1Hello, World!

17. cs-falcon-run-get-command#


Batch executes 'get' command across hosts to retrieve files. The running status you requested the get command can be checked with cs-falcon-status-get-command.

Base Command#

cs-falcon-run-get-command

Input#

Argument NameDescriptionRequired
host_idsList of host agent IDs on which to run the RTR command.Required
file_pathFull path to the file that will be retrieved from each host in the batch.Required
optional_hostsList of a subset of hosts on which to run the command.Optional
timeoutThe number of seconds to wait for the request before it times out. In ISO time format. For example: 2019-10-17T13:41:48.487520845Z.Optional
timeout_durationThe amount of time to wait for the request before it times out. In duration syntax. For example, 10s. Valid units are: ns, us, ms, s, m, h. Maximum value is 10 minutes.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.HostIDstringThe ID of the host on which the command was running.
CrowdStrike.Command.StdoutstringThe standard output of the command.
CrowdStrike.Command.StderrstringThe standard error of the command.
CrowdStrike.Command.BaseCommandstringThe base command.
CrowdStrike.Command.TaskIDstringThe ID of the command that was running on the host.
CrowdStrike.Command.GetRequestIDstringThe ID of the command request that was accepted.
CrowdStrike.Command.CompletebooleanTrue if the command completed.
CrowdStrike.Command.FilePathstringThe file path.

Command Example#

cs-falcon-run-get-command host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 file_path="""c:\Windows\notepad.exe"""

Context Example#

{
"CrowdStrike.Command(val.TaskID === obj.TaskID)": [
{
"BaseCommand": "get",
"Complete": True,
"FilePath": "c:\\Windows\\notepad.exe",
"GetRequestID": "84ee4d50-f499-482e-bac6-b0e296149bbf",
"HostID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Stderr": "",
"Stdout": "C:\\Windows\\notepad.exe",
"TaskID": "b5c8f140-280b-43fd-8501-9900f837510b"
}
]
}

Human Readable Output#

Get command has requested for a file c:\Windows\notepad.exe#

BaseCommandCompleteFilePathGetRequestIDHostIDStderrStdoutTaskID
gettruec:\Windows\notepad.exe107199bc-544c-4b0c-8f20-3094c062a115a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1C:\Windows\notepad.exe9c820b97-6a60-4238-bc23-f63513970ec8

18. cs-falcon-status-get-command#


Retrieves the status of the specified batch 'get' command.

Base Command#

cs-falcon-status-get-command

Input#

Argument NameDescriptionRequired
request_idsThe list of IDs of the command requested.Required
timeoutThe number of seconds to wait for the request before it times out. In ISO time format. For example: 2019-10-17T13:41:48.487520845Z.Optional
timeout_durationThe amount of time to wait for the request before it times out. In duration syntax. For example, 10s. Valid units are: ns, us, ms, s, m, h. Maximum value is 10 minutes.Optional

Context Output#

PathTypeDescription
CrowdStrike.File.IDstringThe ID of the file.
CrowdStrike.File.TaskIDstringThe ID of the command that is running.
CrowdStrike.File.CreatedAtdateThe date the file was created.
CrowdStrike.File.DeletedAtdateThe date the file was deleted.
CrowdStrike.File.UpdatedAtdateThe date the file was last updated.
CrowdStrike.File.NamestringThe full name of the file.
CrowdStrike.File.SHA256stringThe SHA256 hash of the file.
CrowdStrike.File.SizenumberThe size of the file in bytes.
File.NamestringThe full name of the file.
File.SizenumberThe size of the file in bytes.
File.SHA256stringThe SHA256 hash of the file.

Command Example#

!cs-falcon-status-get-command request_ids="84ee4d50-f499-482e-bac6-b0e296149bbf"

Context Example#

{
"CrowdStrike.File(val.ID === obj.ID || val.TaskID === obj.TaskID)": [
{
"CreatedAt": "2020-05-01T16:09:00Z",
"DeletedAt": None,
"ID": 185596,
"Name": "\\Device\\HarddiskVolume2\\Windows\\notepad.exe",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Size": 0,
"TaskID": "b5c8f140-280b-43fd-8501-9900f837510b",
"UpdatedAt": "2020-05-01T16:09:00Z"
}
],
"File(val.MD5 \u0026\u0026 val.MD5 == obj.MD5 || val.SHA1 \u0026\u0026 val.SHA1 == obj.SHA1 || val.SHA256 \u0026\u0026 val.SHA256 == obj.SHA256 || val.SHA512 \u0026\u0026 val.SHA512 == obj.SHA512 || val.CRC32 \u0026\u0026 val.CRC32 == obj.CRC32 || val.CTPH \u0026\u0026 val.CTPH == obj.CTPH || val.SSDeep \u0026\u0026 val.SSDeep == obj.SSDeep)": [
{
"Name": "\\Device\\HarddiskVolume2\\Windows\\notepad.exe",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Size": 0
}
]
}

Human Readable Output#

CrowdStrike Falcon files#

CreatedAtDeletedAtIDNameSHA256SizeTaskIDUpdatedAt
2020-05-01T16:09:00Z185596\Device\HarddiskVolume2\Windows\notepad.exea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a10b5c8f140-280b-43fd-8501-9900f837510b2020-05-01T16:09:00Z

19. cs-falcon-status-command#


Gets the status of a command executed on a host.

Base Command#

cs-falcon-status-command

Input#

Argument NameDescriptionRequired
request_idThe ID of the command requested.Required
sequence_idThe sequence ID in chunk requests.Optional
scopeThe scope to run the command for. Possible values are: "read", "write", or "admin". Possible values are: read, write, admin. Default is read.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.TaskIDstringThe ID of the command request that was accepted.
CrowdStrike.Command.StdoutstringThe standard output of the command.
CrowdStrike.Command.StderrstringThe standard error of the command.
CrowdStrike.Command.BaseCommandstringThe base command.
CrowdStrike.Command.CompletebooleanTrue if the command completed.
CrowdStrike.Command.SequenceIDnumberThe sequence ID in the current request.
CrowdStrike.Command.NextSequenceIDnumberThe sequence ID for the next request in the chunk request.

Command Example#

!cs-falcon-status-command request_id="ae323961-5aa8-442e-8461-8d05c4541d7d"

Context Example#

{
"CrowdStrike.Command(val.TaskID === obj.TaskID)": [
{
"BaseCommand": "ls",
"Complete": true,
"NextSequenceID": null,
"SequenceID": null,
"Stderr": "",
"Stdout": "Directory listing for C:\\ -\n\nName Type Size (bytes) Size (MB) Last Modified (UTC+9) Created (UTC+9) \n---- ---- ------------ --------- --------------------- --------------- \n$Recycle.Bin \u003cDirectory\u003e -- -- 2020/01/10 16:05:59 2019/03/19 13:52:43 \nConfig.Msi \u003cDirectory\u003e -- -- 2020/05/01 23:12:50 2020/01/10 16:52:09 \nDocuments and Settings \u003cDirectory\u003e -- -- 2019/09/12 15:03:21 2019/09/12 15:03:21 \nPerfLogs \u003cDirectory\u003e -- -- 2019/03/19 13:52:43 2019/03/19 13:52:43 \nProgram Files \u003cDirectory\u003e -- -- 2020/01/10 17:11:47 2019/03/19 13:52:43 \nProgram Files (x86) \u003cDirectory\u003e -- -- 2020/05/01 23:12:53 2019/03/19 13:52:44 \nProgramData \u003cDirectory\u003e -- -- 2020/01/10 17:16:51 2019/03/19 13:52:44 \nRecovery \u003cDirectory\u003e -- -- 2019/09/11 20:13:59 2019/09/11 20:13:59 \nSystem Volume Information \u003cDirectory\u003e -- -- 2019/09/12 15:08:21 2019/09/11 20:08:43 \nUsers \u003cDirectory\u003e -- -- 2019/09/22 22:26:11 2019/03/19 13:37:22 \nWindows \u003cDirectory\u003e -- -- 2020/05/01 23:09:08 2019/03/19 13:37:22 \npagefile.sys .sys 2334928896 2226.762 2020/05/02 2:10:05 2019/09/11 20:08:44 \nswapfile.sys .sys 268435456 256 2020/05/01 23:09:13 2019/09/11 20:08:44 \n",
"TaskID": "ae323961-5aa8-442e-8461-8d05c4541d7d"
}
]
}

Human Readable Output#

Command status results#

BaseCommandCompleteStdoutTaskID
lstrueDirectory listing for C:\ ......ae323961-5aa8-442e-8461-8d05c4541d7d

20. cs-falcon-get-extracted-file#


Gets the RTR extracted file contents for the specified session and SHA256 hash.

Base Command#

cs-falcon-get-extracted-file

Input#

Argument NameDescriptionRequired
host_idThe host agent ID.Required
sha256The SHA256 hash of the file.Required
filenameThe filename to use for the archive name and the file within the archive.Optional

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-get-extracted-file host_id="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1" sha256="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"

Context Example#

There is no context output for this command.

Human Readable Output#

There is no human readable for this command.

21. cs-falcon-list-host-files#


Gets a list of files for the specified RTR session on a host.

Base Command#

cs-falcon-list-host-files

Input#

Argument NameDescriptionRequired
host_idThe ID of the host agent that lists files in the session.Required
session_idThe ID of the existing session with the agent.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.HostIDstringThe ID of the host the command was running for.
CrowdStrike.Command.TaskIDstringThe ID of the command request that was accepted.
CrowdStrike.Command.SessionIDstringThe ID of the session of the host.
CrowdStrike.File.IDstringThe ID of the file.
CrowdStrike.File.CreatedAtdateThe date the file was created.
CrowdStrike.File.DeletedAtdateThe date the file was deleted.
CrowdStrike.File.UpdatedAtdateThe date the file was last updated.
CrowdStrike.File.NamestringThe full name of the file.
CrowdStrike.File.SHA256stringThe SHA256 hash of the file.
CrowdStrike.File.SizenumberThe size of the file in bytes.
File.NamestringThe full name of the file.
File.SizenumberThe size of the file in bytes.
File.SHA256stringThe SHA256 hash of the file.

Command Example#

!cs-falcon-list-host-files host_id="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"

Context Example#

{
"CrowdStrike.Command(val.TaskID === obj.TaskID)": [
{
"HostID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SessionID": "fdd6408f-6688-441b-8659-41bcad25441c",
"TaskID": "1269ad9e-c11f-4e38-8aba-1a0275304f9c"
}
],
"CrowdStrike.File(val.ID === obj.ID)": [
{
"CreatedAt": "2020-05-01T17:57:42Z",
"DeletedAt": None,
"ID": 186811,
"Name": "\\Device\\HarddiskVolume2\\Windows\\notepad.exe",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Size": 0,
"Stderr": None,
"Stdout": None,
"UpdatedAt": "2020-05-01T17:57:42Z"
}
],
"File(val.MD5 \u0026\u0026 val.MD5 == obj.MD5 || val.SHA1 \u0026\u0026 val.SHA1 == obj.SHA1 || val.SHA256 \u0026\u0026 val.SHA256 == obj.SHA256 || val.SHA512 \u0026\u0026 val.SHA512 == obj.SHA512 || val.CRC32 \u0026\u0026 val.CRC32 == obj.CRC32 || val.CTPH \u0026\u0026 val.CTPH == obj.CTPH || val.SSDeep \u0026\u0026 val.SSDeep == obj.SSDeep)": [
{
"Name": "\\Device\\HarddiskVolume2\\Windows\\notepad.exe",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Size": 0
}
]
}

Human Readable Output#

CrowdStrike Falcon files#

CreatedAtDeletedAtIDNameSHA256SizeStderrStdoutUpdatedAt
2020-05-01T17:57:42Z186811\Device\HarddiskVolume2\Windows\notepad.exea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a102020-05-01T17:57:42Z

22. cs-falcon-refresh-session#


Refresh a session timeout on a single host.

Base Command#

cs-falcon-refresh-session

Input#

Argument NameDescriptionRequired
host_idThe ID of the host to extend the session for.Required

Context Output#

PathTypeDescription
CrowdStrike.Command.HostIDstringThe ID of the host for which the command was running.
CrowdStrike.Command.TaskIDstringThe ID of the command request which has been accepted.
CrowdStrike.Command.SessionIDstringThe ID of the session of the host.
CrowdStrike.File.IDstringThe ID of the file.
CrowdStrike.File.CreatedAtdateThe creation date of the file.
CrowdStrike.File.DeletedAtdateThe deletion date of the file.
CrowdStrike.File.UpdatedAtdateThe last updated date of the file.
CrowdStrike.File.NamestringThe full file name.
CrowdStrike.File.SHA256stringThe SHA-256 hash of the file.
CrowdStrike.File.SizenumberThe size of the file in bytes.
File.NamestringThe full file name.
File.SizenumberThe size of the file in bytes.
File.SHA256stringThe SHA-256 hash of the file.

Command Example#

!cs-falcon-refresh-session host_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

There is no context output for this command.

Human Readable Output#

CrowdStrike Session Refreshed: fdd6408f-6688-441b-8659-41bcad25441c

23. cs-falcon-search-iocs#


Deprecated. Use the cs-falcon-search-custom-iocs command instead.

Base Command#

cs-falcon-search-iocs

Input#

Argument NameDescriptionRequired
typesA comma-separated list of indicator types. Valid types are: "sha256", "sha1", "md5", "domain", "ipv4", "ipv6".Optional
valuesA comma-separated list of indicator values.Optional
policiesA comma-separated list of indicator policies.Optional
share_levelsThe level at which the indicator will be shared. Only "red" share level (not shared) is supported, which indicates that the IOC is not shared with other Falcon Host customers.Optional
sourcesA comma-separated list of IOC sources.Optional
from_expiration_dateStart of date range in which to search (YYYY-MM-DD format).Optional
to_expiration_dateEnd of date range in which to search (YYYY-MM-DD format).Optional
limitThe maximum number of records to return. The minimum is 1 and the maximum is 500. Default is 100.Optional
sortThe order in which the results are returned. Possible values are: "type.asc", "type.desc", "value.asc", "value.desc", "policy.asc", "policy.desc", "share_level.asc", "share_level.desc", "expiration_timestamp.asc", and "expiration_timestamp.desc".Optional
offsetThe offset to begin the list from. For example, start from the 10th record and return the list. Default is 0.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.PolicystringThe policy of the indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ShareLevelstringThe level at which the indicator will be shared.
CrowdStrike.IOC.ExpirationstringThe datetime the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.

Command Example#

!cs-falcon-search-iocs types="domain"

Context Example#

{
"CrowdStrike": {
"IOC": [
{
"CreatedTime": "2020-09-30T10:59:37Z",
"Expiration": "2020-10-30T00:00:00Z",
"ID": "domain:value",
"ModifiedTime": "2020-09-30T10:59:37Z",
"Policy": "none",
"ShareLevel": "red",
"Type": "domain",
"Value": "value"
}
]
}
}

Human Readable Output#

Indicators of Compromise#

CreatedTimeExpirationIDModifiedTimePolicyShareLevelTypeValue
2020-09-30T10:59:37Z2020-10-30T00:00:00Zdomain:value2020-09-30T10:59:37Znonereddomainvalue

24. cs-falcon-get-ioc#


Gets the full definition of one or more indicators that you are watching.

Base Command#

cs-falcon-get-ioc

Input#

Argument NameDescriptionRequired
typeThe IOC type to retrieve. Possible values are: "sha256", "sha1", "md5", "domain", "ipv4", and "ipv6".Required
valueThe string representation of the indicator.Required

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.PolicystringThe policy of the indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ShareLevelstringThe level at which the indicator will be shared.
CrowdStrike.IOC.ExpirationstringThe datetime when the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.

Command Example#

!cs-falcon-get-ioc type="domain" value="test.domain.com"

Context Example#

{
"CrowdStrike": {
"IOC": {
"CreatedTime": "2020-10-02T13:55:26Z",
"Description": "Test ioc",
"Expiration": "2020-11-01T00:00:00Z",
"ID": "domain:test.domain.com",
"ModifiedTime": "2020-10-02T13:55:26Z",
"Policy": "none",
"ShareLevel": "red",
"Source": "Demisto playbook",
"Type": "domain",
"Value": "test.domain.com"
}
}
}

Human Readable Output#

Indicator of Compromise#

CreatedTimeDescriptionExpirationIDModifiedTimePolicyShareLevelSourceTypeValue
2020-10-02T13:55:26ZTest ioc2020-11-01T00:00:00Zdomain:test.domain.com2020-10-02T13:55:26ZnoneredDemisto playbookdomaintest.domain.com

25. cs-falcon-upload-ioc#


Uploads an indicator for CrowdStrike to monitor.

Base Command#

cs-falcon-upload-ioc

Input#

Argument NameDescriptionRequired
ioc_typeThe type of the indicator. Possible values are: "sha256", "md5", "domain", "ipv4", and "ipv6".Required
valueThe string representation of the indicator.Required
policyThe policy to enact when the value is detected on a host. Possible values are: "detect" and "none". A value of "none" is equivalent to turning the indicator off. Default is "detect".Optional
share_levelThe level at which the indicator will be shared. Only "red" share level (not shared) is supported, which indicates that the IOC is not shared with other Falcon Host customers.Optional
expiration_daysThe number of days for which the indicator should be valid. This only applies to domain, ipv4, and ipv6 types. Default is 30.Optional
sourceThe source where this indicator originated. This can be used for tracking where this indicator was defined. Limited to 200 characters.Optional
descriptionA meaningful description of the indicator. Limited to 200 characters.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.PolicystringThe policy of the indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ShareLevelstringThe level at which the indicator will be shared.
CrowdStrike.IOC.ExpirationstringThe datetime when the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.

Command Example#

!cs-falcon-upload-ioc ioc_type="domain" value="test.domain.com" policy="none" share_level="red" source="Demisto playbook" description="Test ioc"

Context Example#

{
"CrowdStrike": {
"IOC": {
"CreatedTime": "2020-10-02T13:55:26Z",
"Description": "Test ioc",
"Expiration": "2020-11-01T00:00:00Z",
"ID": "domain:test.domain.com",
"ModifiedTime": "2020-10-02T13:55:26Z",
"Policy": "none",
"ShareLevel": "red",
"Source": "Demisto playbook",
"Type": "domain",
"Value": "test.domain.com"
}
}
}

Human Readable Output#

Custom IOC was created successfully#

CreatedTimeDescriptionExpirationIDModifiedTimePolicyShareLevelSourceTypeValue
2020-10-02T13:55:26ZTest ioc2020-11-01T00:00:00Zdomain:test.domain.com2020-10-02T13:55:26ZnoneredDemisto playbookdomaintest.domain.com

26. cs-falcon-update-ioc#


Deprecated. Use the cs-falcon-update-custom-ioc command instead.

Base Command#

cs-falcon-update-ioc

Input#

Argument NameDescriptionRequired
ioc_typeThe type of the indicator. Possible values are: "sha256", "md5", "sha1", "domain", "ipv4", and "ipv6".Required
valueThe string representation of the indicator.Required
policyThe policy to enact when the value is detected on a host. Possible values are: "detect" and "none". A value of "none" is equivalent to turning the indicator off. Default is "detect".Optional
share_levelThe level at which the indicator will be shared. Only "red" share level (not shared) is supported, which indicates that the IOC is not shared with other Falcon Host customers.Optional
expiration_daysThe number of days for which the indicator should be valid. This only applies to domain, ipv4, and ipv6 types. Default is 30.Optional
sourceThe source where this indicator originated. This can be used for tracking where this indicator was defined. Limited to 200 characters.Optional
descriptionA meaningful description of the indicator. Limited to 200 characters.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator (type:value).
CrowdStrike.IOC.PolicystringThe policy of the indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ShareLevelstringThe level at which the indicator will be shared.
CrowdStrike.IOC.ExpirationstringThe datetime when the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimestringThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimestringThe date and time the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.

Command Example#

!cs-falcon-update-ioc ioc_type="domain" value="test.domain.com" policy="detect" description="Benign domain IOC"

Context Example#

{
"CrowdStrike": {
"IOC": {
"CreatedTime": "2020-10-02T13:55:26Z",
"Description": "Benign domain IOC",
"Expiration": "2020-11-01T00:00:00Z",
"ID": "domain:test.domain.com",
"ModifiedTime": "2020-10-02T13:55:33Z",
"Policy": "detect",
"ShareLevel": "red",
"Source": "Demisto playbook",
"Type": "domain",
"Value": "test.domain.com"
}
}
}

Human Readable Output#

Custom IOC was created successfully#

CreatedTimeDescriptionExpirationIDModifiedTimePolicyShareLevelSourceTypeValue
2020-10-02T13:55:26ZBenign domain IOC2020-11-01T00:00:00Zdomain:test.domain.com2020-10-02T13:55:33ZdetectredDemisto playbookdomaintest.domain.com

27. cs-falcon-delete-ioc#


Deprecated. Use the cs-falcon-delete-custom-ioc command instead.

Base Command#

cs-falcon-delete-ioc

Input#

Argument NameDescriptionRequired
typeThe IOC type to delete. Possible values are: "sha256", "sha1", "md5", "domain", "ipv4", and "ipv6".Required
valueThe string representation of the indicator to delete.Required

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-delete-ioc type="domain" value="test.domain.com"

Human Readable Output#

Custom IOC domain:test.domain.com was successfully deleted.

28. cs-falcon-device-count-ioc#


The number of hosts that observed the provided IOC.

Base Command#

cs-falcon-device-count-ioc

Input#

Argument NameDescriptionRequired
typeThe IOC type. Possible values are: "sha256", "sha1", "md5", "domain", "ipv4", and "ipv6". Possible values are: sha256, sha1, md5, domain, ipv4, ipv6.Required
valueThe string representation of the indicator.Required

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator (type:value).
CrowdStrike.IOC.DeviceCountnumberThe number of devices the IOC ran on.

Command Example#

!cs-falcon-device-count-ioc type="domain" value="value"

Context Example#

{
"CrowdStrike": {
"IOC": {
"DeviceCount": 1,
"ID": "domain:value",
"Type": "domain",
"Value": "value"
}
}
}

Human Readable Output#

Indicator of Compromise domain:value device count: 1

29. cs-falcon-processes-ran-on#


Get processes associated with a given IOC.

Base Command#

cs-falcon-processes-ran-on

Input#

Argument NameDescriptionRequired
typeThe IOC type. Possible values are: "sha256", "sha1", "md5", "domain", "ipv4", and "ipv6". Possible values are: sha256, sha1, md5, domain, ipv4, ipv6.Required
valueThe string representation of the indicator.Required
device_idThe device ID to check against.Required

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator (type:value).
CrowdStrike.IOC.Process.IDnumberThe processes IDs associated with the given IOC.
CrowdStrike.IOC.Process.DeviceIDnumberThe device the process ran on.

Command Example#

!cs-falcon-processes-ran-on device_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 type=domain value=value

Context Example#

{
"CrowdStrike": {
"IOC": {
"ID": "domain:value",
"Process": {
"DeviceID": "pid",
"ID": [
"pid:pid:650164094720"
]
},
"Type": "domain",
"Value": "value"
}
}
}

Human Readable Output#

Processes with custom IOC domain:value on device device_id.#

Process ID
pid:pid:650164094720

30. cs-falcon-process-details#


Retrieves the details of a process, according to the process ID that is running or that previously ran.

