Skip to main content

CrowdStrike Falcon

This Integration is part of the CrowdStrike Falcon Pack.#

The CrowdStrike Falcon OAuth 2 API (formerly the Falcon Firehose API), enables fetching and resolving detections, searching devices, getting behaviors by ID, containing hosts, and lifting host containment.

Configure CrowdStrike Falcon on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for CrowdStrike Falcon.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Server URL (e.g., https://api.crowdstrike.com)True
    Client IDFalse
    SecretFalse
    Source ReliabilityReliability of the source providing the intelligence data. Currently used for “CVE” reputation command.False
    First fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days)False
    Max incidents per fetchFalse
    Endpoint Detections fetch queryFalse
    Endpoint Incidents fetch queryFalse
    IDP Detections fetch queryFalse
    Mobile Detections fetch queryFalse
    IOM fetch queryUse the Falcon Query Language. For more information, refer to https://falcon.crowdstrike.com/documentation/page/d3c84a1b/falcon-query-language-fql.False
    IOA fetch queryIn the format: cloud_provider=aws&aws_account_id=1234. The query must have the argument 'cloud_provider' configured. Multiple values for the same parameter is not supported. For more information, refer to https://falcon.crowdstrike.com/documentation/page/d3c84a1b/falcon-query-language-fql.False
    Detections from On-Demand Scans fetch queryUse the Falcon Query Language. For more information, refer to https://falcon.crowdstrike.com/documentation/page/d3c84a1b/falcon-query-language-fql.False
    Fetch incidentsFalse
    Incident typeFalse
    Mirroring DirectionChoose the direction to mirror the detection: Incoming (from CrowdStrike Falcon to Cortex XSOAR), Outgoing (from Cortex XSOAR to CrowdStrike Falcon), or Incoming and Outgoing (to/from CrowdStrike Falcon and Cortex XSOAR).False
    Trust any certificate (not secure)False
    Use legacy APIUse the legacy version of the API, which refers to versions prior to the 'Next Generation Raptor release.'False
    Use system proxy settingsFalse
    Close Mirrored XSOAR IncidentWhen selected, closes the CrowdStrike Falcon incident or detection, which is mirrored in the Cortex XSOAR incident.False
    Close Mirrored CrowdStrike Falcon Incident or DetectionWhen selected, closes the Cortex XSOAR incident, which is mirrored in the CrowdStrike Falcon incident or detection, according to the types that were chosen to be fetched and mirrored.False
    Fetch typesChoose what to fetch - incidents, detections, IDP detections. You can choose any combination.False
    Reopen StatusesCrowdStrike Falcon statuses that will reopen an incident in Cortex XSOAR if closed. You can choose any combination.False
    Incidents Fetch IntervalFalse
    Advanced: Time in minutes to look back when fetching incidents and detectionsUse this parameter to determine the look-back period for searching for incidents that were created before the last run time and did not match the query when they were created.False
  4. Click Test to validate the URLs, token, and connection.

Required API client scope#

In order to use the CrowdStrike Falcon integration, your API client must be provisioned with the following scope and permissions:

  • Real Time Response - Read and Write
  • Alerts - Read and Write
  • IOC Manager - Read and Write
  • IOCs - Read and Write
  • IOA Exclusions - Read and Write
  • Machine Learning Exclusions - Read and Write
  • Detections - Read and Write
  • Hosts - Read and Write
  • Host Groups - Read and Write
  • Incidents - Read and Write
  • Spotlight Vulnerabilities - Read
  • User Management - Read
  • On-Demand Scans (ODS) - Read and Write
  • Identity Protection Entities - Read and Write
  • Identity Protection Detections - Read and Write
  • Identity Protection Timeline - Read
  • Identity Protection Assessment - Read

Incident Mirroring#

You can enable incident mirroring between Cortex XSOAR incidents and CrowdStrike Falcon corresponding events (available from Cortex XSOAR version 6.0.0). To set up the mirroring:

  1. Enable Fetching incidents in your instance configuration.

  2. In the Fetch types integration parameter, select what types to mirror.

  3. Optional: You can go to one of the fetch query parameters and select the query to fetch the events from CrowdStrike Falcon.

  4. In the Mirroring Direction integration parameter, select in which direction the incidents should be mirrored:

    OptionDescription
    NoneTurns off incident mirroring.
    IncomingAny changes in CrowdStrike Falcon events (mirroring incoming fields) will be reflected in Cortex XSOAR incidents.
    OutgoingAny changes in Cortex XSOAR incidents will be reflected in CrowdStrike Falcon events (outgoing mirrored fields).
    Incoming And OutgoingChanges in Cortex XSOAR incidents and CrowdStrike Falcon events will be reflected in both directions.
  5. Optional: Check the Close Mirrored XSOAR Incident integration parameter to close the Cortex XSOAR incident when the corresponding event is closed in CrowdStrike Falcon.

  6. Optional: Check the Close Mirrored CrowdStrike Falcon Incident or Detection integration parameter to close the CrowdStrike Falcon incident or detection when the corresponding Cortex XSOAR incident is closed.

Newly fetched Cortex XSOAR incidents will be mirrored in the chosen direction. However, this selection does not affect existing incidents.

Important Notes

  • To ensure the mirroring works as expected, mappers are required, both for incoming and outgoing, to map the expected fields in Cortex XSOAR and CrowdStrike Falcon.
  • When mirroring in incidents from CrowdStrike Falcon to Cortex XSOAR:
    • For the tags field, tags can only be added from the remote system.
    • When enabling the Close Mirrored XSOAR Incident integration parameter, the field in CrowdStrike Falcon that determines whether the incident was closed is the status field.
    • In case the look-back parameter is initialized with a certain value and during a time that incidents were fetched, if changing the lookback to a number that is greater than the previous value, then in the initial incident fetching there will be incidents duplications. If the integration was already set with lookback > 0, and the lookback is not being increased at any point of time, then those incident duplications would not occur.

Fetch Incidents#

IOM Incidents#

The FQL filter expression is used to configure the IOM fetch query. Available filter:

  • use_current_scan_ids (use this to get records for latest scans)
  • account_name
  • account_id
  • agent_id
  • attack_types
  • azure_subscription_id
  • cloud_provider
  • cloud_service_keyword
  • custom_policy_id
  • is_managed
  • policy_id
  • policy_type
  • resource_id
  • region
  • status
  • severity
  • severity_string

Example: cloud_provider: 'aws'+account_id: 'my_id'

IOA Incidents#

The IOA fetch query uses the following format: param1=val1&param2=val2 Multiple values for the same parameter is not supported. Available parameters:

  • cloud_provider (required in every query)
  • account_id
  • aws_account_id
  • azure_subscription_id
  • azure_tenant_id
  • severity
  • region
  • service
  • state

Example: cloud_provider=aws&region=eu-west-2 More information about the parameters can be found here.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

cs-falcon-search-device#


Searches for a device that matches the query.

Base Command#

cs-falcon-search-device

Input#

Argument NameDescriptionRequired
extended_dataWhether or not to get additional data about the device. Possible values are: Yes, No.Optional
filterThe query by which to filter the device.Optional
limitThe maximum records to return [1-5000]. Default is 50.Optional
offsetThe offset to start retrieving records from.Optional
idsA comma-separated list of device IDs to limit the results.Optional
statusThe status of the device. Possible values are: normal, containment_pending, contained, lift_containment_pending.Optional
hostnameThe hostname of the device. Possible values are: .Optional
platform_nameThe platform name of the device. Possible values are: Windows, Mac, Linux.Optional
site_nameThe site name of the device.Optional
sortThe property to sort by (e.g., status.desc or hostname.asc).Optional

Context Output#

PathTypeDescription
CrowdStrike.Device.IDStringThe ID of the device.
CrowdStrike.Device.LocalIPStringThe local IP address of the device.
CrowdStrike.Device.ExternalIPStringThe external IP address of the device.
CrowdStrike.Device.HostnameStringThe hostname of the device.
CrowdStrike.Device.OSStringThe operating system of the device.
CrowdStrike.Device.MacAddressStringThe MAC address of the device.
CrowdStrike.Device.FirstSeenStringThe first time the device was seen.
CrowdStrike.Device.LastSeenStringThe last time the device was seen.
CrowdStrike.Device.PolicyTypeStringThe policy type of the device.
CrowdStrike.Device.StatusStringThe device status.
Endpoint.HostnameStringThe endpoint hostname.
Endpoint.OSStringThe endpoint operation system.
Endpoint.IPAddressStringThe endpoint IP address.
Endpoint.IDStringThe endpoint ID.
Endpoint.StatusStringThe endpoint status.
Endpoint.IsIsolatedStringThe endpoint isolation status.
Endpoint.MACAddressStringThe endpoint MAC address.
Endpoint.VendorStringThe integration name of the endpoint vendor.
Endpoint.OSVersionStringThe endpoint operation system version.

Command Example#

!cs-falcon-search-device ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1,a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
"CrowdStrike.Device(val.ID === obj.ID)": [
{
"ExternalIP": "94.188.164.68",
"MacAddress": "8c-85-90-3d-ed-3e",
"Hostname": "154.132.82-test-co.in-addr.arpa",
"LocalIP": "192.168.1.76",
"LastSeen": "2019-03-28T02:36:41Z",
"OS": "Mojave (10.14)",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"FirstSeen": "2017-12-28T22:38:11Z",
"Status": "contained"
},
{
"ExternalIP": "94.188.164.68",
"MacAddress": "f0-18-98-74-8c-31",
"Hostname": "154.132.82-test-co.in-addr.arpa",
"LocalIP": "172.22.14.237",
"LastSeen": "2019-03-17T10:03:17Z",
"OS": "Mojave (10.14)",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"FirstSeen": "2017-12-10T11:01:20Z",
"Status": "contained"
}
],
"Endpoint(val.ID === obj.ID)": [
{
"Hostname": "154.132.82-test-co.in-addr.arpa",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"IPAddress": "192.168.1.76",
"OS": "Mojave (10.14)",
"Status": "Online",
"￿Vendor": "CrowdStrike Falcon",
"￿MACAddress": "1-1-1-1"
},
{
"Hostname": "154.132.82-test-co.in-addr.arpa",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"IPAddress": "172.22.14.237",
"OS": "Mojave (10.14)",
"Status": "Online",
"￿Vendor": "CrowdStrike Falcon",
"￿MACAddress": "1-1-1-1"
}
]
}

Human Readable Output#

Devices#

IDHostnameOSMac AddressLocal IPExternal IPFirst SeenLast SeenStatus
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1154.132.82-test-co.in-addr.arpaMojave (10.14)8c-85-90-3d-ed-3e192.168.1.7694.188.164.682017-12-28T22:38:11Z2019-03-28T02:36:41Zcontained
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1154.132.82-test-co.in-addr.arpaMojave (10.14)f0-18-98-74-8c-31172.22.14.23794.188.164.682017-12-10T11:01:20Z2019-03-17T10:03:17Zcontained

cs-falcon-get-behavior#


Searches for and fetches the behavior that matches the query. Deprecated - No replacement available.

Base Command#

cs-falcon-get-behavior

Input#

Argument NameDescriptionRequired
behavior_idThe ID of the behavior. The ID of the behavior can be retrieved by running the cs-falcon-search-detection or cs-falcon-get-detections-for-incident command.Required

Context Output#

PathTypeDescription
CrowdStrike.Behavior.FileNameStringThe filename of the behavior.
CrowdStrike.Behavior.ScenarioStringThe scenario name of the behavior.
CrowdStrike.Behavior.MD5StringThe MD5 hash of the IOC in the behavior.
CrowdStrike.Behavior.SHA256StringThe SHA256 hash of the IOC in the behavior.
CrowdStrike.Behavior.IOCTypeStringThe type of the indicator of compromise.
CrowdStrike.Behavior.IOCValueStringThe value of the indicator of compromise.
CrowdStrike.Behavior.CommandLineStringThe command line executed in the behavior.
CrowdStrike.Behavior.UserNameStringThe username related to the behavior.
CrowdStrike.Behavior.SensorIDStringThe sensor ID related to the behavior.
CrowdStrike.Behavior.ParentProcessIDStringThe ID of the parent process.
CrowdStrike.Behavior.ProcessIDStringThe process ID of the behavior.
CrowdStrike.Behavior.IDStringThe ID of the behavior.

Command Example#

!cs-falcon-get-behavior behavior_id=3206

Context Example#

{
"CrowdStrike.Behavior": [
{
"IOCType": "sha256",
"ProcessID": "197949010450449117",
"Scenario": "known_malware",
"CommandLine": "/Library/spokeshave.jn/spokeshave.jn.app/Contents/MacOS/spokeshave.jn",
"UserName": "user@u-MacBook-Pro-2.local",
"FileName": "spokeshave.jn",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "3206",
"IOCValue": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
},
{
"IOCType": "sha256",
"ProcessID": "197949016741905142",
"Scenario": "known_malware",
"ParentProcessID": "197949014644753130",
"CommandLine": "./xSf",
"UserName": "root@u-MacBook-Pro-2.local",
"FileName": "xSf",
"SensorID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "3206",
"IOCValue": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
]
}

Human Readable Output#

Behavior ID: 3206#

IDFile NameCommand LineScenarioIOC TypeIOC ValueUser NameSHA256MD5Process ID
3206spokeshave.jn/Library/spokeshave.jn/spokeshave.jn.app/Contents/MacOS/spokeshave.jnknown_malwaresha256a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1user@u-MacBook-Pro-2.locala1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1197949010450449117
3206xSf./xSfknown_malwaresha256a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1root@u-MacBook-Pro-2.locala1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1197949016741905142

cs-falcon-search-detection#


Search for details of specific detections, either using a filter query, or by providing the IDs of the detections.

Base Command#

cs-falcon-search-detection

Input#

Argument NameDescriptionRequired
idsA comma-separated list of IDs of the detections to search. If provided, will override other arguments.Optional
filterFilter detections using a query in Falcon Query Language (FQL).
For example, filter="device.hostname:'CS-SE-TG-W7-01'"
For a full list of valid filter options, see: https://falcon.crowdstrike.com/support/documentation/2/query-api-reference#detectionsearch.
Optional
extended_dataWhether to get additional data such as device and behaviors processed. Possible values are: Yes, No.Optional

Context Output#

PathTypeDescription
CrowdStrike.Detection.Behavior.FileNameStringThe filename of the behavior.
CrowdStrike.Detection.Behavior.ScenarioStringThe scenario name of the behavior.
CrowdStrike.Detection.Behavior.MD5StringThe MD5 hash of the IOC of the behavior.
CrowdStrike.Detection.Behavior.SHA256StringThe SHA256 hash of the IOC of the behavior.
CrowdStrike.Detection.Behavior.IOCTypeStringThe type of the IOC.
CrowdStrike.Detection.Behavior.IOCValueStringThe value of the IOC.
CrowdStrike.Detection.Behavior.CommandLineStringThe command line executed in the behavior.
CrowdStrike.Detection.Behavior.UserNameStringThe username related to the behavior.
CrowdStrike.Detection.Behavior.SensorIDStringThe sensor ID related to the behavior.
CrowdStrike.Detection.Behavior.ParentProcessIDStringThe ID of the parent process.
CrowdStrike.Detection.Behavior.ProcessIDStringThe process ID of the behavior.
CrowdStrike.Detection.Behavior.IDStringThe ID of the behavior. Note: This output exists only in the legacy version.
CrowdStrike.Detection.SystemStringThe system name of the detection.
CrowdStrike.Detection.CustomerIDStringThe ID of the customer (CID).
CrowdStrike.Detection.MachineDomainStringThe name of the domain of the detection machine.
CrowdStrike.Detection.IDStringThe detection ID.
CrowdStrike.Detection.ProcessStartTimeDateThe start time of the process that generated the detection.

Command Example#

!cs-falcon-search-detection ids=ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1898376850347,ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1092318056279064902

Context Example#

{
"CrowdStrike.Detection(val.ID === obj.ID)": [
{
"Status": "false_positive",
"ProcessStartTime": "2019-03-21T20:32:55.654489974Z",
"Behavior": [
{
"IOCType": "domain",
"ProcessID": "2279170016592",
"Scenario": "intel_detection",
"ParentProcessID": "2257232915544",
"CommandLine": "C:\\Python27\\pythonw.exe -c __import__('idlelib.run').run.main(True) 1250",
"UserName": "josh",
"FileName": "pythonw.exe",
"SensorID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "4900",
"IOCValue": "systemlowcheck.com",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
},
{
"IOCType": "domain",
"ProcessID": "2283087267593",
"Scenario": "intel_detection",
"ParentProcessID": "2279170016592",
"CommandLine": "ping.exe systemlowcheck.com",
"UserName": "josh",
"FileName": "PING.EXE",
"SensorID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "4900",
"IOCValue": "systemlowcheck.com",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
],
"MaxSeverity": 70,
"System": "DESKTOP-S49VMIL",
"ID": "ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1898376850347",
"MachineDomain": "",
"ShowInUi": true,
"CustomerID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
},
{
"Status": "new",
"ProcessStartTime": "2019-02-04T07:05:57.083205971Z",
"Behavior": [
{
"IOCType": "sha256",
"ProcessID": "201917905370426448",
"Scenario": "known_malware",
"ParentProcessID": "201917902773103685",
"CommandLine": "./xSf",
"UserName": "user@u-MacBook-Pro-2.local",
"FileName": "xSf",
"SensorID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "3206",
"IOCValue": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
},
{
"IOCType": "sha256",
"ProcessID": "201917905370426448",
"Scenario": "known_malware",
"ParentProcessID": "201917902773103685",
"CommandLine": "./xSf",
"UserName": "user@u-MacBook-Pro-2.local",
"FileName": "xSf",
"SensorID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ID": "3206",
"IOCValue": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
],
"MaxSeverity": 30,
"System": "u-MacBook-Pro-2.local",
"ID": "ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1092318056279064902",
"MachineDomain": "",
"ShowInUi": true,
"CustomerID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
]
}

Human Readable Output#

Detections Found:#

IDStatusSystemProcess Start TimeCustomer IDMax Severity
ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1898376850347false_positiveDESKTOP-S49VMIL2019-03-21T20:32:55.654489974Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a170
ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:1092318056279064902newu-MacBook-Pro-2.local2019-02-04T07:05:57.083205971Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a130

cs-falcon-resolve-detection#


Resolves and updates a detection using the provided arguments. At least one optional argument must be passed, otherwise no change will take place. Note that IDP detections are not supported.

Base Command#

cs-falcon-resolve-detection

Input#

Argument NameDescriptionRequired
idsA comma-separated list of one or more IDs to resolve.Required
statusThe status to transition a detection to. Possible values are: new, in_progress, true_positive, false_positive, closed, reopened, ignored.Optional
assigned_to_uuidA user ID, for example: 1234567891234567891. username and assigned_to_uuid are mutually exclusive.Optional
commentOptional comment to add to the detection. Comments are displayed with the detection in CrowdStrike Falcon and provide context or notes for other Falcon users.Optional
show_in_uiIf true, displays the detection in the UI. Possible values are: true, false.Optional
usernameUsername to assign the detections to. (This is usually the user's email address, but may vary based on your configuration). username and assigned_to_uuid are mutually exclusive.Optional

Context Output#

There is no context output for this command.

cs-falcon-contain-host#


Contains containment for a specified host. When contained, a host can only communicate with the CrowdStrike cloud and any IPs specified in your containment policy.

Base Command#

cs-falcon-contain-host

Input#

Argument NameDescriptionRequired
idsA comma-separated list of host agent IDs (AID) of the host to contain. Get an agent ID from a detection.Required

Context Output#

There is no context output for this command.

cs-falcon-lift-host-containment#


Lifts containment on the host, which returns its network communications to normal.

Base Command#

cs-falcon-lift-host-containment

Input#

Argument NameDescriptionRequired
idsA comma-separated list of host agent IDs (AIDs) of the hosts to contain. Get an agent ID from a detection.Required

Context Output#

There is no context output for this command.

cs-falcon-run-command#


Sends commands to hosts.

Base Command#

cs-falcon-run-command

Input#

Argument NameDescriptionRequired
queue_offlineAny commands run against an offline-queued session will be queued up and executed when the host comes online.Optional
host_idsA comma-separated list of host agent IDs to run commands for. The list of host agent IDs can be retrieved by running the 'cs-falcon-search-device' command.Required
command_typeThe type of command to run.Required
full_commandThe full command to run.Required
scopeThe scope to run the command for. (NOTE: In order to run the CrowdStrike RTR put command, it is necessary to pass scope=admin). Possible values are: read, write, admin. Default is read.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs. Default is 180.Optional
targetThe target to run the command for. Possible values are: batch, single. Default is batch.Optional
batch_idA batch ID to execute the command on.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.HostIDStringThe ID of the host the command was running for.
CrowdStrike.Command.SessionIDstringThe session ID of the host.
CrowdStrike.Command.StdoutStringThe standard output of the command.
CrowdStrike.Command.StderrStringThe standard error of the command.
CrowdStrike.Command.BaseCommandStringThe base command.
CrowdStrike.Command.FullCommandStringThe full command.
CrowdStrike.Command.TaskIDstring(For single host) The ID of the command request which has been accepted.
CrowdStrike.Command.Completeboolean(For single host) True if the command completed.
CrowdStrike.Command.NextSequenceIDnumber(For single host) The next sequence ID.
CrowdStrike.Command.BatchIDStringThe Batch ID that the command was executed on.

Command Example#

cs-falcon-run-command host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 command_type=ls full_command="ls C:\\"

Context Example#

{
'CrowdStrike': {
'Command': [{
'HostID': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'Stdout': 'Directory listing for C:\\ -\n\n'
'BatchID': 'batch_id'
'Name Type Size (bytes) Size (MB) '
'Last Modified (UTC-5) Created (UTC-5) \n---- '
' ---- ------------ --------- --------------------- -------'
'-------- \n$Recycle.Bin <Directory> -- '
' -- 11/27/2018 10:54:44 AM 9/15/2017 3:33:40 AM \nITAYDI '
' <Directory> -- -- 11/19/2018 1:'
'31:42 PM 11/19/2018 1:31:42 PM ',
'Stderr': '',
'BaseCommand': 'ls',
'Command': 'ls C:\\'
}]
}

Human Readable Output#

Command ls C:\ results#

BaseCommandCommandHostIDStderrStdoutBatchID
lsls C:\ a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1Directory listing for C:\ -

Name Type Size (bytes) Size (MB) Last Modified (UTC-5) Created (UTC-5)
---- ---- ------------ --------- --------------------- ---------------
$Recycle.Bin <Directory> -- -- 11/27/2018 10:54:44 AM 9/15/2017 3:33:40 AM
ITAYDI <Directory> -- -- 11/19/2018 1:31:42 PM 11/19/2018 1:31:42 PM
batch_id

cs-falcon-upload-script#


Uploads a script to Falcon CrowdStrike.

Base Command#

cs-falcon-upload-script

Input#

Argument NameDescriptionRequired
nameThe script name to upload.Required
permission_typeThe permission type for the custom script. Possible values are: "private", which is used only by the user who uploaded it, "group", which is used by all RTR Admins, and "public", which is used by all active-responders and RTR admins. Possible values are: private, group, public. Default is private.Optional
contentThe content of the PowerShell script.Required

Command Example#

!cs-falcon-upload-script name=greatscript content="Write-Output 'Hello, World!'"

Human Readable Output#

The script was uploaded successfully.

Context Output#

There is no context output for this command.

cs-falcon-upload-file#


Uploads a file to the CrowdStrike cloud. (Can be used for the RTR 'put' command).

Base Command#

cs-falcon-upload-file

Input#

Argument NameDescriptionRequired
entry_idThe file entry ID to upload.Required

Command Example#

!cs-falcon-upload-file entry_id=4@4

Human Readable Output#

The file was uploaded successfully.

Context Output#

There is no context output for this command.

cs-falcon-delete-file#


Deletes a file based on the provided ID. Can delete only one file at a time.

Base Command#

cs-falcon-delete-file

Input#

Argument NameDescriptionRequired
file_idThe ID of the file to delete. The ID of the file can be retrieved by running the 'cs-falcon-list-files' command.Required

Command Example#

!cs-falcon-delete-file file_id=le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Human Readable Output#

File le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 was deleted successfully.

Context Output#

There is no context output for this command.

cs-falcon-get-file#


Returns files based on the provided IDs. These files are used for the RTR 'put' command.

Base Command#

cs-falcon-get-file

Input#

Argument NameDescriptionRequired
file_idA comma-separated list of file IDs to get. The list of file IDs can be retrieved by running the 'cs-falcon-list-files' command.Required

Context Output#

PathTypeDescription
CrowdStrike.File.IDStringThe ID of the file.
CrowdStrike.File.CreatedByStringThe email address of the user who created the file.
CrowdStrike.File.CreatedTimeDateThe datetime the file was created.
CrowdStrike.File.DescriptionStringThe description of the file.
CrowdStrike.File.TypeStringThe type of the file. For example, script.
CrowdStrike.File.ModifiedByStringThe email address of the user who modified the file.
CrowdStrike.File.ModifiedTimeDateThe datetime the file was modified.
CrowdStrike.File.NameStringThe full name of the file.
CrowdStrike.File.PermissionStringThe permission type of the file. Possible values are: "private", which is used only by the user who uploaded it, "group", which is used by all RTR Admins, and "public", which is used by all active-responders and RTR admins.
CrowdStrike.File.SHA256StringThe SHA-256 hash of the file.
File.TypeStringThe file type.
File.NameStringThe full name of the file.
File.SHA256StringThe SHA-256 hash of the file.
File.SizeNumberThe size of the file in bytes.

Command Example#

!cs-falcon-get-file file_id=le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
'CrowdStrike.File(val.ID === obj.ID)': [
{
'CreatedBy': 'spongobob@demisto.com',
'CreatedTime': '2019-10-17T13:41:48.487520845Z',
'Description': 'Demisto',
'ID': 'le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'ModifiedBy': 'spongobob@demisto.com',
'ModifiedTime': '2019-10-17T13:41:48.487521161Z',
'Name': 'Demisto',
'Permission': 'private',
'SHA256': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'Type': 'script'
}
]
}

Human Readable Output#

CrowdStrike Falcon file le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1#

CreatedByCreatedTimeDescriptionIDModifiedByModifiedTimeNamePermissionSHA256Type
spongobob@demisto.com2019-10-17T13:41:48.487520845ZDemistole10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1spongobob@demisto.com2019-10-17T13:41:48.487521161ZDemistoprivatea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1script

cs-falcon-list-files#


Returns a list of put-file IDs that are available for the user in the 'put' command. Due to an API limitation, the maximum number of files returned is 100.