Base Command#

cs-falcon-process-details

Input#

Argument NameDescriptionRequired
idsA comma-separated list of process IDs.Required

Context Output#

PathTypeDescription
CrowdStrike.Process.process_idStringThe process ID.
CrowdStrike.Process.process_id_localStringLocal ID of the process.
CrowdStrike.Process.device_idStringThe device the process ran on.
CrowdStrike.Process.file_nameStringThe path of the file that ran the process.
CrowdStrike.Process.command_lineStringThe command line command execution.
CrowdStrike.Process.start_timestamp_rawStringThe start datetime of the process in Unix time format. For example: 132460167512852140.
CrowdStrike.Process.start_timestampStringThe start datetime of the process in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.Process.stop_timestamp_rawDateThe stop datetime of the process in Unix time format. For example: 132460167512852140.
CrowdStrike.Process.stop_timestampDateThe stop datetime of the process in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-process-details ids="pid:pid:pid"

Context Example#

{
"CrowdStrike": {
"Process": {
"command_line": "\"C:\\Program Files (x86)\\Google\\Chrome\\Application\\chrome.exe\"",
"device_id": "deviceId",
"file_name": "\\Device\\HarddiskVolume1\\Program Files (x86)\\Google\\Chrome\\Application\\chrome.exe",
"process_id": "deviceId:pid",
"process_id_local": "pid",
"start_timestamp": "2020-10-01T09:05:51Z",
"start_timestamp_raw": "132460167512852140",
"stop_timestamp": "2020-10-02T06:43:45Z",
"stop_timestamp_raw": "132460946259334768"
}
}
}

Human Readable Output#

Details for process: pid:pid:pid.#

command_linedevice_idfile_nameprocess_idprocess_id_localstart_timestampstart_timestamp_rawstop_timestampstop_timestamp_raw
"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"deviceId\Device\HarddiskVolume1\Program Files (x86)\Google\Chrome\Application\chrome.exedevice_id:pidpid2020-10-01T09:05:51Z1324601675128521402020-10-02T06:43:45Z132460946259334768

31. cs-falcon-device-ran-on#


Returns a list of device IDs an indicator ran on.

Base Command#

cs-falcon-device-ran-on

Input#

Argument NameDescriptionRequired
typeThe type of indicator. Possible values are: domain, ipv4, ipv6, md5, sha1, sha256.Required
valueThe string representation of the indicator.Required

Context Output#

PathTypeDescription
CrowdStrike.DeviceIDstringDevice IDs an indicator ran on.

Command Example#

!cs-falcon-device-ran-on type=domain value=value

Context Example#

{
"CrowdStrike": {
"DeviceID": [
"a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
]
}
}

Human Readable Output#

Devices that encountered the IOC domain:value#

Device ID
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

32. cs-falcon-list-detection-summaries#


Lists detection summaries.

Base Command#

cs-falcon-list-detection-summaries

Input#

Argument NameDescriptionRequired
fetch_queryThe query used to filter the results.Optional
idsA comma separated list of detection IDs. For example, ldt🔢1234,ldt:5678:5678, If you use this argument, fetch_query argument will be ignored.Optional

Context Output#

PathTypeDescription
CrowdStrike.Detections.cidStringThe organization's customer ID (CID).
CrowdStrike.Detections.created_timestampDateThe datetime the detection occurred in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.Detections.detection_idStringThe ID of the detection.
CrowdStrike.Detections.device.device_idStringThe device ID as seen by CrowdStrike Falcon.
CrowdStrike.Detections.device.cidStringThe CrowdStrike Customer ID (CID) to which the device belongs.
CrowdStrike.Detections.device.agent_load_flagsStringThe CrowdStrike Falcon agent load flags.
CrowdStrike.Detections.device.agent_local_timeDateThe local time of the sensor.
CrowdStrike.Detections.device.agent_versionStringThe version of the agent that the device is running. For example: 5.32.11406.0.
CrowdStrike.Detections.device.bios_manufacturerStringThe BIOS manufacturer.
CrowdStrike.Detections.device.bios_versionStringThe device's BIOS version.
CrowdStrike.Detections.device.config_id_baseStringThe base of the sensor that the device is running.
CrowdStrike.Detections.device.config_id_buildStringThe version of the sensor that the device is running. For example: 11406.
CrowdStrike.Detections.device.config_id_platformStringThe platform ID of the sensor that the device is running.
CrowdStrike.Detections.device.external_ipStringThe external IP address of the device.
CrowdStrike.Detections.device.hostnameStringThe host name of the device.
CrowdStrike.Detections.device.first_seenDateThe datetime the host was first seen by CrowdStrike Falcon.
CrowdStrike.Detections.device.last_seenDateThe datetime the host was last seen by CrowdStrike Falcon.
CrowdStrike.Detections.device.local_ipStringThe local IP address of the device.
CrowdStrike.Detections.device.mac_addressStringThe MAC address of the device.
CrowdStrike.Detections.device.major_versionStringThe major version of the operating system.
CrowdStrike.Detections.device.minor_versionStringThe minor version of the operating system.
CrowdStrike.Detections.device.os_versionStringThe operating system of the device.
CrowdStrike.Detections.device.platform_idStringThe platform ID of the device that runs the sensor.
CrowdStrike.Detections.device.platform_nameStringThe platform name of the device.
CrowdStrike.Detections.device.product_type_descStringThe value indicating the product type. For example, 1 = Workstation, 2 = Domain Controller, 3 = Server.
CrowdStrike.Detections.device.statusStringThe containment status of the machine. Possible values are: "normal", "containment_pending", "contained", and "lift_containment_pending".
CrowdStrike.Detections.device.system_manufacturerStringThe system manufacturer of the device.
CrowdStrike.Detections.device.system_product_nameStringThe product name of the system.
CrowdStrike.Detections.device.modified_timestampDateThe datetime the device was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.Detections.behaviors.device_idStringThe ID of the device associated with the behavior.
CrowdStrike.Detections.behaviors.timestampDateThe datetime the behavior detection occurred in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.Detections.behaviors.behavior_idStringThe ID of the behavior.
CrowdStrike.Detections.behaviors.filenameStringThe file name of the triggering process.
CrowdStrike.Detections.behaviors.alleged_filetypeStringThe file extension of the behavior's filename.
CrowdStrike.Detections.behaviors.cmdlineStringThe command line of the triggering process.
CrowdStrike.Detections.behaviors.scenarioStringThe name of the scenario the behavior belongs to.
CrowdStrike.Detections.behaviors.objectiveStringThe name of the objective associated with the behavior.
CrowdStrike.Detections.behaviors.tacticStringThe name of the tactic associated with the behavior.
CrowdStrike.Detections.behaviors.techniqueStringThe name of the technique associated with the behavior.
CrowdStrike.Detections.behaviors.severityNumberThe severity rating for the behavior. The value can be any integer between 1-100.
CrowdStrike.Detections.behaviors.confidenceNumberThe true positive confidence rating for the behavior. The value can be any integer between 1-100.
CrowdStrike.Detections.behaviors.ioc_typeStringThe type of the triggering IOC. Possible values are: "hash_sha256", "hash_md5", "domain", "filename", "registry_key", "command_line", and "behavior".
CrowdStrike.Detections.behaviors.ioc_valueStringThe IOC value.
CrowdStrike.Detections.behaviors.ioc_sourceStringThe source that triggered an IOC detection. Possible values are: "library_load", "primary_module", "file_read", and "file_write".
CrowdStrike.Detections.behaviors.ioc_descriptionStringThe IOC description.
CrowdStrike.Detections.behaviors.user_nameStringThe user name.
CrowdStrike.Detections.behaviors.user_idStringThe Security Identifier (SID) of the user in Windows.
CrowdStrike.Detections.behaviors.control_graph_idStringThe behavior hit key for the Threat Graph API.
CrowdStrike.Detections.behaviors.triggering_process_graph_idStringThe ID of the process that triggered the behavior detection.
CrowdStrike.Detections.behaviors.sha256StringThe SHA256 of the triggering process.
CrowdStrike.Detections.behaviors.md5StringThe MD5 of the triggering process.
CrowdStrike.Detections.behaviors.parent_details.parent_sha256StringThe SHA256 hash of the parent process.
CrowdStrike.Detections.behaviors.parent_details.parent_md5StringThe MD5 hash of the parent process.
CrowdStrike.Detections.behaviors.parent_details.parent_cmdlineStringThe command line of the parent process.
CrowdStrike.Detections.behaviors.parent_details.parent_process_graph_idStringThe process graph ID of the parent process.
CrowdStrike.Detections.behaviors.pattern_dispositionNumberThe pattern associated with the action performed on the behavior.
CrowdStrike.Detections.behaviors.pattern_disposition_details.indicatorBooleanWhether the detection behavior is similar to an indicator.
CrowdStrike.Detections.behaviors.pattern_disposition_details.detectBooleanWhether this behavior is detected.
CrowdStrike.Detections.behaviors.pattern_disposition_details.inddet_maskBooleanWhether this behavior is an inddet mask.
CrowdStrike.Detections.behaviors.pattern_disposition_details.sensor_onlyBooleanWhether this detection is sensor only.
CrowdStrike.Detections.behaviors.pattern_disposition_details.rootingBooleanWhether this behavior is rooting.
CrowdStrike.Detections.behaviors.pattern_disposition_details.kill_processBooleanWhether this detection kills the process.
CrowdStrike.Detections.behaviors.pattern_disposition_details.kill_subprocessBooleanWhether this detection kills the subprocess.
CrowdStrike.Detections.behaviors.pattern_disposition_details.quarantine_machineBooleanWhether this detection was on a quarantined machine.
CrowdStrike.Detections.behaviors.pattern_disposition_details.quarantine_fileBooleanWhether this detection was on a quarantined file.
CrowdStrike.Detections.behaviors.pattern_disposition_details.policy_disabledBooleanWhether this policy is disabled.
CrowdStrike.Detections.behaviors.pattern_disposition_details.kill_parentBooleanWhether this detection kills the parent process.
CrowdStrike.Detections.behaviors.pattern_disposition_details.operation_blockedBooleanWhether the operation is blocked.
CrowdStrike.Detections.behaviors.pattern_disposition_details.process_blockedBooleanWhether the process is blocked.
CrowdStrike.Detections.behaviors.pattern_disposition_details.registry_operation_blockedBooleanWhether the registry operation is blocked.
CrowdStrike.Detections.email_sentBooleanWhether an email is sent about this detection.
CrowdStrike.Detections.first_behaviorDateThe datetime of the first behavior.
CrowdStrike.Detections.last_behaviorDateThe datetime of the last behavior.
CrowdStrike.Detections.max_confidenceNumberThe highest confidence value of all behaviors. The value can be any integer between 1-100.
CrowdStrike.Detections.max_severityNumberThe highest severity value of all behaviors. Value can be any integer between 1-100.
CrowdStrike.Detections.max_severity_displaynameStringThe name used in the UI to determine the severity of the detection. Possible values are: "Critical", "High", "Medium", and "Low".
CrowdStrike.Detections.show_in_uiBooleanWhether the detection displays in the UI.
CrowdStrike.Detections.statusStringThe status of the detection.
CrowdStrike.Detections.assigned_to_uidStringThe UID of the user for whom the detection is assigned.
CrowdStrike.Detections.assigned_to_nameStringThe human-readable name of the user to whom the detection is currently assigned.
CrowdStrike.Detections.hostinfo.domainStringThe domain of the Active Directory.
CrowdStrike.Detections.seconds_to_triagedNumberThe amount of time it took to move a detection from "new" to "in_progress".
CrowdStrike.Detections.seconds_to_resolvedNumberThe amount of time it took to move a detection from new to a resolved state ("true_positive", "false_positive", and "ignored").

Command Example#

!cs-falcon-list-detection-summaries

Context Example#

{
"CrowdStrike": {
"Detections": [
{
"behaviors": [
{
"alleged_filetype": "exe",
"behavior_id": "10197",
"cmdline": "choice /m crowdstrike_sample_detection",
"confidence": 80,
"control_graph_id": "ctg:ctg:ctg",
"device_id": "deviceid",
"display_name": "",
"filename": "choice.exe",
"filepath": "",
"ioc_description": "",
"ioc_source": "",
"ioc_type": "",
"ioc_value": "",
"md5": "md5",
"objective": "Falcon Detection Method",
"parent_details": {
"parent_cmdline": "\"C:\\Windows\\system32\\cmd.exe\" ",
"parent_md5": "md5",
"parent_process_graph_id": "pid:pid:pid",
"parent_sha256": "sha256"
},
"pattern_disposition": 0,
"pattern_disposition_details": {
"bootup_safeguard_enabled": false,
"critical_process_disabled": false,
"detect": false,
"fs_operation_blocked": false,
"inddet_mask": false,
"indicator": false,
"kill_parent": false,
"kill_process": false,
"kill_subprocess": false,
"operation_blocked": false,
"policy_disabled": false,
"process_blocked": false,
"quarantine_file": false,
"quarantine_machine": false,
"registry_operation_blocked": false,
"rooting": false,
"sensor_only": false
},
"scenario": "suspicious_activity",
"severity": 30,
"sha256": "sha256",
"tactic": "Malware",
"tactic_id": "",
"technique": "Malicious File",
"technique_id": "",
"template_instance_id": "382",
"timestamp": "2020-07-06T08:10:44Z",
"triggering_process_graph_id": "pid:pid:pid",
"user_id": "user_id",
"user_name": "user_name"
}
],
"behaviors_processed": [
"pid:pid:pid:10197"
],
"cid": "cid",
"created_timestamp": "2020-07-06T08:10:55.538668036Z",
"detection_id": "ldt:ldt:ldt",
"device": {
"agent_load_flags": "0",
"agent_local_time": "2020-07-02T01:42:07.640Z",
"agent_version": "5.32.11406.0",
"bios_manufacturer": "Google",
"bios_version": "Google",
"cid": "cid",
"config_id_base": "id",
"config_id_build": "id",
"config_id_platform": "3",
"device_id": "device_id",
"external_ip": "external_ip",
"first_seen": "2020-02-10T12:40:18Z",
"hostname": "FALCON-CROWDSTR",
"last_seen": "2020-07-06T07:59:12Z",
"local_ip": "local_ip",
"mac_address": "mac_address",
"major_version": "major_version",
"minor_version": "minor_version",
"modified_timestamp": "modified_timestamp",
"os_version": "os_version",
"platform_id": "platform_id",
"platform_name": "platform_name",
"product_type": "product_type",
"product_type_desc": "product_type_desc",
"status": "status",
"system_manufacturer": "system_manufacturer",
"system_product_name": "system_product_name"
},
"email_sent": false,
"first_behavior": "2020-07-06T08:10:44Z",
"hostinfo": {
"domain": ""
},
"last_behavior": "2020-07-06T08:10:44Z",
"max_confidence": 80,
"max_severity": 30,
"max_severity_displayname": "Low",
"seconds_to_resolved": 0,
"seconds_to_triaged": 0,
"show_in_ui": true,
"status": "new"
}
]
}
}

Human Readable Output#

CrowdStrike Detections#

detection_idcreated_timestatusmax_severity
ldt:ldt:ldt2020-07-06T08:10:55.538668036ZnewLow

33. cs-falcon-list-incident-summaries#


Lists incident summaries.

Base Command#

cs-falcon-list-incident-summaries

Input#

Argument NameDescriptionRequired
fetch_queryThe query used to filter the results.Optional
idsA comma separated list of detection IDs. For example, ldt🔢1234,ldt:5678:5678, If you use this argument, fetch_query argument will be ignored.Optional

Context Output#

PathTypeDescription
CrowdStrike.Incidents.incident_idStringThe ID of the incident.
CrowdStrike.Incidents.cidStringThe organization's customer ID (CID).
CrowdStrike.Incidents.host_idsStringThe device IDs of all the hosts on which the incident occurred.
CrowdStrike.Incidents.hosts.device_idStringThe device ID as seen by CrowdStrike.
CrowdStrike.Incidents.hosts.cidStringThe host's organization's customer ID (CID).
CrowdStrike.Incidents.hosts.agent_load_flagsStringThe CrowdStrike agent load flags.
CrowdStrike.Incidents.hosts.agent_local_timeDateThe local time of the sensor.
CrowdStrike.Incidents.hosts.agent_versionStringThe version of the agent that the device is running. For example: 5.32.11406.0.
CrowdStrike.Incidents.hosts.bios_manufacturerStringThe BIOS manufacturer.
CrowdStrike.Incidents.hosts.bios_versionStringThe BIOS version of the device.
CrowdStrike.Incidents.hosts.config_id_baseStringThe base of the sensor that the device is running.
CrowdStrike.Incidents.hosts.config_id_buildStringThe version of the sensor that the device is running. For example: 11406.
CrowdStrike.Incidents.hosts.config_id_platformStringThe platform ID of the sensor that the device is running.
CrowdStrike.Incidents.hosts.external_ipStringThe external IP address of the host.
CrowdStrike.Incidents.hosts.hostnameStringThe name of the host.
CrowdStrike.Incidents.hosts.first_seenDateThe date and time the host was first seen by CrowdStrike Falcon.
CrowdStrike.Incidents.hosts.last_seenDateThe date and time the host was last seen by CrowdStrike Falcon.
CrowdStrike.Incidents.hosts.local_ipStringThe device local IP address.
CrowdStrike.Incidents.hosts.mac_addressStringThe device MAC address.
CrowdStrike.Incidents.hosts.major_versionStringThe major version of the operating system.
CrowdStrike.Incidents.hosts.minor_versionStringThe minor version of the operating system.
CrowdStrike.Incidents.hosts.os_versionStringThe operating system of the host.
CrowdStrike.Incidents.hosts.platform_idStringThe platform ID of the device that runs the sensor.
CrowdStrike.Incidents.hosts.platform_nameStringThe platform name of the host.
CrowdStrike.Incidents.hosts.product_type_descStringThe value indicating the product type. For example, 1 = Workstation, 2 = Domain Controller, 3 = Server.
CrowdStrike.Incidents.hosts.statusStringThe incident status as a number. For example, 20 = New, 25 = Reopened, 30 = In Progress, 40 = Closed.
CrowdStrike.Incidents.hosts.system_manufacturerStringThe system manufacturer of the device.
CrowdStrike.Incidents.hosts.system_product_nameStringThe product name of the system.
CrowdStrike.Incidents.hosts.modified_timestampDateThe datetime a user modified the incident in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.Incidents.createdDateThe time that the incident was created.
CrowdStrike.Incidents.startDateThe recorded time of the earliest incident.
CrowdStrike.Incidents.endDateThe recorded time of the latest incident.
CrowdStrike.Incidents.stateStringThe state of the incident.
CrowdStrike.Incidents.statusNumberThe status of the incident.
CrowdStrike.Incidents.nameStringThe name of the incident.
CrowdStrike.Incidents.descriptionStringThe description of the incident.
CrowdStrike.Incidents.tagsStringThe tags of the incident.
CrowdStrike.Incidents.fine_scoreNumberThe incident score.

Command Example#

!cs-falcon-list-incident-summaries

34. Endpoint#


Returns information about an endpoint, does not support regex.

Base Command#

endpoint

Input#

Argument NameDescriptionRequired
idThe endpoint ID.Optional
ipThe endpoint IP address.Optional
hostnameThe endpoint hostname.Optional

Context Output#

PathTypeDescription
Endpoint.HostnameStringThe endpoint's hostname.
Endpoint.OSStringThe endpoint's operation system.
Endpoint.IPAddressStringThe endpoint's IP address.
Endpoint.IDStringThe endpoint's ID.
Endpoint.StatusStringThe endpoint's status.
Endpoint.IsIsolatedStringThe endpoint's isolation status.
Endpoint.MACAddressStringThe endpoint's MAC address.
Endpoint.VendorStringThe integration name of the endpoint vendor.
Endpoint.OSVersionStringThe endpoint's operation system version.

Command Example#

!endpoint id=15dbb9d5fe9f61eb46e829d986

Context Example#

{
"Endpoint":
{
"Hostname": "Hostname",
"ID": "15dbb9d5fe9f61eb46e829d986",
"IPAddress": "1.1.1.1",
"OS": "Windows",
"OSVersion": "Windows Server 2019",
"Status": "Online",
"￿Vendor": "CrowdStrike Falcon",
"￿MACAddress": "1-1-1-1"
}
}

Human Readable Output#

Endpoints#

IDIPAddressOSOSVersionHostnameStatusMACAddressVendor
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a11.1.1.1WindowsWindows Server 2019HostnameOnline1-1-1-1CrowdStrike Falcon

35. cs-falcon-create-host-group#


Create a host group.

Base Command#

cs-falcon-create-host-group

Input#

Argument NameDescriptionRequired
nameThe name of the host.Required
group_typeThe group type of the group. Can be 'static' or 'dynamic'. Possible values are: static, dynamic.Required
descriptionThe description of the host.Optional
assignment_ruleThe assignment rule.Optional

Context Output#

PathTypeDescription
CrowdStrike.HostGroup.idStringThe ID of the host group.
CrowdStrike.HostGroup.group_typeStringThe group type of the host group.
CrowdStrike.HostGroup.nameStringThe name of the host group.
CrowdStrike.HostGroup.descriptionStringThe description of the host group.
CrowdStrike.HostGroup.created_byStringThe client that created the host group.
CrowdStrike.HostGroup.created_timestampDateThe datetime the host group was created in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.HostGroup.modified_byStringThe client that modified the host group.
CrowdStrike.HostGroup.modified_timestampDateThe datetime the host group was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-create-host-group name="test_name_1" description="test_description" group_type=static

Context Example#

{
"CrowdStrike": {
"HostGroup": {
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-25T08:02:02.060242909Z",
"description": "test_description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-25T08:02:02.060242909Z",
"name": "test_name_1"
}
}
}

Human Readable Output#

Results#

created_bycreated_timestampdescriptiongroup_typeidmodified_bymodified_timestampname
api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-25T08:02:02.060242909Ztest_descriptionstatica1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-25T08:02:02.060242909Ztest_name_1

36. cs-falcon-update-host-group#


Updates a host group.

Base Command#

cs-falcon-update-host-group

Input#

Argument NameDescriptionRequired
host_group_idThe ID of the host group.Required
nameThe name of the host group.Optional
descriptionThe description of the host group.Optional
assignment_ruleThe assignment rule.Optional

Context Output#

PathTypeDescription
CrowdStrike.HostGroup.idStringThe ID of the host group.
CrowdStrike.HostGroup.group_typeStringThe group type of the host group.
CrowdStrike.HostGroup.nameStringThe name of the host group.
CrowdStrike.HostGroup.descriptionStringThe description of the host group.
CrowdStrike.HostGroup.created_byStringThe client that created the host group.
CrowdStrike.HostGroup.created_timestampDateThe datetime the host group was created in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.HostGroup.modified_byStringThe client that modified the host group.
CrowdStrike.HostGroup.modified_timestampDateThe datetime the host group was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-update-host-group host_group_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 name="test_name_update_1" description="test_description_update"

Context Example#

{
"CrowdStrike": {
"HostGroup": {
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-22T07:48:35.111070562Z",
"description": "test_description_update",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-25T08:02:05.295663156Z",
"name": "test_name_update_1"
}
}
}

Human Readable Output#

Results#

assignment_rulecreated_bycreated_timestampdescriptiongroup_typeidmodified_bymodified_timestampname
device_id:[''],hostname:['']api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-22T07:48:35.111070562Ztest_description_updatestatica1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-25T08:02:05.295663156Ztest_name_update_1

37. cs-falcon-list-host-group-members#


Gets the list of host group members.