Base Command#

cs-falcon-list-files

Context Output#

PathTypeDescription
CrowdStrike.File.IDStringThe ID of the file.
CrowdStrike.File.CreatedByStringThe email address of the user who created the file.
CrowdStrike.File.CreatedTimeDateThe datetime the file was created.
CrowdStrike.File.DescriptionStringThe description of the file.
CrowdStrike.File.TypeStringThe type of the file. For example, script.
CrowdStrike.File.ModifiedByStringThe email address of the user who modified the file.
CrowdStrike.File.ModifiedTimeDateThe datetime the file was modified.
CrowdStrike.File.NameStringThe full name of the file.
CrowdStrike.File.PermissionStringThe permission type of the file. Possible values are: "private", which is used only by the user who uploaded it, "group", which is used by all RTR Admins, and "public", which is used by all active-responders and RTR admins.
CrowdStrike.File.SHA256StringThe SHA-256 hash of the file.
File.TypeStringThe file type.
File.NameStringThe full name of the file.
File.SHA256StringThe SHA-256 hash of the file.
File.SizeNumberThe size of the file in bytes.

Command Example#

!cs-falcon-list-files

Context Example#

{
'CrowdStrike.File(val.ID === obj.ID)': [
{
'CreatedBy': 'spongobob@demisto.com',
'CreatedTime': '2019-10-17T13:41:48.487520845Z',
'Description': 'Demisto',
'ID': 'le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'ModifiedBy': 'spongobob@demisto.com',
'ModifiedTime': '2019-10-17T13:41:48.487521161Z',
'Name': 'Demisto',
'Permission': 'private',
'SHA256': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'Type': 'script'
}
]
}

Human Readable Output#

CrowdStrike Falcon files#

CreatedByCreatedTimeDescriptionIDModifiedByModifiedTimeNamePermissionSHA256Type
spongobob@demisto.com2019-10-17T13:41:48.487520845ZDemistole10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1spongobob@demisto.com2019-10-17T13:41:48.487521161ZDemistoprivatea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1script

cs-falcon-get-script#


Returns custom scripts based on the provided ID. Used for the RTR 'runscript' command.

Base Command#

cs-falcon-get-script

Input#

Argument NameDescriptionRequired
script_idA comma-separated list of script IDs to return. The script IDs can be retrieved by running the 'cs-falcon-list-scripts' command.Required

Context Output#

PathTypeDescription
CrowdStrike.Script.IDStringThe ID of the script.
CrowdStrike.Script.CreatedByStringThe email address of the user who created the script.
CrowdStrike.Script.CreatedTimeDateThe datetime the script was created.
CrowdStrike.Script.DescriptionStringThe description of the script.
CrowdStrike.Script.ModifiedByStringThe email address of the user who modified the script.
CrowdStrike.Script.ModifiedTimeDateThe datetime the script was modified.
CrowdStrike.Script.NameStringThe script name.
CrowdStrike.Script.PermissionStringPermission type of the script. Possible values are: "private", which is used only by the user who uploaded it, "group", which is used by all RTR Admins, and "public", which is used by all active-responders and RTR admins.
CrowdStrike.Script.SHA256StringThe SHA-256 hash of the script file.
CrowdStrike.Script.RunAttemptCountNumberThe number of times the script attempted to run.
CrowdStrike.Script.RunSuccessCountNumberThe number of times the script ran successfully.
CrowdStrike.Script.PlatformStringThe list of operating system platforms on which the script can run. For example, Windows.
CrowdStrike.Script.WriteAccessBooleanWhether the user has write access to the script.

Command Example#

!cs-falcon-get-script file_id=le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
'CrowdStrike.Script(val.ID === obj.ID)': [
{
'CreatedBy': 'spongobob@demisto.com',
'CreatedTime': '2019-10-17T13:41:48.487520845Z',
'Description': 'Demisto',
'ID': 'le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'ModifiedBy': 'spongobob@demisto.com',
'ModifiedTime': '2019-10-17T13:41:48.487521161Z',
'Name': 'Demisto',
'Permission': 'private',
'SHA256': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'RunAttemptCount': 0,
'RunSuccessCount': 0,
'WriteAccess': True
}
]
}

Human Readable Output#

CrowdStrike Falcon script le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1#

CreatedByCreatedTimeDescriptionIDModifiedByModifiedTimeNamePermissionSHA256
spongobob@demisto.com2019-10-17T13:41:48.487520845ZDemistole10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1spongobob@demisto.com2019-10-17T13:41:48.487521161ZDemistoprivatea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

cs-falcon-delete-script#


Deletes a custom-script based on the provided ID. Can delete only one script at a time.

Base Command#

cs-falcon-delete-script

Input#

Argument NameDescriptionRequired
script_idThe script ID to delete. The script IDs can be retrieved by running the 'cs-falcon-list-scripts' command.Required

Command Example#

!cs-falcon-delete-script script_id=le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Human Readable Output#

Script le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 was deleted successfully.

Context Output#

There is no context output for this command.

cs-falcon-list-scripts#


Returns a list of custom script IDs that are available for the user in the 'runscript' command.

Base Command#

cs-falcon-list-scripts

Context Output#

PathTypeDescription
CrowdStrike.Script.IDStringThe ID of the script.
CrowdStrike.Script.CreatedByStringThe email address of the user who created the script.
CrowdStrike.Script.CreatedTimeDateThe datetime the script was created.
CrowdStrike.Script.DescriptionStringThe description of the script.
CrowdStrike.Script.ModifiedByStringThe email address of the user who modified the script.
CrowdStrike.Script.ModifiedTimeDateThe datetime the script was modified.
CrowdStrike.Script.NameStringThe script name.
CrowdStrike.Script.PermissionStringPermission type of the script. Possible values are: "private", which is used only by the user who uploaded it, "group", which is used by all RTR Admins, and "public", which is used by all active-responders and RTR admins.
CrowdStrike.Script.SHA256StringThe SHA-256 hash of the script file.
CrowdStrike.Script.RunAttemptCountNumberThe number of times the script attempted to run.
CrowdStrike.Script.RunSuccessCountNumberThe number of times the script ran successfully.
CrowdStrike.Script.PlatformStringThe list of operating system platforms on which the script can run. For example, Windows.
CrowdStrike.Script.WriteAccessBooleanWhether the user has write access to the script.

Command Example#

!cs-falcon-list-scripts

Context Example#

{
'CrowdStrike.Script(val.ID === obj.ID)': [
{
'CreatedBy': 'spongobob@demisto.com',
'CreatedTime': '2019-10-17T13:41:48.487520845Z',
'Description': 'Demisto',
'ID': 'le10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'ModifiedBy': 'spongobob@demisto.com',
'ModifiedTime': '2019-10-17T13:41:48.487521161Z',
'Name': 'Demisto',
'Permission': 'private',
'SHA256': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'RunAttemptCount': 0,
'RunSuccessCount': 0,
'WriteAccess': True
}
]
}

Human Readable Output#

CrowdStrike Falcon scripts#

CreatedByCreatedTimeDescriptionIDModifiedByModifiedTimeNamePermissionSHA256
spongobob@demisto.com2019-10-17T13:41:48.487520845ZDemistole10098bf0e311e989190662caec3daa_a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1spongobob@demisto.com2019-10-17T13:41:48.487521161ZDemistoprivatea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

cs-falcon-run-script#


Runs a script on the agent host.

Base Command#

cs-falcon-run-script

Input#

Argument NameDescriptionRequired
script_nameThe name of the script to run.Optional
host_idsA comma-separated list of host agent IDs to run commands. The list of host agent IDs can be retrieved by running the 'cs-falcon-search-device' command.Required
rawThe PowerShell script code to run.Optional
timeoutTimeout for how long to wait for the request in seconds. Maximum is 600 (10 minutes). Default is 30.Optional
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.HostIDStringThe ID of the host for which the command was running.
CrowdStrike.Command.SessionIDStringThe ID of the session of the host.
CrowdStrike.Command.StdoutStringThe standard output of the command.
CrowdStrike.Command.StderrStringThe standard error of the command.
CrowdStrike.Command.BaseCommandStringThe base command.
CrowdStrike.Command.FullCommandStringThe full command.

Command Example#

cs-falcon-run-script host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 raw="Write-Output 'Hello, World!"

Context Example#

{
'CrowdStrike': {
'Command': [{
'HostID': 'a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1',
'Stdout': 'Hello, World!',
'Stderr': '',
'BaseCommand': 'runscript',
'Command': "runscript -Raw=Write-Output 'Hello, World!"
}]
}

Human Readable Output#

Command runscript -Raw=Write-Output 'Hello, World! results#

BaseCommandCommandHostIDStderrStdout
runscriptrunscript -Raw=Write-Output 'Hello, World!a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1Hello, World!

cs-falcon-run-get-command#


Batch executes 'get' command across hosts to retrieve files. The running status you requested in the get command can be checked with cs-falcon-status-get-command.

Base Command#

cs-falcon-run-get-command

Input#

Argument NameDescriptionRequired
host_idsA comma-separated list of host agent IDs on which to run the RTR command.Required
file_pathFull path to the file that will be retrieved from each host in the batch.Required
optional_hostsA comma-separated list of a subset of hosts on which to run the command.Optional
timeoutThe number of seconds to wait for the request before it times out. In ISO time format. For example: 2019-10-17T13:41:48.487520845Z.Optional
timeout_durationThe amount of time to wait for the request before it times out. In duration syntax. For example, 10s. Valid units are: ns, us, ms, s, m, h. Maximum value is 10 minutes.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.HostIDstringThe ID of the host on which the command was running.
CrowdStrike.Command.StdoutstringThe standard output of the command.
CrowdStrike.Command.StderrstringThe standard error of the command.
CrowdStrike.Command.BaseCommandstringThe base command.
CrowdStrike.Command.TaskIDstringThe ID of the command that was running on the host.
CrowdStrike.Command.GetRequestIDstringThe ID of the command request that was accepted.
CrowdStrike.Command.CompletebooleanTrue if the command completed.
CrowdStrike.Command.FilePathstringThe file path.

Command Example#

cs-falcon-run-get-command host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 file_path="""c:\Windows\notepad.exe"""

Context Example#

{
"CrowdStrike.Command(val.TaskID === obj.TaskID)": [
{
"BaseCommand": "get",
"Complete": True,
"FilePath": "c:\\Windows\\notepad.exe",
"GetRequestID": "84ee4d50-f499-482e-bac6-b0e296149bbf",
"HostID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Stderr": "",
"Stdout": "C:\\Windows\\notepad.exe",
"TaskID": "b5c8f140-280b-43fd-8501-9900f837510b"
}
]
}

Human Readable Output#

Get command has requested for a file c:\Windows\notepad.exe#

BaseCommandCompleteFilePathGetRequestIDHostIDStderrStdoutTaskID
gettruec:\Windows\notepad.exe107199bc-544c-4b0c-8f20-3094c062a115a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1C:\Windows\notepad.exe9c820b97-6a60-4238-bc23-f63513970ec8

cs-falcon-status-get-command#


Retrieves the status of the specified batch 'get' command.

Base Command#

cs-falcon-status-get-command

Input#

Argument NameDescriptionRequired
request_idsA comma-separated list of IDs of the command requested.Required
timeoutThe number of seconds to wait for the request before it times out. In ISO time format. For example: 2019-10-17T13:41:48.487520845Z.Optional
timeout_durationThe amount of time to wait for the request before it times out. In duration syntax. For example, 10s. Valid units are: ns, us, ms, s, m, h. Maximum value is 10 minutes.Optional

Context Output#

PathTypeDescription
CrowdStrike.File.IDstringThe ID of the file.
CrowdStrike.File.TaskIDstringThe ID of the command that is running.
CrowdStrike.File.CreatedAtdateThe date the file was created.
CrowdStrike.File.DeletedAtdateThe date the file was deleted.
CrowdStrike.File.UpdatedAtdateThe date the file was last updated.
CrowdStrike.File.NamestringThe full name of the file.
CrowdStrike.File.SHA256stringThe SHA256 hash of the file.
CrowdStrike.File.SizenumberThe size of the file in bytes.
File.NamestringThe full name of the file.
File.SizenumberThe size of the file in bytes.
File.SHA256stringThe SHA256 hash of the file.

Command Example#

!cs-falcon-status-get-command request_ids="84ee4d50-f499-482e-bac6-b0e296149bbf"

Context Example#

{
"CrowdStrike.File(val.ID === obj.ID || val.TaskID === obj.TaskID)": [
{
"CreatedAt": "2020-05-01T16:09:00Z",
"DeletedAt": None,
"ID": 185596,
"Name": "\\Device\\HarddiskVolume2\\Windows\\notepad.exe",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Size": 0,
"TaskID": "b5c8f140-280b-43fd-8501-9900f837510b",
"UpdatedAt": "2020-05-01T16:09:00Z"
}
],
"File(val.MD5 \u0026\u0026 val.MD5 == obj.MD5 || val.SHA1 \u0026\u0026 val.SHA1 == obj.SHA1 || val.SHA256 \u0026\u0026 val.SHA256 == obj.SHA256 || val.SHA512 \u0026\u0026 val.SHA512 == obj.SHA512 || val.CRC32 \u0026\u0026 val.CRC32 == obj.CRC32 || val.CTPH \u0026\u0026 val.CTPH == obj.CTPH || val.SSDeep \u0026\u0026 val.SSDeep == obj.SSDeep)": [
{
"Name": "\\Device\\HarddiskVolume2\\Windows\\notepad.exe",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Size": 0
}
]
}

Human Readable Output#

CrowdStrike Falcon files#

CreatedAtDeletedAtIDNameSHA256SizeTaskIDUpdatedAt
2020-05-01T16:09:00Z185596\Device\HarddiskVolume2\Windows\notepad.exea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a10b5c8f140-280b-43fd-8501-9900f837510b2020-05-01T16:09:00Z

cs-falcon-status-command#


Gets the status of a command executed on a host.

Base Command#

cs-falcon-status-command

Input#

Argument NameDescriptionRequired
request_idThe ID of the command requested.Required
sequence_idThe sequence ID in chunk requests.Optional
scopeThe scope to run the command for. Possible values are: read, write, admin. Default is read.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.TaskIDstringThe ID of the command request that was accepted.
CrowdStrike.Command.StdoutstringThe standard output of the command.
CrowdStrike.Command.StderrstringThe standard error of the command.
CrowdStrike.Command.BaseCommandstringThe base command.
CrowdStrike.Command.CompletebooleanTrue if the command completed.
CrowdStrike.Command.SequenceIDnumberThe sequence ID in the current request.
CrowdStrike.Command.NextSequenceIDnumberThe sequence ID for the next request in the chunk request.

Command Example#

!cs-falcon-status-command request_id="ae323961-5aa8-442e-8461-8d05c4541d7d"

Context Example#

{
"CrowdStrike.Command(val.TaskID === obj.TaskID)": [
{
"BaseCommand": "ls",
"Complete": true,
"NextSequenceID": null,
"SequenceID": null,
"Stderr": "",
"Stdout": "Directory listing for C:\\ -\n\nName Type Size (bytes) Size (MB) Last Modified (UTC+9) Created (UTC+9) \n---- ---- ------------ --------- --------------------- --------------- \n$Recycle.Bin \u003cDirectory\u003e -- -- 2020/01/10 16:05:59 2019/03/19 13:52:43 \nConfig.Msi \u003cDirectory\u003e -- -- 2020/05/01 23:12:50 2020/01/10 16:52:09 \nDocuments and Settings \u003cDirectory\u003e -- -- 2019/09/12 15:03:21 2019/09/12 15:03:21 \nPerfLogs \u003cDirectory\u003e -- -- 2019/03/19 13:52:43 2019/03/19 13:52:43 \nProgram Files \u003cDirectory\u003e -- -- 2020/01/10 17:11:47 2019/03/19 13:52:43 \nProgram Files (x86) \u003cDirectory\u003e -- -- 2020/05/01 23:12:53 2019/03/19 13:52:44 \nProgramData \u003cDirectory\u003e -- -- 2020/01/10 17:16:51 2019/03/19 13:52:44 \nRecovery \u003cDirectory\u003e -- -- 2019/09/11 20:13:59 2019/09/11 20:13:59 \nSystem Volume Information \u003cDirectory\u003e -- -- 2019/09/12 15:08:21 2019/09/11 20:08:43 \nUsers \u003cDirectory\u003e -- -- 2019/09/22 22:26:11 2019/03/19 13:37:22 \nWindows \u003cDirectory\u003e -- -- 2020/05/01 23:09:08 2019/03/19 13:37:22 \npagefile.sys .sys 2334928896 2226.762 2020/05/02 2:10:05 2019/09/11 20:08:44 \nswapfile.sys .sys 268435456 256 2020/05/01 23:09:13 2019/09/11 20:08:44 \n",
"TaskID": "ae323961-5aa8-442e-8461-8d05c4541d7d"
}
]
}

Human Readable Output#

Command status results#

BaseCommandCompleteStdoutTaskID
lstrueDirectory listing for C:\ ......ae323961-5aa8-442e-8461-8d05c4541d7d

cs-falcon-get-extracted-file#


Gets the RTR extracted file contents for the specified session and SHA256 hash.

Base Command#

cs-falcon-get-extracted-file

Input#

Argument NameDescriptionRequired
host_idThe host agent ID.Required
sha256The SHA256 hash of the file.Required
filenameThe filename to use for the archive name and the file within the archive.Optional

Command Example#

!cs-falcon-get-extracted-file host_id="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1" sha256="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"

Context Output#

There is no context output for this command.

cs-falcon-list-host-files#


Gets a list of files for the specified RTR session on a host.

Base Command#

cs-falcon-list-host-files

Input#

Argument NameDescriptionRequired
host_idThe ID of the host agent that lists files in the session.Required
session_idThe ID of the existing session with the agent.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.HostIDstringThe ID of the host the command was running for.
CrowdStrike.Command.TaskIDstringThe ID of the command request that was accepted.
CrowdStrike.Command.SessionIDstringThe ID of the session of the host.
CrowdStrike.File.IDstringThe ID of the file.
CrowdStrike.File.CreatedAtdateThe date the file was created.
CrowdStrike.File.DeletedAtdateThe date the file was deleted.
CrowdStrike.File.UpdatedAtdateThe date the file was last updated.
CrowdStrike.File.NamestringThe full name of the file.
CrowdStrike.File.SHA256stringThe SHA256 hash of the file.
CrowdStrike.File.SizenumberThe size of the file in bytes.
File.NamestringThe full name of the file.
File.SizenumberThe size of the file in bytes.
File.SHA256stringThe SHA256 hash of the file.

Command Example#

!cs-falcon-list-host-files host_id="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"

Context Example#

{
"CrowdStrike.Command(val.TaskID === obj.TaskID)": [
{
"HostID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SessionID": "fdd6408f-6688-441b-8659-41bcad25441c",
"TaskID": "1269ad9e-c11f-4e38-8aba-1a0275304f9c"
}
],
"CrowdStrike.File(val.ID === obj.ID)": [
{
"CreatedAt": "2020-05-01T17:57:42Z",
"DeletedAt": None,
"ID": 186811,
"Name": "\\Device\\HarddiskVolume2\\Windows\\notepad.exe",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Size": 0,
"Stderr": None,
"Stdout": None,
"UpdatedAt": "2020-05-01T17:57:42Z"
}
],
"File(val.MD5 \u0026\u0026 val.MD5 == obj.MD5 || val.SHA1 \u0026\u0026 val.SHA1 == obj.SHA1 || val.SHA256 \u0026\u0026 val.SHA256 == obj.SHA256 || val.SHA512 \u0026\u0026 val.SHA512 == obj.SHA512 || val.CRC32 \u0026\u0026 val.CRC32 == obj.CRC32 || val.CTPH \u0026\u0026 val.CTPH == obj.CTPH || val.SSDeep \u0026\u0026 val.SSDeep == obj.SSDeep)": [
{
"Name": "\\Device\\HarddiskVolume2\\Windows\\notepad.exe",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Size": 0
}
]
}

Human Readable Output#

CrowdStrike Falcon files#

CreatedAtDeletedAtIDNameSHA256SizeStderrStdoutUpdatedAt
2020-05-01T17:57:42Z186811\Device\HarddiskVolume2\Windows\notepad.exea1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a102020-05-01T17:57:42Z

cs-falcon-refresh-session#


Refresh a session timeout on a single host.

Base Command#

cs-falcon-refresh-session

Input#

Argument NameDescriptionRequired
host_idThe ID of the host to extend the session for.Required

Command Example#

!cs-falcon-refresh-session host_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Human Readable Output#

CrowdStrike Session Refreshed: fdd6408f-6688-441b-8659-41bcad25441c

Context Output#

There is no context output for this command.

cs-falcon-search-custom-iocs#


Returns a list of your uploaded IOCs that match the search criteria.

Base Command#

cs-falcon-search-custom-iocs

Input#

Argument NameDescriptionRequired
typesA comma-separated list of indicator types. Possible values are: sha256, sha1, md5, domain, ipv4, ipv6.Optional
valuesA comma-separated list of indicator values.Optional
sourcesA comma-separated list of IOC sources.Optional
expirationThe datetime the indicator will become inactive (ISO 8601 format, i.e., YYYY-MM-DDThh:mm:ssZ).Optional
limitThe maximum number of records to return. The minimum is 1 and the maximum is 500. Default is 50.Optional
sortThe order the results are returned in. Possible values are: type.asc, type.desc, value.asc, value.desc, policy.asc, policy.desc, share_level.asc, share_level.desc, expiration_timestamp.asc, expiration_timestamp.desc.Optional
offsetThe offset to begin the list from. For example, start from the 10th record and return the list.Optional
next_page_tokenA pagination token used with the limit parameter to manage pagination of results. Matching the 'after' parameter in the API. Use instead of offset.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.SeveritystringThe severity level to apply to this indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ActionstringAction to take when a host observes the custom IOC.
CrowdStrike.IOC.ExpirationstringThe datetime the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.
CrowdStrike.NextPageTokenunknownA pagination token used with the limit parameter to manage pagination of results.

Command Example#

!cs-falcon-search-custom-iocs limit=2

Context Example#

{
"CrowdStrike": {
"IOC": [
{
"Action": "no_action",
"CreatedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"CreatedTime": "2022-02-16T17:17:25.992164453Z",
"Description": "test",
"Expiration": "2022-02-17T13:47:57Z",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedTime": "2022-02-16T17:17:25.992164453Z",
"Platforms": [
"mac"
],
"Severity": "informational",
"Source": "Cortex XSOAR",
"Type": "ipv4",
"Value": "1.1.8.9"
},
{
"Action": "no_action",
"CreatedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"CreatedTime": "2022-02-16T17:16:44.514398876Z",
"Description": "test",
"Expiration": "2022-02-17T13:47:57Z",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedTime": "2022-02-16T17:16:44.514398876Z",
"Platforms": [
"mac"
],
"Severity": "informational",
"Source": "Cortex XSOAR",
"Type": "ipv4",
"Value": "4.1.8.9"
}
]
}
}

Human Readable Output#

Indicators of Compromise#

IDActionSeverityTypeValueExpirationCreatedByCreatedTimeDescriptionModifiedByModifiedTimePlatformsPolicyShareLevelSourceTags
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1no_actioninformationalipv41.1.8.92022-02-17T13:47:57Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:17:25.992164453Ztesta1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:17:25.992164453ZmacCortex XSOAR
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1no_actioninformationalipv44.1.8.92022-02-17T13:47:57Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:16:44.514398876Ztesta1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:16:44.514398876ZmacCortex XSOAR

cs-falcon-get-custom-ioc#


Gets the full definition of one or more indicators that you are watching.

Base Command#

cs-falcon-get-custom-ioc

Input#

Argument NameDescriptionRequired
typeThe IOC type to retrieve. Either ioc_id or ioc_type and value must be provided. Possible values are: sha256, sha1, md5, domain, ipv4, ipv6.Optional
valueThe string representation of the indicator. Either ioc_id or ioc_type and value must be provided.Optional
ioc_idThe ID of the IOC to get. The ID of the IOC can be retrieved by running the 'cs-falcon-search-custom-iocs' command. Either ioc_id or ioc_type and value must be provided.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.SeveritystringThe severity level to apply to this indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ActionstringAction to take when a host observes the custom IOC.
CrowdStrike.IOC.ExpirationstringThe datetime when the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.

Command Example#

!cs-falcon-get-custom-ioc type=ipv4 value=7.5.9.8

Context Example#

{
"CrowdStrike": {
"IOC": {
"Action": "no_action",
"CreatedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"CreatedTime": "2022-02-16T14:25:22.968603813Z",
"Expiration": "2022-02-17T17:55:09Z",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedTime": "2022-02-16T14:25:22.968603813Z",
"Platforms": [
"linux"
],
"Severity": "informational",
"Source": "cortex xsoar",
"Tags": [
"test",
"test1"
],
"Type": "ipv4",
"Value": "7.5.9.8"
}
}
}

Human Readable Output#

Indicator of Compromise#

IDActionSeverityTypeValueExpirationCreatedByCreatedTimeDescriptionModifiedByModifiedTimePlatformsPolicyShareLevelSourceTags
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1no_actioninformationalipv47.5.9.82022-02-17T17:55:09Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T14:25:22.968603813Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T14:25:22.968603813Zlinuxcortex xsoartest,
test1

cs-falcon-upload-custom-ioc#


Uploads an indicator for CrowdStrike to monitor.