Base Command#

cs-falcon-list-host-group-members

Input#

Argument NameDescriptionRequired
host_group_idThe ID of the host group.Optional
filterThe query to filter the devices that belong to the host group.Optional
offsetPage offset.Optional
limitThe maximum number of results on a page. Default is 50.Optional
sortThe property to sort by (e.g. status.desc or hostname.asc).Optional

Context Output#

PathTypeDescription
CrowdStrike.Device.IDStringThe ID of the device.
CrowdStrike.Device.LocalIPStringThe local IP address of the device.
CrowdStrike.Device.ExternalIPStringThe external IP address of the device.
CrowdStrike.Device.HostnameStringThe host name of the device.
CrowdStrike.Device.OSStringThe operating system of the device.
CrowdStrike.Device.MacAddressStringThe MAC address of the device.
CrowdStrike.Device.FirstSeenStringThe first time the device was seen.
CrowdStrike.Device.LastSeenStringThe last time the device was seen.
CrowdStrike.Device.StatusStringThe device status.

Command Example#

!cs-falcon-list-host-group-members

Context Example#

{
"CrowdStrike": {
"Device": [
{
"ExternalIP": "35.224.136.145",
"FirstSeen": "2021-08-12T16:13:26Z",
"Hostname": "FALCON-CROWDSTR",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"LastSeen": "2021-08-23T04:59:48Z",
"LocalIP": "10.128.0.21",
"MacAddress": "42-01-0a-80-00-15",
"OS": "Windows Server 2019",
"Status": "normal"
},
{
"ExternalIP": "35.224.136.145",
"FirstSeen": "2020-02-10T12:40:18Z",
"Hostname": "FALCON-CROWDSTR",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"LastSeen": "2021-08-25T07:42:47Z",
"LocalIP": "10.128.0.7",
"MacAddress": "42-01-0a-80-00-07",
"OS": "Windows Server 2019",
"Status": "contained"
},
{
"ExternalIP": "35.224.136.145",
"FirstSeen": "2021-08-23T05:04:41Z",
"Hostname": "INSTANCE-1",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"LastSeen": "2021-08-25T07:49:06Z",
"LocalIP": "10.128.0.20",
"MacAddress": "42-01-0a-80-00-14",
"OS": "Windows Server 2019",
"Status": "normal"
},
{
"ExternalIP": "35.224.136.145",
"FirstSeen": "2021-08-11T13:57:29Z",
"Hostname": "INSTANCE-1",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"LastSeen": "2021-08-23T04:45:37Z",
"LocalIP": "10.128.0.20",
"MacAddress": "42-01-0a-80-00-14",
"OS": "Windows Server 2019",
"Status": "normal"
},
{
"ExternalIP": "35.224.136.145",
"FirstSeen": "2021-08-08T11:33:21Z",
"Hostname": "falcon-crowdstrike-sensor-centos7",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"LastSeen": "2021-08-25T07:50:47Z",
"LocalIP": "10.128.0.19",
"MacAddress": "42-01-0a-80-00-13",
"OS": "CentOS 7.9",
"Status": "normal"
}
]
}
}

Human Readable Output#

Devices#

IDExternal IPLocal IPHostnameOSMac AddressFirst SeenLast SeenStatus
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a135.224.136.14510.128.0.19falcon-crowdstrike-sensor-centos7CentOS 7.942-01-0a-80-00-132021-08-08T11:33:21Z2021-08-25T07:50:47Znormal

38. cs-falcon-add-host-group-members#


Add host group members.

Base Command#

cs-falcon-add-host-group-members

Input#

Argument NameDescriptionRequired
host_group_idThe ID of the host group.Required
host_idsA comma-separated list of host agent IDs to run commands. (The list of host agent IDs can be retrieved by running the 'cs-falcon-search-device' command.).Required

Context Output#

PathTypeDescription
CrowdStrike.HostGroup.idStringThe ID of the host group.
CrowdStrike.HostGroup.group_typeStringThe group type of the host group.
CrowdStrike.HostGroup.nameStringThe name of the host group.
CrowdStrike.HostGroup.descriptionStringThe description of the host group.
CrowdStrike.HostGroup.created_byStringThe client that created the host group.
CrowdStrike.HostGroup.created_timestampDateThe datetime the host group was created in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.HostGroup.modified_byStringThe client that modified the host group.
CrowdStrike.HostGroup.modified_timestampDateThe datetime the host group was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-add-host-group-members host_group_id="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1" host_ids="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"

Context Example#

{
"CrowdStrike": {
"HostGroup": {
"assignment_rule": "device_id:[''],hostname:['falcon-crowdstrike-sensor-centos7','']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-22T07:48:35.111070562Z",
"description": "test_description_update",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-25T08:02:05.295663156Z",
"name": "test_name_update_1"
}
}
}

Human Readable Output#

Results#

assignment_rulecreated_bycreated_timestampdescriptiongroup_typeidmodified_bymodified_timestampname
device_id:[''],hostname:['falcon-crowdstrike-sensor-centos7','']api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-22T07:48:35.111070562Ztest_description_updatestatica1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-25T08:02:05.295663156Ztest_name_update_1

39. cs-falcon-remove-host-group-members#


Remove host group members.

Base Command#

cs-falcon-remove-host-group-members

Input#

Argument NameDescriptionRequired
host_group_idThe ID of the host group.Required
host_idsA comma-separated list of host agent IDs to run commands. (The list of host agent IDs can be retrieved by running the 'cs-falcon-search-device' command.).Required

Context Output#

PathTypeDescription
CrowdStrike.HostGroup.idStringThe ID of the host group.
CrowdStrike.HostGroup.group_typeStringThe group type of the host group.
CrowdStrike.HostGroup.nameStringThe name of the host group.
CrowdStrike.HostGroup.descriptionStringThe description of the host group.
CrowdStrike.HostGroup.created_byStringThe client that created the host group.
CrowdStrike.HostGroup.created_timestampDateThe datetime the host group was created in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.HostGroup.modified_byStringThe client that modified the host group.
CrowdStrike.HostGroup.modified_timestampDateThe datetime the host group was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-remove-host-group-members host_group_id="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1" host_ids="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"

Context Example#

{
"CrowdStrike": {
"HostGroup": {
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-22T07:48:35.111070562Z",
"description": "test_description_update",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-25T08:02:05.295663156Z",
"name": "test_name_update_1"
}
}
}

Human Readable Output#

Results#

assignment_rulecreated_bycreated_timestampdescriptiongroup_typeidmodified_bymodified_timestampname
device_id:[''],hostname:['']api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-22T07:48:35.111070562Ztest_description_updatestatica1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-25T08:02:05.295663156Ztest_name_update_1

40. cs-falcon-resolve-incident#


Resolve and update incidents using the specified settings.

Base Command#

cs-falcon-resolve-incident

Input#

Argument NameDescriptionRequired
idsA comma-separated list of incident IDs.Required
statusThe new status of the incident. Can be "New", "In Progress", "Reopened", "Closed". Possible values are: New, In Progress, Reopened, Closed.Optional
assigned_to_uuidUUID of a user to assign the incident to. Mutually exclusive with the 'username' argument.Optional
usernameUsername of a user to assign the incident to. Mutually exclusive with the 'assigned_to_uuid' argument. Using this parameter instead of 'assigned_to_uuid' will result in an additional API call in order to fetch the UUID of the user.Optional
add_tagAdd a new tag to the incidents.Optional
remove_tagRemove a tag from the incidents.Optional
add_commentAdd a comment to the incident.Optional

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-resolve-incident ids="inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1,inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1" status="Closed"

Human Readable Output#

inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 changed successfully to Closed inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 changed successfully to Closed

41. cs-falcon-list-host-groups#


List the available host groups.

Base Command#

cs-falcon-list-host-groups

Input#

Argument NameDescriptionRequired
filterThe query by which to filter the devices that belong to the host group.Optional
offsetPage offset.Optional
limitMaximum number of results on a page. Default is 50.Optional

Context Output#

PathTypeDescription
CrowdStrike.HostGroup.idStringThe ID of the host group.
CrowdStrike.HostGroup.group_typeStringThe group type of the host group.
CrowdStrike.HostGroup.nameStringThe name of the host group.
CrowdStrike.HostGroup.descriptionStringThe description of the host group.
CrowdStrike.HostGroup.created_byStringThe client that created the host group.
CrowdStrike.HostGroup.created_timestampDateThe datetime when the host group was created in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.HostGroup.modified_byStringThe client that modified the host group.
CrowdStrike.HostGroup.modified_timestampDateThe datetime when the host group was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-list-host-groups

Context Example#

{
"CrowdStrike": {
"HostGroup": [
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:23.765624811Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:23.765624811Z",
"name": "InnerServicesModuleMon Aug 23 2021"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:25.506030441Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:25.506030441Z",
"name": "Rasterize_default_instanceMon Aug 23 2021"
},
{
"assignment_rule": "device_id:[''],hostname:['','FALCON-CROWDSTR']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-07-27T12:34:59.13917402Z",
"description": "",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-07-27T12:34:59.13917402Z",
"name": "Static by id group test"
},
{
"assignment_rule": "device_id:[],hostname:[]",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-07-27T12:24:18.364057533Z",
"description": "Group test",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-07-27T12:24:18.364057533Z",
"name": "Static group test"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:26.069515348Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:26.069515348Z",
"name": "ad-loginMon Aug 23 2021"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:25.556897468Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:25.556897468Z",
"name": "ad-queryMon Aug 23 2021"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:23.737307612Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:23.737307612Z",
"name": "d2Mon Aug 23 2021"
},
{
"created_by": "someone@email.com",
"created_timestamp": "2021-07-27T12:27:43.503021999Z",
"description": "dhfh",
"group_type": "staticByID",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "someone@email.com",
"modified_timestamp": "2021-07-27T12:27:43.503021999Z",
"name": "ddfxgh"
},
{
"assignment_rule": "device.hostname:'FALCON-CROWDSTR'",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-07-27T12:46:39.058352326Z",
"description": "",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-07-27T12:46:39.058352326Z",
"name": "dynamic 1 group test"
},
{
"assignment_rule": "lkjlk:'FalconGroupingTags/example_tag'",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T13:12:56.338590022Z",
"description": "",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T13:12:56.338590022Z",
"name": "dynamic 13523 group test"
},
{
"assignment_rule": "lkjlk:'FalconGroupingTags/example_tag'",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-07-27T14:02:05.538065349Z",
"description": "",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-07-27T14:02:05.538065349Z",
"name": "dynamic 1353 group test"
},
{
"assignment_rule": "tags:'FalconGroupingTags/example_tag'",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-07-27T12:41:33.127997409Z",
"description": "",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-07-27T12:41:33.127997409Z",
"name": "dynamic 2 group test"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:23.7402217Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:23.7402217Z",
"name": "fcm_default_instanceMon Aug 23 2021"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-11T09:55:23.801049103Z",
"description": "ilan test",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-11T09:55:23.801049103Z",
"name": "ilan"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-12T11:24:51.434863056Z",
"description": "ilan test",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-12T11:24:51.434863056Z",
"name": "ilan 2"
},
{
"assignment_rule": "device_id:[''],hostname:['FALCON-CROWDSTR']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-12T11:55:57.943490809Z",
"description": "ilan test",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-12T11:55:57.943490809Z",
"name": "ilan 23"
},
{
"assignment_rule": "",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-17T11:28:39.855075106Z",
"description": "after change",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T09:26:15.351650252Z",
"name": "ilan 2345"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-17T11:58:42.453661998Z",
"description": "ilan test",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-17T11:58:42.453661998Z",
"name": "ilan 23e"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-11T13:54:59.695821727Z",
"description": "",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-11T13:54:59.695821727Z",
"name": "ilan test 2"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-12T10:56:49.2127345Z",
"description": "ilan test",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-12T11:35:35.76509212Z",
"name": "ilan2"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:23.766284685Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:23.766284685Z",
"name": "splunkMon Aug 23 2021"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:09:15.36414377Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:09:15.36414377Z",
"name": "test_1629731353498"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:12:20.69203954Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:12:20.69203954Z",
"name": "test_1629731538458"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:14:20.650781714Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:14:23.026511269Z",
"name": "test_16297316587261629731658726"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:18:53.896505566Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:18:56.2598933Z",
"name": "test_16297319320381629731932038"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:19:51.91067257Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:19:54.269898808Z",
"name": "test_16297319902371629731990237"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:25:42.99601887Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:25:42.99601887Z",
"name": "test_1629732339973"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:26:12.280379354Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:26:14.973676462Z",
"name": "test_16297323698941629732369894"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:26:58.717706381Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:27:01.648623079Z",
"name": "test_16297324168771629732416877"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:28:18.674512647Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:28:21.781563212Z",
"name": "test_16297324965761629732496576"
},
{
"assignment_rule": "device_id:[''],hostname:['FALCON-CROWDSTR','INSTANCE-1','falcon-crowdstrike-sensor-centos7']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:31:41.142748214Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:31:43.800147323Z",
"name": "test_16297326990981629732699098"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:34:20.195778795Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:34:23.212828317Z",
"name": "test_16297328579781629732857978"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:34:55.837119719Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:34:58.490114093Z",
"name": "test_16297328938791629732893879"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:37:42.911344704Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:37:45.620464598Z",
"name": "test_16297330605301629733060530"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-24T07:05:55.813475476Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-24T07:05:58.805702883Z",
"name": "test_16297887501421629788750142"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-24T07:07:30.422517324Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-24T07:07:34.291988227Z",
"name": "test_16297888481381629788848138"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-24T08:03:15.522772079Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-24T08:03:18.622015517Z",
"name": "test_16297921932741629792193274"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:09:52.379925975Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:09:52.379925975Z",
"name": "test_1629967211800"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T12:34:36.934507422Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T12:34:36.934507422Z",
"name": "test_162996721180000"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T08:46:09.996065663Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T08:46:11.572092204Z",
"name": "test_16299675695531629967569553"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T08:53:15.35181954Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T08:53:17.041535905Z",
"name": "test_16299679949831629967994983"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T08:59:52.639696743Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T08:59:54.538170036Z",
"name": "test_16299683923121629968392312"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:06:21.891707157Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:06:23.846219163Z",
"name": "test_16299687814871629968781487"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:12:53.982989Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:12:55.571265187Z",
"name": "test_16299691732871629969173287"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:17:58.206157753Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:17:59.659515838Z",
"name": "test_16299694779051629969477905"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:19:23.276267291Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:19:25.318976241Z",
"name": "test_16299695623981629969562398"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:26:22.538367707Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:26:25.085214782Z",
"name": "test_16299699813871629969981387"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:33:46.303790983Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:33:48.288311235Z",
"name": "test_16299704254441629970425444"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:55:09.157561612Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:55:10.741852436Z",
"name": "test_16299717065381629971706538"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T10:02:50.175530821Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T10:02:52.026307768Z",
"name": "test_16299721694081629972169408"
}
]
}
}

Human Readable Output#

Results#

assignment_rulecreated_bycreated_timestampdescriptiongroup_typeidmodified_bymodified_timestampname
device_id:[''],hostname:['']api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-26T10:02:50.175530821Zdescription2statica1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-26T10:02:52.026307768Ztest_16299721694081629972169408

42. cs-falcon-delete-host-groups#


Delete the requested host groups.

Base Command#

cs-falcon-delete-host-groups

Input#

Argument NameDescriptionRequired
host_group_idA comma-separated list of the IDs of the host groups to be deleted.Required

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-delete-host-groups host_group_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1,a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Human Readable Output#

host group id a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 deleted successfully host group id a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 deleted successfully

43. cs-falcon-search-custom-iocs#


Returns a list of your uploaded IOCs that match the search criteria.

Base Command#

cs-falcon-search-custom-iocs

Input#

Argument NameDescriptionRequired
typesA comma-separated list of indicator types. Valid types are: "sha256", "sha1", "md5", "domain", "ipv4", "ipv6".Optional
valuesA comma-separated list of indicator values.Optional
sourcesA comma-separated list of IOC sources.Optional
expirationThe date on which the indicator will become inactive (ISO 8601 format, i.e. YYYY-MM-DDThh:mm:ssZ).Optional
limitThe maximum number of records to return. The minimum is 1 and the maximum is 500. Default is 50.Optional
sortThe order in which the results are returned. Possible values are: "type.asc", "type.desc", "value.asc", "value.desc", "policy.asc", "policy.desc", "share_level.asc", "share_level.desc", "expiration_timestamp.asc", and "expiration_timestamp.desc".Optional
offsetThe offset to begin the list from. For example, start from the 10th record and return the list. Default is 0.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.SeveritystringThe severity level to apply to this indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ActionstringAction to take when a host observes the custom IOC.
CrowdStrike.IOC.ExpirationdateThe datetime when the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.

Command example#

!cs-falcon-search-custom-iocs limit=2

Context Example#

{
"CrowdStrike": {
"IOC": [
{
"Action": "no_action",
"CreatedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"CreatedTime": "2022-02-16T17:17:25.992164453Z",
"Description": "test",
"Expiration": "2022-02-17T13:47:57Z",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedTime": "2022-02-16T17:17:25.992164453Z",
"Platforms": [
"mac"
],
"Severity": "informational",
"Source": "Cortex XSOAR",
"Type": "ipv4",
"Value": "1.1.8.9"
},
{
"Action": "no_action",
"CreatedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"CreatedTime": "2022-02-16T17:16:44.514398876Z",
"Description": "test",
"Expiration": "2022-02-17T13:47:57Z",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedTime": "2022-02-16T17:16:44.514398876Z",
"Platforms": [
"mac"
],
"Severity": "informational",
"Source": "Cortex XSOAR",
"Type": "ipv4",
"Value": "4.1.8.9"
}
]
}
}

Human Readable Output#

Indicators of Compromise#

IDActionSeverityTypeValueExpirationCreatedByCreatedTimeDescriptionModifiedByModifiedTimePlatformsPolicyShareLevelSourceTags
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1no_actioninformationalipv41.1.8.92022-02-17T13:47:57Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:17:25.992164453Ztesta1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:17:25.992164453ZmacCortex XSOAR
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1no_actioninformationalipv44.1.8.92022-02-17T13:47:57Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:16:44.514398876Ztesta1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:16:44.514398876ZmacCortex XSOAR

44. cs-falcon-get-custom-ioc#


Gets the full definition of one or more indicators that you are watching.

Base Command#

cs-falcon-get-custom-ioc

Input#

Argument NameDescriptionRequired
typeThe IOC type to retrieve. Possible values are: "sha256", "sha1", "md5", "domain", "ipv4", and "ipv6". Either ioc_id or ioc_type and value must be provided.Optional
valueThe string representation of the indicator. Either ioc_id or ioc_type and value must be provided.Optional
ioc_idThe ID of the IOC to get. Can be retrieved by running the cs-falcon-search-custom-iocs command. Either ioc_id or ioc_type and value must be provided.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.SeveritystringThe severity level to apply to this indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ActionstringAction to take when a host observes the custom IOC.
CrowdStrike.IOC.ExpirationdateThe datetime when the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.

Command example#

!cs-falcon-get-custom-ioc type=ipv4 value=7.5.9.8

Context Example#

{
"CrowdStrike": {
"IOC": {
"Action": "no_action",
"CreatedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"CreatedTime": "2022-02-16T14:25:22.968603813Z",
"Expiration": "2022-02-17T17:55:09Z",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedTime": "2022-02-16T14:25:22.968603813Z",
"Platforms": [
"linux"
],
"Severity": "informational",
"Source": "cortex xsoar",
"Tags": [
"test",
"test1"
],
"Type": "ipv4",
"Value": "7.5.9.8"
}
}
}

Human Readable Output#

Indicator of Compromise#

IDActionSeverityTypeValueExpirationCreatedByCreatedTimeDescriptionModifiedByModifiedTimePlatformsPolicyShareLevelSourceTags
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1no_actioninformationalipv47.5.9.82022-02-17T17:55:09Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T14:25:22.968603813Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T14:25:22.968603813Zlinuxcortex xsoartest,
test1

45. cs-falcon-upload-custom-ioc#


Uploads an indicator for CrowdStrike to monitor.

Base Command#

cs-falcon-upload-custom-ioc

Input#

Argument NameDescriptionRequired
ioc_typeThe type of the indicator. Possible values are: "sha256", "md5", "domain", "ipv4", and "ipv6".Required
valueA comma separated list of indicators. More than one value can be supplied in order to upload multiple IOCs of the same type but with different values. Note that the uploaded IOCs will have the same properties (as supplied in other arguments).Required
actionAction to take when a host observes the custom IOC. Possible values are: no_action - Save the indicator for future use, but take no action. No severity required. allow - Applies to hashes only. Allow the indicator and do not detect it. Severity does not apply and should not be provided. prevent_no_ui - Applies to hashes only. Block and detect the indicator, but hide it from Activity > Detections. Has a default severity value. prevent - Applies to hashes only. Block the indicator and show it as a detection at the selected severity. detect - Enable detections for the indicator at the selected severity.Required
platformsThe platforms that the indicator applies to. You can enter multiple platform names, separated by commas. Possible values are: mac, windows and linux.Required
severityThe severity level to apply to this indicator. Possible values are: informational, low, medium, high and critical.Required for the prevent and detect actions. Optional for no_action.
expirationThe date on which the indicator will become inactive (ISO 8601 format, i.e. YYYY-MM-DDThh:mm:ssZ).Optional
sourceThe source where this indicator originated. This can be used for tracking where this indicator was defined. Limited to 200 characters.Optional
descriptionA meaningful description of the indicator. Limited to 200 characters.Optional
applied_globallyWhether the indicator is applied globally. Either applied_globally or host_groups must be provided. Possible values are: true, false.Optional
host_groupsList of host group IDs that the indicator applies to. Can be retrieved by running the cs-falcon-list-host-groups command. Either applied_globally or host_groups must be provided.Optional
tagsList of tags to apply to the indicator.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.SeveritystringThe severity level to apply to this indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ActionstringAction to take when a host observes the custom IOC.
CrowdStrike.IOC.ExpirationdateThe datetime when the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.
CrowdStrike.IOC.TagsUnknownThe tags of the IOC.
CrowdStrike.IOC.PlatformsUnknownThe platforms of the IOC.

Command Example#

!cs-falcon-upload-custom-ioc ioc_type="domain" value="test.domain.com" action="prevent" severity="high" source="Demisto playbook" description="Test ioc" platforms="mac"

Context Example#

{
"CrowdStrike": {
"IOC": {
"CreatedTime": "2020-10-02T13:55:26Z",
"Description": "Test ioc",
"Expiration": "2020-11-01T00:00:00Z",
"ID": "4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r",
"ModifiedTime": "2020-10-02T13:55:26Z",
"Action": "prevent",
"Severity": "high",
"Source": "Demisto playbook",
"Type": "domain",
"Value": "test.domain.com",
"Platforms": ["mac"]
}
}
}

Human Readable Output#

Custom IOC was created successfully#

CreatedTimeDescriptionExpirationIDModifiedTimeActionSeveritySourceTypeValue
2020-10-02T13:55:26ZTest ioc2020-11-01T00:00:00Z4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r2020-10-02T13:55:26ZpreventhighDemisto playbookdomaintest.domain.com

46. cs-falcon-update-custom-ioc#


Updates an indicator for CrowdStrike to monitor.

Base Command#

cs-falcon-update-custom-ioc

Input#

Argument NameDescriptionRequired
ioc_idThe ID of the IOC to delete. Can be retrieved by running the cs-falcon-search-custom-iocs command.Required
actionAction to take when a host observes the custom IOC. Possible values are: no_action - Save the indicator for future use, but take no action. No severity required. allow - Applies to hashes only. Allow the indicator and do not detect it. Severity does not apply and should not be provided. prevent_no_ui - Applies to hashes only. Block and detect the indicator, but hide it from Activity > Detections. Has a default severity value. prevent - Applies to hashes only. Block the indicator and show it as a detection at the selected severity. detect - Enable detections for the indicator at the selected severity.Optional
platformsThe platforms that the indicator applies to. You can enter multiple platform names, separated by commas. Possible values are: mac, windows and linux.Optional
severityThe severity level to apply to this indicator. Possible values are: informational, low, medium, high and critical.Required for the prevent and detect actions. Optional for no_action.
expirationThe date on which the indicator will become inactive (ISO 8601 format, i.e. YYYY-MM-DDThh:mm:ssZ).Optional
sourceThe source where this indicator originated. This can be used for tracking where this indicator was defined. Limited to 200 characters.Optional
descriptionA meaningful description of the indicator. Limited to 200 characters.Optional
applied_globallyWhether the indicator is applied globally. Possible values are: true and false. Either applied_globally or host_groups must be provided.Optional
host_groupsList of host group IDs that the indicator applies to. Can be retrieved by running the cs-falcon-list-host-groups command. Either applied_globally or host_groups must be provided.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator (type:value).
CrowdStrike.IOC.PolicystringThe policy of the indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ShareLevelstringThe level at which the indicator will be shared.
CrowdStrike.IOC.ExpirationstringThe datetime when the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimestringThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimestringThe date and time the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.