Base Command#

cs-falcon-upload-custom-ioc

Input#

Argument NameDescriptionRequired
ioc_typeThe type of the indicator. Possible values are: sha256, md5, domain, ipv4, ipv6.Required
valueA comma-separated list of indicators.
More than one value can be supplied to upload multiple IOCs of the same type but with different values. Note that the uploaded IOCs will have the same properties (as supplied in other arguments).
Required
actionAction to take when a host observes the custom IOC. Possible values are: no_action - Save the indicator for future use, but take no action. No severity required. allow - Applies to hashes only. Allow the indicator and do not detect it. Severity does not apply and should not be provided. prevent_no_ui - Applies to hashes only. Block and detect the indicator, but hide it from Activity > Detections. Has a default severity value. prevent - Applies to hashes only. Block the indicator and show it as a detection at the selected severity. detect - Enable detections for the indicator at the selected severity. Possible values are: no_action, allow, prevent_no_ui, prevent, detect.Required
platformsA comma-separated list of the platforms that the indicator applies to. Possible values are: mac, windows, linux.Required
severityThe severity level to apply to this indicator. Required for the prevent and detect actions. Optional for no_action. Possible values are: informational, low, medium, high, critical.Optional
expirationThe datetime the indicator will become inactive (ISO 8601 format, i.e., YYYY-MM-DDThh:mm:ssZ).Optional
sourceThe source where this indicator originated. This can be used for tracking where this indicator was defined. Limited to 200 characters.Optional
descriptionA meaningful description of the indicator. Limited to 200 characters.Optional
applied_globallyWhether the indicator is applied globally. Either applied_globally or host_groups must be provided. Possible values are: true, false.Optional
host_groupsA comma-separated list of host group IDs that the indicator applies to. The list of host group IDs can be retrieved by running the 'cs-falcon-list-host-groups' command. Either applied_globally or host_groups must be provided.Optional
tagsA comma-separated list of tags to apply to the indicator.Optional
file_nameName of the file for file indicators. Applies to hashes only. A common filename, or a filename in your environment. Filenames can be helpful for identifying hashes or filtering IOCs.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.SeveritystringThe severity level to apply to this indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ActionstringAction to take when a host observes the custom IOC.
CrowdStrike.IOC.ExpirationstringThe datetime when the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.
CrowdStrike.IOC.TagsUnknownThe tags of the IOC.
CrowdStrike.IOC.PlatformsUnknownThe platforms of the IOC.
CrowdStrike.IOC.FilenamestringName of the file for file indicators. Applies to hashes only. A common filename, or a filename in your environment. Filenames can be helpful for identifying hashes or filtering IOCs.

Command Example#

!cs-falcon-upload-custom-ioc ioc_type="domain" value="test.domain.com" action="prevent" severity="high" source="Demisto playbook" description="Test ioc" platforms="mac"

Context Example#

{
"CrowdStrike": {
"IOC": {
"CreatedTime": "2020-10-02T13:55:26Z",
"Description": "Test ioc",
"Expiration": "2020-11-01T00:00:00Z",
"ID": "4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r",
"ModifiedTime": "2020-10-02T13:55:26Z",
"Action": "prevent",
"Severity": "high",
"Source": "Demisto playbook",
"Type": "domain",
"Value": "test.domain.com",
"Platforms": ["mac"]
}
}
}

Human Readable Output#

Custom IOC was created successfully#

CreatedTimeDescriptionExpirationIDModifiedTimeActionSeveritySourceTypeValue
2020-10-02T13:55:26ZTest ioc2020-11-01T00:00:00Z4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r2020-10-02T13:55:26ZpreventhighDemisto playbookdomaintest.domain.com

cs-falcon-update-custom-ioc#


Updates an indicator for CrowdStrike to monitor.

Base Command#

cs-falcon-update-custom-ioc

Input#

Argument NameDescriptionRequired
ioc_idThe ID of the IOC to update. The ID of the IOC can be retrieved by running the 'cs-falcon-search-custom-iocs' command.Required
actionAction to take when a host observes the custom IOC. Possible values are: no_action - Save the indicator for future use, but take no action. No severity required. allow - Applies to hashes only. Allow the indicator and do not detect it. Severity does not apply and should not be provided. prevent_no_ui - Applies to hashes only. Block and detect the indicator, but hide it from Activity > Detections. Has a default severity value. prevent - Applies to hashes only. Block the indicator and show it as a detection at the selected severity. detect - Enable detections for the indicator at the selected severity. Possible values are: no_action, allow, prevent_no_ui, prevent, detect.Optional
platformsA comma-separated list of the platforms that the indicator applies to. Possible values are: mac, windows, linux.Optional
severityThe severity level to apply to this indicator. Required for the prevent and detect actions. Optional for no_action. Possible values are: informational, low, medium, high, critical.Optional
expirationThe datetime the indicator will become inactive (ISO 8601 format, i.e., YYYY-MM-DDThh:mm:ssZ).Optional
sourceThe source where this indicator originated. This can be used for tracking where this indicator was defined. Limited to 200 characters.Optional
descriptionA meaningful description of the indicator. Limited to 200 characters.Optional
file_nameName of the file for file indicators. Applies to hashes only. A common filename, or a filename in your environment. Filenames can be helpful for identifying hashes or filtering IOCs.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.SeveritystringThe severity level to apply to this indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ActionstringAction to take when a host observes the custom IOC.
CrowdStrike.IOC.ExpirationstringThe datetime when the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.
CrowdStrike.IOC.FilenamestringName of the file for file indicators. Applies to hashes only. A common filename, or a filename in your environment. Filenames can be helpful for identifying hashes or filtering IOCs.

Command Example#

!cs-falcon-update-custom-ioc ioc_id="4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r" severity="high"

Context Example#

{
"CrowdStrike": {
"IOC": {
"CreatedTime": "2020-10-02T13:55:26Z",
"Description": "Test ioc",
"Expiration": "2020-11-01T00:00:00Z",
"ID": "4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r",
"ModifiedTime": "2020-10-02T13:55:26Z",
"Action": "prevent",
"Severity": "high",
"Source": "Demisto playbook",
"Type": "domain",
"Value": "test.domain.com"
}
}
}

Human Readable Output#

Custom IOC was updated successfully#

CreatedTimeDescriptionExpirationIDModifiedTimeActionSeveritySourceTypeValue
2020-10-02T13:55:26ZTest ioc2020-11-01T00:00:00Z4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r2020-10-02T13:55:26ZpreventhighDemisto playbookdomaintest.domain.com

cs-falcon-delete-custom-ioc#


Deletes a monitored indicator.

Base Command#

cs-falcon-delete-custom-ioc

Input#

Argument NameDescriptionRequired
ioc_idThe ID of the IOC to delete. The ID of the IOC can be retrieved by running the 'cs-falcon-search-custom-iocs' command.Required

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-delete-custom-ioc ioc_id="4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r"

Human Readable Output#

Custom IOC 4f8c43311k1801ca4359fc07t319610482c2003mcde8934d5412b1781e841e9r was successfully deleted.

cs-falcon-device-count-ioc#


The number of hosts that observed the provided IOC.

Base Command#

cs-falcon-device-count-ioc

Input#

Argument NameDescriptionRequired
typeThe IOC type. Possible values are: sha256, sha1, md5, domain, ipv4, ipv6.Required
valueThe string representation of the indicator.Required

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator (type:value).
CrowdStrike.IOC.DeviceCountnumberThe number of devices the IOC ran on.

Command Example#

!cs-falcon-device-count-ioc type="domain" value="value"

Context Example#

{
"CrowdStrike": {
"IOC": {
"DeviceCount": 1,
"ID": "domain:value",
"Type": "domain",
"Value": "value"
}
}
}

Human Readable Output#

Indicator of Compromise domain:value device count: 1

cs-falcon-processes-ran-on#


Get processes associated with a given IOC.

Base Command#

cs-falcon-processes-ran-on

Input#

Argument NameDescriptionRequired
typeThe IOC type. Possible values are: sha256, sha1, md5, domain, ipv4, ipv6.Required
valueThe string representation of the indicator.Required
device_idThe device ID to check against.Required

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator (type:value).
CrowdStrike.IOC.Process.IDnumberThe processes IDs associated with the given IOC.
CrowdStrike.IOC.Process.DeviceIDnumberThe device the process ran on.

Command Example#

!cs-falcon-processes-ran-on device_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 type=domain value=value

Context Example#

{
"CrowdStrike": {
"IOC": {
"ID": "domain:value",
"Process": {
"DeviceID": "pid",
"ID": [
"pid:pid:650164094720"
]
},
"Type": "domain",
"Value": "value"
}
}
}

Human Readable Output#

Processes with custom IOC domain:value on device device_id.#

Process ID
pid:pid:650164094720

cs-falcon-process-details#


Retrieves the details of a process, according to the process ID that is running or that previously ran.

Base Command#

cs-falcon-process-details

Input#

Argument NameDescriptionRequired
idsA comma-separated list of process IDs.Required

Context Output#

PathTypeDescription
CrowdStrike.Process.process_idStringThe process ID.
CrowdStrike.Process.process_id_localStringLocal ID of the process.
CrowdStrike.Process.device_idStringThe device the process ran on.
CrowdStrike.Process.file_nameStringThe path of the file that ran the process.
CrowdStrike.Process.command_lineStringThe command line command execution.
CrowdStrike.Process.start_timestamp_rawStringThe start datetime of the process in Unix time format. For example: 132460167512852140.
CrowdStrike.Process.start_timestampStringThe start datetime of the process in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.Process.stop_timestamp_rawDateThe stop datetime of the process in Unix time format. For example: 132460167512852140.
CrowdStrike.Process.stop_timestampDateThe stop datetime of the process in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-process-details ids="pid:pid:pid"

Context Example#

{
"CrowdStrike": {
"Process": {
"command_line": "\"C:\\Program Files (x86)\\Google\\Chrome\\Application\\chrome.exe\"",
"device_id": "deviceId",
"file_name": "\\Device\\HarddiskVolume1\\Program Files (x86)\\Google\\Chrome\\Application\\chrome.exe",
"process_id": "deviceId:pid",
"process_id_local": "pid",
"start_timestamp": "2020-10-01T09:05:51Z",
"start_timestamp_raw": "132460167512852140",
"stop_timestamp": "2020-10-02T06:43:45Z",
"stop_timestamp_raw": "132460946259334768"
}
}
}

Human Readable Output#

Details for process: pid:pid:pid.#

command_linedevice_idfile_nameprocess_idprocess_id_localstart_timestampstart_timestamp_rawstop_timestampstop_timestamp_raw
"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"deviceId\Device\HarddiskVolume1\Program Files (x86)\Google\Chrome\Application\chrome.exedevice_id:pidpid2020-10-01T09:05:51Z1324601675128521402020-10-02T06:43:45Z132460946259334768

cs-falcon-device-ran-on#


Returns a list of device IDs an indicator ran on.

Base Command#

cs-falcon-device-ran-on

Input#

Argument NameDescriptionRequired
typeThe type of indicator. Possible values are: domain, ipv4, ipv6, md5, sha1, sha256.Required
valueThe string representation of the indicator.Required

Context Output#

PathTypeDescription
CrowdStrike.DeviceIDstringDevice IDs an indicator ran on.

Command Example#

!cs-falcon-device-ran-on type=domain value=value

Context Example#

{
"CrowdStrike": {
"DeviceID": [
"a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
]
}
}

Human Readable Output#

Devices that encountered the IOC domain:value#

Device ID
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

cs-falcon-list-detection-summaries#


Lists detection summaries.

Base Command#

cs-falcon-list-detection-summaries

Input#

Argument NameDescriptionRequired
fetch_queryThe query used to filter the results.Optional
idsA comma-separated list of detection IDs. For example, ldt🔢1234,ldt:5678:5678. If you use this argument, the fetch_query argument will be ignored.Optional

Context Output#

PathTypeDescription
CrowdStrike.Detections.cidStringThe organization's customer ID (CID).
CrowdStrike.Detections.created_timestampDateThe datetime the detection occurred in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.Detections.detection_idStringThe ID of the detection.
CrowdStrike.Detections.device.device_idStringThe device ID as seen by CrowdStrike Falcon.
CrowdStrike.Detections.device.cidStringThe CrowdStrike Customer ID (CID) to which the device belongs.
CrowdStrike.Detections.device.agent_load_flagsStringThe CrowdStrike Falcon agent load flags.
CrowdStrike.Detections.device.agent_local_timeDateThe local time of the sensor.
CrowdStrike.Detections.device.agent_versionStringThe version of the agent that the device is running. For example: 5.32.11406.0.
CrowdStrike.Detections.device.bios_manufacturerStringThe BIOS manufacturer.
CrowdStrike.Detections.device.bios_versionStringThe device's BIOS version.
CrowdStrike.Detections.device.config_id_baseStringThe base of the sensor that the device is running.
CrowdStrike.Detections.device.config_id_buildStringThe version of the sensor that the device is running. For example: 11406.
CrowdStrike.Detections.device.config_id_platformStringThe platform ID of the sensor that the device is running.
CrowdStrike.Detections.device.external_ipStringThe external IP address of the device.
CrowdStrike.Detections.device.hostnameStringThe hostname of the device.
CrowdStrike.Detections.device.first_seenDateThe datetime the host was first seen by CrowdStrike Falcon.
CrowdStrike.Detections.device.last_seenDateThe datetime the host was last seen by CrowdStrike Falcon.
CrowdStrike.Detections.device.local_ipStringThe local IP address of the device.
CrowdStrike.Detections.device.mac_addressStringThe MAC address of the device.
CrowdStrike.Detections.device.major_versionStringThe major version of the operating system.
CrowdStrike.Detections.device.minor_versionStringThe minor version of the operating system.
CrowdStrike.Detections.device.os_versionStringThe operating system of the device.
CrowdStrike.Detections.device.platform_idStringThe platform ID of the device that runs the sensor.
CrowdStrike.Detections.device.platform_nameStringThe platform name of the device.
CrowdStrike.Detections.device.product_type_descStringThe value indicating the product type. For example, 1 = Workstation, 2 = Domain Controller, 3 = Server.
CrowdStrike.Detections.device.statusStringThe containment status of the machine. Possible values are: "normal", "containment_pending", "contained", and "lift_containment_pending".
CrowdStrike.Detections.device.system_manufacturerStringThe system manufacturer of the device.
CrowdStrike.Detections.device.system_product_nameStringThe product name of the system.
CrowdStrike.Detections.device.modified_timestampDateThe datetime the device was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.Detections.behaviors.device_idStringThe ID of the device associated with the behavior.
CrowdStrike.Detections.behaviors.timestampDateThe datetime the behavior detection occurred in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.Detections.behaviors.behavior_idStringThe ID of the behavior.
CrowdStrike.Detections.behaviors.filenameStringThe filename of the triggering process.
CrowdStrike.Detections.behaviors.alleged_filetypeStringThe file extension of the behavior's filename.
CrowdStrike.Detections.behaviors.cmdlineStringThe command line of the triggering process.
CrowdStrike.Detections.behaviors.scenarioStringThe name of the scenario the behavior belongs to.
CrowdStrike.Detections.behaviors.objectiveStringThe name of the objective associated with the behavior.
CrowdStrike.Detections.behaviors.tacticStringThe name of the tactic associated with the behavior.
CrowdStrike.Detections.behaviors.techniqueStringThe name of the technique associated with the behavior.
CrowdStrike.Detections.behaviors.severityNumberThe severity rating for the behavior. The value can be any integer between 1-100.
CrowdStrike.Detections.behaviors.confidenceNumberThe true positive confidence rating for the behavior. The value can be any integer between 1-100.
CrowdStrike.Detections.behaviors.ioc_typeStringThe type of the triggering IOC. Possible values are: "hash_sha256", "hash_md5", "domain", "filename", "registry_key", "command_line", and "behavior".
CrowdStrike.Detections.behaviors.ioc_valueStringThe IOC value.
CrowdStrike.Detections.behaviors.ioc_sourceStringThe source that triggered an IOC detection. Possible values are: "library_load", "primary_module", "file_read", and "file_write". Note: This output exists only in the legacy version.
CrowdStrike.Detections.behaviors.ioc_descriptionStringThe IOC description. Note: This output exists only in the legacy version.
CrowdStrike.Detections.behaviors.user_nameStringThe user name.
CrowdStrike.Detections.behaviors.user_idStringThe Security Identifier (SID) of the user in Windows.
CrowdStrike.Detections.behaviors.control_graph_idStringThe behavior hit key for the Threat Graph API.
CrowdStrike.Detections.behaviors.triggering_process_graph_idStringThe ID of the process that triggered the behavior detection.
CrowdStrike.Detections.behaviors.sha256StringThe SHA256 of the triggering process.
CrowdStrike.Detections.behaviors.md5StringThe MD5 hash of the triggering process.
CrowdStrike.Detections.behaviors.parent_details.parent_sha256StringThe SHA256 hash of the parent process.
CrowdStrike.Detections.behaviors.parent_details.parent_md5StringThe MD5 hash of the parent process.
CrowdStrike.Detections.behaviors.parent_details.parent_cmdlineStringThe command line of the parent process.
CrowdStrike.Detections.behaviors.parent_details.parent_process_graph_idStringThe process graph ID of the parent process.
CrowdStrike.Detections.behaviors.pattern_dispositionNumberThe pattern associated with the action performed on the behavior.
CrowdStrike.Detections.behaviors.pattern_disposition_details.indicatorBooleanWhether the detection behavior is similar to an indicator.
CrowdStrike.Detections.behaviors.pattern_disposition_details.detectBooleanWhether this behavior is detected.
CrowdStrike.Detections.behaviors.pattern_disposition_details.inddet_maskBooleanWhether this behavior is an inddet mask.
CrowdStrike.Detections.behaviors.pattern_disposition_details.sensor_onlyBooleanWhether this detection is sensor only.
CrowdStrike.Detections.behaviors.pattern_disposition_details.rootingBooleanWhether this behavior is rooting.
CrowdStrike.Detections.behaviors.pattern_disposition_details.kill_processBooleanWhether this detection kills the process.
CrowdStrike.Detections.behaviors.pattern_disposition_details.kill_subprocessBooleanWhether this detection kills the subprocess.
CrowdStrike.Detections.behaviors.pattern_disposition_details.quarantine_machineBooleanWhether this detection was on a quarantined machine.
CrowdStrike.Detections.behaviors.pattern_disposition_details.quarantine_fileBooleanWhether this detection was on a quarantined file.
CrowdStrike.Detections.behaviors.pattern_disposition_details.policy_disabledBooleanWhether this policy is disabled.
CrowdStrike.Detections.behaviors.pattern_disposition_details.kill_parentBooleanWhether this detection kills the parent process.
CrowdStrike.Detections.behaviors.pattern_disposition_details.operation_blockedBooleanWhether the operation is blocked.
CrowdStrike.Detections.behaviors.pattern_disposition_details.process_blockedBooleanWhether the process is blocked.
CrowdStrike.Detections.behaviors.pattern_disposition_details.registry_operation_blockedBooleanWhether the registry operation is blocked.
CrowdStrike.Detections.email_sentBooleanWhether an email is sent about this detection.
CrowdStrike.Detections.first_behaviorDateThe datetime of the first behavior. Note: This output exists only in the legacy version.
CrowdStrike.Detections.last_behaviorDateThe datetime of the last behavior. Note: This output exists only in the legacy version.
CrowdStrike.Detections.max_confidenceNumberThe highest confidence value of all behaviors. The value can be any integer between 1-100. Note: This output exists only in the legacy version.
CrowdStrike.Detections.max_severityNumberThe highest severity value of all behaviors. Value can be any integer between 1-100. Note: This output exists only in the legacy version.
CrowdStrike.Detections.max_severity_displaynameStringThe name used in the UI to determine the severity of the detection. Possible values are: "Critical", "High", "Medium", and "Low". Note: This output exists only in the legacy version.
CrowdStrike.Detections.show_in_uiBooleanWhether the detection displays in the UI.
CrowdStrike.Detections.statusStringThe status of the detection.
CrowdStrike.Detections.assigned_to_uidStringThe UID of the user for whom the detection is assigned. Note: This output exists only in the legacy version.
CrowdStrike.Detections.assigned_to_nameStringThe human-readable name of the user to whom the detection is currently assigned. Note: This output exists only in the legacy version.
CrowdStrike.Detections.hostinfo.domainStringThe domain of the Active Directory.
CrowdStrike.Detections.seconds_to_triagedNumberThe amount of time it took to move a detection from "new" to "in_progress".
CrowdStrike.Detections.seconds_to_resolvedNumberThe amount of time it took to move a detection from new to a resolved state ("true_positive", "false_positive", and "ignored").

Command Example#

!cs-falcon-list-detection-summaries

Context Example#

{
"CrowdStrike": {
"Detections": [
{
"behaviors": [
{
"alleged_filetype": "exe",
"behavior_id": "10197",
"cmdline": "choice /m crowdstrike_sample_detection",
"confidence": 80,
"control_graph_id": "ctg:ctg:ctg",
"device_id": "deviceid",
"display_name": "",
"filename": "choice.exe",
"filepath": "",
"ioc_description": "",
"ioc_source": "",
"ioc_type": "",
"ioc_value": "",
"md5": "md5",
"objective": "Falcon Detection Method",
"parent_details": {
"parent_cmdline": "\"C:\\Windows\\system32\\cmd.exe\" ",
"parent_md5": "md5",
"parent_process_graph_id": "pid:pid:pid",
"parent_sha256": "sha256"
},
"pattern_disposition": 0,
"pattern_disposition_details": {
"bootup_safeguard_enabled": false,
"critical_process_disabled": false,
"detect": false,
"fs_operation_blocked": false,
"inddet_mask": false,
"indicator": false,
"kill_parent": false,
"kill_process": false,
"kill_subprocess": false,
"operation_blocked": false,
"policy_disabled": false,
"process_blocked": false,
"quarantine_file": false,
"quarantine_machine": false,
"registry_operation_blocked": false,
"rooting": false,
"sensor_only": false
},
"scenario": "suspicious_activity",
"severity": 30,
"sha256": "sha256",
"tactic": "Malware",
"tactic_id": "",
"technique": "Malicious File",
"technique_id": "",
"template_instance_id": "382",
"timestamp": "2020-07-06T08:10:44Z",
"triggering_process_graph_id": "pid:pid:pid",
"user_id": "user_id",
"user_name": "user_name"
}
],
"behaviors_processed": [
"pid:pid:pid:10197"
],
"cid": "cid",
"created_timestamp": "2020-07-06T08:10:55.538668036Z",
"detection_id": "ldt:ldt:ldt",
"device": {
"agent_load_flags": "0",
"agent_local_time": "2020-07-02T01:42:07.640Z",
"agent_version": "5.32.11406.0",
"bios_manufacturer": "Google",
"bios_version": "Google",
"cid": "cid",
"config_id_base": "id",
"config_id_build": "id",
"config_id_platform": "3",
"device_id": "device_id",
"external_ip": "external_ip",
"first_seen": "2020-02-10T12:40:18Z",
"hostname": "FALCON-CROWDSTR",
"last_seen": "2020-07-06T07:59:12Z",
"local_ip": "local_ip",
"mac_address": "mac_address",
"major_version": "major_version",
"minor_version": "minor_version",
"modified_timestamp": "modified_timestamp",
"os_version": "os_version",
"platform_id": "platform_id",
"platform_name": "platform_name",
"product_type": "product_type",
"product_type_desc": "product_type_desc",
"status": "status",
"system_manufacturer": "system_manufacturer",
"system_product_name": "system_product_name"
},
"email_sent": false,
"first_behavior": "2020-07-06T08:10:44Z",
"hostinfo": {
"domain": ""
},
"last_behavior": "2020-07-06T08:10:44Z",
"max_confidence": 80,
"max_severity": 30,
"max_severity_displayname": "Low",
"seconds_to_resolved": 0,
"seconds_to_triaged": 0,
"show_in_ui": true,
"status": "new"
}
]
}
}

Human Readable Output#

CrowdStrike Detections#

detection_idcreated_timestatusmax_severity
ldt:ldt:ldt2020-07-06T08:10:55.538668036ZnewLow

cs-falcon-list-incident-summaries#


Lists incident summaries.

Base Command#

cs-falcon-list-incident-summaries

Input#

Argument NameDescriptionRequired
fetch_queryThe query used to filter the results.Optional
idsA comma-separated list of detection IDs. For example, ldt🔢1234,ldt:5678:5678. If you use this argument, the fetch_query argument will be ignored.Optional

Context Output#

PathTypeDescription
CrowdStrike.Incidents.incident_idStringThe ID of the incident.
CrowdStrike.Incidents.cidStringThe organization's customer ID (CID).
CrowdStrike.Incidents.host_idsStringThe device IDs of all the hosts on which the incident occurred.
CrowdStrike.Incidents.hosts.device_idStringThe device ID as seen by CrowdStrike.
CrowdStrike.Incidents.hosts.cidStringThe host's organization's customer ID (CID).
CrowdStrike.Incidents.hosts.agent_load_flagsStringThe CrowdStrike agent load flags.
CrowdStrike.Incidents.hosts.agent_local_timeDateThe local time of the sensor.
CrowdStrike.Incidents.hosts.agent_versionStringThe version of the agent that the device is running. For example: 5.32.11406.0.
CrowdStrike.Incidents.hosts.bios_manufacturerStringThe BIOS manufacturer.
CrowdStrike.Incidents.hosts.bios_versionStringThe BIOS version of the device.
CrowdStrike.Incidents.hosts.config_id_baseStringThe base of the sensor that the device is running.
CrowdStrike.Incidents.hosts.config_id_buildStringThe version of the sensor that the device is running. For example: 11406.
CrowdStrike.Incidents.hosts.config_id_platformStringThe platform ID of the sensor that the device is running.
CrowdStrike.Incidents.hosts.external_ipStringThe external IP address of the host.
CrowdStrike.Incidents.hosts.hostnameStringThe name of the host.
CrowdStrike.Incidents.hosts.first_seenDateThe datetime the host was first seen by CrowdStrike Falcon.
CrowdStrike.Incidents.hosts.last_seenDateThe datetime the host was last seen by CrowdStrike Falcon.
CrowdStrike.Incidents.hosts.local_ipStringThe device local IP address.
CrowdStrike.Incidents.hosts.mac_addressStringThe device MAC address.
CrowdStrike.Incidents.hosts.major_versionStringThe major version of the operating system.
CrowdStrike.Incidents.hosts.minor_versionStringThe minor version of the operating system.
CrowdStrike.Incidents.hosts.os_versionStringThe operating system of the host.
CrowdStrike.Incidents.hosts.platform_idStringThe platform ID of the device that runs the sensor.
CrowdStrike.Incidents.hosts.platform_nameStringThe platform name of the host.
CrowdStrike.Incidents.hosts.product_type_descStringThe value indicating the product type. For example, 1 = Workstation, 2 = Domain Controller, 3 = Server.
CrowdStrike.Incidents.hosts.statusStringThe incident status as a number. For example, 20 = New, 25 = Reopened, 30 = In Progress, 40 = Closed.
CrowdStrike.Incidents.hosts.system_manufacturerStringThe system manufacturer of the device.
CrowdStrike.Incidents.hosts.system_product_nameStringThe product name of the system.
CrowdStrike.Incidents.hosts.modified_timestampDateThe datetime a user modified the incident in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.Incidents.createdDateThe datetime that the incident was created.
CrowdStrike.Incidents.startDateThe recorded datetime of the earliest incident.
CrowdStrike.Incidents.endDateThe recorded datetime of the latest incident.
CrowdStrike.Incidents.stateStringThe state of the incident.
CrowdStrike.Incidents.statusNumberThe status of the incident.
CrowdStrike.Incidents.nameStringThe name of the incident.
CrowdStrike.Incidents.descriptionStringThe description of the incident.
CrowdStrike.Incidents.tagsStringThe tags of the incident.
CrowdStrike.Incidents.fine_scoreNumberThe incident score.

Command Example#

!cs-falcon-list-incident-summaries

endpoint#


Returns information about an endpoint. Does not support regex.

Base Command#

endpoint

Input#

Argument NameDescriptionRequired
idThe endpoint ID.Optional
ipThe endpoint IP address.Optional
hostnameThe endpoint hostname.Optional

Context Output#

PathTypeDescription
Endpoint.HostnameStringThe endpoint's hostname.
Endpoint.OSStringThe endpoint's operation system.
Endpoint.IPAddressStringThe endpoint's IP address.
Endpoint.IDStringThe endpoint's ID.
Endpoint.StatusStringThe endpoint's status.
Endpoint.IsIsolatedStringThe endpoint's isolation status.
Endpoint.MACAddressStringThe endpoint's MAC address.
Endpoint.VendorStringThe integration name of the endpoint vendor.
Endpoint.OSVersionStringThe endpoint's operation system version.

Command Example#

!endpoint id=15dbb9d5fe9f61eb46e829d986

Context Example#

{
"Endpoint":
{
"Hostname": "Hostname",
"ID": "15dbb9d5fe9f61eb46e829d986",
"IPAddress": "1.1.1.1",
"OS": "Windows",
"OSVersion": "Windows Server 2019",
"Status": "Online",
"￿Vendor": "CrowdStrike Falcon",
"￿MACAddress": "1-1-1-1"
}
}

Human Readable Output#

Endpoints#

IDIPAddressOSOSVersionHostnameStatusMACAddressVendor
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a11.1.1.1WindowsWindows Server 2019HostnameOnline1-1-1-1CrowdStrike Falcon

cs-falcon-create-host-group#


Create a host group.

Base Command#

cs-falcon-create-host-group

Input#

Argument NameDescriptionRequired
nameThe name of the host.Required
group_typeThe group type of the group. Possible values are: static, dynamic.Required
descriptionThe description of the host.Optional
assignment_ruleThe assignment rule.Optional

Context Output#

PathTypeDescription
CrowdStrike.HostGroup.idStringThe ID of the host group.
CrowdStrike.HostGroup.group_typeStringThe group type of the host group.
CrowdStrike.HostGroup.nameStringThe name of the host group.
CrowdStrike.HostGroup.descriptionStringThe description of the host group.
CrowdStrike.HostGroup.created_byStringThe client that created the host group.
CrowdStrike.HostGroup.created_timestampDateThe datetime the host group was created in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.HostGroup.modified_byStringThe client that modified the host group.
CrowdStrike.HostGroup.modified_timestampDateThe datetime the host group was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-create-host-group name="test_name_1" description="test_description" group_type=static

Context Example#

{
"CrowdStrike": {
"HostGroup": {
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-25T08:02:02.060242909Z",
"description": "test_description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-25T08:02:02.060242909Z",
"name": "test_name_1"
}
}
}

Human Readable Output#

Results#

created_bycreated_timestampdescriptiongroup_typeidmodified_bymodified_timestampname
api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-25T08:02:02.060242909Ztest_descriptionstatica1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-25T08:02:02.060242909Ztest_name_1

cs-falcon-list-host-groups#


List the available host groups.

Base Command#

cs-falcon-list-host-groups

Input#

Argument NameDescriptionRequired
filterThe query by which to filter the devices that belong to the host group.Optional
offsetPage offset.Optional
limitMaximum number of results on a page. Default is 50.Optional

Context Output#

PathTypeDescription
CrowdStrike.HostGroup.idStringThe ID of the host group.
CrowdStrike.HostGroup.group_typeStringThe group type of the host group.
CrowdStrike.HostGroup.nameStringThe name of the host group.
CrowdStrike.HostGroup.descriptionStringThe description of the host group.
CrowdStrike.HostGroup.created_byStringThe client that created the host group.
CrowdStrike.HostGroup.created_timestampDateThe datetime the host group was created in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.HostGroup.modified_byStringThe client that modified the host group.
CrowdStrike.HostGroup.modified_timestampDateThe datetime the host group was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-list-host-groups

Context Example#

{
"CrowdStrike": {
"HostGroup": [
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:23.765624811Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:23.765624811Z",
"name": "InnerServicesModuleMon Aug 23 2021"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:25.506030441Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:25.506030441Z",
"name": "Rasterize_default_instanceMon Aug 23 2021"
},
{
"assignment_rule": "device_id:[''],hostname:['','FALCON-CROWDSTR']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-07-27T12:34:59.13917402Z",
"description": "",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-07-27T12:34:59.13917402Z",
"name": "Static by id group test"
},
{
"assignment_rule": "device_id:[],hostname:[]",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-07-27T12:24:18.364057533Z",
"description": "Group test",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-07-27T12:24:18.364057533Z",
"name": "Static group test"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:26.069515348Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:26.069515348Z",
"name": "ad-loginMon Aug 23 2021"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:25.556897468Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:25.556897468Z",
"name": "ad-queryMon Aug 23 2021"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:23.737307612Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:23.737307612Z",
"name": "d2Mon Aug 23 2021"
},
{
"created_by": "someone@email.com",
"created_timestamp": "2021-07-27T12:27:43.503021999Z",
"description": "dhfh",
"group_type": "staticByID",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "someone@email.com",
"modified_timestamp": "2021-07-27T12:27:43.503021999Z",
"name": "ddfxgh"
},
{
"assignment_rule": "device.hostname:'FALCON-CROWDSTR'",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-07-27T12:46:39.058352326Z",
"description": "",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-07-27T12:46:39.058352326Z",
"name": "dynamic 1 group test"
},
{
"assignment_rule": "lkjlk:'FalconGroupingTags/example_tag'",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T13:12:56.338590022Z",
"description": "",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T13:12:56.338590022Z",
"name": "dynamic 13523 group test"
},
{
"assignment_rule": "lkjlk:'FalconGroupingTags/example_tag'",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-07-27T14:02:05.538065349Z",
"description": "",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-07-27T14:02:05.538065349Z",
"name": "dynamic 1353 group test"
},
{
"assignment_rule": "tags:'FalconGroupingTags/example_tag'",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-07-27T12:41:33.127997409Z",
"description": "",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-07-27T12:41:33.127997409Z",
"name": "dynamic 2 group test"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:23.7402217Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:23.7402217Z",
"name": "fcm_default_instanceMon Aug 23 2021"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-11T09:55:23.801049103Z",
"description": "ilan test",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-11T09:55:23.801049103Z",
"name": "ilan"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-12T11:24:51.434863056Z",
"description": "ilan test",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-12T11:24:51.434863056Z",
"name": "ilan 2"
},
{
"assignment_rule": "device_id:[''],hostname:['FALCON-CROWDSTR']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-12T11:55:57.943490809Z",
"description": "ilan test",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-12T11:55:57.943490809Z",
"name": "ilan 23"
},
{
"assignment_rule": "",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-17T11:28:39.855075106Z",
"description": "after change",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T09:26:15.351650252Z",
"name": "ilan 2345"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-17T11:58:42.453661998Z",
"description": "ilan test",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-17T11:58:42.453661998Z",
"name": "ilan 23e"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-11T13:54:59.695821727Z",
"description": "",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-11T13:54:59.695821727Z",
"name": "ilan test 2"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-12T10:56:49.2127345Z",
"description": "ilan test",
"group_type": "dynamic",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-12T11:35:35.76509212Z",
"name": "ilan2"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T14:35:23.766284685Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T14:35:23.766284685Z",
"name": "splunkMon Aug 23 2021"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:09:15.36414377Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:09:15.36414377Z",
"name": "test_1629731353498"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:12:20.69203954Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:12:20.69203954Z",
"name": "test_1629731538458"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:14:20.650781714Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:14:23.026511269Z",
"name": "test_16297316587261629731658726"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:18:53.896505566Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:18:56.2598933Z",
"name": "test_16297319320381629731932038"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:19:51.91067257Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:19:54.269898808Z",
"name": "test_16297319902371629731990237"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:25:42.99601887Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:25:42.99601887Z",
"name": "test_1629732339973"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:26:12.280379354Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:26:14.973676462Z",
"name": "test_16297323698941629732369894"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:26:58.717706381Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:27:01.648623079Z",
"name": "test_16297324168771629732416877"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:28:18.674512647Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:28:21.781563212Z",
"name": "test_16297324965761629732496576"
},
{
"assignment_rule": "device_id:[''],hostname:['FALCON-CROWDSTR','INSTANCE-1','falcon-crowdstrike-sensor-centos7']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:31:41.142748214Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:31:43.800147323Z",
"name": "test_16297326990981629732699098"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:34:20.195778795Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:34:23.212828317Z",
"name": "test_16297328579781629732857978"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:34:55.837119719Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:34:58.490114093Z",
"name": "test_16297328938791629732893879"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-23T15:37:42.911344704Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-23T15:37:45.620464598Z",
"name": "test_16297330605301629733060530"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-24T07:05:55.813475476Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-24T07:05:58.805702883Z",
"name": "test_16297887501421629788750142"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-24T07:07:30.422517324Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-24T07:07:34.291988227Z",
"name": "test_16297888481381629788848138"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-24T08:03:15.522772079Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-24T08:03:18.622015517Z",
"name": "test_16297921932741629792193274"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:09:52.379925975Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:09:52.379925975Z",
"name": "test_1629967211800"
},
{
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T12:34:36.934507422Z",
"description": "description",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T12:34:36.934507422Z",
"name": "test_162996721180000"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T08:46:09.996065663Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T08:46:11.572092204Z",
"name": "test_16299675695531629967569553"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T08:53:15.35181954Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T08:53:17.041535905Z",
"name": "test_16299679949831629967994983"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T08:59:52.639696743Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T08:59:54.538170036Z",
"name": "test_16299683923121629968392312"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:06:21.891707157Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:06:23.846219163Z",
"name": "test_16299687814871629968781487"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:12:53.982989Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:12:55.571265187Z",
"name": "test_16299691732871629969173287"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:17:58.206157753Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:17:59.659515838Z",
"name": "test_16299694779051629969477905"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:19:23.276267291Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:19:25.318976241Z",
"name": "test_16299695623981629969562398"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:26:22.538367707Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:26:25.085214782Z",
"name": "test_16299699813871629969981387"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:33:46.303790983Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:33:48.288311235Z",
"name": "test_16299704254441629970425444"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T09:55:09.157561612Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T09:55:10.741852436Z",
"name": "test_16299717065381629971706538"
},
{
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-26T10:02:50.175530821Z",
"description": "description2",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-26T10:02:52.026307768Z",
"name": "test_16299721694081629972169408"
}
]
}
}

Human Readable Output#

Results#

assignment_rulecreated_bycreated_timestampdescriptiongroup_typeidmodified_bymodified_timestampname
device_id:[''],hostname:['']api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-26T10:02:50.175530821Zdescription2statica1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-26T10:02:52.026307768Ztest_16299721694081629972169408

cs-falcon-delete-host-groups#


Deletes the requested host groups.

Base Command#

cs-falcon-delete-host-groups

Input#

Argument NameDescriptionRequired
host_group_idA comma-separated list of the IDs of the host groups to be deleted.Required

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-delete-host-groups host_group_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1,a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Human Readable Output#

host group id a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 deleted successfully host group id a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 deleted successfully

cs-falcon-update-host-group#


Updates a host group.

Base Command#

cs-falcon-update-host-group

Input#

Argument NameDescriptionRequired
host_group_idThe ID of the host group.Required
nameThe name of the host group.Optional
descriptionThe description of the host group.Optional
assignment_ruleThe assignment rule.Optional

Context Output#

PathTypeDescription
CrowdStrike.HostGroup.idStringThe ID of the host group.
CrowdStrike.HostGroup.group_typeStringThe group type of the host group.
CrowdStrike.HostGroup.nameStringThe name of the host group.
CrowdStrike.HostGroup.descriptionStringThe description of the host group.
CrowdStrike.HostGroup.created_byStringThe client that created the host group.
CrowdStrike.HostGroup.created_timestampDateThe datetime the host group was created in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.HostGroup.modified_byStringThe client that modified the host group.
CrowdStrike.HostGroup.modified_timestampDateThe datetime the host group was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-update-host-group host_group_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 name="test_name_update_1" description="test_description_update"

Context Example#

{
"CrowdStrike": {
"HostGroup": {
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-22T07:48:35.111070562Z",
"description": "test_description_update",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-25T08:02:05.295663156Z",
"name": "test_name_update_1"
}
}
}

Human Readable Output#

Results#

assignment_rulecreated_bycreated_timestampdescriptiongroup_typeidmodified_bymodified_timestampname
device_id:[''],hostname:['']api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-22T07:48:35.111070562Ztest_description_updatestatica1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-25T08:02:05.295663156Ztest_name_update_1

cs-falcon-list-host-group-members#


Gets the list of host group members.

Base Command#

cs-falcon-list-host-group-members

Input#

Argument NameDescriptionRequired
host_group_idThe ID of the host group.Optional
filterThe query to filter the devices that belong to the host group.Optional
offsetPage offset.Optional
limitThe maximum number of results on a page. Default is 50.Optional
sortThe property to sort by (e.g., status.desc or hostname.asc).Optional

Context Output#

PathTypeDescription
CrowdStrike.Device.IDStringThe ID of the device.
CrowdStrike.Device.LocalIPStringThe local IP address of the device.
CrowdStrike.Device.ExternalIPStringThe external IP address of the device.
CrowdStrike.Device.HostnameStringThe hostname of the device.
CrowdStrike.Device.OSStringThe operating system of the device.
CrowdStrike.Device.MacAddressStringThe MAC address of the device.
CrowdStrike.Device.FirstSeenStringThe first time the device was seen.
CrowdStrike.Device.LastSeenStringThe last time the device was seen.
CrowdStrike.Device.StatusStringThe device status.

Command Example#

!cs-falcon-list-host-group-members

Context Example#

{
"CrowdStrike": {
"Device": [
{
"ExternalIP": "35.224.136.145",
"FirstSeen": "2021-08-12T16:13:26Z",
"Hostname": "FALCON-CROWDSTR",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"LastSeen": "2021-08-23T04:59:48Z",
"LocalIP": "10.128.0.21",
"MacAddress": "42-01-0a-80-00-15",
"OS": "Windows Server 2019",
"Status": "normal"
},
{
"ExternalIP": "35.224.136.145",
"FirstSeen": "2020-02-10T12:40:18Z",
"Hostname": "FALCON-CROWDSTR",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"LastSeen": "2021-08-25T07:42:47Z",
"LocalIP": "10.128.0.7",
"MacAddress": "42-01-0a-80-00-07",
"OS": "Windows Server 2019",
"Status": "contained"
},
{
"ExternalIP": "35.224.136.145",
"FirstSeen": "2021-08-23T05:04:41Z",
"Hostname": "INSTANCE-1",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"LastSeen": "2021-08-25T07:49:06Z",
"LocalIP": "10.128.0.20",
"MacAddress": "42-01-0a-80-00-14",
"OS": "Windows Server 2019",
"Status": "normal"
},
{
"ExternalIP": "35.224.136.145",
"FirstSeen": "2021-08-11T13:57:29Z",
"Hostname": "INSTANCE-1",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"LastSeen": "2021-08-23T04:45:37Z",
"LocalIP": "10.128.0.20",
"MacAddress": "42-01-0a-80-00-14",
"OS": "Windows Server 2019",
"Status": "normal"
},
{
"ExternalIP": "35.224.136.145",
"FirstSeen": "2021-08-08T11:33:21Z",
"Hostname": "falcon-crowdstrike-sensor-centos7",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"LastSeen": "2021-08-25T07:50:47Z",
"LocalIP": "10.128.0.19",
"MacAddress": "42-01-0a-80-00-13",
"OS": "CentOS 7.9",
"Status": "normal"
}
]
}
}

Human Readable Output#

Devices#

IDExternal IPLocal IPHostnameOSMac AddressFirst SeenLast SeenStatus
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a135.224.136.14510.128.0.19falcon-crowdstrike-sensor-centos7CentOS 7.942-01-0a-80-00-132021-08-08T11:33:21Z2021-08-25T07:50:47Znormal

cs-falcon-add-host-group-members#


Add host group members.

Base Command#

cs-falcon-add-host-group-members

Input#

Argument NameDescriptionRequired
host_group_idThe ID of the host group.Required
host_idsA comma-separated list of host agent IDs to run commands. The list of host agent IDs can be retrieved by running the 'cs-falcon-search-device' command.Required

Context Output#

PathTypeDescription
CrowdStrike.HostGroup.idStringThe ID of the host group.
CrowdStrike.HostGroup.group_typeStringThe group type of the host group.
CrowdStrike.HostGroup.nameStringThe name of the host group.
CrowdStrike.HostGroup.descriptionStringThe description of the host group.
CrowdStrike.HostGroup.created_byStringThe client that created the host group.
CrowdStrike.HostGroup.created_timestampDateThe datetime the host group was created in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.HostGroup.modified_byStringThe client that modified the host group.
CrowdStrike.HostGroup.modified_timestampDateThe datetime the host group was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-add-host-group-members host_group_id="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1" host_ids="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"

Context Example#

{
"CrowdStrike": {
"HostGroup": {
"assignment_rule": "device_id:[''],hostname:['falcon-crowdstrike-sensor-centos7','']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-22T07:48:35.111070562Z",
"description": "test_description_update",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-25T08:02:05.295663156Z",
"name": "test_name_update_1"
}
}
}

Human Readable Output#

Results#

assignment_rulecreated_bycreated_timestampdescriptiongroup_typeidmodified_bymodified_timestampname
device_id:[''],hostname:['falcon-crowdstrike-sensor-centos7','']api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-22T07:48:35.111070562Ztest_description_updatestatica1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-25T08:02:05.295663156Ztest_name_update_1

cs-falcon-remove-host-group-members#


Remove host group members.

Base Command#

cs-falcon-remove-host-group-members

Input#

Argument NameDescriptionRequired
host_group_idThe ID of the host group.Required
host_idsA comma-separated list of host agent IDs to run commands. The list of host agent IDs can be retrieved by running the 'cs-falcon-search-device' command.Required

Context Output#

PathTypeDescription
CrowdStrike.HostGroup.idStringThe ID of the host group.
CrowdStrike.HostGroup.group_typeStringThe group type of the host group.
CrowdStrike.HostGroup.nameStringThe name of the host group.
CrowdStrike.HostGroup.descriptionStringThe description of the host group.
CrowdStrike.HostGroup.created_byStringThe client that created the host group.
CrowdStrike.HostGroup.created_timestampDateThe datetime the host group was created in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.
CrowdStrike.HostGroup.modified_byStringThe client that modified the host group.
CrowdStrike.HostGroup.modified_timestampDateThe datetime the host group was last modified in ISO time format. For example: 2019-10-17T13:41:48.487520845Z.

Command Example#

!cs-falcon-remove-host-group-members host_group_id="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1" host_ids="a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"

Context Example#

{
"CrowdStrike": {
"HostGroup": {
"assignment_rule": "device_id:[''],hostname:['']",
"created_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_timestamp": "2021-08-22T07:48:35.111070562Z",
"description": "test_description_update",
"group_type": "static",
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_by": "api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"modified_timestamp": "2021-08-25T08:02:05.295663156Z",
"name": "test_name_update_1"
}
}
}

Human Readable Output#

Results#

assignment_rulecreated_bycreated_timestampdescriptiongroup_typeidmodified_bymodified_timestampname
device_id:[''],hostname:['']api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-22T07:48:35.111070562Ztest_description_updatestatica1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1api-client-id:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12021-08-25T08:02:05.295663156Ztest_name_update_1

cs-falcon-resolve-incident#


Resolve and update incidents using the specified settings.

Base Command#

cs-falcon-resolve-incident

Input#

Argument NameDescriptionRequired
idsA comma-separated list of incident IDs.Required
statusThe new status of the incident. Possible values are: New, In Progress, Reopened, Closed.Optional
assigned_to_uuidUUID of a user to assign the incident to. Mutually exclusive with the 'username' argument.Optional
usernameUsername of a user to assign the incident to. Mutually exclusive with the 'assigned_to_uuid' argument. Using this parameter instead of 'assigned_to_uuid' will result in an additional API call in order to fetch the UUID of the user.Optional
add_tagAdd a new tag to the incidents.Optional
remove_tagRemove a tag from the incidents.Optional
add_commentAdd a comment to the incident.Optional

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-resolve-incident ids="inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1,inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1" status="Closed"

Human Readable Output#

inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 changed successfully to Closed inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 changed successfully to Closed

cs-falcon-batch-upload-custom-ioc#


Uploads a batch of indicators.

Base Command#

cs-falcon-batch-upload-custom-ioc

Input#

Argument NameDescriptionRequired
multiple_indicators_jsonA JSON object with a list of CrowdStrike Falcon indicators to upload.Required
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs. Default is 180.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOC.TypestringThe type of the IOC.
CrowdStrike.IOC.ValuestringThe string representation of the indicator.
CrowdStrike.IOC.IDstringThe full ID of the indicator.
CrowdStrike.IOC.SeveritystringThe severity level to apply to this indicator.
CrowdStrike.IOC.SourcestringThe source of the IOC.
CrowdStrike.IOC.ActionstringThe action to take when a host observes the custom IOC.
CrowdStrike.IOC.ExpirationstringThe datetime the indicator will expire.
CrowdStrike.IOC.DescriptionstringThe description of the IOC.
CrowdStrike.IOC.CreatedTimedateThe datetime the IOC was created.
CrowdStrike.IOC.CreatedBystringThe identity of the user/process who created the IOC.
CrowdStrike.IOC.ModifiedTimedateThe datetime the indicator was last modified.
CrowdStrike.IOC.ModifiedBystringThe identity of the user/process who last updated the IOC.
CrowdStrike.IOC.TagsUnknownThe tags of the IOC.
CrowdStrike.IOC.PlatformsUnknownThe platforms of the IOC.

Command Example#

!cs-falcon-batch-upload-custom-ioc multiple_indicators_json=`[{"description": "test", "expiration": "2022-02-17T13:47:57Z", "type": "ipv4", "severity": "Informational", "value": "1.1.8.9", "action": "no_action", "platforms": ["mac"], "source": "Cortex XSOAR", "applied_globally": true}]`

Context Example#

{
"CrowdStrike": {
"IOC": {
"Action": "no_action",
"CreatedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"CreatedTime": "2022-02-16T17:17:25.992164453Z",
"Description": "test",
"Expiration": "2022-02-17T13:47:57Z",
"ID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedBy": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ModifiedTime": "2022-02-16T17:17:25.992164453Z",
"Platforms": [
"mac"
],
"Severity": "informational",
"Source": "Cortex XSOAR",
"Type": "ipv4",
"Value": "1.1.8.9"
}
}
}

Human Readable Output#

Custom IOC 1.1.8.9 was created successfully#

ActionCreatedByCreatedTimeDescriptionExpirationIDModifiedByModifiedTimePlatformsSeveritySourceTypeValue
no_actiona1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:17:25.992164453Ztest2022-02-17T13:47:57Z"a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12022-02-16T17:17:25.992164453ZmacinformationalCortex XSOARipv41.1.8.9

cs-falcon-rtr-kill-process#


Execute an active responder kill command on a single host.

Base Command#

cs-falcon-rtr-kill-process

Input#

Argument NameDescriptionRequired
host_idThe host ID to kill the given process for.Required
process_idsA comma-separated list of process IDs to kill.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.kill.ProcessIDStringThe process ID that was killed.
CrowdStrike.Command.kill.ErrorStringThe error message raised if the command failed.
CrowdStrike.Command.kill.HostIDStringThe host ID.

Command Example#

!cs-falcon-rtr-kill-process host_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 process_ids=5260,123

Context Example#

{
"CrowdStrike": {
"Command": {
"kill": [
{
"Error": "Cannot find a process with the process identifier 123.",
"HostID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ProcessID": "123"
},
{
"Error": "Success",
"HostID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"ProcessID": "5260"
}
]
}
}
}

Human Readable Output#

CrowdStrike Falcon kill command on host a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:#

ProcessIDError
123Cannot find a process with the process identifier 123.
5260Success

Note: you don't see the following IDs in the results as the request was failed for them. ID 123 failed as it was not found.

cs-falcon-rtr-remove-file#


Batch executes an RTR active-responder remove file across the hosts mapped to the given batch ID.

Base Command#

cs-falcon-rtr-remove-file

Input#

Argument NameDescriptionRequired
host_idsA comma-separated list of the hosts IDs to remove the file for.Required
file_pathThe path to a file or a directory to remove.Required
osThe operating system of the hosts given. Since the remove command is different in each operating system, you can choose only one operating system. Possible values are: Windows, Linux, Mac.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.rm.HostIDStringThe host ID.
CrowdStrike.Command.rm.ErrorStringThe error message raised if the command failed.

Command Example#

!cs-falcon-rtr-remove-file file_path="c:\\testfolder" host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 os=Windows

Context Example#

{
"CrowdStrike": {
"Command": {
"rm": {
"Error": "Success",
"HostID": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
}
}

Human Readable Output#

CrowdStrike Falcon rm over the file: c:\testfolder#

HostIDError
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1Success

cs-falcon-rtr-list-processes#


Executes an RTR active-responder ps command to get a list of active processes across the given host.

Base Command#

cs-falcon-rtr-list-processes

Input#

Argument NameDescriptionRequired
host_idThe host ID to get the processes list from.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.ps.FilenameStringThe name of the result file to be returned.

Command Example#

!cs-falcon-rtr-list-processes host_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
"CrowdStrike": {
"Command": {
"ps": {
"Filename": "ps-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
},
"File": {
"EntryID": "1792@5e02fcd0-37ad-4124-836d-7e769ba0ae86",
"Info": "text/plain",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Name": "ps-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA1": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a115919af3",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA512": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SSDeep": "768:4jcAkTBaZ61QUEcDBdMoFwIxVvroYrohrbY2akHLnsa5fbqFEJtPNObzVj0ff+3K:4IraZ61QUEcDBdMoFwIxRJEbY2akHLnr",
"Size": 30798,
"Type": "ASCII text"
}
}

Human Readable Output#

CrowdStrike Falcon ps command on host a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:#

Stdout
TOO MUCH INFO TO DISPLAY

cs-falcon-rtr-list-network-stats#


Executes an RTR active-responder netstat command to get a list of network status and protocol statistics across the given host.