Command Example#

!cs-falcon-update-custom-ioc ioc_id="4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r" severity="high"

Context Example#

{
"CrowdStrike": {
"IOC": {
"CreatedTime": "2020-10-02T13:55:26Z",
"Description": "Test ioc",
"Expiration": "2020-11-01T00:00:00Z",
"ID": "4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r",
"ModifiedTime": "2020-10-02T13:55:26Z",
"Action": "prevent",
"Severity": "high",
"Source": "Demisto playbook",
"Type": "domain",
"Value": "test.domain.com"
}
}
}

Human Readable Output#

Custom IOC was updated successfully#

CreatedTimeDescriptionExpirationIDModifiedTimeActionSeveritySourceTypeValue
2020-10-02T13:55:26ZTest ioc2020-11-01T00:00:00Z4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r2020-10-02T13:55:26ZpreventhighDemisto playbookdomaintest.domain.com

47. cs-falcon-delete-custom-ioc#


Deletes a monitored indicator.

Base Command#

cs-falcon-delete-custom-ioc

Input#

Argument NameDescriptionRequired
ioc_idThe ID of the IOC to delete. Can be retrieved by running the cs-falcon-search-custom-iocs command.Required

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-delete-custom-ioc ioc_id="4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r"

Human Readable Output#

Custom IOC 4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r was successfully deleted.

48. cs-falcon-batch-upload-custom-ioc#


Uploads a batch of indicators.

Base Command#

cs-falcon-batch-upload-custom-ioc

Input#

Argument NameDescriptionRequired
multiple_indicators_jsonA JSON object with list of CS Falcon indicators to upload.Required
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs. Default is 180.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.SeveritystringThe severity level to apply to this indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ActionstringThe action to take when a host observes the custom IOC.
CrowdStrike.IOC.ExpirationstringThe datetime the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.
CrowdStrike.IOC.TagsUnknownThe tags of the IOC.
CrowdStrike.IOC.PlatformsUnknownThe platforms of the IOC.

Command example#

!cs-falcon-batch-upload-custom-ioc multiple_indicators_json=`[{"description": "test", "expiration": "2022-02-17T13:47:57Z", "type": "ipv4", "severity": "Informational", "value": "1.1.8.9", "action": "no_action", "platforms": ["mac"], "source": "Cortex XSOAR", "applied_globally": true}]`

Context Example#

{
"CrowdStrike": {
"IOC": {
"Action": "no_action",
"CreatedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"CreatedTime": "2022-02-16T17:17:25.992164453Z",
"Description": "test",
"Expiration": "2022-02-17T13:47:57Z",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedTime": "2022-02-16T17:17:25.992164453Z",
"Platforms": [
"mac"
],
"Severity": "informational",
"Source": "Cortex XSOAR",
"Type": "ipv4",
"Value": "1.1.8.9"
}
}
}

Human Readable Output#

Custom IOC 1.1.8.9 was created successfully#

ActionCreatedByCreatedTimeDescriptionExpirationIDModifiedByModifiedTimePlatformsSeveritySourceTypeValue
no_actiona1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:17:25.992164453Ztest2022-02-17T13:47:57Z"a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:17:25.992164453ZmacinformationalCortex XSOARipv41.1.8.9

49. cs-falcon-rtr-kill-process#


Execute an active responder kill command on a single host.

Base Command#

cs-falcon-rtr-kill-process

Input#

Argument NameDescriptionRequired
host_idThe host ID you would like to kill the given process for.Required
process_idsA comma-separated list of process IDs to kill.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.kill.ProcessIDStringThe process ID that was killed.
CrowdStrike.Command.kill.ErrorStringThe error message raised if the command was failed.
CrowdStrike.Command.kill.HostIDStringThe host ID.

Command example#

!cs-falcon-rtr-kill-process host_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 process_ids=5260,123

Context Example#

{
"CrowdStrike": {
"Command": {
"kill": [
{
"Error": "Cannot find a process with the process identifier 123.",
"HostID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ProcessID": "123"
},
{
"Error": "Success",
"HostID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ProcessID": "5260"
}
]
}
}
}

Human Readable Output#

CrowdStrike Falcon kill command on host a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:#

ProcessIDError
123Cannot find a process with the process identifier 123.
5260Success

Note: you don't see the following IDs in the results as the request was failed for them. ID 123 failed as it was not found.

50. cs-falcon-rtr-remove-file#


Batch executes an RTR active-responder remove file across the hosts mapped to the given batch ID.

Base Command#

cs-falcon-rtr-remove-file

Input#

Argument NameDescriptionRequired
host_idsA comma-separated list of the hosts IDs you would like to remove the file for.Required
file_pathThe path to a file or a directory you want to remove.Required
osThe operating system of the hosts given. Since the remove command is different in each operating system, you can choose only one operating system. Possible values are: Windows, Linux, Mac.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.rm.HostIDStringThe host ID.
CrowdStrike.Command.rm.ErrorStringThe error message raised if the command failed.

Command example#

!cs-falcon-rtr-remove-file file_path="c:\\testfolder" host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 os=Windows

Context Example#

{
"CrowdStrike": {
"Command": {
"rm": {
"Error": "Success",
"HostID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
}
}

Human Readable Output#

CrowdStrike Falcon rm over the file: c:\testfolder#

HostIDError
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1Success

51. cs-falcon-rtr-list-processes#


Executes an RTR active-responder ps command to get a list of active processes across the given host.

Base Command#

cs-falcon-rtr-list-processes

Input#

Argument NameDescriptionRequired
host_idThe host ID you want to get the processes list from.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.ps.FilenameStringThe the name of the result file to be returned.

Command example#

!cs-falcon-rtr-list-processes host_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
"CrowdStrike": {
"Command": {
"ps": {
"Filename": "ps-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
},
"File": {
"EntryID": "1792@5e02fcd0-37ad-4124-836d-7e769ba0ae86",
"Info": "text/plain",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Name": "ps-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA1": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a115919af3",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA512": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SSDeep": "768:4jcAkTBaZ61QUEcDBdMoFwIxVvroYrohrbY2akHLnsa5fbqFEJtPNObzVj0ff+3K:4IraZ61QUEcDBdMoFwIxRJEbY2akHLnr",
"Size": 30798,
"Type": "ASCII text"
}
}

Human Readable Output#

CrowdStrike Falcon ps command on host a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:#

Stdout
TOO MUCH INFO TO DISPLAY

52. cs-falcon-rtr-list-network-stats#


Executes an RTR active-responder netstat command to get a list of network status and protocol statistics across the given host.

Base Command#

cs-falcon-rtr-list-network-stats

Input#

Argument NameDescriptionRequired
host_idThe host ID you want to get the network status and protocol statistics list from.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.netstat.FilenameStringThe the name of the result file to be returned.

Command example#

!cs-falcon-rtr-list-network-stats host_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
"CrowdStrike": {
"Command": {
"netstat": {
"Filename": "netstat-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
},
"File": {
"EntryID": "1797@5e02fcd0-37ad-4124-836d-7e769ba0ae86",
"Info": "text/plain",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Name": "netstat-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA1": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1864ce595",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA512": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SSDeep": "48:XSvprPoeCfd8saowYL8zjt6yjjRchg24OI58RtTLvWptl6TtCla5n1lEtClMw/u:CRQeCxRmxVpIHUchCIvsCo",
"Size": 4987,
"Type": "ASCII text, with CRLF line terminators"
}
}

Human Readable Output#

CrowdStrike Falcon netstat command on host a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:#

Stdout
TOO MUCH INFO TO DISPLAY

53. cs-falcon-rtr-read-registry#


Executes an RTR active-responder read registry keys command across the given hosts. This command is valid only for Windows hosts.

Base Command#

cs-falcon-rtr-read-registry

Input#

Argument NameDescriptionRequired
host_idsA comma-separated list of the host IDs you want to get the registry keys from.Required
registry_keysA comma-separated list of the registry keys, sub keys or value to get.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

There is no context output for this command.

Command example#

``!cs-falcon-rtr-read-registry host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 registry_keys= HKEY_LOCAL_MACHINE,HKEY_USERS````

Context Example#

{
"File": [
{
"EntryID": "1806@5e02fcd0-37ad-4124-836d-7e769ba0ae86",
"Info": "text/plain",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Name": "reg-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1HKEY_USERS",
"SHA1": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a139dd0333",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA512": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SSDeep": "12:uSn3PtdoI1pZI2WUNI2e6NI2vboI2vbP3I2zd:uSQIpZIII1aIUMIUjIcd",
"Size": 656,
"Type": "ASCII text, with CRLF, LF line terminators"
},
{
"EntryID": "1807@5e02fcd0-37ad-4124-836d-7e769ba0ae86",
"Info": "text/plain",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Name": "reg-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1HKEY_LOCAL_MACHINE",
"SHA1": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a18e3b4919",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA512": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SSDeep": "6:zYuSugMQEYPtdWCMwdiwf2Jai2FU42DGE25/:zYuSnMQXPtd9/eJqy7yfh",
"Size": 320,
"Type": "ASCII text, with CRLF, LF line terminators"
}
]
}

Human Readable Output#

CrowdStrike Falcon reg command on hosts ['a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1']:#

FileNameStdout
reg-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1HKEY_USERSTOO MUCH INFO TO DISPLAY
reg-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1HKEY_LOCAL_MACHINETOO MUCH INFO TO DISPLAY

54. cs-falcon-rtr-list-scheduled-tasks#


Executes an RTR active-responder netstat command to get a list of scheduled tasks across the given host. This command is valid only for Windows hosts.

Base Command#

cs-falcon-rtr-list-scheduled-tasks

Input#

Argument NameDescriptionRequired
host_idsA comma-separated list of the hosts IDs you want to get the list of scheduled tasks from.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

There is no context output for this command.

Command example#

!cs-falcon-rtr-list-scheduled-tasks host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
"CrowdStrike": {
"Command": {
"runscript": {
"Filename": "runscript-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
},
"File": {
"EntryID": "1812@5e02fcd0-37ad-4124-836d-7e769ba0ae86",
"Info": "text/plain",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Name": "runscript-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA1": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1c589bf80",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA512": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SSDeep": "3072:zjQ3/3YHGa8dbXbpbItbo4W444ibNb9MTf2Wat4cuuEqk4W4ybmF54c4eEEEjX6f:EXN8Nbw",
"Size": 299252,
"Type": "ASCII text"
}
}

Human Readable Output#

CrowdStrike Falcon runscript command on host a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:#

Stdout
TOO MUCH INFO TO DISPLAY

55. cs-falcon-rtr-retrieve-file#


Gets the RTR extracted file contents for the specified file path.

Base Command#

cs-falcon-rtr-retrieve-file

Input#

Argument NameDescriptionRequired
host_idsA comma-separated list of the hosts IDs you want to get the file from.Required
file_pathThe file path of the required file to extract.Required
filenameThe file name to use for the archive name and the file within the archive.Optional
interval_in_secondsInterval between polling. Default is 60 seconds. Must be higher than 10.Optional
hosts_and_requests_idsThis is an internal argument used for the polling process, not to be used by the user.Optional
SHA256This is an internal argument used for the polling process, not to be used by the user.Optional
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional
polling_timeoutTimeout for polling. Default is 600 seconds.Optional

Context Output#

PathTypeDescription
CrowdStrike.File.FileNameStringThe file name.
CrowdStrike.File.HostIDStringThe host ID.
File.SizeNumberThe size of the file.
File.SHA1StringThe SHA1 hash of the file.
File.SHA256StringThe SHA256 hash of the file.
File.SHA512StringThe SHA512 hash of the file.
File.NameStringThe name of the file.
File.SSDeepStringThe SSDeep hash of the file.
File.EntryIDStringThe entry ID of the file.
File.InfoStringInformation about the file.
File.TypeStringThe file type.
File.MD5StringThe MD5 hash of the file.
File.ExtensionStringThe extension of the file.

Command example#

!cs-falcon-rtr-retrieve-file file_path=`C:\Windows\System32\Windows.Media.FaceAnalysis.dll` host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1,a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Human Readable Output#

Waiting for the polling execution

56. cs-falcon-get-detections-for-incident#


Gets the detections for a specific incident.

Base Command#

cs-falcon-get-detections-for-incident

Input#

Argument NameDescriptionRequired
incident_idThe incident ID to get detections for. A list of all available incident IDs can be retrieved by running the 'cs-falcon-list-incident-summaries' command.Required

Context Output#

PathTypeDescription
CrowdStrike.IncidentDetection.incident_idStringThe incident ID.
CrowdStrike.IncidentDetection.behavior_idStringThe behavior ID connected to the incident.
CrowdStrike.IncidentDetection.detection_idsStringA list of detection IDs connected to the incident.

Command example#

``!cs-falcon-get-detections-for-incident incident_id=inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1````

Context Example#

{
"CrowdStrike": {
"IncidentDetection": {
"behavior_id": "ind:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:162589633341-10303-6705920",
"detection_ids": [
"ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:38655034604"
],
"incident_id": "inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
}

Human Readable Output#

Detection For Incident#

behavior_iddetection_idsincident_id
ind:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:162590282130-10303-6707968ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:38656254663inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1
ind:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:162596456872-10303-6710016ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:38657629548inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1
ind:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:162597577534-10305-6712576ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:38658614774inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1
ind:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:162589633341-10303-6705920ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:38655034604inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

17. cs-falcon-update-incident-comment#


Updates CrowdStrike Incident with the comment.

Base Command#

cs-falcon-update-incident-comment

Input#

Argument NameDescriptionRequired
idsA comma-separated list of incident IDs.Required
commentA comment added to the CrowdStrike incident.Required

Context Output#

Command Example#

cs-falcon-update-incident-comment ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 comment="Some comment"

Spotlight#

Using Spotlight APIs#

Spotlight identifies and gives info about specific vulnerabilities on your hosts using the Falcon sensor.

Required API client scope#

To access the Spotlight API, your API client must be assigned the spotlight-vulnerabilities:read scope.

Validating API data#

The Falcon sensor continuously monitors hosts for any changes and reports them as they occur. Depending on the timing of requests, Spotlight APIs can return values that are different from those shown by the Falcon console or an external source. There are other factors that can cause differences between API responses and other data sources.

API query syntax#

If an API query doesn’t exactly match the query used on the Spotlight Vulnerabilities page, the values might differ.

Expired vulnerabilities in Spotlight APIs#

If a host is deleted or inactive for 45 days, the status of vulnerabilities on that host changes to expired. Expired vulnerabilities are removed from Spotlight after 3 days. Expired vulnerabilities are only visible in API responses and are not included in reports or the Falcon console. An external data source might not use the same data retention policy, which can lead to discrepancies with Spotlight APIs. For more info, see Data retention in Spotlight [https://falcon.crowdstrike.com/login/?next=%2Fdocumentation%2F43%2Ffalcon-spotlight-overview#data-retention-in-spotlight].

The following commands uses the Spotlight API:#

cs-falcon-spotlight-search-vulnerability#


Retrieve vulnerability details according to the selected filter. Each request requires at least one filter parameter. Supported with the CrowdStrike Spotlight license.

Base Command#

cs-falcon-spotlight-search-vulnerability

Input#

Argument NameDescriptionRequired
filterLimit the vulnerabilities returned to specific properties. Each value must be enclosed in single quotes and placed immediately after the colon with no space. For example, 'filter=status:'open'+cve.id:['CVE-2013-3900','CVE-2021-1675']'.Optional
aidUnique agent identifier (AID) of a sensor.Optional
cve_idUnique identifier for a vulnerability as cataloged in the National Vulnerability Database (NVD). This filter supports multiple values and negation.Optional
cve_severitySeverity of the CVE. The possible values are: CRITICAL, HIGH, MEDIUM, LOW, UNKNOWN, or NONE.Optional
tagsName of a tag assigned to a host. Retrieve tags from Host Tags APIs.Optional
statusStatus of a vulnerability. This filter supports multiple values and negation. The possible values are: open, closed, reopen, expired.Optional
platform_nameOperating system platform. This filter supports negation. The possible values are: Windows, Mac, Linux.Optional
host_groupUnique system-assigned ID of a host group. Retrieve the host group ID from Host Group APIs.Optional
host_typeType of host a sensor is running on.Optional
last_seen_withinFilter for vulnerabilities based on the number of days since a host last connected to CrowdStrike Falcon. Enter a numeric value from 3 to 45 to indicate the number of days you want to look back. Example- last_seen_within:10.Optional
is_suppressedIndicates if the vulnerability is suppressed by a suppression rule. Possible values are: true, false.Optional
display_remediation_infoDisplay remediation information type of data to be returned for each vulnerability entity. Possible values are: True, False. Default is True.Optional
display_evaluation_logic_infoWhether to return logic information type of data for each vulnerability entity. Possible values are: True, False. Default is True.Optional
display_host_infoWhether to return host information type of data for each vulnerability entity. Possible values are: True, False. Default is False.Optional
limitMaximum number of items to return (1-5000). Default is 50.Optional

Context Output#

PathTypeDescription
CrowdStrike.Vulnerability.idStringUnique system-assigned ID of the vulnerability.
CrowdStrike.Vulnerability.cidStringUnique system-generated customer identifier (CID) of the account.
CrowdStrike.Vulnerability.aidStringUnique agent identifier (AID) of the sensor where the vulnerability was found.
CrowdStrike.Vulnerability.created_timestampDateUTC date and time of when the vulnerability was created in Spotlight.
CrowdStrike.Vulnerability.updated_timestampDateUTC date and time of the last update made on the vulnerability.
CrowdStrike.Vulnerability.statusStringVulnerability's current status. Possible values are: open, closed, reopen, or expired.
CrowdStrike.Vulnerability.apps.product_name_versionStringName and version of the product associated with the vulnerability.
CrowdStrike.Vulnerability.apps.sub_statusStringStatus of each product associated with the vulnerability. Possible values are: open, closed, or reopen.
CrowdStrike.Vulnerability.apps.remediation.idsStringRemediation ID of each product associated with the vulnerability.
CrowdStrike.Vulnerability.host_info.hostnameStringName of the machine.
CrowdStrike.Vulnerability.host_info.instance_idStringCloud instance ID of the host.
CrowdStrike.Vulnerability.host_info.service_provider_account_idStringCloud service provider account ID for the host.
CrowdStrike.Vulnerability.host_info.service_providerStringCloud service provider for the host.
CrowdStrike.Vulnerability.host_info.os_buildStringOperating system build.
CrowdStrike.Vulnerability.host_info.product_type_descStringType of host a sensor is running on.
CrowdStrike.Vulnerability.host_info.local_ipStringDevice's local IP address.
CrowdStrike.Vulnerability.host_info.machine_domainStringActive Directory domain name.
CrowdStrike.Vulnerability.host_info.os_versionStringOperating system version.
CrowdStrike.Vulnerability.host_info.ouStringActive directory organizational unit name.
CrowdStrike.Vulnerability.host_info.site_nameStringActive directory site name.
CrowdStrike.Vulnerability.host_info.system_manufacturerStringName of the system manufacturer.
CrowdStrike.Vulnerability.host_info.groups.idStringArray of host group IDs that the host is assigned to.
CrowdStrike.Vulnerability.host_info.groups.nameStringArray of host group names that the host is assigned to.
CrowdStrike.Vulnerability.host_info.tagsStringName of a tag assigned to a host.
CrowdStrike.Vulnerability.host_info.platformStringOperating system platform. This filter supports negation.
CrowdStrike.Vulnerability.remediation.entities.idStringUnique ID of the remediation.
CrowdStrike.Vulnerability.remediation.entities.referenceStringRelevant reference for the remediation that can be used to get additional details for the remediation.
CrowdStrike.Vulnerability.remediation.entities.titleStringShort description of the remediation.
CrowdStrike.Vulnerability.remediation.entities.actionStringExpanded description of the remediation.
CrowdStrike.Vulnerability.remediation.entities.linkStringLink to the remediation page for the vendor. In certain cases, this field is null.
CrowdStrike.Vulnerability.cve.idStringUnique identifier for a vulnerability as cataloged in the National Vulnerability Database (NVD).
CrowdStrike.Vulnerability.cve.base_scoreNumberBase score of the CVE (float value between 1 and 10).
CrowdStrike.Vulnerability.cve.severityStringCVSS severity rating of the vulnerability.
CrowdStrike.Vulnerability.cve.exploit_statusNumberNumeric value of the most severe known exploit.
CrowdStrike.Vulnerability.cve.exprt_ratingStringExPRT rating assigned by CrowdStrike's predictive AI rating system.
CrowdStrike.Vulnerability.cve.descriptionStringBrief description of the CVE.
CrowdStrike.Vulnerability.cve.published_dateDateUTC timestamp with the date and time of when the vendor published the CVE.
CrowdStrike.Vulnerability.cve.vendor_advisoryStringLink to the vendor page where the CVE was disclosed.
CrowdStrike.Vulnerability.cve.exploitability_scoreNumberExploitability score of the CVE (float values from 1-4).
CrowdStrike.Vulnerability.cve.impact_scoreNumberImpact score of the CVE (float values from 1-6).
CrowdStrike.Vulnerability.cve.vectorStringTextual representation of the metric values used to score the vulnerability.
CrowdStrike.Vulnerability.cve.remediation_levelStringCVSS remediation level of the vulnerability (U = Unavailable, or O = Official fix).
CrowdStrike.Vulnerability.cve.cisa_info.is_cisa_kevBooleanWhether to filter for vulnerabilities that are in the CISA Known Exploited Vulnerabilities (KEV) catalog.
CrowdStrike.Vulnerability.cve.cisa_info.due_dateDateDate before which CISA mandates subject organizations to patch the vulnerability.
CrowdStrike.Vulnerability.cve.spotlight_published_dateDateUTC timestamp with the date and time Spotlight enabled coverage for the vulnerability.
CrowdStrike.Vulnerability.cve.actorsStringAdversaries associated with the vulnerability.
CrowdStrike.Vulnerability.cve.nameStringThe vulnerability name.

Command example#

cs-falcon-spotlight-search-vulnerability filter=status:['open','closed'] cve_id=CVE-2021-2222 cve_severity='LOW,HIGH' display_host_info=false display_evaluation_logic_info=false display_remediation_info=false limit=1

Context Example#

{
"resources": [
{
"id": "id_num",
"cid": "cid_num",
"aid": "aid_num",
"created_timestamp": "2021-07-13T01:12:57Z",
"updated_timestamp": "2022-10-27T18:32:21Z",
"status": "open",
"apps": [
{
"product_name_version": "product",
"sub_status": "open",
"remediation": {
"ids": [
"1234"
]
},
"evaluation_logic": {
"id": "1234"
}
}
],
"suppression_info": {
"is_suppressed": false
},
"cve": {
"id": "CVE-2021-2222",
"base_score": 5.5,
"severity": "MEDIUM",
"exploit_status": 0,
"exprt_rating": "LOW",
"remediation_level": "O",
"cisa_info": {
"is_cisa_kev": false
},
"spotlight_published_date": "2021-05-10T17:08:00Z",
"description": "description\n",
"published_date": "2021-02-25T23:15:00Z",
"vendor_advisory": [
"web address"
],
"exploitability_score": 1.8,
"impact_score": 3.6,
"vector": "vendor"
}
}
]
}
CVE IDCVE SeverityCVE Base ScoreCVE Published DateCVE Impact ScoreCVE Exploitability ScoreCVE Vector
CVE-2021-2222LOW5.52021-05-10T17:08:00Z3.60vendor

cs-falcon-spotlight-list-host-by-vulnerability#


Retrieve vulnerability details for a specific ID and host. Supported with the CrowdStrike Spotlight license.