Base Command#

cs-falcon-rtr-list-network-stats

Input#

Argument NameDescriptionRequired
host_idThe host ID to get the network status and protocol statistics list from.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

PathTypeDescription
CrowdStrike.Command.netstat.FilenameStringThe name of the result file to be returned.

Command Example#

!cs-falcon-rtr-list-network-stats host_id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
"CrowdStrike": {
"Command": {
"netstat": {
"Filename": "netstat-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
},
"File": {
"EntryID": "1797@5e02fcd0-37ad-4124-836d-7e769ba0ae86",
"Info": "text/plain",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Name": "netstat-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA1": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1864ce595",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA512": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SSDeep": "48:XSvprPoeCfd8saowYL8zjt6yjjRchg24OI58RtTLvWptl6TtCla5n1lEtClMw/u:CRQeCxRmxVpIHUchCIvsCo",
"Size": 4987,
"Type": "ASCII text, with CRLF line terminators"
}
}

Human Readable Output#

CrowdStrike Falcon netstat command on host a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:#

Stdout
TOO MUCH INFO TO DISPLAY

cs-falcon-rtr-read-registry#


Executes an RTR active-responder read registry keys command across the given hosts. This command is valid only for Windows hosts.

Base Command#

cs-falcon-rtr-read-registry

Input#

Argument NameDescriptionRequired
host_idsA comma-separated list of the host IDs to get the registry keys from.Required
registry_keysA comma-separated list of the registry keys, sub-keys, or value to get.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

There is no context output for this command.

Command Example#

``!cs-falcon-rtr-read-registry host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 registry_keys= HKEY_LOCAL_MACHINE,HKEY_USERS````

Context Example#

{
"File": [
{
"EntryID": "1806@5e02fcd0-37ad-4124-836d-7e769ba0ae86",
"Info": "text/plain",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Name": "reg-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1HKEY_USERS",
"SHA1": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a139dd0333",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA512": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SSDeep": "12:uSn3PtdoI1pZI2WUNI2e6NI2vboI2vbP3I2zd:uSQIpZIII1aIUMIUjIcd",
"Size": 656,
"Type": "ASCII text, with CRLF, LF line terminators"
},
{
"EntryID": "1807@5e02fcd0-37ad-4124-836d-7e769ba0ae86",
"Info": "text/plain",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Name": "reg-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1HKEY_LOCAL_MACHINE",
"SHA1": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a18e3b4919",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA512": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SSDeep": "6:zYuSugMQEYPtdWCMwdiwf2Jai2FU42DGE25/:zYuSnMQXPtd9/eJqy7yfh",
"Size": 320,
"Type": "ASCII text, with CRLF, LF line terminators"
}
]
}

Human Readable Output#

CrowdStrike Falcon reg command on hosts ['a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1']:#

FileNameStdout
reg-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1HKEY_USERSTOO MUCH INFO TO DISPLAY
reg-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1HKEY_LOCAL_MACHINETOO MUCH INFO TO DISPLAY

cs-falcon-rtr-list-scheduled-tasks#


Executes an RTR active-responder netstat command to get a list of scheduled tasks across the given host. This command is valid only for Windows hosts.

Base Command#

cs-falcon-rtr-list-scheduled-tasks

Input#

Argument NameDescriptionRequired
host_idsA comma-separated list of the hosts IDs to get the list of scheduled tasks from.Required
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-rtr-list-scheduled-tasks host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Context Example#

{
"CrowdStrike": {
"Command": {
"runscript": {
"Filename": "runscript-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
},
"File": {
"EntryID": "1812@5e02fcd0-37ad-4124-836d-7e769ba0ae86",
"Info": "text/plain",
"MD5": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"Name": "runscript-a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA1": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1c589bf80",
"SHA256": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SHA512": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"SSDeep": "3072:zjQ3/3YHGa8dbXbpbItbo4W444ibNb9MTf2Wat4cuuEqk4W4ybmF54c4eEEEjX6f:EXN8Nbw",
"Size": 299252,
"Type": "ASCII text"
}
}

Human Readable Output#

CrowdStrike Falcon runscript command on host a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:#

Stdout
TOO MUCH INFO TO DISPLAY

cs-falcon-rtr-retrieve-file#


Gets the RTR extracted file contents for the specified file path.

Base Command#

cs-falcon-rtr-retrieve-file

Input#

Argument NameDescriptionRequired
host_idsA comma-separated list of the hosts IDs to get the file from.Required
file_pathThe file path of the required file to extract.Required
filenameThe filename to use for the archive name and the file within the archive.Optional
interval_in_secondsInterval between polling. Default is 60 seconds. Must be higher than 10.Optional
hosts_and_requests_idsThis is an internal argument used for the polling process, not to be used by the user.Optional
SHA256This is an internal argument used for the polling process, not to be used by the user.Optional
queue_offlineWhether the command will run against an offline-queued session and be queued for execution when the host comes online.Optional
timeoutThe amount of time (in seconds) that a request will wait for a client to establish a connection to a remote machine before a timeout occurs.Optional
polling_timeoutTimeout for polling. Default is 600 seconds.Optional

Context Output#

PathTypeDescription
CrowdStrike.File.FileNameStringThe filename.
CrowdStrike.File.HostIDStringThe host ID.
File.SizeNumberThe size of the file.
File.SHA1StringThe SHA1 hash of the file.
File.SHA256StringThe SHA256 hash of the file.
File.SHA512StringThe SHA512 hash of the file.
File.NameStringThe name of the file.
File.SSDeepStringThe SSDeep hash of the file.
File.EntryIDStringThe entry ID of the file.
File.InfoStringInformation about the file.
File.TypeStringThe file type.
File.MD5StringThe MD5 hash of the file.
File.ExtensionStringThe extension of the file.

Command Example#

!cs-falcon-rtr-retrieve-file file_path=`C:\Windows\System32\Windows.Media.FaceAnalysis.dll` host_ids=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1,a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

Human Readable Output#

Waiting for the polling execution

cs-falcon-get-detections-for-incident#


Gets the detections for a specific incident.

Base Command#

cs-falcon-get-detections-for-incident

Input#

Argument NameDescriptionRequired
incident_idThe incident ID to get detections for. A list of all available incident IDs can be retrieved by running the 'cs-falcon-list-incident-summaries' command.Required

Context Output#

PathTypeDescription
CrowdStrike.IncidentDetection.incident_idStringThe incident ID.
CrowdStrike.IncidentDetection.behavior_idStringThe behavior ID connected to the incident.
CrowdStrike.IncidentDetection.detection_idsStringA list of detection IDs connected to the incident.

Command Example#

``!cs-falcon-get-detections-for-incident incident_id=inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1````

Context Example#

{
"CrowdStrike": {
"IncidentDetection": {
"behavior_id": "ind:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:162589633341-10303-6705920",
"detection_ids": [
"ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:38655034604"
],
"incident_id": "inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
}

Human Readable Output#

Detection For Incident#

behavior_iddetection_idsincident_id
ind:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:162590282130-10303-6707968ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:38656254663inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1
ind:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:162596456872-10303-6710016ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:38657629548inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1
ind:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:162597577534-10305-6712576ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:38658614774inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1
ind:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:162589633341-10303-6705920ldt:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:38655034604inc:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1:a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

get-mapping-fields#


Returns the list of fields to map in outgoing mirroring. This command is only used for debugging purposes.

Base Command#

get-mapping-fields

Context Output#

There is no context output for this command.

get-remote-data#


Gets remote data from a remote incident or detection. This method does not update the current incident or detection, and should be used for debugging purposes only.

Base Command#

get-remote-data

Input#

Argument NameDescriptionRequired
idThe remote incident or detection ID.Required
lastUpdateThe UTC timestamp in seconds of the last update. The incident or detection is only updated if it was modified after the last update time. Default is 0.Optional

Context Output#

There is no context output for this command.

get-modified-remote-data#


Gets the list of incidents and detections that were modified since the last update time. This method is used for debugging purposes. The get-modified-remote-data command is used as part of the Mirroring feature that was introduced in Cortex XSOAR version 6.1.

Base Command#

get-modified-remote-data

Input#

Argument NameDescriptionRequired
lastUpdateDate string representing the local time in UTC timestamp in seconds. The incident or detection is only returned if it was modified after the last update time.Optional

Context Output#

There is no context output for this command.

update-remote-system#


Updates the remote incident or detection with local incident or detection changes. This method is only used for debugging purposes and will not update the current incident or detection.

Base Command#

update-remote-system

Context Output#

There is no context output for this command.

cve#


Retrieve vulnerability details according to the selected filter. Each request requires at least one filter parameter. Supported with the CrowdStrike Spotlight license.

Base Command#

cve

Input#

Argument NameDescriptionRequired
cve_idDeprecated. Use cve instead.Optional
cveUnique identifier for a vulnerability as cataloged in the National Vulnerability Database (NVD). This filter supports multiple values and negation.Optional

Context Output#

PathTypeDescription
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.ScoreNumberThe actual score.

Command Example#

cve cve_id=CVE-2021-2222

Human Readable Output#

IDSeverityPublished DateBase Score
CVE-2021-2222HIGH2021-09-16T15:12:42Z1

cs-falcon-create-ml-exclusion#


Create an ML exclusion.

Base Command#

cs-falcon-create-ml-exclusion

Input#

Argument NameDescriptionRequired
valueValue to match for exclusion.Required
excluded_fromA comma-separated list from where to exclude the exclusion. Possible values are: blocking, extraction.Required
commentComment describing why the exclusions were created.Optional
groupsA comma-separated list of group ID(s) impacted by the exclusion OR all if empty.Optional

Context Output#

PathTypeDescription
CrowdStrike.MLExclusion.idStringThe ML exclusion ID.
CrowdStrike.MLExclusion.valueStringThe ML exclusion value.
CrowdStrike.MLExclusion.regexp_valueStringA regular expression for matching the excluded value.
CrowdStrike.MLExclusion.value_hashStringAn hash of the value field.
CrowdStrike.MLExclusion.excluded_fromStringWhat the exclusion applies to (e.g., a specific ML model).
CrowdStrike.MLExclusion.groups.idStringGroup ID that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.group_typeStringGroup type that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.nameStringGroup name that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.descriptionStringGroup description that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.assignment_ruleStringGroup assignment rule that the exclusion is associated with.
CrowdStrike.MLExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.MLExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.MLExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.MLExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.MLExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.MLExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.MLExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.MLExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.MLExclusion.created_byStringIndicate who created the rule.

Command Example#

!cs-falcon-create-ml-exclusion value=/demo-test excluded_from=blocking groups=999999

Context Example#

{
"CrowdStrike": {
"MLExclusion": {
"applied_globally": false,
"created_by": "api-client-id:123456",
"created_on": "2023-03-06T13:57:14.853546312Z",
"excluded_from": [
"blocking"
],
"groups": [
{
"assignment_rule": "device_id",
"created_by": "admin@test.com",
"created_timestamp": "2023-01-23T15:01:11.846726918Z",
"description": "",
"group_type": "static",
"id": "999999",
"modified_by": "admin@test.com",
"modified_timestamp": "2023-01-23T15:18:52.316882546Z",
"name": "Lab env"
}
],
"id": "123456",
"last_modified": "2023-03-06T13:57:14.853546312Z",
"modified_by": "api-client-id:123456",
"regexp_value": "\\/demo-test",
"value": "/demo-test",
"value_hash": "abcdef123456"
}
}
}

Human Readable Output#

CrowdStrike Falcon machine learning exclusion#

IdValueRegexpValueValueHashExcludedFromGroupsAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
123456/demo-test\/demo-testabcdef123456values: blocking- id: 999999
group_type: static
name: Lab env
description:
assignment_rule: device_id:
created_by: admin@test.com
created_timestamp: 2023-01-23T15:01:11.846726918Z
modified_by: admin@test.com
modified_timestamp: 2023-01-23T15:18:52.316882546Z
2023-03-06T13:57:14.853546312Zapi-client-id:1234562023-03-06T13:57:14.853546312Zapi-client-id:123456

cs-falcon-update-ml-exclusion#


Updates an ML exclusion. At least one argument is required in addition to the id argument.

Base Command#

cs-falcon-update-ml-exclusion

Input#

Argument NameDescriptionRequired
idThe ID of the exclusion to update.Required
valueValue to match for the exclusion (the exclusion pattern).Optional
commentComment describing why the exclusions were created.Optional
groupsA comma-separated list of group ID(s) impacted by the exclusion.Optional

Context Output#

PathTypeDescription
CrowdStrike.MLExclusion.idStringThe ML exclusion ID.
CrowdStrike.MLExclusion.valueStringThe ML exclusion value.
CrowdStrike.MLExclusion.regexp_valueStringA regular expression for matching the excluded value.
CrowdStrike.MLExclusion.value_hashStringA hash of the value field.
CrowdStrike.MLExclusion.excluded_fromStringWhat the exclusion applies to (e.g., a specific ML model).
CrowdStrike.MLExclusion.groups.idStringGroup ID that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.group_typeStringGroup type that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.nameStringGroup name that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.descriptionStringGroup description that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.assignment_ruleStringGroup assignment rule that the exclusion is associated with.
CrowdStrike.MLExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.MLExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.MLExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.MLExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.MLExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.MLExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.MLExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.MLExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.MLExclusion.created_byStringIndicate who created the rule.

Command Example#

!cs-falcon-update-ml-exclusion id=a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1 comment=demo-comment

Context Example#

{
"CrowdStrike": {
"MLExclusion": {
"applied_globally": false,
"created_by": "api-client-id:123456",
"created_on": "2023-03-06T13:56:25.940685483Z",
"excluded_from": [
"extraction",
"blocking"
],
"groups": [
{
"assignment_rule": "device_id:",
"created_by": "admin@test.com",
"created_timestamp": "2023-01-23T15:01:11.846726918Z",
"description": "",
"group_type": "static",
"id": "999999",
"modified_by": "admin@test.com",
"modified_timestamp": "2023-01-23T15:18:52.316882546Z",
"name": "Lab env"
}
],
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"last_modified": "2023-03-06T13:57:21.57829431Z",
"modified_by": "api-client-id:123456",
"regexp_value": "\\/demo",
"value": "/demo",
"value_hash": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
}
}
}

Human Readable Output#

CrowdStrike Falcon machine learning exclusion#

IdValueRegexpValueValueHashExcludedFromGroupsAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1/demo\/demoa1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1values: extraction, blocking- id: 999999
group_type: static
name: Lab env
description:
assignment_rule: device_id:
created_by: admin@test.com
created_timestamp: 2023-01-23T15:01:11.846726918Z
modified_by: admin@test.com
modified_timestamp: 2023-01-23T15:18:52.316882546Z
2023-03-06T13:57:21.57829431Zapi-client-id:1234562023-03-06T13:56:25.940685483Zapi-client-id:123456

cs-falcon-delete-ml-exclusion#


Delete the ML exclusions by ID.

Base Command#

cs-falcon-delete-ml-exclusion

Input#

Argument NameDescriptionRequired
idsA comma-separated list of exclusion IDs to delete.Required

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-delete-ml-exclusion ids=123456

Human Readable Output#

'The machine learning exclusions with IDs '123456' was successfully deleted.'

cs-falcon-search-ml-exclusion#


Get a list of ML exclusions by specifying their IDs, value, or a specific filter.

Base Command#

cs-falcon-search-ml-exclusion

Input#

Argument NameDescriptionRequired
filterA custom filter by which the exclusions should be filtered.
The syntax follows the pattern &lt;property&gt;:[operator]'&lt;value&gt;'. For example: value:'test'.
Available filters: applied_globally, created_by, created_on, last_modified, modified_by, value.
For more information, see: https://falcon.crowdstrike.com/documentation/page/d3c84a1b/falcon-query-language-fql.
Optional
valueThe value by which the exclusions should be filtered.Optional
idsA comma-separated list of exclusion IDs to retrieve. The IDs overwrite the filter and value.Optional
limitThe maximum number of records to return. [1-500]. Applies only if the ids argument is not supplied.Optional
offsetThe offset to start retrieving records from. Applies only if the ids argument is not supplied.Optional
sortHow to sort the retrieved exclusions. Possible values are: applied_globally.asc, applied_globally.desc, created_by.asc, created_by.desc, created_on.asc, created_on.desc, last_modified.asc, last_modified.desc, modified_by.asc, modified_by.desc, value.asc, value.desc.Optional

Context Output#

PathTypeDescription
CrowdStrike.MLExclusion.idStringThe ML exclusion ID.
CrowdStrike.MLExclusion.valueStringThe ML exclusion value.
CrowdStrike.MLExclusion.regexp_valueStringA regular expression for matching the excluded value.
CrowdStrike.MLExclusion.value_hashStringA hash of the value field.
CrowdStrike.MLExclusion.excluded_fromStringWhat the exclusion applies to (e.g., a specific ML model).
CrowdStrike.MLExclusion.groups.idStringGroup ID that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.group_typeStringGroup type that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.nameStringGroup name that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.descriptionStringGroup description that the exclusion rule is associated with.
CrowdStrike.MLExclusion.groups.assignment_ruleStringGroup assignment rule that the exclusion is associated with.
CrowdStrike.MLExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.MLExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.MLExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.MLExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.MLExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.MLExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.MLExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.MLExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.MLExclusion.created_byStringIndicate who created the rule.

Command Example#

!cs-falcon-search-ml-exclusion limit=1

Context Example#

{
"CrowdStrike": {
"MLExclusion": {
"applied_globally": false,
"created_by": "api-client-id:123456",
"created_on": "2023-03-01T18:51:07.196018144Z",
"excluded_from": [
"blocking"
],
"groups": [
{
"assignment_rule": "device_id",
"created_by": "admin@test.com",
"created_timestamp": "2023-01-23T15:01:11.846726918Z",
"description": "",
"group_type": "static",
"id": "999999",
"modified_by": "admin@test.com",
"modified_timestamp": "2023-01-23T15:18:52.316882546Z",
"name": "Lab env"
}
],
"id": "123456",
"last_modified": "2023-03-01T18:51:07.196018144Z",
"modified_by": "api-client-id:123456",
"regexp_value": "\\/MosheTest2-432",
"value": "/MosheTest2-432",
"value_hash": "abcdef123456"
}
}
}

Human Readable Output#

CrowdStrike Falcon machine learning exclusions#

IdValueRegexpValueValueHashExcludedFromGroupsAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
123456/MosheTest2-432\/MosheTest2-432abcdef123456values: blocking- id: 999999
group_type: static
name: Lab env
description:
assignment_rule: device_id
created_by: admin@test.com
created_timestamp: 2023-01-23T15:01:11.846726918Z
modified_by: admin@test.com
modified_timestamp: 2023-01-23T15:18:52.316882546Z
2023-03-01T18:51:07.196018144Zapi-client-id:1234562023-03-01T18:51:07.196018144Zapi-client-id:123456

cs-falcon-create-ioa-exclusion#


Create an IOA exclusion.

Base Command#

cs-falcon-create-ioa-exclusion

Input#

Argument NameDescriptionRequired
exclusion_nameName of the exclusion.Required
pattern_nameName of the exclusion pattern.Optional
pattern_idID of the exclusion pattern.Required
cl_regexCommand line regular expression.Required
ifn_regexImage filename regular expression.Required
commentComment describing why the exclusions were created.Optional
descriptionExclusion description.Optional
detection_jsonJSON formatted detection template.Optional
groupsA comma-separated list of group ID(s) impacted by the exclusion OR all if empty.Required

Context Output#

PathTypeDescription
CrowdStrike.IOAExclusion.idStringA unique identifier for the IOA exclusion.
CrowdStrike.IOAExclusion.nameStringThe name of the IOA exclusion.
CrowdStrike.IOAExclusion.descriptionStringA description of the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_idStringThe identifier of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_nameStringThe name of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.ifn_regexStringA regular expression used for filename matching.
CrowdStrike.IOAExclusion.cl_regexStringA regular expression used for command line matching.
CrowdStrike.IOAExclusion.detection_jsonStringA JSON string that describes the detection logic for the IOA exclusion.
CrowdStrike.IOAExclusion.groups.idStringGroup ID that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.group_typeStringGroup type that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.nameStringGroup name that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.descriptionStringGroup description that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.assignment_ruleStringGroup assignment rule that the exclusion is associated with.
CrowdStrike.IOAExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.IOAExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.IOAExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.IOAExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.IOAExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.IOAExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.IOAExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.IOAExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.IOAExclusion.created_byStringIndicate who created the rule.

Command Example#

!cs-falcon-create-ioa-exclusion exclusion_name=demo-test pattern_id=101010 cl_regex=.* ifn_regex="c:\\\\windows\\\\system32\\\\test.exe" groups=999999

Context Example#

{
"CrowdStrike": {
"IOAExclusion": {
"applied_globally": false,
"cl_regex": ".*",
"created_by": "api-client-id:123456",
"created_on": "2023-03-06T13:57:41.746172897Z",
"description": "",
"detection_json": "",
"groups": [
{
"assignment_rule": "device_id",
"created_by": "admin@test.com",
"created_timestamp": "2023-01-23T15:01:11.846726918Z",
"description": "",
"group_type": "static",
"id": "999999",
"modified_by": "admin@test.com",
"modified_timestamp": "2023-01-23T15:18:52.316882546Z",
"name": "Lab env"
}
],
"id": "123456",
"ifn_regex": "c:\\\\windows\\\\system32\\\\test.exe",
"last_modified": "2023-03-06T13:57:41.746172897Z",
"modified_by": "api-client-id:123456",
"name": "demo-test",
"pattern_id": "101010",
"pattern_name": ""
}
}
}

Human Readable Output#

CrowdStrike Falcon IOA exclusion#

IdNamePatternIdIfnRegexClRegexGroupsAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
123456demo-test101010c:\windows\system32\poqexec.exe.*- id: 999999
group_type: static
name: Lab env
description:
assignment_rule: device_id
created_by: admin@test.com
created_timestamp: 2023-01-23T15:01:11.846726918Z
modified_by: admin@test.com
modified_timestamp: 2023-01-23T15:18:52.316882546Z
2023-03-06T13:57:41.746172897Zapi-client-id:1234562023-03-06T13:57:41.746172897Zapi-client-id:123456

cs-falcon-update-ioa-exclusion#


Updates an IOA exclusion. At least one argument is required in addition to the id argument.

Base Command#

cs-falcon-update-ioa-exclusion

Input#

Argument NameDescriptionRequired
idID of the exclusion to update.Required
exclusion_nameName of the exclusion.Optional
pattern_idID of the exclusion pattern to update.Optional
pattern_nameName of the exclusion pattern.Optional
cl_regexCommand line regular expression.Optional
ifn_regexImage filename regular expression.Optional
commentComment describing why the exclusions was created.Optional
descriptionExclusion description.Optional
detection_jsonJSON formatted detection template.Optional
groupsA comma-separated list of group ID(s) impacted by the exclusion.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOAExclusion.idStringA unique identifier for the IOA exclusion.
CrowdStrike.IOAExclusion.nameStringThe name of the IOA exclusion.
CrowdStrike.IOAExclusion.descriptionStringA description of the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_idStringThe identifier of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_nameStringThe name of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.ifn_regexStringA regular expression used for filename matching.
CrowdStrike.IOAExclusion.cl_regexStringA regular expression used for command line matching.
CrowdStrike.IOAExclusion.detection_jsonStringA JSON string that describes the detection logic for the IOA exclusion.
CrowdStrike.IOAExclusion.groups.idStringGroup ID that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.group_typeStringGroup type that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.nameStringGroup name that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.descriptionStringGroup description that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.assignment_ruleStringGroup assignment rule that the exclusion is associated with.
CrowdStrike.IOAExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.IOAExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.IOAExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.IOAExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.IOAExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.IOAExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.IOAExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.IOAExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.IOAExclusion.created_byStringIndicate who created the rule.

Command Example#

!cs-falcon-update-ioa-exclusion id=123456 description=demo-description

Context Example#

{
"CrowdStrike": {
"IOAExclusion": {
"applied_globally": false,
"cl_regex": ".*",
"created_by": "api-client-id:123456",
"created_on": "2023-03-06T13:46:58.137122925Z",
"description": "demo-description",
"detection_json": "",
"groups": [
{
"assignment_rule": "device_id",
"created_by": "admin@test.com",
"created_timestamp": "2023-01-23T15:01:11.846726918Z",
"description": "",
"group_type": "static",
"id": "999999",
"modified_by": "admin@test.com",
"modified_timestamp": "2023-01-23T15:18:52.316882546Z",
"name": "Lab env"
}
],
"id": "123456",
"ifn_regex": "c:\\\\windows\\\\system32\\\\poqexec\\.exe",
"last_modified": "2023-03-06T13:57:49.086458198Z",
"modified_by": "api-client-id:123456",
"name": "demo",
"pattern_id": "101010",
"pattern_name": ""
}
}
}

Human Readable Output#

CrowdStrike Falcon IOA exclusion#

IdNameDescriptionPatternIdIfnRegexClRegexGroupsAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
123456demodemo-description101010c:\windows\system32\poqexec.exe.*- id: 999999
group_type: static
name: Lab env
description:
assignment_rule: device_id
created_by: admin@test.com
created_timestamp: 2023-01-23T15:01:11.846726918Z
modified_by: admin@test.com
modified_timestamp: 2023-01-23T15:18:52.316882546Z
2023-03-06T13:57:49.086458198Zapi-client-id:1234562023-03-06T13:46:58.137122925Zapi-client-id:123456

cs-falcon-delete-ioa-exclusion#


Delete the IOA exclusions by ID.

Base Command#

cs-falcon-delete-ioa-exclusion

Input#

Argument NameDescriptionRequired
idsA comma-separated list of exclusion IDs to delete.Required

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-delete-ioa-exclusion ids=123456

Human Readable Output#

'The IOA exclusions with IDs '123456' was successfully deleted.'

cs-falcon-search-ioa-exclusion#


Get a list of IOA exclusions by specifying their IDs or a filter.

Base Command#

cs-falcon-search-ioa-exclusion

Input#

Argument NameDescriptionRequired
filterA custom filter by which the exclusions should be filtered.
The syntax follows the pattern &lt;property&gt;:[operator]'&lt;value&gt;'. For example: name:'test'.
Available filters: applied_globally, created_by, created_on, name, last_modified, modified_by, value, pattern.
For more information, see: https://www.falconpy.io/Service-Collections/Falcon-Query-Language.
Optional
nameThe name by which the exclusions should be filtered.Optional
idsA comma-separated list of exclusion IDs to retrieve. The IDs overwrite the filter and name.Optional
limitThe limit of how many exclusions to retrieve. Default is 50. Applies only if the ids argument is not supplied.Optional
offsetThe offset of how many exclusions to skip. Default is 0. Applies only if the ids argument is not supplied.Optional

Context Output#

PathTypeDescription
CrowdStrike.IOAExclusion.idStringA unique identifier for the IOA exclusion.
CrowdStrike.IOAExclusion.nameStringThe name of the IOA exclusion.
CrowdStrike.IOAExclusion.descriptionStringA description of the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_idStringThe identifier of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.pattern_nameStringThe name of the pattern associated with the IOA exclusion.
CrowdStrike.IOAExclusion.ifn_regexStringA regular expression used for filename matching.
CrowdStrike.IOAExclusion.cl_regexStringA regular expression used for command line matching.
CrowdStrike.IOAExclusion.detection_jsonStringA JSON string that describes the detection logic for the IOA exclusion.
CrowdStrike.IOAExclusion.groups.idStringGroup ID that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.group_typeStringGroup type that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.nameStringGroup name that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.descriptionStringGroup description that the exclusion rule is associated with.
CrowdStrike.IOAExclusion.groups.assignment_ruleStringGroup assignment rule that the exclusion is associated with.
CrowdStrike.IOAExclusion.groups.created_byStringIndicate who created the group.
CrowdStrike.IOAExclusion.groups.created_timestampDateThe date when the group was created.
CrowdStrike.IOAExclusion.groups.modified_byStringIndicate who last modified the group.
CrowdStrike.IOAExclusion.groups.modified_timestampDateThe date when the group was last modified.
CrowdStrike.IOAExclusion.applied_globallyBooleanWhether the exclusion rule applies globally or only to specific entities.
CrowdStrike.IOAExclusion.last_modifiedDateThe date when the exclusion rule was last modified.
CrowdStrike.IOAExclusion.modified_byStringIndicate who last modified the rule.
CrowdStrike.IOAExclusion.created_onDateThe date when the exclusion rule was created.
CrowdStrike.IOAExclusion.created_byStringIndicate who created the rule.

Command Example#

!cs-falcon-search-ioa-exclusion limit=1

Context Example#

{
"CrowdStrike": {
"IOAExclusion": {
"applied_globally": true,
"cl_regex": "regex",
"created_by": "user@test.com",
"created_on": "2023-02-06T16:42:19.29906839Z",
"description": "demo description",
"detection_json": "",
"groups": [],
"id": "123456",
"ifn_regex": ".*\\\\Windows\\\\System32\\\\choice\\.exe",
"last_modified": "2023-02-26T15:30:04.554767735Z",
"modified_by": "api-client-id:123456",
"name": "My IOA Exclusion",
"pattern_id": "101010",
"pattern_name": "P_name"
}
}
}

Human Readable Output#

CrowdStrike Falcon IOA exclusions#

IdNameDescriptionPatternIdPatternNameIfnRegexClRegexAppliedGloballyLastModifiedModifiedByCreatedOnCreatedBy
123456My IOA Exclusiondemo description101010P_name.*\Windows\System32\choice.exechoice\s+/m\s+crowdstrike_sample_detection2023-02-26T15:30:04.554767735Zapi-client-id:1234562023-02-06T16:42:19.29906839Zuser@test.com

cs-falcon-list-quarantined-file#


Get quarantine file metadata by specified IDs or filter.

Base Command#

cs-falcon-list-quarantined-file

Input#

Argument NameDescriptionRequired
idsA comma-separated list of quarantined file IDs to retrieve.Optional
filterA custom filter by which the retrieved quarantined file should be filtered.Optional
sha256A comma-separated list of SHA256 hash of the files to retrieve.Optional
filenameA comma-separated list of the name of the files to retrieve.Optional
stateFilter the retrieved files by state.Optional
hostnameA comma-separated list of the hostnames of the files to retrieve.Optional
usernameA comma-separated list of the usernames of the files to retrieve.Optional
limitMaximum number of IDs to return. Max 5000. Default 50.Optional
offsetStarting index of the overall result set from which to return IDs. Default 0.Optional

Context Output#

PathTypeDescription
CrowdStrike.QuarantinedFile.idStringA unique identifier for the quarantined file.
CrowdStrike.QuarantinedFile.aidStringThe agent identifier of the agent that quarantined the file.
CrowdStrike.QuarantinedFile.cidStringThe unique customer identifier of the agent that quarantined the file.
CrowdStrike.QuarantinedFile.sha256StringThe SHA256 hash value of the quarantined file.
CrowdStrike.QuarantinedFile.paths.pathStringThe full path of the quarantined file.
CrowdStrike.QuarantinedFile.paths.filenameStringThe name of the quarantined file.
CrowdStrike.QuarantinedFile.paths.stateStringThe current state of the quarantined file path (e.g., "purged").
CrowdStrike.QuarantinedFile.stateStringThe current state of the quarantined file (e.g., "unrelease_pending").
CrowdStrike.QuarantinedFile.detect_idsStringThe detection identifiers associated with the quarantined file.
CrowdStrike.QuarantinedFile.hostnameStringThe hostname of the agent that quarantined the file.
CrowdStrike.QuarantinedFile.usernameStringThe username associated with the quarantined file.
CrowdStrike.QuarantinedFile.date_updatedDateThe date the quarantined file was last updated.
CrowdStrike.QuarantinedFile.date_createdDateThe date the quarantined file was created.

Command Example#

!cs-falcon-list-quarantined-file limit=1

Context Example#

{
"CrowdStrike": {
"QuarantinedFile": {
"aid": "a123456",
"cid": "c123456",
"date_created": "2022-12-13T14:23:49Z",
"date_updated": "2023-03-06T13:47:30Z",
"detect_ids": [
"ldt:a123456:456789"
],
"hostname": "INSTANCE-1",
"id": "a123456_sha123456",
"paths": [
{
"filename": "nc.exe",
"path": "\\Device\\HarddiskVolume3\\Users\\admin\\Downloads\\hamuzim\\test.exe",
"state": "quarantined"
}
],
"sha256": "sha123456",
"state": "deleted",
"username": "admin"
}
}
}

Human Readable Output#

CrowdStrike Falcon Quarantined File#

IdAidCidSha256PathsStateDetectIdsHostnameUsernameDateUpdatedDateCreated
a123456_sha123456a123456c123456sha123456- path: \Device\HarddiskVolume3\Users\admin\Downloads\hamuzim\netcat-1.11\nc.exe
filename: nc.exe
state: quarantined
deletedvalues: ldt:a123456:456789INSTANCE-1admin2023-03-06T13:47:30Z2022-12-13T14:23:49Z

cs-falcon-apply-quarantine-file-action#


Apply action to quarantined files by file IDs or filter.

Base Command#

cs-falcon-apply-quarantine-file-action

Input#

Argument NameDescriptionRequired
idsA comma-separated list of quarantined file IDs to update.Optional
actionAction to perform against the quarantined file. Possible values are: delete, release, unrelease.Required
commentComment to appear along with the action taken.Required
filterUpdate files based on a custom filter.Optional
sha256A comma-separated list of quarantined SHA256 files to update.Optional
filenameA comma-separated list of quarantined filenames to update.Optional
stateUpdate files based on the state.Optional
hostnameA comma-separated list of quarantined file hostnames to update.Optional
usernameA comma-separated list of quarantined file usernames to update.Optional

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-apply-quarantine-file-action filename=nc.exe action=delete comment=demo-comment

Human Readable Output#

The Quarantined File with IDs ['a123456_sha123456'] was successfully updated.

cs-falcon-ods-query-scan#


Retrieve ODS scan details.

Base Command#

cs-falcon-ods-query-scan

Input#

Argument NameDescriptionRequired
wait_for_resultWhether to poll for results. Possible values are: true, false. Default is false.Optional
filterValid CS-Falcon-FQL filter to query with.Optional
idsComma-separated list of scan IDs to retrieve details about. If set, will override all other arguments.Optional
initiated_fromComma-separated list of scan initiation sources to filter by.Optional
statusComma-separated list of scan statuses to filter by.Optional
severityComma-separated list of scan severities to filter by.Optional
scan_started_onUTC-format of the scan start time to filter by.Optional
scan_completed_onUTC-format of the scan completion time to filter by.Optional
offsetStarting index of overall result set from which to return IDs.Optional
limitMaximum number of resources to return.Optional
interval_in_secondsThe interval in seconds between each poll. Default is 30.Optional
timeout_in_secondsThe timeout in seconds until polling ends. Default is 600.Optional
hide_polling_outputWhether to hide the polling message and only print the final status at the end (automatically filled by polling. Can be used for testing purposes). Default is True.Optional

Context Output#

PathTypeDescription
CrowdStrike.ODSScan.idStringA unique identifier for the scan event.
CrowdStrike.ODSScan.cidStringA unique identifier for the client that triggered the scan.
CrowdStrike.ODSScan.profile_idStringA unique identifier for the scan profile used in the scan.
CrowdStrike.ODSScan.descriptionStringThe ID of the description of the scan.
CrowdStrike.ODSScan.scan_inclusionsStringThe files or folders included in the scan.
CrowdStrike.ODSScan.initiated_fromStringThe source of the scan initiation.
CrowdStrike.ODSScan.quarantineBooleanWhether the scan was set to quarantine.
CrowdStrike.ODSScan.cpu_priorityNumberThe CPU priority for the scan (1-5).
CrowdStrike.ODSScan.preemption_priorityNumberThe preemption priority for the scan.
CrowdStrike.ODSScan.metadata.host_idStringA unique identifier for the host that was scanned.
CrowdStrike.ODSScan.metadata.host_scan_idStringA unique identifier for the scan that was performed on the host.
CrowdStrike.ODSScan.metadata.scan_host_metadata_idStringA unique identifier for the metadata associated with the host scan.
CrowdStrike.ODSScan.metadata.filecount.scannedNumberThe number of files that were scanned.
CrowdStrike.ODSScan.metadata.filecount.maliciousNumberThe number of files that were identified as malicious.
CrowdStrike.ODSScan.metadata.filecount.quarantinedNumberThe number of files that were quarantined.
CrowdStrike.ODSScan.metadata.filecount.skippedNumberThe number of files that were skipped during the scan.
CrowdStrike.ODSScan.metadata.filecount.traversedNumberThe number of files that were traversed during the scan.
CrowdStrike.ODSScan.metadata.statusStringThe status of the scan on this host. (e.g., "pending", "running", "completed", or "failed").
CrowdStrike.ODSScan.metadata.started_onDateThe date and time that the scan started.
CrowdStrike.ODSScan.metadata.completed_onDateThe date and time that the scan completed.
CrowdStrike.ODSScan.metadata.last_updatedDateThe date and time that the metadata was last updated.
CrowdStrike.ODSScan.statusStringThe status of the scan (e.g., "pending", "running", "completed", or "failed").
CrowdStrike.ODSScan.hostsStringA list of the host IDs that were scanned.
CrowdStrike.ODSScan.endpoint_notificationBooleanIndicates whether endpoint notifications are enabled.
CrowdStrike.ODSScan.pause_durationNumberThe number of hours to pause between scanning each file.
CrowdStrike.ODSScan.max_durationNumberThe maximum amount of time to allow for the scan job in hours.
CrowdStrike.ODSScan.max_file_sizeNumberThe maximum file size (in MB) to scan.
CrowdStrike.ODSScan.sensor_ml_level_detectionNumberThe level of detection sensitivity for the local sensor machine learning model.
CrowdStrike.ODSScan.sensor_ml_level_preventionNumberThe level of prevention sensitivity for the local sensor machine learning model.
CrowdStrike.ODSScan.cloud_ml_level_detectionNumberThe level of detection sensitivity for the cloud machine learning model.
CrowdStrike.ODSScan.cloud_ml_level_preventionNumberThe level of prevention sensitivity for the cloud machine learning model.
CrowdStrike.ODSScan.policy_settingNumberA list of policy setting IDs for the scan job (these correspond to specific policy settings in the Falcon console).
CrowdStrike.ODSScan.scan_started_onDateThe timestamp when the scan was started.
CrowdStrike.ODSScan.scan_completed_onDateThe timestamp when the scan was completed.
CrowdStrike.ODSScan.created_onDateThe timestamp when the scan was created.
CrowdStrike.ODSScan.created_byStringThe ID of the user who created the scan job.
CrowdStrike.ODSScan.last_updatedDateThe timestamp when the scan job was last updated.

Command Example#

!cs-falcon-ods-query-scan initiated_from=some_admin_name severity=high scan_started_on=2023-02-27T09:51:33.91608286Z

Context Example#

{
"CrowdStrike": {
"ODSScan": [
{
"cid": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"cloud_ml_level_detection": 4,
"cloud_ml_level_prevention": 4,
"cpu_priority": 5,
"created_by": "someone@email.com",
"created_on": "2023-05-03T08:45:41.688556439Z",
"endpoint_notification": true,
"file_paths": [
"C:\\Users\\admin\\Downloads\\hamuzim\\netcat-1.11\\eicar_com.exe"
],
"filecount": {},
"hosts": [
"a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
],
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"initiated_from": "some_admin_name",
"last_updated": "2023-05-03T08:45:43.348230927Z",
"max_duration": 0,
"max_file_size": 60,
"metadata": [
{
"completed_on": "2023-05-03T08:45:43.274953782Z",
"filecount": {
"malicious": 0,
"quarantined": 0,
"scanned": 0,
"skipped": 0,
"traversed": 0
},
"host_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"host_scan_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"last_updated": "2023-05-03T08:45:43.61797613Z",
"scan_host_metadata_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"started_on": "2023-05-03T08:45:43.069273028Z",
"status": "completed"
}
],
"pause_duration": 2,
"policy_setting": [
26439818675190,
26405458936832,
26405458936833,
26405458936834,
26405458936835,
26405458936840,
26405458936841,
26405458936842,
26405458936843,
26456998543793,
26456998544045,
26456998543652,
26456998543653,
26456998543656,
26456998543654,
26456998543950,
26456998543963
],
"preemption_priority": 1,
"profile_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"quarantine": true,
"scan_completed_on": "2023-05-03T08:45:43.274953782Z",
"scan_inclusions": [
"**\\Downloads\\**"
],
"scan_started_on": "2023-02-27T09:51:33.91608286Z",
"sensor_ml_level_detection": 4,
"sensor_ml_level_prevention": 4,
"status": "completed"
},
{
"cid": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"cloud_ml_level_detection": 3,
"cloud_ml_level_prevention": 3,
"cpu_priority": 4,
"created_by": "someone@email.com",
"created_on": "2023-03-12T14:54:43.659773852Z",
"endpoint_notification": true,
"filecount": {},
"hosts": [
"a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
],
"id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"initiated_from": "some_admin_name",
"last_updated": "2023-04-05T16:56:14.972317443Z",
"max_duration": 2,
"max_file_size": 60,
"metadata": [
{
"completed_on": "2023-03-12T14:57:37.338506965Z",
"filecount": {
"malicious": 0,
"quarantined": 0,
"scanned": 0,
"skipped": 0,
"traversed": 518485
},
"host_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"host_scan_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"last_updated": "2023-03-12T14:57:37.338585331Z",
"scan_host_metadata_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"started_on": "2023-02-27T09:51:33.91608286Z",
"status": "completed"
}
],
"pause_duration": 2,
"policy_setting": [
26439818674573,
26439818674574,
26439818674575,
26405458936832,
26456998543653,
26456998543656,
26456998543654,
26456998543950,
26456998543963
],
"preemption_priority": 1,
"profile_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"quarantine": true,
"scan_completed_on": "2023-03-12T14:57:37.338506965Z",
"scan_inclusions": [
"*"
],
"scan_started_on": "2023-03-12T14:54:45.210172175Z",
"sensor_ml_level_detection": 3,
"sensor_ml_level_prevention": 3,
"status": "failed"
}
]
}
}

Human Readable Output#

CrowdStrike Falcon ODS Scans#

IDStatusSeverityFile CountDescriptionHosts/Host groupsEnd timeStart timeRun by
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1failedscanned: 0
malicious: 0
quarantined: 0
skipped: 0
traversed: 518464
desc3456346a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12023-02-27T09:51:33.91608286Za1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1failedscanned: 0
malicious: 0
quarantined: 0
skipped: 0
traversed: 518511
a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12023-03-13T14:50:26.259846586Z2023-02-27T09:51:33.91608286Zsomeone@email.com

cs-falcon-ods-query-scheduled-scan#


Retrieve ODS scheduled scan details.

Base Command#

cs-falcon-ods-query-scheduled-scan

Input#

Argument NameDescriptionRequired
filterValid CS-Falcon-FQL filter to query with.Optional
idsComma-separated list of scan IDs to retrieve details about. If set, will override all other arguments.Optional
initiated_fromComma-separated list of scan initiation sources to filter by.Optional
statusComma-separated list of scan statuses to filter by.Optional
created_onUTC-format of the scan creation time to filter by.Optional
created_byUTC-format time of the scan creator to filter by.Optional
start_timestampUTC-format of scan start time to filter by.Optional
deletedDeleted scans only.Optional
offsetStarting index of overall result set from which to return IDs.Optional
limitMaximum number of resources to return.Optional

Context Output#

PathTypeDescription
CrowdStrike.ODSScheduledScan.idStringUnique identifier for the scan.
CrowdStrike.ODSScheduledScan.cidStringIdentifier for the customer or organization that owns the scan.
CrowdStrike.ODSScheduledScan.descriptionStringThe ID of the description of the scan.
CrowdStrike.ODSScheduledScan.file_pathsStringThe file or folder paths scanned.
CrowdStrike.ODSScheduledScan.scan_exclusionsStringThe file or folder exclusions from the scan.
CrowdStrike.ODSScheduledScan.initiated_fromStringThe source of the scan initiation.
CrowdStrike.ODSScheduledScan.cpu_priorityNumberThe CPU priority for the scan (1-5).
CrowdStrike.ODSScheduledScan.preemption_priorityNumberThe preemption priority for the scan.
CrowdStrike.ODSScheduledScan.statusStringThe status of the scan, whether it's "scheduled", "running", "completed", etc.
CrowdStrike.ODSScheduledScan.host_groupsStringThe host groups targeted by the scan.
CrowdStrike.ODSScheduledScan.endpoint_notificationBooleanWhether notifications of the scan were sent to endpoints.
CrowdStrike.ODSScheduledScan.pause_durationNumberThe pause duration of the scan in hours.
CrowdStrike.ODSScheduledScan.max_durationNumberThe maximum duration of the scan in hours.
CrowdStrike.ODSScheduledScan.max_file_sizeNumberThe maximum file size that the scan can handle in MB.
CrowdStrike.ODSScheduledScan.sensor_ml_level_detectionNumberThe machine learning detection level for the sensor.
CrowdStrike.ODSScheduledScan.cloud_ml_level_detectionNumberThe machine learning detection level for the cloud.
CrowdStrike.ODSScheduledScan.schedule.start_timestampDateThe timestamp when the first scan was created.
CrowdStrike.ODSScheduledScan.schedule.intervalNumberThe interval between scans.
CrowdStrike.ODSScheduledScan.created_onDateThe timestamp when the scan was created.
CrowdStrike.ODSScheduledScan.created_byStringThe user who created the scan.
CrowdStrike.ODSScheduledScan.last_updatedDateThe timestamp when the scan was last updated.
CrowdStrike.ODSScheduledScan.deletedBooleanWhether the scan was deleted.
CrowdStrike.ODSScheduledScan.quarantineBooleanWhether the scan was set to quarantine.
CrowdStrike.ODSScheduledScan.metadata.host_idStringScan host IDs.
CrowdStrike.ODSScheduledScan.metadata.last_updatedDateThe date and time when the detection event was last updated.
CrowdStrike.ODSScheduledScan.sensor_ml_level_preventionNumberThe machine learning prevention level for the sensor.
CrowdStrike.ODSScheduledScan.cloud_ml_level_preventionNumberThe machine learning prevention level for the cloud.

Command Example#

!cs-falcon-ods-query-scheduled-scan ids=123456789

Context Example#

{
"CrowdStrike": {
"ODSScheduledScan": {
"cid": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"cloud_ml_level_detection": 2,
"cloud_ml_level_prevention": 2,
"cpu_priority": 3,
"created_by": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"created_on": "2023-05-08T09:04:20.8414225Z",
"deleted": false,
"endpoint_notification": true,
"host_groups": [
"a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1"
],
"id": "123456789",
"initiated_from": "cloud_scheduled",
"last_updated": "2023-05-08T09:22:48.408487143Z",
"max_duration": 2,
"max_file_size": 60,
"metadata": [
{
"host_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"last_updated": "2023-05-08T09:22:48.408487143Z"
}
],
"pause_duration": 3,
"policy_setting": [
26439818674573,
26439818674574,
26439818675074,
26405458936702,
26405458936703,
26405458936707,
26439818675124,
26439818675125,
26439818675157,
26439818675158,
26439818675182,
26439818675183,
26439818675190,
26439818675191,
26439818675196,
26439818675197,
26439818675204,
26439818675205,
26405458936760,
26405458936761,
26405458936793,
26405458936794,
26405458936818,
26405458936819,
26405458936825,
26405458936826,
26405458936832,
26405458936833,
26405458936840,
26405458936841,
26456998543793,
26456998544045,
26456998543652,
26456998543653,
26456998543656,
26456998543654,
26456998543950,
26456998543963
],
"preemption_priority": 15,
"quarantine": true,
"scan_inclusions": [
"*"
],
"schedule": {
"interval": 14,
"start_timestamp": "2023-05-20T06:49"
},
"sensor_ml_level_detection": 2,
"sensor_ml_level_prevention": 2,
"status": "scheduled"
}
}
}

Human Readable Output#

CrowdStrike Falcon ODS Scheduled Scans#

IDHosts targetedDescriptionHost groupsStart timeCreated by
1234567891a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a12023-05-20T06:49a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1

cs-falcon-ods-query-scan-host#


Retrieve ODS scan host details.

Base Command#

cs-falcon-ods-query-scan-host

Input#

Argument NameDescriptionRequired
filterValid CS-Falcon-FQL filter to query with.Optional
host_idsComma-separated list of host IDs to filter by.Optional
scan_idsComma-separated list of scan IDs to filter by.Optional
statusComma-separated list of scan statuses to filter by.Optional
started_onUTC-format of scan start time to filter by.Optional
completed_onUTC-format of scan completion time to filter by.Optional
offsetStarting index of the overall result set from which to return IDs.Optional
limitMaximum number of resources to return.Optional

Context Output#

PathTypeDescription
CrowdStrike.ODSScanHost.idStringA unique identifier for the scan event.
CrowdStrike.ODSScanHost.cidStringA unique identifier for the client that triggered the scan.
CrowdStrike.ODSScanHost.scan_idStringA unique identifier for the scan.
CrowdStrike.ODSScanHost.profile_idStringA unique identifier for the scan profile used in the scan.
CrowdStrike.ODSScanHost.host_idStringA unique identifier for the host that was scanned.
CrowdStrike.ODSScanHost.host_scan_idStringA unique identifier for the scan that was performed on the host.
CrowdStrike.ODSScanHost.filecount.scannedNumberThe number of files that were scanned during the scan.
CrowdStrike.ODSScanHost.filecount.maliciousNumberThe number of files that were detected as malicious during the scan.
CrowdStrike.ODSScanHost.filecount.quarantinedNumberThe number of files that were quarantined during the scan.
CrowdStrike.ODSScanHost.filecount.skippedNumberThe number of files that were skipped during the scan.
CrowdStrike.ODSScanHost.statusStringThe status of the scan. (e.g., "completed", "pending", "cancelled", "running", or "failed").
CrowdStrike.ODSScanHost.severityNumberA severity score assigned to the scan, ranging from 0 to 100.
CrowdStrike.ODSScanHost.started_onDateThe date and time when the scan started.
CrowdStrike.ODSScanHost.completed_onDateThe date and time when the scan completed.
CrowdStrike.ODSScanHost.last_updatedDateThe date and time when the scan event was last updated.

Command Example#

!cs-falcon-ods-query-scan-host filter="scan_id:[\"123456789\",\"987654321\"]"

Context Example#

{
"CrowdStrike": {
"ODSScanHost": [
{
"cid": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"filecount": {},
"host_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"id": "123456789",
"last_updated": "2022-11-27T17:15:50.056840267Z",
"profile_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"scan_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"status": "pending"
},
{
"cid": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"completed_on": "2023-05-07T08:28:56.856506979Z",
"filecount": {
"malicious": 0,
"quarantined": 0,
"scanned": 0,
"skipped": 0,
"traversed": 524581
},
"host_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"host_scan_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"id": "987654321",
"last_updated": "2023-05-07T08:28:56.856575358Z",
"profile_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"scan_id": "a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1",
"started_on": "2023-05-07T08:25:48.336234188Z",
"status": "completed"
}
]
}
}

Human Readable Output#

CrowdStrike Falcon ODS Scan Hosts#

IDScan IDHost IDFilecountStatusSeverityStarted on
123456789a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1pending
987654321a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1scanned: 0
malicious: 0
quarantined: 0
skipped: 0
traversed: 524581
completed2023-05-07T08:25:48.336234188Z

cs-falcon-ods-query-malicious-files#


Retrieve ODS malicious file details.

Base Command#

cs-falcon-ods-query-malicious-files

Input#

Argument NameDescriptionRequired
filterValid CS-Falcon-FQL filter to query with.Optional
file_idsComma-separated list of malicious file IDs to retrieve details about. If set, will override all other arguments.Optional
host_idsComma-separated list of host IDs to filter by.Optional
scan_idsComma-separated list of scan IDs to filter by.Optional
file_pathsComma-separated list of file paths to filter by.Optional
file_namesComma-separated list of filenames to filter by.Optional
hashComma-separated list of hashes to filter by.Optional
offsetStarting index of the overall result set from which to return IDs.Optional
limitMaximum number of resources to return.Optional

Context Output#

PathTypeDescription
CrowdStrike.ODSMaliciousFile.idStringA unique identifier of the detection event.
CrowdStrike.ODSMaliciousFile.cidStringA unique identifier for the client that triggered the detection event.
CrowdStrike.ODSMaliciousFile.scan_idStringA unique identifier for the scan that triggered the detection event.
CrowdStrike.ODSMaliciousFile.host_idStringA unique identifier for the host that was scanned.
CrowdStrike.ODSMaliciousFile.host_scan_idStringA unique identifier for the scan that detected the file on the host.
CrowdStrike.ODSMaliciousFile.filepathStringThe full path to the malicious file on the host system.
CrowdStrike.ODSMaliciousFile.filenameStringThe name of the malicious file.
CrowdStrike.ODSMaliciousFile.hashStringA SHA256 hash of the malicious file, which can be used to identify it.
CrowdStrike.ODSMaliciousFile.pattern_idNumberThe identifier of the pattern used to detect the malicious file.
CrowdStrike.ODSMaliciousFile.severityNumberA severity score assigned to the detection event, ranging from 0 to 100.
CrowdStrike.ODSMaliciousFile.quarantinedBooleanIndicates whether the file was quarantined.
CrowdStrike.ODSMaliciousFile.last_updatedDateThe date and time when the detection event was last updated.