Base Command#

cs-falcon-spotlight-list-host-by-vulnerability

Input#

Argument NameDescriptionRequired
limitMaximum number of items to return (1-5000). Default is 50.Optional
cve_idsUnique identifier for a vulnerability as cataloged in the National Vulnerability Database (NVD). This filter supports multiple values and negation.Required

Context Output#

PathTypeDescription
CrowdStrike.VulnerabilityHost.idStringUnique system-assigned ID of the vulnerability.
CrowdStrike.VulnerabilityHost.cidStringUnique system-generated customer identifier (CID) of the account.
CrowdStrike.VulnerabilityHost.aidStringUnique agent identifier (AID) of the sensor where the vulnerability was found.
CrowdStrike.VulnerabilityHost.created_timestampDateUTC date and time of when the vulnerability was created in Spotlight.
CrowdStrike.VulnerabilityHost.updated_timestampDateUTC date and time of the last update made on the vulnerability.
CrowdStrike.VulnerabilityHost.statusStringVulnerability's current status. Possible values are: open, closed, reopen, or expired.
CrowdStrike.VulnerabilityHost.apps.product_name_versionStringName and version of the product associated with the vulnerability.
CrowdStrike.VulnerabilityHost.apps.sub_statusStringStatus of each product associated with the vulnerability. Possible values are: open, closed, or reopen.
CrowdStrike.VulnerabilityHost.apps.remediation.idsStringRemediation ID of each product associated with the vulnerability.
CrowdStrike.VulnerabilityHost.apps.evaluation_logic.idStringUnique system-assigned ID of the vulnerability evaluation logic.
CrowdStrike.VulnerabilityHost.suppression_info.is_suppressedBooleanIndicates if the vulnerability is suppressed by a suppression rule.
CrowdStrike.VulnerabilityHost.host_info.hostnameStringName of the machine.
CrowdStrike.VulnerabilityHost.host_info.local_ipStringDevice's local IP address.
CrowdStrike.VulnerabilityHost.host_info.machine_domainStringActive Directory domain name.
CrowdStrike.VulnerabilityHost.host_info.os_versionStringOperating system version.
CrowdStrike.VulnerabilityHost.host_info.ouStringActive directory organizational unit name.
CrowdStrike.VulnerabilityHost.host_info.site_nameStringActive directory site name.
CrowdStrike.VulnerabilityHost.host_info.system_manufacturerStringName of the system manufacturer.
CrowdStrike.VulnerabilityHost.host_info.platformStringOperating system platform. This filter supports negation.
CrowdStrike.VulnerabilityHost.host_info.instance_idStringCloud instance ID of the host.
CrowdStrike.VulnerabilityHost.host_info.service_provider_account_idStringCloud service provider account ID for the host.
CrowdStrike.VulnerabilityHost.host_info.service_providerStringCloud service provider for the host.
CrowdStrike.VulnerabilityHost.host_info.os_buildStringOperating system build.
CrowdStrike.VulnerabilityHost.host_info.product_type_descStringType of host a sensor is running on.
CrowdStrike.VulnerabilityHost.cve.idStringUnique identifier for a vulnerability as cataloged in the National Vulnerability Database (NVD).

Command example#

cs-falcon-spotlight-list-host-by-vulnerability cve_ids=CVE-2021-2222

Context Example#

{
{
"id": "id",
"cid": "cid",
"aid": "aid",
"created_timestamp": "2021-09-16T15:12:42Z",
"updated_timestamp": "2022-10-19T00:54:43Z",
"status": "open",
"apps": [
{
"product_name_version": "prod",
"sub_status": "open",
"remediation": {
"ids": [
"id"
]
},
"evaluation_logic": {
"id": "id"
}
}
],
"suppression_info": {
"is_suppressed": false
},
"host_info": {
"hostname": "host",
"local_ip": "10.128.0.7",
"machine_domain": "",
"os_version": "version",
"ou": "",
"site_name": "",
"system_manufacturer": "manufactor",
"tags": [],
"platform": "Windows",
"instance_id": "instance id",
"service_provider_account_id": "id",
"service_provider": "id",
"os_build": "os build",
"product_type_desc": "Server"
},
"cve": {
"id": "CVE-20212-2222"
}
}
}

Human Readable Output#

CVE IDHost Info hostnameHost Info os VersionHost Info Product Type DescHost Info Local IPHost Info ouHost Info Machine DomainHost Info Site NameCVE Exploitability ScoreCVE Vector
CVE-20212-2222host1Serveripsite5.5

cve#

Retrieve vulnerability details according to the selected filter. Each request requires at least one filter parameter. Supported with the CrowdStrike Spotlight license.

Base Command#

cve

Input#

Argument NameDescriptionRequired
cve_idDeprecated. Use cve instead.Optional
cveUnique identifier for a vulnerability as cataloged in the National Vulnerability Database (NVD). This filter supports multiple values and negationOptional

Command example#

cve cve_id=CVE-2021-2222

Human Readable Output#

IDSeverityPublished DateBase Score
CVE-2021-2222HIGH2021-09-16T15:12:42Z1

cs-falcon-create-ml-exclusion#


Create an ML exclusion.

Base Command#

cs-falcon-create-ml-exclusion

Input#

Argument NameDescriptionRequired
valueValue to match for exclusion.Required
excluded_fromA comma-separated list from where to exclude the exclusion. Possible values are: blocking, extraction.Required
commentComment describing why the exclusions were created.Optional
groupsA comma-separated list of group ID(s) impacted by the exclusion OR all if empty.Optional

Context Output#

PathTypeDescription
CrowdStrike.MLExclusion.idStringThe ML exclusion ID.
CrowdStrike.MLExclusion.valueStringThe ML exclusion value.
CrowdStrike.MLExclusion.regexp_valueStringA regular expression for matching the excluded value.
CrowdStrike.MLExclusion.value_hashStringAn hash of the value field.
CrowdStrike.MLExclusion.excluded_fromStringWhat the exclusion applies to (e.g., a specific ML model).
CrowdStrike.MLExclusion.groups.idStringGroup's ID that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.group_typeStringGroups type that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.nameStringGroups name that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.descriptionStringGroups description that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.assignment_ruleStringGroups assignment rule that the exclusion is associated with.
CrowdStrike.MLExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.MLExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.MLExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.MLExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.MLExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.MLExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.MLExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.MLExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.MLExclusion.created_byStringIndicate who created the rule.

Command example#

!cs-falcon-create-ml-exclusion value=/demo-test excluded_from=blocking groups=999999

Context Example#

{
"CrowdStrike": {
"MLExclusion": {
"applied_globally": false,
"created_by": "api-client-id:123456",
"created_on": "2023-03-06T13:57:14.853546312Z",
"excluded_from": [
"blocking"
],
"groups": [
{
"assignment_rule": "device_id",
"created_by": "admin@test.com",
"created_timestamp": "2023-01-23T15:01:11.846726918Z",
"description": "",
"group_type": "static",
"id": "999999",
"modified_by": "admin@test.com",
"modified_timestamp": "2023-01-23T15:18:52.316882546Z",
"name": "Lab env"
}
],
"id": "123456",
"last_modified": "2023-03-06T13:57:14.853546312Z",
"modified_by": "api-client-id:123456",
"regexp_value": "\\/demo-test",
"value": "/demo-test",
"value_hash": "abcdef123456"
}
}
}

Human Readable Output#

CrowdStrike Falcon machine learning exclusion#

IdValueRegexpValueValueHashExcludedFromGroupsAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
123456/demo-test\/demo-testabcdef123456values: blocking- id: 999999
group_type: static
name: Lab env
description:
assignment_rule: device_id:
created_by: admin@test.com
created_timestamp: 2023-01-23T15:01:11.846726918Z
modified_by: admin@test.com
modified_timestamp: 2023-01-23T15:18:52.316882546Z
2023-03-06T13:57:14.853546312Zapi-client-id:1234562023-03-06T13:57:14.853546312Zapi-client-id:123456

cs-falcon-update-ml-exclusion#


Updates an ML exclusion. At least one argument is required in addition to the ID argument.

Base Command#

cs-falcon-update-ml-exclusion

Input#

Argument NameDescriptionRequired
idThe ID of the exclusion to update.Required
valueValue to match for the exclusion (the exclusion pattern).Optional
commentComment describing why the exclusions were created.Optional
groupsA comma-separated list of group ID(s) impacted by the exclusion.Optional

Context Output#

PathTypeDescription
CrowdStrike.MLExclusion.idStringThe ML exclusion ID.
CrowdStrike.MLExclusion.valueStringThe ML exclusion value.
CrowdStrike.MLExclusion.regexp_valueStringA regular expression for matching the excluded value.
CrowdStrike.MLExclusion.value_hashStringAn hash of the value field.
CrowdStrike.MLExclusion.excluded_fromStringWhat the exclusion applies to (e.g., a specific ML model).
CrowdStrike.MLExclusion.groups.idStringGroups ID that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.group_typeStringGroups type that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.nameStringGroups name that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.descriptionStringGroups description that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.assignment_ruleStringGroups assignment rule that the exclusion is associated with.
CrowdStrike.MLExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.MLExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.MLExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.MLExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.MLExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.MLExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.MLExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.MLExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.MLExclusion.created_byStringIndicate who created the rule.

Command example#

!cs-falcon-update-ml-exclusion id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 comment=demo-comment

Context Example#

{
"CrowdStrike": {
"MLExclusion": {
"applied_globally": false,
"created_by": "api-client-id:123456",
"created_on": "2023-03-06T13:56:25.940685483Z",
"excluded_from": [
"extraction",
"blocking"
],
"groups": [
{
"assignment_rule": "device_id:",
"created_by": "admin@test.com",
"created_timestamp": "2023-01-23T15:01:11.846726918Z",
"description": "",
"group_type": "static",
"id": "999999",
"modified_by": "admin@test.com",
"modified_timestamp": "2023-01-23T15:18:52.316882546Z",
"name": "Lab env"
}
],
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"last_modified": "2023-03-06T13:57:21.57829431Z",
"modified_by": "api-client-id:123456",
"regexp_value": "\\/demo",
"value": "/demo",
"value_hash": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
}

Human Readable Output#

CrowdStrike Falcon machine learning exclusion#

IdValueRegexpValueValueHashExcludedFromGroupsAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1/demo\/demoa1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1values: extraction, blocking- id: 999999
group_type: static
name: Lab env
description:
assignment_rule: device_id:
created_by: admin@test.com
created_timestamp: 2023-01-23T15:01:11.846726918Z
modified_by: admin@test.com
modified_timestamp: 2023-01-23T15:18:52.316882546Z
2023-03-06T13:57:21.57829431Zapi-client-id:1234562023-03-06T13:56:25.940685483Zapi-client-id:123456

cs-falcon-delete-ml-exclusion#


Delete the ML exclusions by ID.

Base Command#

cs-falcon-delete-ml-exclusion

Input#

Argument NameDescriptionRequired
idsA comma-separated list of exclusion IDs to delete.Required

Context Output#

There is no context output for this command.

Command example#

!cs-falcon-delete-ml-exclusion ids=123456

Human Readable Output#

'The machine learning exclusions with IDs '123456' was successfully deleted.'

cs-falcon-search-ml-exclusion#


Get a list of ML exclusions by specifying their IDs, value, or a specific filter.

Base Command#

cs-falcon-search-ml-exclusion#


Get a list of ML exclusions by specifying their IDs, value, or a specific filter.

Base Command#

cs-falcon-search-ml-exclusion

Input#

Argument NameDescriptionRequired
filterA custom filter by which the exclusions should be filtered.
The syntax follows the pattern &lt;property&gt;:[operator]'&lt;value&gt;' for example: value:'test'.
Available filters: applied_globally, created_by, created_on, last_modified, modified_by, value.
For more information, see: https://www.falconpy.io/Service-Collections/Falcon-Query-Language.
Optional
valueThe value by which the exclusions should be filtered.Optional
idsA comma-separated list of exclusion IDs to retrieve. The IDs overwrite the filter and value.Optional
limitThe maximum number of records to return. [1-500]. Applies only if the IDs argument is not supplied.Optional
offsetThe offset to start retrieving records from. Applies only if the IDs argument is not supplied.Optional
sortHow to sort the retrieved exclusions. Possible values are: applied_globally.asc, applied_globally.desc, created_by.asc, created_by.desc, created_on.asc, created_on.desc, last_modified.asc, last_modified.desc, modified_by.asc, modified_by.desc, value.asc, value.desc.Optional

Context Output#

PathTypeDescription
CrowdStrike.MLExclusion.idStringThe ML exclusion ID.
CrowdStrike.MLExclusion.valueStringThe ML exclusion value.
CrowdStrike.MLExclusion.regexp_valueStringA regular expression for matching the excluded value.
CrowdStrike.MLExclusion.value_hashStringA hash of the value field.
CrowdStrike.MLExclusion.excluded_fromStringWhat the exclusion applies to (e.g., a specific ML model).
CrowdStrike.MLExclusion.groups.idStringGroups ID that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.group_typeStringGroups type that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.nameStringGroups name that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.descriptionStringGroups description that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.assignment_ruleStringGroups assignment rule that the exclusion is associated with.
CrowdStrike.MLExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.MLExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.MLExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.MLExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.MLExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.MLExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.MLExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.MLExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.MLExclusion.created_byStringIndicate who created the rule.

Command example#

!cs-falcon-search-ml-exclusion limit=1

Context Example#

{
"CrowdStrike": {
"MLExclusion": {
"applied_globally": false,
"created_by": "api-client-id:123456",
"created_on": "2023-03-01T18:51:07.196018144Z",
"excluded_from": [
"blocking"
],
"groups": [
{
"assignment_rule": "device_id",
"created_by": "admin@test.com",
"created_timestamp": "2023-01-23T15:01:11.846726918Z",
"description": "",
"group_type": "static",
"id": "999999",
"modified_by": "admin@test.com",
"modified_timestamp": "2023-01-23T15:18:52.316882546Z",
"name": "Lab env"
}
],
"id": "123456",
"last_modified": "2023-03-01T18:51:07.196018144Z",
"modified_by": "api-client-id:123456",
"regexp_value": "\\/MosheTest2-432",
"value": "/MosheTest2-432",
"value_hash": "abcdef123456"
}
}
}

Human Readable Output#

CrowdStrike Falcon machine learning exclusions#

IdValueRegexpValueValueHashExcludedFromGroupsAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
123456/MosheTest2-432\/MosheTest2-432abcdef123456values: blocking- id: 999999
group_type: static
name: Lab env
description:
assignment_rule: device_id
created_by: admin@test.com
created_timestamp: 2023-01-23T15:01:11.846726918Z
modified_by: admin@test.com
modified_timestamp: 2023-01-23T15:18:52.316882546Z
2023-03-01T18:51:07.196018144Zapi-client-id:1234562023-03-01T18:51:07.196018144Zapi-client-id:123456

cs-falcon-create-ioa-exclusion#


Create an IOA exclusion.

Base Command#

cs-falcon-create-ioa-exclusion

Input#

Argument NameDescriptionRequired
exclusion_nameName of the exclusion.Required
pattern_nameName of the exclusion pattern.Optional
pattern_idID of the exclusion pattern.Required
cl_regexCommand line regular expression.Required
ifn_regexImage file name regular expression.Required
commentComment describing why the exclusions were created.Optional
descriptionExclusion description.Optional
detection_jsonJSON formatted detection template.Optional
groupsA comma-separated list of group ID(s) impacted by the exclusion OR all if empty.Required

Context Output#

PathTypeDescription
CrowdStrike.IOAExclusion.idStringA unique identifier for the IOA exclusion.
CrowdStrike.IOAExclusion.nameStringThe name of the IOA exclusion.
CrowdStrike.IOAExclusion.descriptionStringA description of the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_idStringThe identifier of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_nameStringThe name of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.ifn_regexStringA regular expression used for file name matching.
CrowdStrike.IOAExclusion.cl_regexStringA regular expression used for command line matching.
CrowdStrike.IOAExclusion.detection_jsonStringA JSON string that describes the detection logic for the IOA exclusion.
CrowdStrike.IOAExclusion.groups.idStringGroups ID that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.group_typeStringGroups type that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.nameStringGroups name that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.descriptionStringGroups description that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.assignment_ruleStringGroups assignment rule that the exclusion is associated with.
CrowdStrike.IOAExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.IOAExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.IOAExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.IOAExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.IOAExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.IOAExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.IOAExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.IOAExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.IOAExclusion.created_byStringIndicate who created the rule.

Command example#

!cs-falcon-create-ioa-exclusion exclusion_name=demo-test pattern_id=101010 cl_regex=.* ifn_regex="c:\\\\windows\\\\system32\\\\test.exe" groups=999999

Context Example#

{
"CrowdStrike": {
"IOAExclusion": {
"applied_globally": false,
"cl_regex": ".*",
"created_by": "api-client-id:123456",
"created_on": "2023-03-06T13:57:41.746172897Z",
"description": "",
"detection_json": "",
"groups": [
{
"assignment_rule": "device_id",
"created_by": "admin@test.com",
"created_timestamp": "2023-01-23T15:01:11.846726918Z",
"description": "",
"group_type": "static",
"id": "999999",
"modified_by": "admin@test.com",
"modified_timestamp": "2023-01-23T15:18:52.316882546Z",
"name": "Lab env"
}
],
"id": "123456",
"ifn_regex": "c:\\\\windows\\\\system32\\\\test.exe",
"last_modified": "2023-03-06T13:57:41.746172897Z",
"modified_by": "api-client-id:123456",
"name": "demo-test",
"pattern_id": "101010",
"pattern_name": ""
}
}
}

Human Readable Output#

CrowdStrike Falcon IOA exclusion#

IdNamePatternIdIfnRegexClRegexGroupsAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
123456demo-test101010c:\windows\system32\poqexec.exe.*- id: 999999
group_type: static
name: Lab env
description:
assignment_rule: device_id
created_by: admin@test.com
created_timestamp: 2023-01-23T15:01:11.846726918Z
modified_by: admin@test.com
modified_timestamp: 2023-01-23T15:18:52.316882546Z
2023-03-06T13:57:41.746172897Zapi-client-id:1234562023-03-06T13:57:41.746172897Zapi-client-id:123456

cs-falcon-update-ioa-exclusion#


Updates an IOA exclusion. At least one argument is required in addition to the ID argument.

Base Command#

cs-falcon-update-ioa-exclusion

Input#

Argument NameDescriptionRequired
idID of the exclusion to update.Required
exclusion_nameName of the exclusion.Optional
pattern_idID of the exclusion pattern to update.Optional
pattern_nameName of the exclusion pattern.Optional
cl_regexCommand line regular expression.Optional
ifn_regexImage file name regular expression.Optional
commentComment describing why the exclusions was created.Optional
descriptionExclusion description.Optional
detection_jsonJSON formatted detection template.Optional
groupsA comma-separated list of group ID(s) impacted by the exclusion.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOAExclusion.idStringA unique identifier for the IOA exclusion.
CrowdStrike.IOAExclusion.nameStringThe name of the IOA exclusion.
CrowdStrike.IOAExclusion.descriptionStringA description of the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_idStringThe identifier of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_nameStringThe name of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.ifn_regexStringA regular expression used for file name matching.
CrowdStrike.IOAExclusion.cl_regexStringA regular expression used for command line matching.
CrowdStrike.IOAExclusion.detection_jsonStringA JSON string that describes the detection logic for the IOA exclusion.
CrowdStrike.IOAExclusion.groups.idStringGroups ID that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.group_typeStringGroups type that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.nameStringGroups name that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.descriptionStringGroups description that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.assignment_ruleStringGroups assignment rule that the exclusion is associated with.
CrowdStrike.IOAExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.IOAExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.IOAExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.IOAExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.IOAExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.IOAExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.IOAExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.IOAExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.IOAExclusion.created_byStringIndicate who created the rule.

Command example#

!cs-falcon-update-ioa-exclusion id=123456 description=demo-description

Context Example#

{
"CrowdStrike": {
"IOAExclusion": {
"applied_globally": false,
"cl_regex": ".*",
"created_by": "api-client-id:123456",
"created_on": "2023-03-06T13:46:58.137122925Z",
"description": "demo-description",
"detection_json": "",
"groups": [
{
"assignment_rule": "device_id",
"created_by": "admin@test.com",
"created_timestamp": "2023-01-23T15:01:11.846726918Z",
"description": "",
"group_type": "static",
"id": "999999",
"modified_by": "admin@test.com",
"modified_timestamp": "2023-01-23T15:18:52.316882546Z",
"name": "Lab env"
}
],
"id": "123456",
"ifn_regex": "c:\\\\windows\\\\system32\\\\poqexec\\.exe",
"last_modified": "2023-03-06T13:57:49.086458198Z",
"modified_by": "api-client-id:123456",
"name": "demo",
"pattern_id": "101010",
"pattern_name": ""
}
}
}

Human Readable Output#

CrowdStrike Falcon IOA exclusion#

IdNameDescriptionPatternIdIfnRegexClRegexGroupsAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
123456demodemo-description101010c:\windows\system32\poqexec.exe.*- id: 999999
group_type: static
name: Lab env
description:
assignment_rule: device_id
created_by: admin@test.com
created_timestamp: 2023-01-23T15:01:11.846726918Z
modified_by: admin@test.com
modified_timestamp: 2023-01-23T15:18:52.316882546Z
2023-03-06T13:57:49.086458198Zapi-client-id:1234562023-03-06T13:46:58.137122925Zapi-client-id:123456

cs-falcon-delete-ioa-exclusion#


Delete the IOA exclusions by ID.

Base Command#

cs-falcon-delete-ioa-exclusion

Input#

Argument NameDescriptionRequired
idsA comma-separated list of exclusion IDs to delete.Required

Context Output#

There is no context output for this command.

Command example#

!cs-falcon-delete-ioa-exclusion ids=123456

Human Readable Output#

'The IOA exclusions with IDs '123456' was successfully deleted.'

cs-falcon-search-ioa-exclusion#


Get a list of IOA exclusions by specifying their IDs or a filter.

Base Command#

cs-falcon-search-ioa-exclusion

Input#

Argument NameDescriptionRequired
filterA custom filter by which the exclusions should be filtered.
The syntax follows the pattern &lt;property&gt;:[operator]'&lt;value&gt;' for example: name:'test'.
Available filters: applied_globally, created_by, created_on, name, last_modified, modified_by, value, pattern.
For more information, see: https://www.falconpy.io/Service-Collections/Falcon-Query-Language.
Optional
nameThe name by which the exclusions should be filtered.Optional
idsA comma-separated list of exclusion IDs to retrieve. The IDs overwrite the filter and name.Optional
limitThe limit of how many exclusions to retrieve. Default is 50. Applies only if the IDs argument is not supplied.Optional
offsetThe offset of how many exclusions to skip. Default is 0. Applies only if the IDs argument is not supplied.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOAExclusion.idStringA unique identifier for the IOA exclusion.
CrowdStrike.IOAExclusion.nameStringThe name of the IOA exclusion.
CrowdStrike.IOAExclusion.descriptionStringA description of the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_idStringThe identifier of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_nameStringThe name of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.ifn_regexStringA regular expression used for file name matching.
CrowdStrike.IOAExclusion.cl_regexStringA regular expression used for command line matching.
CrowdStrike.IOAExclusion.detection_jsonStringA JSON string that describes the detection logic for the IOA exclusion.
CrowdStrike.IOAExclusion.groups.idStringGroups ID that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.group_typeStringGroups type that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.nameStringGroups name that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.descriptionStringGroups description that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.assignment_ruleStringGroups assignment rule that the exclusion is associated with.
CrowdStrike.IOAExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.IOAExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.IOAExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.IOAExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.IOAExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.IOAExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.IOAExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.IOAExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.IOAExclusion.created_byStringIndicate who created the rule.