Command Example#

!cs-falcon-ods-query-malicious-files

Human Readable Output#

No malicious files match the arguments/filter.

cs-falcon-ods-create-scan#


Create an ODS scan and wait for the results.

Base Command#

cs-falcon-ods-create-scan

Input#

Argument NameDescriptionRequired
hostsA comma-separated list of hosts to be scanned. "hosts" OR "host_groups" must be set.Optional
host_groupsA comma-separated list of host groups to be scanned. "hosts" OR "host_groups" must be set.Optional
file_pathsA comma-separated list of file paths to be scanned. "file_paths" OR "scan_inclusions" must be set.Optional
scan_inclusionsA comma-separated list of included files or locations for this scan. "file_paths" OR "scan_inclusions" must be set.Optional
scan_exclusionsA comma-separated list of excluded files or locations for this scan.Optional
initiated_fromScan origin.Optional
cpu_priorityThe scan CPU priority. Possible values are: Highest, High, Medium, Low, Lowest. Default is Low.Optional
descriptionScan description.Optional
quarantineFlag indicating if identified threats should be quarantined.Optional
pause_durationAmount of time (in hours) for scan pauses. Default is 2.Optional
sensor_ml_level_detectionSensor ML detection level.Optional
sensor_ml_level_preventionSensor ML prevention level.Optional
cloud_ml_level_detectionCloud ML detection level for the scan.Optional
cloud_ml_level_preventionCloud ML prevention level for the scan.Optional
max_durationMaximum time (in hours) the scan is allowed to execute. Default is 2.Optional
interval_in_secondsThe interval in seconds between each poll. Default is 30.Optional
timeout_in_secondsThe timeout in seconds until polling ends. Default is 600.Optional

Context Output#

PathTypeDescription
CrowdStrike.ODSScan.idStringA unique identifier for the scan event.
CrowdStrike.ODSScan.cidStringA unique identifier for the client that triggered the scan.
CrowdStrike.ODSScan.profile_idStringA unique identifier for the scan profile used in the scan.
CrowdStrike.ODSScan.descriptionStringThe ID of the description of the scan.
CrowdStrike.ODSScan.scan_inclusionsStringThe files or folders included in the scan.
CrowdStrike.ODSScan.initiated_fromStringThe source of the scan initiation.
CrowdStrike.ODSScan.quarantineBooleanWhether the scan was set to quarantine.
CrowdStrike.ODSScan.cpu_priorityNumberThe CPU priority for the scan (1-5).
CrowdStrike.ODSScan.preemption_priorityNumberThe preemption priority for the scan.
CrowdStrike.ODSScan.metadata.host_idStringA unique identifier for the host that was scanned.
CrowdStrike.ODSScan.metadata.host_scan_idStringA unique identifier for the scan that was performed on the host.
CrowdStrike.ODSScan.metadata.scan_host_metadata_idStringA unique identifier for the metadata associated with the host scan.
CrowdStrike.ODSScan.metadata.filecount.scannedNumberThe number of files that were scanned.
CrowdStrike.ODSScan.metadata.filecount.maliciousNumberThe number of files that were identified as malicious.
CrowdStrike.ODSScan.metadata.filecount.quarantinedNumberThe number of files that were quarantined.
CrowdStrike.ODSScan.metadata.filecount.skippedNumberThe number of files that were skipped during the scan.
CrowdStrike.ODSScan.metadata.filecount.traversedNumberThe number of files that were traversed during the scan.
CrowdStrike.ODSScan.metadata.statusStringThe status of the scan on this host (e.g., "pending", "running", "completed", or "failed").
CrowdStrike.ODSScan.metadata.started_onDateThe date and time that the scan started.
CrowdStrike.ODSScan.metadata.completed_onDateThe date and time that the scan completed.
CrowdStrike.ODSScan.metadata.last_updatedDateThe date and time that the metadata was last updated.
CrowdStrike.ODSScan.statusStringThe status of the scan (e.g., "pending", "running", "completed", or "failed").
CrowdStrike.ODSScan.hostsStringA list of the host IDs that were scanned.
CrowdStrike.ODSScan.endpoint_notificationBooleanIndicates whether endpoint notifications are enabled.
CrowdStrike.ODSScan.pause_durationNumberThe number of hours to pause between scanning each file.
CrowdStrike.ODSScan.max_durationNumberThe maximum amount of time to allow for the scan job in hours.
CrowdStrike.ODSScan.max_file_sizeNumberThe maximum file size (in MB) to scan.
CrowdStrike.ODSScan.sensor_ml_level_detectionNumberThe level of detection sensitivity for the local sensor machine learning model.
CrowdStrike.ODSScan.sensor_ml_level_preventionNumberThe level of prevention sensitivity for the local sensor machine learning model.
CrowdStrike.ODSScan.cloud_ml_level_detectionNumberThe level of detection sensitivity for the cloud machine learning model.
CrowdStrike.ODSScan.cloud_ml_level_preventionNumberThe level of prevention sensitivity for the cloud machine learning model.
CrowdStrike.ODSScan.policy_settingNumberA list of policy setting IDs for the scan job (these correspond to specific policy settings in the Falcon console).
CrowdStrike.ODSScan.scan_started_onDateThe timestamp when the scan was started.
CrowdStrike.ODSScan.scan_completed_onDateThe timestamp when the scan was completed.
CrowdStrike.ODSScan.created_onDateThe timestamp when the scan was created.
CrowdStrike.ODSScan.created_byStringThe ID of the user who created the scan job.
CrowdStrike.ODSScan.last_updatedDateThe timestamp when the scan job was last updated.

Command Example#

!cs-falcon-ods-create-scan host_groups=7471ba0636b34cbb8c65fae7979a6a9b scan_inclusions=* cpu_priority=Highest max_duration=1 pause_duration=1

Context Example#

{
"CrowdStrike": {
"ODSScan": {
"cid": "20879a8064904ecfbb62c118a6a19411",
"cloud_ml_level_detection": 2,
"cloud_ml_level_prevention": 2,
"cpu_priority": 5,
"created_by": "f7acf1bd5d3d4b40afe77546cbbaefde",
"created_on": "2023-06-11T13:23:05.139153881Z",
"filecount": {
"malicious": 0,
"quarantined": 0,
"scanned": 0,
"skipped": 0,
"traversed": 0
},
"host_groups": [
"7471ba0636b34cbb8c65fae7979a6a9b"
],
"id": "9ba8489e9f604b61bf9b4a2c5f95ede7",
"initiated_from": "cloud_adhoc",
"last_updated": "2023-06-11T13:23:05.139153881Z",
"max_duration": 1,
"max_file_size": 60,
"metadata": [
{
"filecount": {},
"host_id": "046761c46ec84f40b27b6f79ce7cd32c",
"last_updated": "2023-06-11T13:23:05.139153881Z",
"scan_host_metadata_id": "31052e821a5a4189a1a9a2814cc88e4e",
"status": "complete"
}
],
"pause_duration": 1,
"policy_setting": [
26439818674573,
26439818674574,
26439818675074,
26405458936702,
26405458936703,
26456998543654,
26456998543950,
26456998543963
],
"preemption_priority": 1,
"profile_id": "335198a96e1a4a6b880d62b2e7ccbb91",
"quarantine": true,
"scan_inclusions": [
"*"
],
"sensor_ml_level_detection": 2,
"sensor_ml_level_prevention": 2,
"status": "complete"
}
}
}

Human Readable Output#

CrowdStrike Falcon ODS Scans#

IDStatusSeverityFile CountDescriptionHosts/Host groupsEnd timeStart timeRun by
9ba8489e9f604b61bf9b4a2c5f95ede7complete7471ba0636b34cbb8c65fae7979a6a9bf7acf1bd5d3d4b40afe77546cbbaefde

cs-falcon-ods-create-scheduled-scan#


Create an ODS scheduled scan.

Base Command#

cs-falcon-ods-create-scheduled-scan

Input#

Argument NameDescriptionRequired
host_groupsA comma-separated list of host groups to be scanned.Required
file_pathsA comma-separated list of file paths to be scanned. "file_paths" OR "scan_inclusions" must be set.Optional
scan_inclusionsA comma-separated list of included files or locations for this scan. "file_paths" OR "scan_inclusions" must be set.Optional
scan_exclusionsA comma-separated list of excluded files or locations for this scan.Optional
initiated_fromScan origin.Optional
cpu_priorityThe scan CPU priority. Possible values are: Highest, High, Medium, Low, Lowest. Default is Low.Optional
descriptionScan description.Optional
quarantineFlag indicating if identified threats should be quarantined.Optional
pause_durationAmount of time (in hours) for scan pauses. Default is 2.Optional
sensor_ml_level_detectionSensor ML detection level.Optional
sensor_ml_level_preventionSensor ML prevention level.Optional
cloud_ml_level_detectionCloud ML detection level for the scan.Optional
cloud_ml_level_preventionCloud ML prevention level for the scan.Optional
max_durationMaximum time (in hours) the scan is allowed to execute. Default is 2.Optional
schedule_start_timestampWhen to start the first scan. Supports english expressions such as "tomorrow" or "in an hour".Required
schedule_intervalThe schedule interval. Possible values are: Never, Daily, Weekly, Every other week, Every four weeks, Monthly.Required

Context Output#

PathTypeDescription
CrowdStrike.ODSScheduledScan.idStringUnique identifier for the scan.
CrowdStrike.ODSScheduledScan.cidStringIdentifier for the customer or organization that owns the scan.
CrowdStrike.ODSScheduledScan.descriptionStringThe ID of the description of the scan.
CrowdStrike.ODSScheduledScan.file_pathsStringThe file or folder paths scanned.
CrowdStrike.ODSScheduledScan.scan_exclusionsStringThe file or folder exclusions from the scan.
CrowdStrike.ODSScheduledScan.initiated_fromStringThe source of the scan initiation.
CrowdStrike.ODSScheduledScan.cpu_priorityNumberThe CPU priority for the scan (1-5).
CrowdStrike.ODSScheduledScan.preemption_priorityNumberThe preemption priority for the scan.
CrowdStrike.ODSScheduledScan.statusStringThe status of the scan, whether it's "scheduled", "running", "completed", etc.
CrowdStrike.ODSScheduledScan.host_groupsStringThe host groups targeted by the scan.
CrowdStrike.ODSScheduledScan.endpoint_notificationBooleanWhether notifications of the scan were sent to endpoints.
CrowdStrike.ODSScheduledScan.pause_durationNumberThe pause duration of the scan in hours.
CrowdStrike.ODSScheduledScan.max_durationNumberThe maximum duration of the scan in hours.
CrowdStrike.ODSScheduledScan.max_file_sizeNumberThe maximum file size that the scan can handle in MB.
CrowdStrike.ODSScheduledScan.sensor_ml_level_detectionNumberThe machine learning detection level for the sensor.
CrowdStrike.ODSScheduledScan.cloud_ml_level_detectionNumberThe machine learning detection level for the cloud.
CrowdStrike.ODSScheduledScan.schedule.start_timestampDateThe timestamp when the first scan was created.
CrowdStrike.ODSScheduledScan.schedule.intervalNumberThe interval between scans.
CrowdStrike.ODSScheduledScan.created_onDateThe timestamp when the scan was created.
CrowdStrike.ODSScheduledScan.created_byStringThe user who created the scan.
CrowdStrike.ODSScheduledScan.last_updatedDateThe timestamp when the scan was last updated.
CrowdStrike.ODSScheduledScan.deletedBooleanWhether the scan was deleted.
CrowdStrike.ODSScheduledScan.quarantineBooleanWhether the scan was set to quarantine.
CrowdStrike.ODSScheduledScan.metadata.host_idStringScan host IDs.
CrowdStrike.ODSScheduledScan.metadata.last_updatedDateThe date and time when the detection event was last updated.
CrowdStrike.ODSScheduledScan.sensor_ml_level_preventionNumberThe machine learning prevention level for the sensor.
CrowdStrike.ODSScheduledScan.cloud_ml_level_preventionNumberThe machine learning prevention level for the cloud.

Command Example#

!cs-falcon-ods-create-scheduled-scan host_groups=7471ba0636b34cbb8c65fae7979a6a9b schedule_interval=daily schedule_start_timestamp=tomorrow cpu_priority=Highest scan_inclusions=*

Context Example#

{
"CrowdStrike": {
"ODSScan": {
"cid": "20879a8064904ecfbb62c118a6a19411",
"cloud_ml_level_detection": 2,
"cloud_ml_level_prevention": 2,
"cpu_priority": 5,
"created_by": "f7acf1bd5d3d4b40afe77546cbbaefde",
"created_on": "2023-06-11T13:23:10.564070276Z",
"deleted": false,
"host_groups": [
"7471ba0636b34cbb8c65fae7979a6a9b"
],
"id": "7d08d9a3088f49b3aa20efafc355aef0",
"initiated_from": "cloud_scheduled",
"last_updated": "2023-06-11T13:23:10.564070276Z",
"max_duration": 2,
"max_file_size": 60,
"metadata": [
{
"host_id": "046761c46ec84f40b27b6f79ce7cd32c",
"last_updated": "2023-06-11T13:23:10.564070276Z"
}
],
"pause_duration": 2,
"policy_setting": [
26439818674573,
26439818674574,
26439818675074,
26405458936702,
26405458936703,
26405458936707,
26439818675124,
26439818675125,
26439818675157,
26439818675158,
26439818675182,
26439818675183,
26439818675190,
26439818675191,
26439818675196,
26439818675197,
26439818675204,
26439818675205,
26405458936760,
26405458936761,
26405458936793,
26405458936794,
26405458936818,
26405458936819,
26405458936825,
26405458936826,
26405458936832,
26405458936833,
26405458936840,
26405458936841,
26456998543793,
26456998544045,
26456998543652,
26456998543653,
26456998543656,
26456998543654,
26456998543950,
26456998543963
],
"preemption_priority": 15,
"quarantine": true,
"scan_inclusions": [
"*"
],
"schedule": {
"interval": 1,
"start_timestamp": "2023-06-12T13:23"
},
"sensor_ml_level_detection": 2,
"sensor_ml_level_prevention": 2,
"status": "scheduled"
}
}
}

Human Readable Output#

Scheduled Scan Created#

Scan ID
7d08d9a3088f49b3aa20efafc355aef0

cs-falcon-ods-delete-scheduled-scan#


Delete ODS scheduled scans.

Base Command#

cs-falcon-ods-delete-scheduled-scan

Input#

Argument NameDescriptionRequired
idsComma-separated list of scheduled scan IDs to delete.Optional
filterValid CS-Falcon-FQL filter to delete scans by.Optional

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-ods-delete-scheduled-scan ids=9acf0c069d3d4a5b82badb170966e77c

Human Readable Output#

Deleted Scans:#

Scan ID
9acf0c069d3d4a5b82badb170966e77c

cs-falcon-list-identity-entities#


List identity entities.

Base Command#

cs-falcon-list-identity-entities

Input#

Argument NameDescriptionRequired
typeAPI type. Possible values are: USER, ENDPOINT.Required
sort_keyThe key to sort by. Possible values are: RISK_SCORE, PRIMARY_DISPLAY_NAME, SECONDARY_DISPLAY_NAME, MOST_RECENT_ACTIVITY, ENTITY_ID.Optional
sort_orderThe sort order. Possible values are: DESCENDING, ASCENDING. Default is ASCENDING.Optional
entity_idA comma-separated list of entity IDs to look for.Optional
primary_display_nameA comma-separated list of primary display names to filter by.Optional
secondary_display_nameA comma-separated list of secondary display names to filter by.Optional
max_risk_score_severityThe maximum risk score severity to filter by. Possible values are: NORMAL, MEDIUM, HIGH.Optional
min_risk_score_severityThe minimum risk score severity to filter by. Possible values are: NORMAL, MEDIUM, HIGH.Optional
enabledWhether to get only enabled or disabled identity entities. Possible values are: true, false.Optional
emailEmail to filter by.Optional
next_tokenThe hash for the next page.Optional
page_sizeThe maximum number of items to fetch per page. The maximum value allowed is 1000. Default is 50.Optional
pageThe page number. Default is 1.Optional
limitThe maximum number of identity entities to list.Optional

Context Output#

PathTypeDescription
CrowdStrike.IDPEntity.IsHumanBooleanWhether the identity entity is human made.
CrowdStrike.IDPEntity.IsProgrammaticBooleanWhether the identity entity is programmatic made.
CrowdStrike.IDPEntity.IsAdminStringWhether the identity entity is admin made.
CrowdStrike.IDPEntity.PrimaryDisplayNameStringThe identity entity primary display name.
CrowdStrike.IDPEntity.RiskFactors.TypeUnknownThe identity entity risk factor type.
CrowdStrike.IDPEntity.RiskFactors.SeverityUnknownThe identity entity risk factor severity.
CrowdStrike.IDPEntity.RiskScoreNumberThe identity entity risk score.
CrowdStrike.IDPEntity.RiskScoreSeverityStringThe identity entity risk score severity.
CrowdStrike.IDPEntity.SecondaryDisplayNameStringThe identity entity secondary display name.
CrowdStrike.IDPEntity.EmailAddressesStringThe identity entity email address.

cs-falcon-cspm-list-policy-details#


Given a CSV list of policy IDs, returns detailed policy information.

Base Command#

cs-falcon-cspm-list-policy-details

Input#

Argument NameDescriptionRequired
policy_idsComma-separated list of policy IDs to look for.Required

Context Output#

PathTypeDescription
CrowdStrike.CSPMPolicy.IDIntegerThe policy ID.
CrowdStrike.CSPMPolicy.CreatedAtDateThe creation date.
CrowdStrike.CSPMPolicy.UpdatedAtDateThe update date.
CrowdStrike.CSPMPolicy.DeletedAtDateThe deletion date.
CrowdStrike.CSPMPolicy.descriptionStringThe policy description.
CrowdStrike.CSPMPolicy.policy_statementStringThe policy statement.
CrowdStrike.CSPMPolicy.policy_remediationStringThe policy remediation.
CrowdStrike.CSPMPolicy.cloud_service_subtypeStringThe cloud service subtype.
CrowdStrike.CSPMPolicy.cloud_documentStringThe cloud document.
CrowdStrike.CSPMPolicy.mitre_attack_cloud_matrixStringURL to the MITRE attack tactics.
CrowdStrike.CSPMPolicy.mitre_attack_cloud_subtypeStringURL to the MITRE attack techniques.
CrowdStrike.CSPMPolicy.alert_logicStringThe alert logic.
CrowdStrike.CSPMPolicy.api_commandStringThe API command.
CrowdStrike.CSPMPolicy.cli_commandStringThe CLI command.
CrowdStrike.CSPMPolicy.cloud_platform_typeStringThe cloud platform type.
CrowdStrike.CSPMPolicy.cloud_service_typeStringThe cloud service type.
CrowdStrike.CSPMPolicy.default_severityStringThe default severity.
CrowdStrike.CSPMPolicy.cis_benchmark_idsArrayThe CIS benchmark IDs.
CrowdStrike.CSPMPolicy.nist_benchmark_idsArrayThe NIST benchmark IDs.
CrowdStrike.CSPMPolicy.pci_benchmark_idsArrayThe PCI benchmark IDs.
CrowdStrike.CSPMPolicy.policy_typeStringThe policy type.
CrowdStrike.CSPMPolicy.tactic_urlStringThe tactic URL.
CrowdStrike.CSPMPolicy.technique_urlStringThe technique URL.
CrowdStrike.CSPMPolicy.tacticStringThe tactic used.
CrowdStrike.CSPMPolicy.techniqueStringThe technique used.
CrowdStrike.CSPMPolicy.tactic_idStringThe tactic ID.
CrowdStrike.CSPMPolicy.technique_idStringThe technique ID.
CrowdStrike.CSPMPolicy.attack_typesArrayThe attack types.
CrowdStrike.CSPMPolicy.asset_type_idIntegerThe asset type ID.
CrowdStrike.CSPMPolicy.cloud_asset_typeStringThe cloud asset type.
CrowdStrike.CSPMPolicy.is_remediableBooleanWhether the policy is remediable or not.
CrowdStrike.CSPMPolicy.is_enabledBooleanWhether the policy is enabled or not.
CrowdStrike.CSPMPolicy.account_scopeStringThe account scope.

Command Example#

!cs-falcon-cspm-list-policy-details policy_ids=1,2

Context Example#

{
"CrowdStrike": {
"CSPMPolicy": [
{
"CreatedAt": "2020-08-18T08:30:21.760579Z",
"DeletedAt": null,
"ID": 1,
"UpdatedAt": "2023-06-21T18:47:44.371539Z",
"account_scope": "",
"alert_logic": "1. List all IAM users.|\n2. Filter on users with active access keys.|\n3. Filter on access keys that have not been rotated in 90 days.|\n4. Alert on each user.",
"api_command": "ListUsers, ListAccessKeys",
"asset_type_id": 8,
"attack_types": [
"Credential policy violation"
],
"cis_benchmark_ids": [
108,
641,
740
],
"cli_command": "aws2 iam list-users, aws2 iam list-access-keys",
"cloud_asset_type": "user",
"cloud_document": "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html",
"cloud_platform_type": "aws",
"cloud_service_subtype": "Access Keys",
"cloud_service_type": "IAM",
"default_severity": "informational",
"description": "Because IAM access keys are long-term credentials, as time goes on, the risk of these keys being exposed is increased.\n\nKeys are often left on old servers, accidentally published through Git, or stolen from developer machines. The longer the keys are valid, the more likely they are to be discovered in one of these places. By ensuring keys are rotated at least every 90 days, you can be confident that if those keys are discovered, they cannot be abused.",
"is_enabled": true,
"is_remediable": false,
"mitre_attack_cloud_matrix": "https://attack.mitre.org/tactics/TA0006/",
"mitre_attack_cloud_subtype": "https://attack.mitre.org/techniques/T1528/",
"nist_benchmark_ids": [
2,
3,
281,
941
],
"pci_benchmark_ids": [
120
],
"policy_remediation": "Step 1. From the AWS Console, navigate to the IAM page.|\nStep 2. Locate and click on the offending IAM User.|\nStep 3. Click on the Security Credentials tab.|\nStep 4. Navigate to the Access Keys section and choose between making the access key inactive, deleting the key, or rotating the key.",
"policy_statement": "IAM user access key active longer than 90 days",
"policy_type": "Configuration",
"tactic": "Credential Access",
"tactic_id": "TA0006",
"tactic_url": "https://attack.mitre.org/tactics/TA0006/",
"technique": "Steal Application Access Token",
"technique_id": "T1528",
"technique_url": "https://attack.mitre.org/techniques/T1528/"
},
{
"CreatedAt": "2022-10-19T15:00:00Z",
"DeletedAt": null,
"ID": 2,
"UpdatedAt": "2023-07-20T19:14:47.972998Z",
"account_scope": "",
"alert_logic": "1. List Launch Configurations.|\n2. Decode Base64-encoded User Data field.|\n3. Search for strings indicating credentials are present.|\n4. Alert on each instance.",
"api_command": "DescribeLaunchConfigurations",
"asset_type_id": 81,
"cis_benchmark_ids": [
714
],
"cisa_benchmark_ids": [
16
],
"cli_command": "aws autoscaling describe-launch-configurations",
"cloud_asset_type": "launchconfig",
"cloud_document": "https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/user-data.html",
"cloud_platform_type": "aws",
"cloud_service_type": "Auto Scaling",
"default_severity": "informational",
"description": "EC2 instance data is used to pass start up information into the EC2 instance. This User Data must not contain any sort of credentials. Instead, use an IAM Instance Profile assigned to the instance to grant access to other AWS Services.",
"is_enabled": true,
"is_remediable": false,
"iso_benchmark_ids": [
10,
15,
62,
63
],
"mitre_attack_cloud_matrix": "https://attack.mitre.org/tactics/TA0006/",
"mitre_attack_cloud_subtype": "https://attack.mitre.org/techniques/T1552/005/",
"nist_benchmark_ids": [
16,
65,
66,
531
],
"policy_remediation": "Step 1. From the console navigate to the EC2 page.|\nStep 2. From the sub-menu, click on 'Launch Configurations' under 'Auto Scaling'.|\nStep 3. Select the offending launch configuration.|\nStep 4. Scroll down to the 'Details' section and click 'View user data'.|\nStep 5. Validate whether or not any credentials are present.|\nStep 6. If credentials are present, re-create the launch configuration without exposing any credentials in the user data field.",
"policy_statement": "Auto Scaling group launch configuration User Data with potential credentials exposed",
"policy_type": "Configuration",
"soc2_benchmark_ids": [
15,
17
],
"tactic": "Credential Access",
"tactic_id": "TA0006",
"tactic_url": "https://attack.mitre.org/tactics/TA0006/",
"technique": "Unsecured Credentials: Cloud Instance Metadata API",
"technique_id": "T1552.005",
"technique_url": "https://attack.mitre.org/techniques/T1552/005/"
}
]
}
}

Human Readable Output#

CSPM Policy Details:#

IdDescriptionPolicy StatementPolicy RemediationCloud Service SubtypeCloud Platform TypeCloud Service TypeDefault SeverityPolicy TypeTacticTechnique
1Because IAM access keys are long-term credentials, as time goes on, the risk of these keys being exposed is increased.