Command example#

!cs-falcon-search-ioa-exclusion limit=1

Context Example#

{
"CrowdStrike": {
"IOAExclusion": {
"applied_globally": true,
"cl_regex": "regex",
"created_by": "user@test.com",
"created_on": "2023-02-06T16:42:19.29906839Z",
"description": "demo description",
"detection_json": "",
"groups": [],
"id": "123456",
"ifn_regex": ".*\\\\Windows\\\\System32\\\\choice\\.exe",
"last_modified": "2023-02-26T15:30:04.554767735Z",
"modified_by": "api-client-id:123456",
"name": "My IOA Exclusion",
"pattern_id": "101010",
"pattern_name": "P_name"
}
}
}

Human Readable Output#

CrowdStrike Falcon IOA exclusions#

IdNameDescriptionPatternIdPatternNameIfnRegexClRegexAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
123456My IOA Exclusiondemo description101010P_name.*\Windows\System32\choice.exechoice\s+/m\s+crowdstrike_sample_detection2023-02-26T15:30:04.554767735Zapi-client-id:1234562023-02-06T16:42:19.29906839Zuser@test.com

cs-falcon-list-quarantined-file#


Get quarantine file metadata by specified IDs or filter.

Base Command#

cs-falcon-list-quarantined-file

Input#

Argument NameDescriptionRequired
idsA comma-separated list of quarantined file IDs to retrieve.Optional
filterA custom filter by which the retrieve quarantined file should be filtered.Optional
sha256A comma-separated list of SHA256 hash of the files to retrieve.Optional
filenameA comma-separated list of the name of the files to retrieve.Optional
stateFilter the retrieved files by state.Optional
hostnameA comma-separated list of the hostnames of the files to retrieve.Optional
usernameA comma-separated list of the usernames of the files to retrieve.Optional
limitMaximum number of IDs to return. Max 5000. Default 50.Optional
offsetStarting index of the overall result set from which to return IDs. Default 0.Optional

Context Output#

PathTypeDescription
CrowdStrike.QuarantinedFile.idStringA unique identifier for the quarantined file.
CrowdStrike.QuarantinedFile.aidStringThe agent identifier of the agent that quarantined the file.
CrowdStrike.QuarantinedFile.cidStringThe unique identifier for the customer that who the agent.
CrowdStrike.QuarantinedFile.sha256StringThe SHA256 hash value of the quarantined file.
CrowdStrike.QuarantinedFile.paths.pathStringThe full path of the quarantined file.
CrowdStrike.QuarantinedFile.paths.filenameStringThe name of the quarantined file.
CrowdStrike.QuarantinedFile.paths.stateStringThe current state of the quarantined file path (e.g., "purged").
CrowdStrike.QuarantinedFile.stateStringThe current state of the quarantined file (e.g., "unrelease_pending").
CrowdStrike.QuarantinedFile.detect_idsStringThe detection identifiers associated with the quarantined file.
CrowdStrike.QuarantinedFile.hostnameStringThe hostname of the agent that quarantined the file.
CrowdStrike.QuarantinedFile.usernameStringThe username associated with the quarantined file.
CrowdStrike.QuarantinedFile.date_updatedDateThe date the quarantined file was last updated.
CrowdStrike.QuarantinedFile.date_createdDateThe date the quarantined file was created.

Command example#

!cs-falcon-list-quarantined-file limit=1

Context Example#

{
"CrowdStrike": {
"QuarantinedFile": {
"aid": "a123456",
"cid": "c123456",
"date_created": "2022-12-13T14:23:49Z",
"date_updated": "2023-03-06T13:47:30Z",
"detect_ids": [
"ldt:a123456:456789"
],
"hostname": "INSTANCE-1",
"id": "a123456_sha123456",
"paths": [
{
"filename": "nc.exe",
"path": "\\Device\\HarddiskVolume3\\Users\\admin\\Downloads\\hamuzim\\test.exe",
"state": "quarantined"
}
],
"sha256": "sha123456",
"state": "deleted",
"username": "admin"
}
}
}

Human Readable Output#

CrowdStrike Falcon Quarantined File#

IdAidCidSha256PathsStateDetectIdsHostnameUsernameDateUpdatedDateCreated
a123456_sha123456a123456c123456sha123456- path: \Device\HarddiskVolume3\Users\admin\Downloads\hamuzim\netcat-1.11\nc.exe
filename: nc.exe
state: quarantined
deletedvalues: ldt:a123456:456789INSTANCE-1admin2023-03-06T13:47:30Z2022-12-13T14:23:49Z

cs-falcon-apply-quarantine-file-action#


Apply action to quarantined file by file IDs or filter.

Base Command#

cs-falcon-apply-quarantine-file-action

Input#

Argument NameDescriptionRequired
idsA comma-separated list of quarantined file IDs to update.Optional
actionAction to perform against the quarantined file. Possible values are: delete, release, unrelease.Required
commentComment to appear along with the action taken.Required
filterUpdate files based on a custom filter.Optional
sha256A comma-separated list of quarantined files SHA256 to update.Optional
filenameA comma-separated list of quarantined file names to update.Optional
stateUpdate files based on the state.Optional
hostnameA comma-separated list of quarantined file hostnames to update.Optional
usernameA comma-separated list of quarantined files username to update.Optional

Context Output#

There is no context output for this command.

Command example#

!cs-falcon-apply-quarantine-file-action filename=nc.exe action=delete comment=demo-comment

Human Readable Output#

The Quarantined File with IDs ['a123456_sha123456'] was successfully updated.

cs-falcon-ods-query-scan#


Retrieve ODS scan details.

Base Command#

cs-falcon-ods-query-scan

Input#

Argument NameDescriptionRequired
wait_for_resultWhether to poll for results. Possible values are: true, false. Default is false.Optional
filterValid CS-Falcon-FQL filter to query with.Optional
idsComma-separated list of scan IDs to retrieve details about. If set, will override all other arguments.Optional
initiated_fromComma-separated list of scan initiation sources to filter by.Optional
statusComma-separated list of scan statuses to filter by.Optional
severityComma-separated list of scan severities to filter by.Optional
scan_started_onUTC-format time of scan start to filter by.Optional
scan_completed_onUTC-format time of the scan completion to filter by.Optional
offsetStarting index of overall result set from which to return IDs.Optional
limitMaximum number of resources to return.Optional
interval_in_secondsThe interval in seconds between each poll. Default is 30.Optional
timeout_in_secondsThe timeout in seconds until polling ends. Default is 600.Optional

Context Output#

PathTypeDescription
CrowdStrike.ODSScan.idStringA unique identifier for the scan event.
CrowdStrike.ODSScan.cidStringA unique identifier for the client that triggered the scan.
CrowdStrike.ODSScan.profile_idStringA unique identifier for the scan profile used in the scan.
CrowdStrike.ODSScan.descriptionStringThe ID of the description of the scan.
CrowdStrike.ODSScan.scan_inclusionsStringThe files or folders included in the scan.
CrowdStrike.ODSScan.initiated_fromStringThe source of the scan initiation.
CrowdStrike.ODSScan.quarantineBooleanWhether the scan was set to quarantine.
CrowdStrike.ODSScan.cpu_priorityNumberThe CPU priority for the scan (1-5).
CrowdStrike.ODSScan.preemption_priorityNumberThe preemption priority for the scan.
CrowdStrike.ODSScan.metadata.host_idStringA unique identifier for the host that was scanned.
CrowdStrike.ODSScan.metadata.host_scan_idStringA unique identifier for the scan that was performed on the host.
CrowdStrike.ODSScan.metadata.scan_host_metadata_idStringA unique identifier for the metadata associated with the host scan.
CrowdStrike.ODSScan.metadata.filecount.scannedNumberThe number of files that were scanned.
CrowdStrike.ODSScan.metadata.filecount.maliciousNumberThe number of files that were identified as malicious.
CrowdStrike.ODSScan.metadata.filecount.quarantinedNumberThe number of files that were quarantined.
CrowdStrike.ODSScan.metadata.filecount.skippedNumberThe number of files that were skipped during the scan.
CrowdStrike.ODSScan.metadata.filecount.traversedNumberThe number of files that were traversed during the scan.
CrowdStrike.ODSScan.metadata.statusStringThe status of the scan on this host. (e.g., "pending", "running", "completed", or "failed").
CrowdStrike.ODSScan.metadata.started_onDateThe date and time that the scan started.
CrowdStrike.ODSScan.metadata.completed_onDateThe date and time that the scan completed.
CrowdStrike.ODSScan.metadata.last_updatedDateThe date and time that the metadata was last updated.
CrowdStrike.ODSScan.statusStringThe status of the scan (e.g., "pending", "running", "completed", or "failed").
CrowdStrike.ODSScan.hostsStringA list of the host IDs that were scanned.
CrowdStrike.ODSScan.endpoint_notificationBooleanA boolean value indicating whether endpoint notifications are enabled.
CrowdStrike.ODSScan.pause_durationNumberThe number of hours to pause between scanning each file.
CrowdStrike.ODSScan.max_durationNumberThe maximum amount of time to allow for the scan job in hours.
CrowdStrike.ODSScan.max_file_sizeNumberThe maximum file size (in MB) to scan.
CrowdStrike.ODSScan.sensor_ml_level_detectionNumberThe level of detection sensitivity for the local sensor machine learning model.
CrowdStrike.ODSScan.sensor_ml_level_preventionNumberThe level of prevention sensitivity for the local sensor machine learning model.
CrowdStrike.ODSScan.cloud_ml_level_detectionNumberThe level of detection sensitivity for the cloud machine learning model.
CrowdStrike.ODSScan.cloud_ml_level_preventionNumberThe level of prevention sensitivity for the cloud machine learning model.
CrowdStrike.ODSScan.policy_settingNumberA list of policy setting IDs for the scan job (these correspond to specific policy settings in the Falcon console).
CrowdStrike.ODSScan.scan_started_onDateThe timestamp when the scan was started.
CrowdStrike.ODSScan.scan_completed_onDateThe timestamp when the scan was completed.
CrowdStrike.ODSScan.created_onDateThe timestamp when the scan was created.
CrowdStrike.ODSScan.created_byStringThe ID of the user who created the scan job.
CrowdStrike.ODSScan.last_updatedDateThe timestamp when the scan job was last updated.

Command example#

!cs-falcon-ods-query-scan initiated_from=some_admin_name severity=high scan_started_on=2023-02-27T09:51:33.91608286Z

Context Example#

{
"CrowdStrike": {
"ODSScan": [
{
"cid": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"cloud_ml_level_detection": 4,
"cloud_ml_level_prevention": 4,
"cpu_priority": 5,
"created_by": "someone@email.com",
"created_on": "2023-05-03T08:45:41.688556439Z",
"endpoint_notification": true,
"file_paths": [
"C:\\Users\\admin\\Downloads\\hamuzim\\netcat-1.11\\eicar_com.exe"
],
"filecount": {},
"hosts": [
"a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
],
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"initiated_from": "some_admin_name",
"last_updated": "2023-05-03T08:45:43.348230927Z",
"max_duration": 0,
"max_file_size": 60,
"metadata": [
{
"completed_on": "2023-05-03T08:45:43.274953782Z",
"filecount": {
"malicious": 0,
"quarantined": 0,
"scanned": 0,
"skipped": 0,
"traversed": 0
},
"host_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"host_scan_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"last_updated": "2023-05-03T08:45:43.61797613Z",
"scan_host_metadata_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"started_on": "2023-05-03T08:45:43.069273028Z",
"status": "completed"
}
],
"pause_duration": 2,
"policy_setting": [
26439818675190,
26405458936832,
26405458936833,
26405458936834,
26405458936835,
26405458936840,
26405458936841,
26405458936842,
26405458936843,
26456998543793,
26456998544045,
26456998543652,
26456998543653,
26456998543656,
26456998543654,
26456998543950,
26456998543963
],
"preemption_priority": 1,
"profile_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"quarantine": true,
"scan_completed_on": "2023-05-03T08:45:43.274953782Z",
"scan_inclusions": [
"**\\Downloads\\**"
],
"scan_started_on": "2023-02-27T09:51:33.91608286Z",
"sensor_ml_level_detection": 4,
"sensor_ml_level_prevention": 4,
"status": "completed"
},
{
"cid": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"cloud_ml_level_detection": 3,
"cloud_ml_level_prevention": 3,
"cpu_priority": 4,
"created_by": "someone@email.com",
"created_on": "2023-03-12T14:54:43.659773852Z",
"endpoint_notification": true,
"filecount": {},
"hosts": [
"a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
],
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"initiated_from": "some_admin_name",
"last_updated": "2023-04-05T16:56:14.972317443Z",
"max_duration": 2,
"max_file_size": 60,
"metadata": [
{
"completed_on": "2023-03-12T14:57:37.338506965Z",
"filecount": {
"malicious": 0,
"quarantined": 0,
"scanned": 0,
"skipped": 0,
"traversed": 518485
},
"host_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"host_scan_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"last_updated": "2023-03-12T14:57:37.338585331Z",
"scan_host_metadata_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"started_on": "2023-02-27T09:51:33.91608286Z",
"status": "completed"
}
],
"pause_duration": 2,
"policy_setting": [
26439818674573,
26439818674574,
26439818674575,
26405458936832,
26456998543653,
26456998543656,
26456998543654,
26456998543950,
26456998543963
],
"preemption_priority": 1,
"profile_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"quarantine": true,
"scan_completed_on": "2023-03-12T14:57:37.338506965Z",
"scan_inclusions": [
"*"
],
"scan_started_on": "2023-03-12T14:54:45.210172175Z",
"sensor_ml_level_detection": 3,
"sensor_ml_level_prevention": 3,
"status": "failed"
}
]
}
}

Human Readable Output#

CrowdStrike Falcon ODS Scans#

IDStatusSeverityFile CountDescriptionHosts/Host groupsEnd timeStart timeRun by
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1failedscanned: 0
malicious: 0
quarantined: 0
skipped: 0
traversed: 518464
desc3456346a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12023-02-27T09:51:33.91608286Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1failedscanned: 0
malicious: 0
quarantined: 0
skipped: 0
traversed: 518511
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12023-03-13T14:50:26.259846586Z2023-02-27T09:51:33.91608286Zsomeone@email.com

cs-falcon-ods-query-scheduled-scan#


Retrieve ODS scheduled scan details.

Base Command#

cs-falcon-ods-query-scheduled-scan

Input#

Argument NameDescriptionRequired
filterValid CS-Falcon-FQL filter to query with.Optional
idsComma-separated list of scan IDs to retrieve details about. If set, will override all other arguments.Optional
initiated_fromComma-separated list of scan initiation sources to filter by.Optional
statusComma-separated list of scan statuses to filter by.Optional
created_onUTC-format time of scan creation to filter by.Optional
created_byUTC-format time of scan creator to filter by.Optional
start_timestampUTC-format time of scan start to filter by.Optional
deletedDeleted scans only.Optional
offsetStarting index of overall result set from which to return IDs.Optional
limitMaximum number of resources to return.Optional

Context Output#

PathTypeDescription
CrowdStrike.ODSScheduledScan.idStringUnique identifier for the scan.
CrowdStrike.ODSScheduledScan.cidStringIdentifier for the customer or organization that owns the scan.
CrowdStrike.ODSScheduledScan.descriptionStringThe ID of the description of the scan.
CrowdStrike.ODSScheduledScan.file_pathsStringThe file or folder paths scanned.
CrowdStrike.ODSScheduledScan.scan_exclusionsStringThe file or folder exclusions from the scan.
CrowdStrike.ODSScheduledScan.initiated_fromStringThe source of the scan initiation.
CrowdStrike.ODSScheduledScan.cpu_priorityNumberThe CPU priority for the scan (1-5).
CrowdStrike.ODSScheduledScan.preemption_priorityNumberThe preemption priority for the scan.
CrowdStrike.ODSScheduledScan.statusStringThe status of the scan, whether it's "scheduled", "running", "completed", etc.
CrowdStrike.ODSScheduledScan.host_groupsStringThe host groups targeted by the scan.
CrowdStrike.ODSScheduledScan.endpoint_notificationBooleanWhether notifications of the scan were sent to endpoints.
CrowdStrike.ODSScheduledScan.pause_durationNumberThe pause duration of the scan in hours.
CrowdStrike.ODSScheduledScan.max_durationNumberThe max duration of the scan in hours.
CrowdStrike.ODSScheduledScan.max_file_sizeNumberThe maximum file size that the scan can handle in MB.
CrowdStrike.ODSScheduledScan.sensor_ml_level_detectionNumberThe machine learning detection level for the sensor.
CrowdStrike.ODSScheduledScan.cloud_ml_level_detectionNumberThe machine learning detection level for the cloud.
CrowdStrike.ODSScheduledScan.schedule.start_timestampDateThe timestamp when the first scan was created.
CrowdStrike.ODSScheduledScan.schedule.intervalNumberThe interval between scans.
CrowdStrike.ODSScheduledScan.created_onDateThe timestamp when the scan was created.
CrowdStrike.ODSScheduledScan.created_byStringThe user who created the scan.
CrowdStrike.ODSScheduledScan.last_updatedDateThe timestamp when the scan was last updated.
CrowdStrike.ODSScheduledScan.deletedBooleanWhether the scan has been deleted.
CrowdStrike.ODSScheduledScan.quarantineBooleanWhether the scan was set to quarantine.
CrowdStrike.ODSScheduledScan.metadata.host_idStringScan host IDs.
CrowdStrike.ODSScheduledScan.metadata.last_updatedDateThe date and time when the detection event was last updated.
CrowdStrike.ODSScheduledScan.sensor_ml_level_preventionNumberThe machine learning prevention level for the sensor.
CrowdStrike.ODSScheduledScan.cloud_ml_level_preventionNumberThe machine learning prevention level for the cloud.

Command example#

!cs-falcon-ods-query-scheduled-scan ids=123456789

Context Example#

{
"CrowdStrike": {
"ODSScheduledScan": {
"cid": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"cloud_ml_level_detection": 2,
"cloud_ml_level_prevention": 2,
"cpu_priority": 3,
"created_by": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_on": "2023-05-08T09:04:20.8414225Z",
"deleted": false,
"endpoint_notification": true,
"host_groups": [
"a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
],
"id": "123456789",
"initiated_from": "cloud_scheduled",
"last_updated": "2023-05-08T09:22:48.408487143Z",
"max_duration": 2,
"max_file_size": 60,
"metadata": [
{
"host_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"last_updated": "2023-05-08T09:22:48.408487143Z"
}
],
"pause_duration": 3,
"policy_setting": [
26439818674573,
26439818674574,
26439818675074,
26405458936702,
26405458936703,
26405458936707,
26439818675124,
26439818675125,
26439818675157,
26439818675158,
26439818675182,
26439818675183,
26439818675190,
26439818675191,
26439818675196,
26439818675197,
26439818675204,
26439818675205,
26405458936760,
26405458936761,
26405458936793,
26405458936794,
26405458936818,
26405458936819,
26405458936825,
26405458936826,
26405458936832,
26405458936833,
26405458936840,
26405458936841,
26456998543793,
26456998544045,
26456998543652,
26456998543653,
26456998543656,
26456998543654,
26456998543950,
26456998543963
],
"preemption_priority": 15,
"quarantine": true,
"scan_inclusions": [
"*"
],
"schedule": {
"interval": 14,
"start_timestamp": "2023-05-20T06:49"
},
"sensor_ml_level_detection": 2,
"sensor_ml_level_prevention": 2,
"status": "scheduled"
}
}
}

Human Readable Output#

CrowdStrike Falcon ODS Scheduled Scans#

IDHosts targetedDescriptionHost groupsStart timeCreated by
1234567891a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12023-05-20T06:49a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

cs-falcon-ods-query-scan-host#


Retrieve ODS scan host details.

Base Command#

cs-falcon-ods-query-scan-host

Input#

Argument NameDescriptionRequired
filterValid CS-Falcon-FQL filter to query with.Optional
host_idsComma-separated list of host IDs to filter by.Optional
scan_idsComma-separated list of scan IDs to filter by.Optional
statusComma-separated list of scan statuses to filter by.Optional
started_onUTC-format time of scan start to filter by.Optional
completed_onUTC-format time of scan completion to filter by.Optional
offsetStarting index of overall result set from which to return IDs.Optional
limitMaximum number of resources to return.Optional

Context Output#

PathTypeDescription
CrowdStrike.ODSScanHost.idStringA unique identifier for the scan event.
CrowdStrike.ODSScanHost.cidStringA unique identifier for the client that triggered the scan.
CrowdStrike.ODSScanHost.scan_idStringA unique identifier for the scan.
CrowdStrike.ODSScanHost.profile_idStringA unique identifier for the scan profile used in the scan.
CrowdStrike.ODSScanHost.host_idStringA unique identifier for the host that was scanned.
CrowdStrike.ODSScanHost.host_scan_idStringA unique identifier for the scan that was performed on the host.
CrowdStrike.ODSScanHost.filecount.scannedNumberThe number of files that were scanned during the scan.
CrowdStrike.ODSScanHost.filecount.maliciousNumberThe number of files that were detected as malicious during the scan.
CrowdStrike.ODSScanHost.filecount.quarantinedNumberThe number of files that were quarantined during the scan.
CrowdStrike.ODSScanHost.filecount.skippedNumberThe number of files that were skipped during the scan.
CrowdStrike.ODSScanHost.statusStringThe status of the scan. (e.g., "completed", "pending", "cancelled", "running", or "failed").
CrowdStrike.ODSScanHost.severityNumberA severity score assigned to the scan, ranging from 0 to 100.
CrowdStrike.ODSScanHost.started_onDateThe date and time when the scan was started.
CrowdStrike.ODSScanHost.completed_onDateThe date and time when the scan was completed.
CrowdStrike.ODSScanHost.last_updatedDateThe date and time when the scan event was last updated.

Command example#

!cs-falcon-ods-query-scan-host filter="scan_id:[\"123456789\",\"987654321\"]"

Context Example#

{
"CrowdStrike": {
"ODSScanHost": [
{
"cid": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"filecount": {},
"host_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"id": "123456789",
"last_updated": "2022-11-27T17:15:50.056840267Z",
"profile_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"scan_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"status": "pending"
},
{
"cid": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"completed_on": "2023-05-07T08:28:56.856506979Z",
"filecount": {
"malicious": 0,
"quarantined": 0,
"scanned": 0,
"skipped": 0,
"traversed": 524581
},
"host_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"host_scan_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"id": "987654321",
"last_updated": "2023-05-07T08:28:56.856575358Z",
"profile_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"scan_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"started_on": "2023-05-07T08:25:48.336234188Z",
"status": "completed"
}
]
}
}

Human Readable Output#

CrowdStrike Falcon ODS Scan Hosts#

IDScan IDHost IDFilecountStatusSeverityStarted on
123456789a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1pending
987654321a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1scanned: 0
malicious: 0
quarantined: 0
skipped: 0
traversed: 524581
completed2023-05-07T08:25:48.336234188Z

cs-falcon-ods-query-malicious-files#


Retrieve ODS malicious file details.

Base Command#

cs-falcon-ods-query-malicious-files

Input#

Argument NameDescriptionRequired
filterValid CS-Falcon-FQL filter to query with.Optional
file_idsComma-separated list of malicious file IDs to retrieve details about. If set, will override all other arguments.Optional
host_idsComma-separated list of host IDs to filter by.Optional
scan_idsComma-separated list of scan IDs to filter by.Optional
file_pathsComma-separated list of file paths to filter by.Optional
file_namesComma-separated list of file names to filter by.Optional
hashComma-separated list of hashes to filter by.Optional
offsetStarting index of overall result set from which to return IDs.Optional
limitMaximum number of resources to return.Optional

Context Output#

PathTypeDescription
CrowdStrike.ODSMaliciousFile.idStringA unique identifier of the detection event.
CrowdStrike.ODSMaliciousFile.cidStringA unique identifier for the client that triggered the detection event.
CrowdStrike.ODSMaliciousFile.scan_idStringA unique identifier for the scan that triggered the detection event.
CrowdStrike.ODSMaliciousFile.host_idStringA unique identifier for the host that was scanned.
CrowdStrike.ODSMaliciousFile.host_scan_idStringA unique identifier for the scan that detected the file on the host.
CrowdStrike.ODSMaliciousFile.filepathStringThe full path to the malicious file on the host system.
CrowdStrike.ODSMaliciousFile.filenameStringThe name of the malicious file.
CrowdStrike.ODSMaliciousFile.hashStringA SHA-256 hash of the malicious file, which can be used to identify it.
CrowdStrike.ODSMaliciousFile.pattern_idNumberThe identifier of the pattern used to detect the malicious file.
CrowdStrike.ODSMaliciousFile.severityNumberA severity score assigned to the detection event, ranging from 0 to 100.
CrowdStrike.ODSMaliciousFile.quarantinedBooleanA Boolean value indicating whether the file has been quarantined.
CrowdStrike.ODSMaliciousFile.last_updatedDateThe date and time when the detection event was last updated.

Command example#

!cs-falcon-ods-query-malicious-files

Human Readable Output#

No malicious files match the arguments/filter.

cs-falcon-ods-create-scan#


Create an ODS scan and wait for results.

Base Command#

cs-falcon-ods-create-scan

Input#

Argument NameDescriptionRequired
hostsList of hosts to be scanned. "hosts" OR "host_groups" must be set.Optional
host_groupsList of host groups to be scanned. "hosts" OR "host_groups" must be set.Optional
file_pathsList of file paths to be scanned. "file_paths" OR "scan_inclusions" must be set.Optional
scan_inclusionsList of included files or locations for this scan. "file_paths" OR "scan_inclusions" must be set.Optional
scan_exclusionsList of excluded files or locations for this scan.Optional
initiated_fromScan origin.Optional
cpu_prioritySet the scan CPU priority. Possible values are: Highest, High, Medium, Low, Lowest. Default is Low.Optional
descriptionScan description.Optional
quarantineFlag indicating if identified threats should be quarantined.Optional
pause_durationAmount of time (in hours) for scan pauses. Default is 2.Optional
sensor_ml_level_detectionSensor ML detection level.Optional
sensor_ml_level_preventionSensor ML prevention level.Optional
cloud_ml_level_detectionCloud ML detection level for the scan.Optional
cloud_ml_level_preventionCloud ML prevention level for the scan.Optional
max_durationMaximum time (in hours) the scan is allowed to execute. Default is 2.Optional
interval_in_secondsThe interval in seconds between each poll. Default is 30.Optional
timeout_in_secondsThe timeout in seconds until polling ends. Default is 600.Optional

Context Output#

PathTypeDescription
CrowdStrike.ODSScan.idStringA unique identifier for the scan event.
CrowdStrike.ODSScan.cidStringA unique identifier for the client that triggered the scan.
CrowdStrike.ODSScan.profile_idStringA unique identifier for the scan profile used in the scan.
CrowdStrike.ODSScan.descriptionStringThe ID of the description of the scan.
CrowdStrike.ODSScan.scan_inclusionsStringThe files or folders included in the scan.
CrowdStrike.ODSScan.initiated_fromStringThe source of the scan initiation.
CrowdStrike.ODSScan.quarantineBooleanWhether the scan was set to quarantine.
CrowdStrike.ODSScan.cpu_priorityNumberThe CPU priority for the scan (1-5).
CrowdStrike.ODSScan.preemption_priorityNumberThe preemption priority for the scan.
CrowdStrike.ODSScan.metadata.host_idStringA unique identifier for the host that was scanned.
CrowdStrike.ODSScan.metadata.host_scan_idStringA unique identifier for the scan that was performed on the host.
CrowdStrike.ODSScan.metadata.scan_host_metadata_idStringA unique identifier for the metadata associated with the host scan.
CrowdStrike.ODSScan.metadata.filecount.scannedNumberThe number of files that were scanned.
CrowdStrike.ODSScan.metadata.filecount.maliciousNumberThe number of files that were identified as malicious.
CrowdStrike.ODSScan.metadata.filecount.quarantinedNumberThe number of files that were quarantined.
CrowdStrike.ODSScan.metadata.filecount.skippedNumberThe number of files that were skipped during the scan.
CrowdStrike.ODSScan.metadata.filecount.traversedNumberThe number of files that were traversed during the scan.
CrowdStrike.ODSScan.metadata.statusStringThe status of the scan on this host (e.g., "pending", "running", "completed", or "failed").
CrowdStrike.ODSScan.metadata.started_onDateThe date and time that the scan started.
CrowdStrike.ODSScan.metadata.completed_onDateThe date and time that the scan completed.
CrowdStrike.ODSScan.metadata.last_updatedDateThe date and time that the metadata was last updated.
CrowdStrike.ODSScan.statusStringThe status of the scan (e.g., "pending", "running", "completed", or "failed").
CrowdStrike.ODSScan.hostsStringA list of the host IDs that were scanned.
CrowdStrike.ODSScan.endpoint_notificationBooleanA boolean value indicating whether endpoint notifications are enabled.
CrowdStrike.ODSScan.pause_durationNumberThe number of hours to pause between scanning each file.
CrowdStrike.ODSScan.max_durationNumberThe maximum amount of time to allow for the scan job in hours.
CrowdStrike.ODSScan.max_file_sizeNumberThe maximum file size (in MB) to scan.
CrowdStrike.ODSScan.sensor_ml_level_detectionNumberThe level of detection sensitivity for the local sensor machine learning model.
CrowdStrike.ODSScan.sensor_ml_level_preventionNumberThe level of prevention sensitivity for the local sensor machine learning model.
CrowdStrike.ODSScan.cloud_ml_level_detectionNumberThe level of detection sensitivity for the cloud machine learning model.
CrowdStrike.ODSScan.cloud_ml_level_preventionNumberThe level of prevention sensitivity for the cloud machine learning model.
CrowdStrike.ODSScan.policy_settingNumberA list of policy setting IDs for the scan job (these correspond to specific policy settings in the Falcon console).
CrowdStrike.ODSScan.scan_started_onDateThe timestamp when the scan was started.
CrowdStrike.ODSScan.scan_completed_onDateThe timestamp when the scan was completed.
CrowdStrike.ODSScan.created_onDateThe timestamp when the scan was created.
CrowdStrike.ODSScan.created_byStringThe ID of the user who created the scan job.
CrowdStrike.ODSScan.last_updatedDateThe timestamp when the scan job was last updated.

Command example#

!cs-falcon-ods-create-scan host_groups=7471ba0636b34cbb8c65fae7979a6a9b scan_inclusions=* cpu_priority=Highest max_duration=1 pause_duration=1

Context Example#

{
"CrowdStrike": {
"ODSScan": {
"cid": "20879a8064904ecfbb62c118a6a19411",
"cloud_ml_level_detection": 2,
"cloud_ml_level_prevention": 2,
"cpu_priority": 5,
"created_by": "f7acf1bd5d3d4b40afe77546cbbaefde",
"created_on": "2023-06-11T13:23:05.139153881Z",
"filecount": {
"malicious": 0,
"quarantined": 0,
"scanned": 0,
"skipped": 0,
"traversed": 0
},
"host_groups": [
"7471ba0636b34cbb8c65fae7979a6a9b"
],
"id": "9ba8489e9f604b61bf9b4a2c5f95ede7",
"initiated_from": "cloud_adhoc",
"last_updated": "2023-06-11T13:23:05.139153881Z",
"max_duration": 1,
"max_file_size": 60,
"metadata": [
{
"filecount": {},
"host_id": "046761c46ec84f40b27b6f79ce7cd32c",
"last_updated": "2023-06-11T13:23:05.139153881Z",
"scan_host_metadata_id": "31052e821a5a4189a1a9a2814cc88e4e",
"status": "complete"
}
],
"pause_duration": 1,
"policy_setting": [
26439818674573,
26439818674574,
26439818675074,
26405458936702,
26405458936703,
26456998543654,
26456998543950,
26456998543963
],
"preemption_priority": 1,
"profile_id": "335198a96e1a4a6b880d62b2e7ccbb91",
"quarantine": true,
"scan_inclusions": [
"*"
],
"sensor_ml_level_detection": 2,
"sensor_ml_level_prevention": 2,
"status": "complete"
}
}
}

Human Readable Output#

CrowdStrike Falcon ODS Scans#

IDStatusSeverityFile CountDescriptionHosts/Host groupsEnd timeStart timeRun by
9ba8489e9f604b61bf9b4a2c5f95ede7complete7471ba0636b34cbb8c65fae7979a6a9bf7acf1bd5d3d4b40afe77546cbbaefde

cs-falcon-ods-create-scheduled-scan#


Create an ODS scheduled scan.

Base Command#

cs-falcon-ods-create-scheduled-scan

Input#

Argument NameDescriptionRequired
host_groupsList of host groups to be scanned.Required
file_pathsList of file paths to be scanned. "file_paths" OR "scan_inclusions" must be set.Optional
scan_inclusionsList of included files or locations for this scan. "file_paths" OR "scan_inclusions" must be set.Optional
scan_exclusionsList of excluded files or locations for this scan.Optional
initiated_fromScan origin.Optional
cpu_prioritySet the scan CPU priority. Possible values are: Highest, High, Medium, Low, Lowest. Default is Low.Optional
descriptionScan description.Optional
quarantineFlag indicating if identified threats should be quarantined.Optional
pause_durationAmount of time (in hours) for scan pauses. Default is 2.Optional
sensor_ml_level_detectionSensor ML detection level.Optional
sensor_ml_level_preventionSensor ML prevention level.Optional
cloud_ml_level_detectionCloud ML detection level for the scan.Optional
cloud_ml_level_preventionCloud ML prevention level for the scan.Optional
max_durationMaximum time (in hours) the scan is allowed to execute. Default is 2.Optional
schedule_start_timestampWhen to start the first scan. Supports english expressions such as "tommorow" or "in an hour".Required
schedule_intervalSet the schedule interval. Possible values are: Never, Daily, Weekly, Every other week, Every four weeks, Monthly.Required

Context Output#

PathTypeDescription
CrowdStrike.ODSScheduledScan.idStringUnique identifier for the scan.
CrowdStrike.ODSScheduledScan.cidStringIdentifier for the customer or organization that owns the scan.
CrowdStrike.ODSScheduledScan.descriptionStringThe ID of the description of the scan.
CrowdStrike.ODSScheduledScan.file_pathsStringThe file or folder paths scanned.
CrowdStrike.ODSScheduledScan.scan_exclusionsStringThe file or folder exclusions from the scan.
CrowdStrike.ODSScheduledScan.initiated_fromStringThe source of the scan initiation.
CrowdStrike.ODSScheduledScan.cpu_priorityNumberThe CPU priority for the scan (1-5).
CrowdStrike.ODSScheduledScan.preemption_priorityNumberThe preemption priority for the scan.
CrowdStrike.ODSScheduledScan.statusStringThe status of the scan, whether it's "scheduled", "running", "completed", etc.
CrowdStrike.ODSScheduledScan.host_groupsStringThe host groups targeted by the scan.
CrowdStrike.ODSScheduledScan.endpoint_notificationBooleanWhether notifications of the scan were sent to endpoints.
CrowdStrike.ODSScheduledScan.pause_durationNumberThe pause duration of scan in hours.
CrowdStrike.ODSScheduledScan.max_durationNumberThe max duration of scan in hours.
CrowdStrike.ODSScheduledScan.max_file_sizeNumberThe maximum file size that the scan can handle in MB.
CrowdStrike.ODSScheduledScan.sensor_ml_level_detectionNumberThe machine learning detection level for the sensor.
CrowdStrike.ODSScheduledScan.cloud_ml_level_detectionNumberThe machine learning detection level for the cloud.
CrowdStrike.ODSScheduledScan.schedule.start_timestampDateThe timestamp when the first scan was created.
CrowdStrike.ODSScheduledScan.schedule.intervalNumberThe interval between scans.
CrowdStrike.ODSScheduledScan.created_onDateThe timestamp when the scan was created.
CrowdStrike.ODSScheduledScan.created_byStringThe user who created the scan.
CrowdStrike.ODSScheduledScan.last_updatedDateThe timestamp when the scan was last updated.
CrowdStrike.ODSScheduledScan.deletedBooleanWhether the scan has been deleted.
CrowdStrike.ODSScheduledScan.quarantineBooleanWhether the scan was set to quarantine.
CrowdStrike.ODSScheduledScan.metadata.host_idStringScan host IDs.
CrowdStrike.ODSScheduledScan.metadata.last_updatedDateThe date and time when the detection event was last updated.
CrowdStrike.ODSScheduledScan.sensor_ml_level_preventionNumberThe machine learning prevention level for the sensor.
CrowdStrike.ODSScheduledScan.cloud_ml_level_preventionNumberThe machine learning prevention level for the cloud.

Command example#

!cs-falcon-ods-create-scheduled-scan host_groups=7471ba0636b34cbb8c65fae7979a6a9b schedule_interval=daily schedule_start_timestamp=tomorrow cpu_priority=Highest scan_inclusions=*

Context Example#

{
"CrowdStrike": {
"ODSScan": {
"cid": "20879a8064904ecfbb62c118a6a19411",
"cloud_ml_level_detection": 2,
"cloud_ml_level_prevention": 2,
"cpu_priority": 5,
"created_by": "f7acf1bd5d3d4b40afe77546cbbaefde",
"created_on": "2023-06-11T13:23:10.564070276Z",
"deleted": false,
"host_groups": [
"7471ba0636b34cbb8c65fae7979a6a9b"
],
"id": "7d08d9a3088f49b3aa20efafc355aef0",
"initiated_from": "cloud_scheduled",
"last_updated": "2023-06-11T13:23:10.564070276Z",
"max_duration": 2,
"max_file_size": 60,
"metadata": [
{
"host_id": "046761c46ec84f40b27b6f79ce7cd32c",
"last_updated": "2023-06-11T13:23:10.564070276Z"
}
],
"pause_duration": 2,
"policy_setting": [
26439818674573,
26439818674574,
26439818675074,
26405458936702,
26405458936703,
26405458936707,
26439818675124,
26439818675125,
26439818675157,
26439818675158,
26439818675182,
26439818675183,
26439818675190,
26439818675191,
26439818675196,
26439818675197,
26439818675204,
26439818675205,
26405458936760,
26405458936761,
26405458936793,
26405458936794,
26405458936818,
26405458936819,
26405458936825,
26405458936826,
26405458936832,
26405458936833,
26405458936840,
26405458936841,
26456998543793,
26456998544045,
26456998543652,
26456998543653,
26456998543656,
26456998543654,
26456998543950,
26456998543963
],
"preemption_priority": 15,
"quarantine": true,
"scan_inclusions": [
"*"
],
"schedule": {
"interval": 1,
"start_timestamp": "2023-06-12T13:23"
},
"sensor_ml_level_detection": 2,
"sensor_ml_level_prevention": 2,
"status": "scheduled"
}
}
}

Human Readable Output#

Scheduled Scan Created#

Scan ID
7d08d9a3088f49b3aa20efafc355aef0

cs-falcon-ods-delete-scheduled-scan#


Delete ODS scheduled scans.

Base Command#

cs-falcon-ods-delete-scheduled-scan

Input#

Argument NameDescriptionRequired
idsComma-separated list of scheduled scan IDs to delete.Optional
filterValid CS-Falcon-FQL filter to delete scans by.Optional

Context Output#

There is no context output for this command.

Command example#

!cs-falcon-ods-delete-scheduled-scan ids=9acf0c069d3d4a5b82badb170966e77c

Human Readable Output#

Deleted Scans:#

Scan ID
9acf0c069d3d4a5b82badb170966e77c

cs-falcon-list-identity-entities#


List identity entities.

Base Command#

cs-falcon-list-identity-entities

Input#

Argument NameDescriptionRequired
typeAPI type. Possible values are: USER, ENDPOINT.Required
sort_keyThe key to sort by. Possible values are: RISK_SCORE, PRIMARY_DISPLAY_NAME, SECONDARY_DISPLAY_NAME, MOST_RECENT_ACTIVITY, ENTITY_ID.Optional
sort_orderThe sort order. Possible values are: DESCENDING, ASCENDING. Default is ASCENDING.Optional
entity_idComma separated list of entity IDs to look for.Optional
primary_display_namePrimary display name to filter by.Optional
secondary_display_nameSecondary display name to filter by.Optional
max_risk_score_severityThe maximum risk score severity to filter by. Possible values are: NORMAL, MEDIUM, HIGH.Optional
min_risk_score_severityThe minimum risk score severity to filter by. Possible values are: NORMAL, MEDIUM, HIGH.Optional
enabledWhether to get only enabled or disabled identity entities. Possible values are: true, false.Optional
emailFilter by email.Optional
next_tokenThe hash for the next page.Optional
page_sizeThe maximum number of items to fetch per page. The maximum value allowed is 1000. Default is 50.Optional
pageThe page number. Default is 1.Optional
limitThe maximum number of identity entities to list.Optional

Context Output#

PathTypeDescription
CrowdStrike.IDPEntity.IsHumanBooleanWhether the identity entity is human made.
CrowdStrike.IDPEntity.IsProgrammaticBooleanWhether the identity entity is programmatic made.
CrowdStrike.IDPEntity.IsAdminStringWhether the identity entity is admin made.
CrowdStrike.IDPEntity.PrimaryDisplayNameStringThe identity entity primary display name.
CrowdStrike.IDPEntity.RiskFactors.TypeUnknownThe identity entity risk factor type.
CrowdStrike.IDPEntity.RiskFactors.SeverityUnknownThe identity entity risk factor severity.
CrowdStrike.IDPEntity.RiskScoreNumberThe identity entity risk score.
CrowdStrike.IDPEntity.RiskScoreSeverityStringThe identity entity risk score severity.
CrowdStrike.IDPEntity.SecondaryDisplayNameStringThe identity entity secondary display name.
CrowdStrike.IDPEntity.EmailAddressesStringThe identity entity email address.

Base Command#

cs-falcon-cspm-list-policy-details

Input#

Argument NameDescriptionRequired
policy_idsComma-separated list of policy IDs to look for.Required

Context Output#

PathTypeDescription
CrowdStrike.CSPMPolicy.IDIntegerThe policy ID.
CrowdStrike.CSPMPolicy.CreatedAtDateThe creation date.
CrowdStrike.CSPMPolicy.UpdatedAtDateThe update date.
CrowdStrike.CSPMPolicy.DeletedAtDateThe deletion date.
CrowdStrike.CSPMPolicy.descriptionStringThe policy description.
CrowdStrike.CSPMPolicy.policy_statementStringThe policy statement.
CrowdStrike.CSPMPolicy.policy_remediationStringThe policy remediation.
CrowdStrike.CSPMPolicy.cloud_service_subtypeStringThe cloud service subtype.
CrowdStrike.CSPMPolicy.cloud_documentStringThe cloud document.
CrowdStrike.CSPMPolicy.mitre_attack_cloud_matrixStringURL to the MITRE attack tactics.
CrowdStrike.CSPMPolicy.mitre_attack_cloud_subtypeStringURL to the MITRE attack techniques.
CrowdStrike.CSPMPolicy.alert_logicStringThe alert logic.
CrowdStrike.CSPMPolicy.api_commandStringThe API command.
CrowdStrike.CSPMPolicy.cli_commandStringThe CLI command.
CrowdStrike.CSPMPolicy.cloud_platform_typeStringThe cloud platform type.
CrowdStrike.CSPMPolicy.cloud_service_typeStringThe cloud service type.
CrowdStrike.CSPMPolicy.default_severityStringThe default severity.
CrowdStrike.CSPMPolicy.cis_benchmark_idsArrayThe CIS benchmark IDs.
CrowdStrike.CSPMPolicy.nist_benchmark_idsArrayThe NIST benchmark IDs.
CrowdStrike.CSPMPolicy.pci_benchmark_idsArrayThe pci benchmark IDs.
CrowdStrike.CSPMPolicy.policy_typeStringThe policy type.
CrowdStrike.CSPMPolicy.tactic_urlStringThe tactic URL.
CrowdStrike.CSPMPolicy.technique_urlStringThe technique URL.
CrowdStrike.CSPMPolicy.tacticStringThe tactic used.
CrowdStrike.CSPMPolicy.techniqueStringThe technique used.
CrowdStrike.CSPMPolicy.tactic_idStringThe tactic ID.
CrowdStrike.CSPMPolicy.technique_idStringThe technique ID.
CrowdStrike.CSPMPolicy.attack_typesArrayThe attack types.
CrowdStrike.CSPMPolicy.asset_type_idIntegerThe asset type ID.
CrowdStrike.CSPMPolicy.cloud_asset_typeStringThe cloud asset type.
CrowdStrike.CSPMPolicy.is_remediableBooleanWhether the policy is remediable or not..
CrowdStrike.CSPMPolicy.is_enabledBooleanWhether the policy is enabled or not.
CrowdStrike.CSPMPolicy.account_scopeStringThe account scope.

Command example#

!cs-falcon-cspm-list-policy-details policy_ids=1,2

Context Example#

{
"CrowdStrike": {
"CSPMPolicy": [
{
"CreatedAt": "2020-08-18T08:30:21.760579Z",
"DeletedAt": null,
"ID": 1,
"UpdatedAt": "2023-06-21T18:47:44.371539Z",
"account_scope": "",
"alert_logic": "1. List all IAM users.|\n2. Filter on users with active access keys.|\n3. Filter on access keys that have not been rotated in 90 days.|\n4. Alert on each user.",
"api_command": "ListUsers, ListAccessKeys",
"asset_type_id": 8,
"attack_types": [
"Credential policy violation"
],
"cis_benchmark_ids": [
108,
641,
740
],
"cli_command": "aws2 iam list-users, aws2 iam list-access-keys",
"cloud_asset_type": "user",
"cloud_document": "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html",
"cloud_platform_type": "aws",
"cloud_service_subtype": "Access Keys",
"cloud_service_type": "IAM",
"default_severity": "informational",
"description": "Because IAM access keys are long-term credentials, as time goes on, the risk of these keys being exposed is increased.\n\nKeys are often left on old servers, accidentally published through Git, or stolen from developer machines. The longer the keys are valid, the more likely they are to be discovered in one of these places. By ensuring keys are rotated at least every 90 days, you can be confident that if those keys are discovered, they cannot be abused.",
"is_enabled": true,
"is_remediable": false,
"mitre_attack_cloud_matrix": "https://attack.mitre.org/tactics/TA0006/",
"mitre_attack_cloud_subtype": "https://attack.mitre.org/techniques/T1528/",
"nist_benchmark_ids": [
2,
3,
281,
941
],
"pci_benchmark_ids": [
120
],
"policy_remediation": "Step 1. From the AWS Console, navigate to the IAM page.|\nStep 2. Locate and click on the offending IAM User.|\nStep 3. Click on the Security Credentials tab.|\nStep 4. Navigate to the Access Keys section and choose between making the access key inactive, deleting the key, or rotating the key.",
"policy_statement": "IAM user access key active longer than 90 days",
"policy_type": "Configuration",
"tactic": "Credential Access",
"tactic_id": "TA0006",
"tactic_url": "https://attack.mitre.org/tactics/TA0006/",
"technique": "Steal Application Access Token",
"technique_id": "T1528",
"technique_url": "https://attack.mitre.org/techniques/T1528/"
},
{
"CreatedAt": "2022-10-19T15:00:00Z",
"DeletedAt": null,
"ID": 2,
"UpdatedAt": "2023-07-20T19:14:47.972998Z",
"account_scope": "",
"alert_logic": "1. List Launch Configurations.|\n2. Decode Base64-encoded User Data field.|\n3. Search for strings indicating credentials are present.|\n4. Alert on each instance.",
"api_command": "DescribeLaunchConfigurations",
"asset_type_id": 81,
"cis_benchmark_ids": [
714
],
"cisa_benchmark_ids": [
16
],
"cli_command": "aws autoscaling describe-launch-configurations",
"cloud_asset_type": "launchconfig",
"cloud_document": "https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/user-data.html",
"cloud_platform_type": "aws",
"cloud_service_type": "Auto Scaling",
"default_severity": "informational",
"description": "EC2 instance data is used to pass start up information into the EC2 instance. This User Data must not contain any sort of credentials. Instead, use an IAM Instance Profile assigned to the instance to grant access to other AWS Services.",
"is_enabled": true,
"is_remediable": false,
"iso_benchmark_ids": [
10,
15,
62,
63
],
"mitre_attack_cloud_matrix": "https://attack.mitre.org/tactics/TA0006/",
"mitre_attack_cloud_subtype": "https://attack.mitre.org/techniques/T1552/005/",
"nist_benchmark_ids": [
16,
65,
66,
531
],
"policy_remediation": "Step 1. From the console navigate to the EC2 page.|\nStep 2. From the sub-menu, click on 'Launch Configurations' under 'Auto Scaling'.|\nStep 3. Select the offending launch configuration.|\nStep 4. Scroll down to the 'Details' section and click 'View user data'.|\nStep 5. Validate whether or not any credentials are present.|\nStep 6. If credentials are present, re-create the launch configuration without exposing any credentials in the user data field.",
"policy_statement": "Auto Scaling group launch configuration User Data with potential credentials exposed",
"policy_type": "Configuration",
"soc2_benchmark_ids": [
15,
17
],
"tactic": "Credential Access",
"tactic_id": "TA0006",
"tactic_url": "https://attack.mitre.org/tactics/TA0006/",
"technique": "Unsecured Credentials: Cloud Instance Metadata API",
"technique_id": "T1552.005",
"technique_url": "https://attack.mitre.org/techniques/T1552/005/"
}
]
}
}

Human Readable Output#

CSPM Policy Details:#

IdDescriptionPolicy StatementPolicy RemediationCloud Service SubtypeCloud Platform TypeCloud Service TypeDefault SeverityPolicy TypeTacticTechnique
1Because IAM access keys are long-term credentials, as time goes on, the risk of these keys being exposed is increased.

Keys are often left on old servers, accidentally published through Git, or stolen from developer machines. The longer the keys are valid, the more likely they are to be discovered in one of these places. By ensuring keys are rotated at least every 90 days, you can be confident that if those keys are discovered, they cannot be abused.
IAM user access key active longer than 90 daysStep 1. From the AWS Console, navigate to the IAM page.|
Step 2. Locate and click on the offending IAM User.|
Step 3. Click on the Security Credentials tab.|
Step 4. Navigate to the Access Keys section and choose between making the access key inactive, deleting the key, or rotating the key.
Access KeysawsIAMinformationalConfigurationCredential AccessSteal Application Access Token
2EC2 instance data is used to pass start up information into the EC2 instance. This User Data must not contain any sort of credentials. Instead, use an IAM Instance Profile assigned to the instance to grant access to other AWS Services.Auto Scaling group launch configuration User Data with potential credentials exposedStep 1. From the console navigate to the EC2 page.|
Step 2. From the sub-menu, click on 'Launch Configurations' under 'Auto Scaling'.|
Step 3. Select the offending launch configuration.|
Step 4. Scroll down to the 'Details' section and click 'View user data'.|
Step 5. Validate whether or not any credentials are present.|
Step 6. If credentials are present, re-create the launch configuration without exposing any credentials in the user data field.
awsAuto ScalinginformationalConfigurationCredential AccessUnsecured Credentials: Cloud Instance Metadata API

cs-falcon-cspm-list-service-policy-settings#


Returns information about current policy settings.

Base Command#

cs-falcon-cspm-list-service-policy-settings

Input#

Argument NameDescriptionRequired
policy_idThe policy ID to look for its settings.Optional
cloud_platformThe cloud provider. Possible values are: aws, gcp, azure. Default is aws.Optional
serviceService type to filter by.Optional
limitThe maximum number of entities to list. Default is 50.Optional

Context Output#

PathTypeDescription
CrowdStrike.CSPMPolicySetting.is_remediableBooleanWhether the policy setting is remediable or not.
CrowdStrike.CSPMPolicySetting.created_atStringThe creation date.
CrowdStrike.CSPMPolicySetting.updated_atStringThe update date.
CrowdStrike.CSPMPolicySetting.policy_idIntegerThe policy ID.
CrowdStrike.CSPMPolicySetting.nameStringThe policy setting name.
CrowdStrike.CSPMPolicySetting.policy_typeStringThe policy type.
CrowdStrike.CSPMPolicySetting.cloud_service_subtypeStringThe cloud service subtype.
CrowdStrike.CSPMPolicySetting.cloud_serviceStringThe cloud service.
CrowdStrike.CSPMPolicySetting.cloud_service_friendlyStringThe cloud friendly service.
CrowdStrike.CSPMPolicySetting.cloud_asset_typeStringThe cloud asset type.
CrowdStrike.CSPMPolicySetting.cloud_asset_type_idIntegerThe cloud asset type ID.
CrowdStrike.CSPMPolicySetting.cloud_providerStringThe cloud provider.
CrowdStrike.CSPMPolicySetting.default_severityStringThe default severity.
CrowdStrike.CSPMPolicySetting.policy_timestampDateThe policy timestamp.
CrowdStrike.CSPMPolicySetting.policy_settingsArrayAn array that holds policy settings.
CrowdStrike.CSPMPolicySetting.policy_settings.account_idStringThe account ID correlated to the policy.
CrowdStrike.CSPMPolicySetting.policy_settings.regionsArrayThe regions in which the policy is configured at.
CrowdStrike.CSPMPolicySetting.policy_settings.severityStringThe severity of the policy.
CrowdStrike.CSPMPolicySetting.policy_settings.enabledBooleanWhether the policy settings are enabled or not.
CrowdStrike.CSPMPolicySetting.policy_settings.tag_excludedBooleanWhether the tag is excluded or not.
CrowdStrike.CSPMPolicySetting.cis_benchmarkArrayAn array of CIS benchmark details.
CrowdStrike.CSPMPolicySetting.cis_benchmark.idIntegerThe CIS benchmark ID.
CrowdStrike.CSPMPolicySetting.cis_benchmark.benchmark_shortStringThe CIS benchmark shortname.
CrowdStrike.CSPMPolicySetting.cis_benchmark.recommendation_numberStringThe CIS benchmark recommendation number.
CrowdStrike.CSPMPolicySetting.pci_benchmarkArrayAn array of PCI benchmark details.
CrowdStrike.CSPMPolicySetting.pci_benchmark.idIntegerThe PCI benchmark ID.
CrowdStrike.CSPMPolicySetting.pci_benchmark.benchmark_shortStringThe PCI benchmark shortname.
CrowdStrike.CSPMPolicySetting.pci_benchmark.recommendation_numberStringThe PCI benchmark recommendation number.
CrowdStrike.CSPMPolicySetting.nist_benchmarkArrayAn array of NIST benchmark details.
CrowdStrike.CSPMPolicySetting.nist_benchmark.idIntegerThe NIST benchmark ID.
CrowdStrike.CSPMPolicySetting.nist_benchmark.benchmark_shortStringThe NIST benchmark shortname.
CrowdStrike.CSPMPolicySetting.nist_benchmark.recommendation_numberStringThe NIST benchmark recommendation number.
CrowdStrike.CSPMPolicySetting.attack_typesArrayThe attack types.

Command example#

!cs-falcon-cspm-list-service-policy-settings limit=2

Context Example#

{
"CrowdStrike": {
"CSPMPolicySetting": [
{
"cis_benchmark": [
{
"benchmark_short": "CIS Controls v8",
"id": 722,
"recommendation_number": "3.11"
}
],
"cloud_asset_type": "filesystem",
"cloud_asset_type_id": 107,
"cloud_provider": "aws",
"cloud_service": "efs",
"cloud_service_friendly": "EFS",
"cloud_service_subtype": "N/A",
"created_at": "2022-08-02T22:17:56.53081Z",
"default_severity": "informational",
"fql_policy": "aws_encrypted:['true']+aws_kms_key_id:['']",
"is_remediable": false,
"name": "EFS File System is encrypted without CMK",
"nist_benchmark": [
{
"benchmark_short": "NIST 800-53 REV 5",
"id": 932,
"recommendation_number": "SC-8(1)"
},
{
"benchmark_short": "NIST 800-53 REV 5",
"id": 989,
"recommendation_number": "SC-28(1)"
}
],
"pci_benchmark": [
{
"benchmark_short": "PCI DSS v3.2.1",
"id": 41,
"recommendation_number": "3.4"
}
],
"policy_id": 1,
"policy_settings": [
{
"account_id": "537409938058",
"enabled": true,
"regions": [
"af-south-1",
"ap-east-1",
"ap-northeast-1",
"ap-northeast-2",
"ap-northeast-3"
],
"severity": "informational",
"tag_excluded": false
}
],
"policy_timestamp": "0001-01-01T00:00:00Z",
"policy_type": "Configuration",
"updated_at": "2023-07-19T17:31:45.372476Z"
},
{
"cis_benchmark": [
{
"benchmark_short": "CIS 1.4.0 AWS Foundations",
"id": 143,
"recommendation_number": "4.13"
}
],
"cloud_asset_type": "awsaccount",
"cloud_asset_type_id": 116,
"cloud_provider": "aws",
"cloud_service": "awsaccount",
"cloud_service_friendly": "CloudWatch",
"cloud_service_subtype": "Route Table",
"created_at": "2023-01-04T19:57:23.897865Z",
"default_severity": "informational",
"is_remediable": false,
"iso_benchmark": [
{
"benchmark_short": "ISO",
"id": 25,
"recommendation_number": "5.25"
}
],
"name": "CloudWatch log metric filter and alarm missing for changes to route tables",
"nist_benchmark": [
{
"benchmark_short": "NIST 800-53 REV 5",
"id": 184,
"recommendation_number": "AU-6(1)"
},
{
"benchmark_short": "NIST 800-53 REV 5",
"id": 183,
"recommendation_number": "AU-6"
}
],
"pci_benchmark": [
{
"benchmark_short": "PCI DSS v4.0",
"id": 428,
"recommendation_number": "10.4.1"
}
],
"policy_id": 2,
"policy_settings": [
{
"account_id": "537409938058",
"enabled": true,
"regions": [
"af-south-1",
"ap-east-1"
],
"severity": "informational",
"tag_excluded": false
}
],
"policy_timestamp": "0001-01-01T00:00:00Z",
"policy_type": "Configuration",
"soc2_benchmark": [
{
"benchmark_short": "TSC 2017 rev 2020",
"id": 27,
"recommendation_number": "CC7.3"
}
],
"updated_at": "2023-09-18T16:11:58.369644Z"
}
]
}
}

Human Readable Output#

CSPM Policy Settings:#

Policy IdIs RemediableRemediation SummaryNamePolicy TypeCloud Service SubtypeCloud ServiceDefault Severity
1falseEFS File System is encrypted without CMKConfigurationN/Aefsinformational
2falseCloudWatch log metric filter and alarm missing for changes to route tablesConfigurationRoute Tableawsaccountinformational

cs-falcon-cspm-update-policy_settings#


Updates a policy setting - can be used to override policy severity or to disable a policy entirely.

Base Command#

cs-falcon-cspm-update-policy_settings

Input#

Argument NameDescriptionRequired
policy_idPolicy ID to be updated.Required
account_idCloud Account ID to impact.Optional
enabledFlag indicating if this policy is enabled. Possible values are: false, true. Default is true.Optional
regionsList of regions where this policy is enforced.Optional
severityPolicy severity value. Possible values are: critical, high, medium, informational.Optional
tag_excludedTag exclusion flag. Possible values are: false, true.Optional

Context Output#

There is no context output for this command.

Command example#

!cs-falcon-cspm-update-policy_settings policy_id=1 enabled=true regions="eu-central-1,eu-central-2" severity=high tag_excluded=false

Human Readable Output#

Policy 1 was updated successfully

cs-falcon-resolve-identity-detection#


Perform actions on identity detection alerts.

Base Command#

cs-falcon-resolve-identity-detection

Input#

Argument NameDescriptionRequired
idsIDs of the alerts to update.Required
assign_to_nameAssign the specified detections to a user based on their username.Optional
assign_to_uuidAssign the specified detections to a user based on their UUID.Optional
append_commentAppends a new comment to any existing comments for the specified detections.Optional
add_tagAdd a tag to the specified detections.Optional
remove_tagRemove a tag from the specified detections.Optional
update_statusUpdate status of the alert to the specified value. Possible values are: new, in_progress, closed, reopened.Optional
unassignWhether to unassign any assigned users to the specified detections. Possible values are: false, true.Optional
show_in_uiIf true, displays the detection in the UI. Possible values are: false, true.Optional

Context Output#

There is no context output for this command.

Command example#

!cs-falcon-resolve-identity-detection ids="id_1,id_2" add_tag="Demo tag" append_comment="Demo comment" assign_to_name="morganf" show_in_ui=true update_status=in_progress

Human Readable Output#

IDP Detection(s) id_1, id_2 were successfully updated

cs-falcon-list-users#


List users.

Base Command#

cs-falcon-list-users

Input#

Argument NameDescriptionRequired
idID(s) of specific users to list.Optional
filterThe filter expression that should be used to limit the results. FQL syntax. Available values: assigned_cids, cid, first_name, last_name, name, uid.Optional
offsetThe integer offset to start retrieving records from.Optional
limitThe maximum number of records to return. Default is 100.Optional

Context Output#

PathTypeDescription
CrowdStrike.Users.uuidStringThe user's UUID.
CrowdStrike.Users.cidStringThe customer ID.
CrowdStrike.Users.uidStringThe user's ID.
CrowdStrike.Users.first_nameStringThe user's first name.
CrowdStrike.Users.last_nameStringThe user's last name.
CrowdStrike.Users.last_login_atStringThe timestamp of the user's last login.
CrowdStrike.Users.created_atStringThe timestamp of the user's creation.

cs-falcon-get-incident-behavior#


Get incident behavior information

Base Command#

cs-falcon-get-incident-behavior

Input#

Argument NameDescriptionRequired
behavior_idsID(s) of behaviors to list. Behavior IDs can be retrieved by running the 'cs-falcon-get-detections-for-incident' command.Required

Context Output#

PathTypeDescription
CrowdStrike.IncidentBehavior.behavior_idStringThe behavior ID.
CrowdStrike.IncidentBehavior.cidStringThe customer ID.
CrowdStrike.IncidentBehavior.aidStringThe agent ID.
CrowdStrike.IncidentBehavior.incident_idStringThe incident ID.
CrowdStrike.IncidentBehavior.incident_idsListThe incident IDs.
CrowdStrike.IncidentBehavior.pattern_idNumberThe pattern ID.
CrowdStrike.IncidentBehavior.template_instance_idNumberThe template instance ID.
CrowdStrike.IncidentBehavior.timestampStringThe timestamp.
CrowdStrike.IncidentBehavior.cmdlineStringThe command line.
CrowdStrike.IncidentBehavior.filepathStringThe file path.
CrowdStrike.IncidentBehavior.domainStringThe domain.
CrowdStrike.IncidentBehavior.pattern_dispositionNumberThe pattern disposition.
CrowdStrike.IncidentBehavior.pattern_disposition_details.indicatorBooleanWhether the pattern disposition is an indicator.
CrowdStrike.IncidentBehavior.pattern_disposition_details.detectBooleanWhether the pattern disposition is a detect.
CrowdStrike.IncidentBehavior.pattern_disposition_details.inddet_maskBooleanThe pattern disposition indicator detect mask.
CrowdStrike.IncidentBehavior.pattern_disposition_details.sensor_onlyBooleanWhether the pattern disposition is sensor only.
CrowdStrike.IncidentBehavior.pattern_disposition_details.rootingBooleanWhether the pattern disposition is rooting.
CrowdStrike.IncidentBehavior.pattern_disposition_details.kill_processBooleanWhether the process was killed.
CrowdStrike.IncidentBehavior.pattern_disposition_details.kill_subprocessBooleanWhether the subprocess was killed.
CrowdStrike.IncidentBehavior.pattern_disposition_details.quarantine_machineBooleanWhether the machine was quarantined.
CrowdStrike.IncidentBehavior.pattern_disposition_details.quarantine_fileBooleanWhether the file was quarantined.
CrowdStrike.IncidentBehavior.pattern_disposition_details.policy_disabledBooleanWhether the policy was disabled.
CrowdStrike.IncidentBehavior.pattern_disposition_details.kill_parentBooleanWhether the parent was killed.
CrowdStrike.IncidentBehavior.pattern_disposition_details.operation_blockedBooleanWhether the operation was blocked.
CrowdStrike.IncidentBehavior.pattern_disposition_details.process_blockedBooleanWhether the process was blocked.
CrowdStrike.IncidentBehavior.pattern_disposition_details.registry_operation_blockedBooleanWhether the registry operation was blocked.
CrowdStrike.IncidentBehavior.pattern_disposition_details.critical_process_disabledBooleanWhether the critical process was disabled.
CrowdStrike.IncidentBehavior.pattern_disposition_details.bootup_safeguard_enabledBooleanWhether the bootup safeguard was enabled.
CrowdStrike.IncidentBehavior.pattern_disposition_details.fs_operation_blockedBooleanWhether the file system operation was blocked.
CrowdStrike.IncidentBehavior.pattern_disposition_details.handle_operation_downgradedBooleanWhether the handle operation was downgraded.
CrowdStrike.IncidentBehavior.pattern_disposition_details.kill_action_failedBooleanWhether the kill action failed.
CrowdStrike.IncidentBehavior.pattern_disposition_details.blocking_unsupportedBooleanWhether the blocking is unsupported.
CrowdStrike.IncidentBehavior.pattern_disposition_details.suspend_processBooleanWhether the process was suspended.
CrowdStrike.IncidentBehavior.pattern_disposition_details.suspend_parentBooleanWhether the parent was suspended.
CrowdStrike.IncidentBehavior.sha256StringThe SHA256 hash.
CrowdStrike.IncidentBehavior.user_nameStringThe user name.
CrowdStrike.IncidentBehavior.tacticStringThe tactic used.
CrowdStrike.IncidentBehavior.tactic_idStringThe tactic ID.
CrowdStrike.IncidentBehavior.techniqueStringThe technique used.
CrowdStrike.IncidentBehavior.technique_idStringThe technique ID.
CrowdStrike.IncidentBehavior.display_nameStringThe display name.
CrowdStrike.IncidentBehavior.objectiveStringThe objective.
CrowdStrike.IncidentBehavior.compound_ttoStringThe compound TTO.

cs-falcon-get-ioarules#


Get IOA Rules for Custom IOA rule triggered detections

Base Command#

cs-falcon-get-ioarules

Input#

Argument NameDescriptionRequired
rule_idsID(s) of rules to list. Rule IDs can be retrieved by combining cid and rule_instance_id from 'cs-falcon-list-detection-summaries' output using this format cid:rule_instance_id. Example: 1123casdcccxxaafq13fdasf:2003Required

Context Output#

PathTypeDescription
CrowdStrike.IOARules.instance_idStringThe IOA Rule's Instance ID.
CrowdStrike.IOARules.customer_idStringThe customer ID.
CrowdStrike.IOARules.action_labelStringThe IOA Rule's Action Label.
CrowdStrike.IOARules.commentStringThe IOA Rule's Comment..
CrowdStrike.IOARules.committed_onStringThe timestamp of the IOA Rule's commitment.
CrowdStrike.IOARules.created_byStringThe IOA Rule's creator.
CrowdStrike.IOARules.created_onStringThe timestamp of the IOA Rule's creation.
CrowdStrike.IOARules.deletedBooleanWhether the IOA Rule is in deleted status.
CrowdStrike.IOARules.descriptionStringThe IOA Rule's Description.
CrowdStrike.IOARules.disposition_idStringThe Disposition ID used by the IOA Rule.
CrowdStrike.IOARules.enabledBooleanWhether the IOA Rule is enabled.
CrowdStrike.IOARules.field_valuesStringThe IOA Rule's field values.
CrowdStrike.IOARules.instance_versionStringThe IOA Rule's Instance Version.
CrowdStrike.IOARules.magic_cookieStringThe IOA Rule's Magic Cookie.
CrowdStrike.IOARules.modified_byStringThe IOA Rule's last modified user.
CrowdStrike.IOARules.modified_onStringThe timestamp of the IOA Rule's last modification.
CrowdStrike.IOARules.nameStringThe IOA Rule Name.
CrowdStrike.IOARules.pattern_idStringThe IOA Rule's Pattern ID.
CrowdStrike.IOARules.pattern_severityStringThe IOA Rule's Pattern Severity.
CrowdStrike.IOARules.rulegroup_idStringThe IOA Rule's Rule Group ID.
CrowdStrike.IOARules.ruletype_idStringThe IOA Rule's Rule Type ID.
CrowdStrike.IOARules.ruletype_nameStringThe IOA Rule's Rule Type Name.
CrowdStrike.IOARules.version_idsStringThe IOA Rule's Version ID.

cs-falcon-resolve-mobile-detection#


Perform actions on mobile detection alerts.

Base Command#

cs-falcon-resolve-mobile-detection

Input#

Argument NameDescriptionRequired
idsIDs of the alerts to update.Required
assign_to_nameAssign the specified detections to a user based on their username.Optional
assign_to_uuidAssign the specified detections to a user based on their UUID.Optional
append_commentAppends a new comment to any existing comments for the specified detections.Optional
add_tagAdd a tag to the specified detections.Optional
remove_tagRemove a tag from the specified detections.Optional
update_statusUpdate status of the alert to the specified value. Possible values are: new, in_progress, closed, reopened.Optional
unassignWhether to unassign any assigned users to the specified detections. Possible values are: false, true.Optional
show_in_uiIf true, displays the detection in the UI. Possible values are: false, true.Optional

Context Output#

There is no context output for this command.

Command example#

!cs-falcon-resolve-mobile-detection ids="id_1,id_2" add_tag="Demo tag" append_comment="Demo comment" assign_to_name="morganf" show_in_ui=true update_status=in_progress

Human Readable Output#

Mobile Detection(s) id_1, id_2 were successfully updated

Troubleshooting#

When encountering connectivity or authorization errors within Cortex XSOAR 8, it necessary to include the IP corresponding to the relevant region into the CrowdStrike Falcon allow list.