Keys are often left on old servers, accidentally published through Git, or stolen from developer machines. The longer the keys are valid, the more likely they are to be discovered in one of these places. By ensuring keys are rotated at least every 90 days, you can be confident that if those keys are discovered, they cannot be abused.
IAM user access key active longer than 90 daysStep 1. From the AWS Console, navigate to the IAM page.|
Step 2. Locate and click on the offending IAM User.|
Step 3. Click on the Security Credentials tab.|
Step 4. Navigate to the Access Keys section and choose between making the access key inactive, deleting the key, or rotating the key.
Access KeysawsIAMinformationalConfigurationCredential AccessSteal Application Access Token
2EC2 instance data is used to pass start up information into the EC2 instance. This User Data must not contain any sort of credentials. Instead, use an IAM Instance Profile assigned to the instance to grant access to other AWS Services.Auto Scaling group launch configuration User Data with potential credentials exposedStep 1. From the console navigate to the EC2 page.|
Step 2. From the sub-menu, click on 'Launch Configurations' under 'Auto Scaling'.|
Step 3. Select the offending launch configuration.|
Step 4. Scroll down to the 'Details' section and click 'View user data'.|
Step 5. Validate whether or not any credentials are present.|
Step 6. If credentials are present, re-create the launch configuration without exposing any credentials in the user data field.
awsAuto ScalinginformationalConfigurationCredential AccessUnsecured Credentials: Cloud Instance Metadata API

cs-falcon-cspm-list-service-policy-settings#


Returns information about current policy settings.

Base Command#

cs-falcon-cspm-list-service-policy-settings

Input#

Argument NameDescriptionRequired
policy_idThe policy ID.Optional
cloud_platformThe cloud provider. Possible values are: aws, gcp, azure. Default is aws.Optional
serviceService type to filter by.Optional
limitThe maximum number of entities to list. Default is 50.Optional

Context Output#

PathTypeDescription
CrowdStrike.CSPMPolicySetting.is_remediableBooleanWhether the policy setting is remediable or not.
CrowdStrike.CSPMPolicySetting.created_atStringThe creation date.
CrowdStrike.CSPMPolicySetting.updated_atStringThe update date.
CrowdStrike.CSPMPolicySetting.policy_idIntegerThe policy ID.
CrowdStrike.CSPMPolicySetting.nameStringThe policy setting name.
CrowdStrike.CSPMPolicySetting.policy_typeStringThe policy type.
CrowdStrike.CSPMPolicySetting.cloud_service_subtypeStringThe cloud service subtype.
CrowdStrike.CSPMPolicySetting.cloud_serviceStringThe cloud service.
CrowdStrike.CSPMPolicySetting.cloud_service_friendlyStringThe cloud friendly service.
CrowdStrike.CSPMPolicySetting.cloud_asset_typeStringThe cloud asset type.
CrowdStrike.CSPMPolicySetting.cloud_asset_type_idIntegerThe cloud asset type ID.
CrowdStrike.CSPMPolicySetting.cloud_providerStringThe cloud provider.
CrowdStrike.CSPMPolicySetting.default_severityStringThe default severity.
CrowdStrike.CSPMPolicySetting.policy_timestampDateThe policy timestamp.
CrowdStrike.CSPMPolicySetting.policy_settingsArrayAn array that holds policy settings.
CrowdStrike.CSPMPolicySetting.policy_settings.account_idStringThe account ID correlated to the policy.
CrowdStrike.CSPMPolicySetting.policy_settings.regionsArrayThe regions in which the policy is configured.
CrowdStrike.CSPMPolicySetting.policy_settings.severityStringThe severity of the policy.
CrowdStrike.CSPMPolicySetting.policy_settings.enabledBooleanWhether the policy settings are enabled or not.
CrowdStrike.CSPMPolicySetting.policy_settings.tag_excludedBooleanWhether the tag is excluded or not.
CrowdStrike.CSPMPolicySetting.cis_benchmarkArrayAn array of CIS benchmark details.
CrowdStrike.CSPMPolicySetting.cis_benchmark.idIntegerThe CIS benchmark ID.
CrowdStrike.CSPMPolicySetting.cis_benchmark.benchmark_shortStringThe CIS benchmark shortname.
CrowdStrike.CSPMPolicySetting.cis_benchmark.recommendation_numberStringThe CIS benchmark recommendation number.
CrowdStrike.CSPMPolicySetting.pci_benchmarkArrayAn array of PCI benchmark details.
CrowdStrike.CSPMPolicySetting.pci_benchmark.idIntegerThe PCI benchmark ID.
CrowdStrike.CSPMPolicySetting.pci_benchmark.benchmark_shortStringThe PCI benchmark shortname.
CrowdStrike.CSPMPolicySetting.pci_benchmark.recommendation_numberStringThe PCI benchmark recommendation number.
CrowdStrike.CSPMPolicySetting.nist_benchmarkArrayAn array of NIST benchmark details.
CrowdStrike.CSPMPolicySetting.nist_benchmark.idIntegerThe NIST benchmark ID.
CrowdStrike.CSPMPolicySetting.nist_benchmark.benchmark_shortStringThe NIST benchmark shortname.
CrowdStrike.CSPMPolicySetting.nist_benchmark.recommendation_numberStringThe NIST benchmark recommendation number.
CrowdStrike.CSPMPolicySetting.attack_typesArrayThe attack types.

Command Example#

!cs-falcon-cspm-list-service-policy-settings limit=2

Context Example#

{
"CrowdStrike": {
"CSPMPolicySetting": [
{
"cis_benchmark": [
{
"benchmark_short": "CIS Controls v8",
"id": 722,
"recommendation_number": "3.11"
}
],
"cloud_asset_type": "filesystem",
"cloud_asset_type_id": 107,
"cloud_provider": "aws",
"cloud_service": "efs",
"cloud_service_friendly": "EFS",
"cloud_service_subtype": "N/A",
"created_at": "2022-08-02T22:17:56.53081Z",
"default_severity": "informational",
"fql_policy": "aws_encrypted:['true']+aws_kms_key_id:['']",
"is_remediable": false,
"name": "EFS File System is encrypted without CMK",
"nist_benchmark": [
{
"benchmark_short": "NIST 800-53 REV 5",
"id": 932,
"recommendation_number": "SC-8(1)"
},
{
"benchmark_short": "NIST 800-53 REV 5",
"id": 989,
"recommendation_number": "SC-28(1)"
}
],
"pci_benchmark": [
{
"benchmark_short": "PCI DSS v3.2.1",
"id": 41,
"recommendation_number": "3.4"
}
],
"policy_id": 1,
"policy_settings": [
{
"account_id": "537409938058",
"enabled": true,
"regions": [
"af-south-1",
"ap-east-1",
"ap-northeast-1",
"ap-northeast-2",
"ap-northeast-3"
],
"severity": "informational",
"tag_excluded": false
}
],
"policy_timestamp": "0001-01-01T00:00:00Z",
"policy_type": "Configuration",
"updated_at": "2023-07-19T17:31:45.372476Z"
},
{
"cis_benchmark": [
{
"benchmark_short": "CIS 1.4.0 AWS Foundations",
"id": 143,
"recommendation_number": "4.13"
}
],
"cloud_asset_type": "awsaccount",
"cloud_asset_type_id": 116,
"cloud_provider": "aws",
"cloud_service": "awsaccount",
"cloud_service_friendly": "CloudWatch",
"cloud_service_subtype": "Route Table",
"created_at": "2023-01-04T19:57:23.897865Z",
"default_severity": "informational",
"is_remediable": false,
"iso_benchmark": [
{
"benchmark_short": "ISO",
"id": 25,
"recommendation_number": "5.25"
}
],
"name": "CloudWatch log metric filter and alarm missing for changes to route tables",
"nist_benchmark": [
{
"benchmark_short": "NIST 800-53 REV 5",
"id": 184,
"recommendation_number": "AU-6(1)"
},
{
"benchmark_short": "NIST 800-53 REV 5",
"id": 183,
"recommendation_number": "AU-6"
}
],
"pci_benchmark": [
{
"benchmark_short": "PCI DSS v4.0",
"id": 428,
"recommendation_number": "10.4.1"
}
],
"policy_id": 2,
"policy_settings": [
{
"account_id": "537409938058",
"enabled": true,
"regions": [
"af-south-1",
"ap-east-1"
],
"severity": "informational",
"tag_excluded": false
}
],
"policy_timestamp": "0001-01-01T00:00:00Z",
"policy_type": "Configuration",
"soc2_benchmark": [
{
"benchmark_short": "TSC 2017 rev 2020",
"id": 27,
"recommendation_number": "CC7.3"
}
],
"updated_at": "2023-09-18T16:11:58.369644Z"
}
]
}
}

Human Readable Output#

CSPM Policy Settings:#

Policy IdIs RemediableRemediation SummaryNamePolicy TypeCloud Service SubtypeCloud ServiceDefault Severity
1falseEFS File System is encrypted without CMKConfigurationN/Aefsinformational
2falseCloudWatch log metric filter and alarm missing for changes to route tablesConfigurationRoute Tableawsaccountinformational

cs-falcon-cspm-update-policy_settings#


Updates a policy setting. Can be used to override policy severity or to disable a policy entirely.

Base Command#

cs-falcon-cspm-update-policy_settings

Input#

Argument NameDescriptionRequired
policy_idPolicy ID to be updated.Required
account_idCloud account ID to impact.Optional
enabledFlag indicating if this policy is enabled. Possible values are: false, true. Default is true.Optional
regionsA comma-separated list of regions where this policy is enforced.Optional
severityPolicy severity value. Possible values are: critical, high, medium, informational.Optional
tag_excludedTag exclusion flag. Possible values are: false, true.Optional

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-cspm-update-policy_settings policy_id=1 enabled=true regions="eu-central-1,eu-central-2" severity=high tag_excluded=false

Human Readable Output#

Policy 1 was updated successfully

cs-falcon-resolve-identity-detection#


Perform actions on identity detection alerts.

Base Command#

cs-falcon-resolve-identity-detection

Input#

Argument NameDescriptionRequired
idsA comma-separated list of IDs of the alerts to update.Required
assign_to_nameAssign the specified detections to a user based on their username.Optional
assign_to_uuidAssign the specified detections to a user based on their UUID.Optional
append_commentAppends a new comment to any existing comments for the specified detections.Optional
add_tagAdd a tag to the specified detections.Optional
remove_tagRemove a tag from the specified detections.Optional
update_statusUpdate the status of the alert to the specified value. Possible values are: new, in_progress, closed, reopened.Optional
unassignWhether to unassign any assigned users to the specified detections. Possible values are: false, true.Optional
show_in_uiIf true, displays the detection in the UI. Possible values are: false, true.Optional

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-resolve-identity-detection ids="id_1,id_2" add_tag="Demo tag" append_comment="Demo comment" assign_to_name="morganf" show_in_ui=true update_status=in_progress

Human Readable Output#

IDP Detection(s) id_1, id_2 were successfully updated

cs-falcon-resolve-mobile-detection#


Perform actions on mobile detection alerts.

Base Command#

cs-falcon-resolve-mobile-detection

Input#

Argument NameDescriptionRequired
idsA comma-separated list of IDs of the alerts to update.Required
assign_to_nameAssign the specified detections to a user based on their username.Optional
assign_to_uuidAssign the specified detections to a user based on their UUID.Optional
append_commentAppends a new comment to any existing comments for the specified detections.Optional
add_tagAdd a tag to the specified detections.Optional
remove_tagRemove a tag from the specified detections.Optional
update_statusUpdate the status of the alert to the specified value. Possible values are: new, in_progress, closed, reopened.Optional
unassignWhether to unassign any assigned users to the specified detections. Possible values are: false, true.Optional
show_in_uiIf true, displays the detection in the UI. Possible values are: false, true.Optional

Context Output#

There is no context output for this command.

Command Example#

!cs-falcon-resolve-mobile-detection ids="id_1,id_2" add_tag="Demo tag" append_comment="Demo comment" assign_to_name="morganf" show_in_ui=true update_status=in_progress

Human Readable Output#

Mobile Detection(s) id_1, id_2 were successfully updated

cs-falcon-list-users#


List users.

Base Command#

cs-falcon-list-users

Input#

Argument NameDescriptionRequired
idA comma-separated list of IDs (UUIDs) of specific users to list.Optional
filterThe filter expression that should be used to limit the results. FQL syntax. Available values: assigned_cids, cid, first_name, last_name, name, uid. Example: "first_name:'John'".Optional
offsetThe integer offset to start retrieving records from.Optional
limitThe maximum number of records to return. Default is 50.Optional

Context Output#

PathTypeDescription
CrowdStrike.Users.uuidStringThe user's UUID.
CrowdStrike.Users.cidStringThe customer ID.
CrowdStrike.Users.uidStringThe user's ID.
CrowdStrike.Users.first_nameStringThe user's first name.
CrowdStrike.Users.last_nameStringThe user's last name.
CrowdStrike.Users.last_login_atStringThe timestamp of the user's last login.
CrowdStrike.Users.created_atStringThe timestamp of the user's creation.

cs-falcon-get-incident-behavior#


Get incident behavior information.

Base Command#

cs-falcon-get-incident-behavior

Input#

Argument NameDescriptionRequired
behavior_idsA comma-separated list of ID(s) of behaviors to list. Behavior IDs can be retrieved by running the 'cs-falcon-get-detections-for-incident' command.Required

Context Output#

PathTypeDescription
CrowdStrike.IncidentBehavior.behavior_idStringThe behavior ID.
CrowdStrike.IncidentBehavior.cidStringThe customer ID.
CrowdStrike.IncidentBehavior.aidStringThe agent ID.
CrowdStrike.IncidentBehavior.incident_idStringThe incident ID.
CrowdStrike.IncidentBehavior.incident_idsListThe incident IDs.
CrowdStrike.IncidentBehavior.pattern_idNumberThe pattern ID.
CrowdStrike.IncidentBehavior.template_instance_idNumberThe template instance ID.
CrowdStrike.IncidentBehavior.timestampStringThe timestamp.
CrowdStrike.IncidentBehavior.cmdlineStringThe command line.
CrowdStrike.IncidentBehavior.filepathStringThe file path.
CrowdStrike.IncidentBehavior.domainStringThe domain.
CrowdStrike.IncidentBehavior.pattern_dispositionNumberThe pattern disposition.
CrowdStrike.IncidentBehavior.pattern_disposition_details.indicatorBooleanWhether the pattern disposition is an indicator.
CrowdStrike.IncidentBehavior.pattern_disposition_details.detectBooleanWhether the pattern disposition is a detect.
CrowdStrike.IncidentBehavior.pattern_disposition_details.inddet_maskBooleanThe pattern disposition indicator detect mask.
CrowdStrike.IncidentBehavior.pattern_disposition_details.sensor_onlyBooleanWhether the pattern disposition is sensor only.
CrowdStrike.IncidentBehavior.pattern_disposition_details.rootingBooleanWhether the pattern disposition is rooting.
CrowdStrike.IncidentBehavior.pattern_disposition_details.kill_processBooleanWhether the process was killed.
CrowdStrike.IncidentBehavior.pattern_disposition_details.kill_subprocessBooleanWhether the subprocess was killed.
CrowdStrike.IncidentBehavior.pattern_disposition_details.quarantine_machineBooleanWhether the machine was quarantined.
CrowdStrike.IncidentBehavior.pattern_disposition_details.quarantine_fileBooleanWhether the file was quarantined.
CrowdStrike.IncidentBehavior.pattern_disposition_details.policy_disabledBooleanWhether the policy was disabled.
CrowdStrike.IncidentBehavior.pattern_disposition_details.kill_parentBooleanWhether the parent was killed.
CrowdStrike.IncidentBehavior.pattern_disposition_details.operation_blockedBooleanWhether the operation was blocked.
CrowdStrike.IncidentBehavior.pattern_disposition_details.process_blockedBooleanWhether the process was blocked.
CrowdStrike.IncidentBehavior.pattern_disposition_details.registry_operation_blockedBooleanWhether the registry operation was blocked.
CrowdStrike.IncidentBehavior.pattern_disposition_details.critical_process_disabledBooleanWhether the critical process was disabled.
CrowdStrike.IncidentBehavior.pattern_disposition_details.bootup_safeguard_enabledBooleanWhether the bootup safeguard was enabled.
CrowdStrike.IncidentBehavior.pattern_disposition_details.fs_operation_blockedBooleanWhether the file system operation was blocked.
CrowdStrike.IncidentBehavior.pattern_disposition_details.handle_operation_downgradedBooleanWhether the handle operation was downgraded.
CrowdStrike.IncidentBehavior.pattern_disposition_details.kill_action_failedBooleanWhether the kill action failed.
CrowdStrike.IncidentBehavior.pattern_disposition_details.blocking_unsupportedBooleanWhether the blocking is unsupported.
CrowdStrike.IncidentBehavior.pattern_disposition_details.suspend_processBooleanWhether the process was suspended.
CrowdStrike.IncidentBehavior.pattern_disposition_details.suspend_parentBooleanWhether the parent was suspended.
CrowdStrike.IncidentBehavior.sha256StringThe SHA256 hash.
CrowdStrike.IncidentBehavior.user_nameStringThe username.
CrowdStrike.IncidentBehavior.tacticStringThe tactic used.
CrowdStrike.IncidentBehavior.tactic_idStringThe tactic ID.
CrowdStrike.IncidentBehavior.techniqueStringThe technique used.
CrowdStrike.IncidentBehavior.technique_idStringThe technique ID.
CrowdStrike.IncidentBehavior.display_nameStringThe display name.
CrowdStrike.IncidentBehavior.objectiveStringThe objective.
CrowdStrike.IncidentBehavior.compound_ttoStringThe compound Time to Operate (TTO).

cs-falcon-get-ioarules#


Get IOA Rules.

Base Command#

cs-falcon-get-ioarules

Input#

Argument NameDescriptionRequired
rule_idsA comma-separated list of rule IDs to get IOA rules for.Required

Context Output#

PathTypeDescription
CrowdStrike.IOARules.instance_idStringThe IOA rule's instance ID.
CrowdStrike.IOARules.customer_idStringThe customer ID.
CrowdStrike.IOARules.action_labelStringThe IOA rule's action label.
CrowdStrike.IOARules.commentStringThe IOA rule's comment.
CrowdStrike.IOARules.committed_onStringThe timestamp of the IOA rule's commitment.
CrowdStrike.IOARules.created_byStringThe IOA rule's creator.
CrowdStrike.IOARules.created_onStringThe timestamp of the IOA rule's creation.
CrowdStrike.IOARules.deletedBooleanWhether the IOA rule is in a deleted status.
CrowdStrike.IOARules.descriptionStringThe IOA rule's description.
CrowdStrike.IOARules.disposition_idStringThe disposition ID used by the IOA rule.
CrowdStrike.IOARules.enabledBooleanWhether the IOA rule is enabled.
CrowdStrike.IOARules.field_valuesStringThe IOA rule's field values.
CrowdStrike.IOARules.instance_versionStringThe IOA rule's instance version.
CrowdStrike.IOARules.magic_cookieStringThe IOA rule's magic cookie.
CrowdStrike.IOARules.modified_byStringThe last user who modified the IOA rule.
CrowdStrike.IOARules.modified_onStringThe timestamp of the IOA rule's last modification.
CrowdStrike.IOARules.nameStringThe IOA rule name.
CrowdStrike.IOARules.pattern_idStringThe IOA rule's pattern ID.
CrowdStrike.IOARules.pattern_severityStringThe IOA rule's pattern severity.
CrowdStrike.IOARules.rulegroup_idStringThe IOA rule's rule group ID.
CrowdStrike.IOARules.ruletype_idStringThe IOA rule's rule type ID.
CrowdStrike.IOARules.ruletype_nameStringThe IOA rule's rule type name.
CrowdStrike.IOARules.version_idsStringThe IOA rule's version ID.

Spotlight#

Using Spotlight APIs#

Spotlight identifies and gives info about specific vulnerabilities on your hosts using the Falcon sensor.

Required API client scope#

To access the Spotlight API, your API client must be assigned the spotlight-vulnerabilities:read scope.

Validating API data#

The Falcon sensor continuously monitors hosts for any changes and reports them as they occur. Depending on the timing of requests, Spotlight APIs can return values that are different from those shown by the Falcon console or an external source. There are other factors that can cause differences between API responses and other data sources.

API query syntax#

If an API query doesn’t exactly match the query used on the Spotlight Vulnerabilities page, the values might differ.

Expired vulnerabilities in Spotlight APIs#

If a host is deleted or inactive for 45 days, the status of vulnerabilities on that host changes to expired. Expired vulnerabilities are removed from Spotlight after 3 days. Expired vulnerabilities are only visible in API responses and are not included in reports or the Falcon console. An external data source might not use the same data retention policy, which can lead to discrepancies with Spotlight APIs. For more info, see Data retention in Spotlight [https://falcon.crowdstrike.com/login/?next=%2Fdocumentation%2F43%2Ffalcon-spotlight-overview#data-retention-in-spotlight].

The following commands uses the Spotlight API:#

cs-falcon-spotlight-search-vulnerability#


Retrieve vulnerability details according to the selected filter. Each request requires at least one filter parameter. Supported with the CrowdStrike Spotlight license.

Base Command#

cs-falcon-spotlight-search-vulnerability

Input#

Argument NameDescriptionRequired
filterLimit the vulnerabilities returned to specific properties. Each value must be enclosed in single quotes and placed immediately after the colon with no space. For example, 'filter=status:'open'+cve.id:['CVE-2013-3900','CVE-2021-1675']'.Optional
aidA comma-separated list of unique agent identifiers (AIDs) of a sensor.Optional
cve_idA comma-separated list of unique identifiers for a vulnerability as cataloged in the National Vulnerability Database (NVD). This filter supports multiple values and negation.Optional
cve_severityA comma-separated list of severities of the CVE. The possible values are: CRITICAL, HIGH, MEDIUM, LOW, UNKNOWN, or NONE.Optional
tagsA comma-separated list of names of a tag assigned to a host. Retrieve tags from Host Tags APIs.Optional
statusStatus of a vulnerability. This filter supports multiple values and negation. The possible values are: open, closed, reopen, expired.Optional
platform_nameOperating system platform. This filter supports negation. The possible values are: Windows, Mac, Linux.Optional
host_groupA comma-separated list of unique system-assigned IDs of a host group. Retrieve the host group ID from Host Group APIs.Optional
host_typeA comma-separated list of types of hosts a sensor is running on.Optional
last_seen_withinFilter for vulnerabilities based on the number of days since a host last connected to CrowdStrike Falcon. Enter a numeric value from 3 to 45 to indicate the number of days to look back. For example, last_seen_within:10.Optional
is_suppressedIndicates if the vulnerability is suppressed by a suppression rule. Possible values are: true, false.Optional
display_remediation_infoDisplay remediation information type of data to be returned for each vulnerability entity. Possible values are: True, False. Default is True.Optional
display_evaluation_logic_infoWhether to return logic information type of data for each vulnerability entity. Possible values are: True, False. Default is True.Optional
display_host_infoWhether to return host information type of data for each vulnerability entity. Possible values are: True, False. Default is False.Optional
limitMaximum number of items to return (1-5000). Default is 50.Optional

Context Output#

PathTypeDescription
CrowdStrike.Vulnerability.idStringUnique system-assigned ID of the vulnerability.
CrowdStrike.Vulnerability.cidStringUnique system-generated customer identifier (CID) of the account.
CrowdStrike.Vulnerability.aidStringUnique agent identifier (AID) of the sensor where the vulnerability was found.
CrowdStrike.Vulnerability.created_timestampDateUTC date and time of when the vulnerability was created in Spotlight.
CrowdStrike.Vulnerability.updated_timestampDateUTC date and time of the last update made on the vulnerability.
CrowdStrike.Vulnerability.statusStringVulnerability's current status. Possible values are: open, closed, reopen, or expired.
CrowdStrike.Vulnerability.apps.product_name_versionStringName and version of the product associated with the vulnerability.
CrowdStrike.Vulnerability.apps.sub_statusStringStatus of each product associated with the vulnerability. Possible values are: open, closed, or reopen.
CrowdStrike.Vulnerability.apps.remediation.idsStringRemediation ID of each product associated with the vulnerability.
CrowdStrike.Vulnerability.host_info.hostnameStringName of the machine.
CrowdStrike.Vulnerability.host_info.instance_idStringCloud instance ID of the host.
CrowdStrike.Vulnerability.host_info.service_provider_account_idStringCloud service provider account ID for the host.
CrowdStrike.Vulnerability.host_info.service_providerStringCloud service provider for the host.
CrowdStrike.Vulnerability.host_info.os_buildStringOperating system build.
CrowdStrike.Vulnerability.host_info.product_type_descStringType of host a sensor is running on.
CrowdStrike.Vulnerability.host_info.local_ipStringDevice's local IP address.
CrowdStrike.Vulnerability.host_info.machine_domainStringActive directory domain name.
CrowdStrike.Vulnerability.host_info.os_versionStringOperating system version.
CrowdStrike.Vulnerability.host_info.ouStringActive directory organizational unit name.
CrowdStrike.Vulnerability.host_info.site_nameStringActive directory site name.
CrowdStrike.Vulnerability.host_info.system_manufacturerStringName of the system manufacturer.
CrowdStrike.Vulnerability.host_info.groups.idStringArray of host group IDs that the host is assigned to.
CrowdStrike.Vulnerability.host_info.groups.nameStringArray of host group names that the host is assigned to.
CrowdStrike.Vulnerability.host_info.tagsStringName of a tag assigned to a host.
CrowdStrike.Vulnerability.host_info.platformStringOperating system platform. This filter supports negation.
CrowdStrike.Vulnerability.remediation.entities.idStringUnique ID of the remediation.
CrowdStrike.Vulnerability.remediation.entities.referenceStringRelevant reference for the remediation that can be used to get additional details for the remediation.
CrowdStrike.Vulnerability.remediation.entities.titleStringShort description of the remediation.
CrowdStrike.Vulnerability.remediation.entities.actionStringExpanded description of the remediation.
CrowdStrike.Vulnerability.remediation.entities.linkStringLink to the remediation page for the vendor. In certain cases, this field is null.
CrowdStrike.Vulnerability.cve.idStringUnique identifier for a vulnerability as cataloged in the National Vulnerability Database (NVD).
CrowdStrike.Vulnerability.cve.base_scoreNumberBase score of the CVE (float value between 1 and 10).
CrowdStrike.Vulnerability.cve.severityStringCVSS severity rating of the vulnerability.
CrowdStrike.Vulnerability.cve.exploit_statusNumberNumeric value of the most severe known exploit.
CrowdStrike.Vulnerability.cve.exprt_ratingStringExPRT rating assigned by CrowdStrike's predictive AI rating system.
CrowdStrike.Vulnerability.cve.descriptionStringBrief description of the CVE.
CrowdStrike.Vulnerability.cve.published_dateDateUTC timestamp with the date and time of when the vendor published the CVE.
CrowdStrike.Vulnerability.cve.vendor_advisoryStringLink to the vendor page where the CVE was disclosed.
CrowdStrike.Vulnerability.cve.exploitability_scoreNumberExploitability score of the CVE (float values from 1-4).
CrowdStrike.Vulnerability.cve.impact_scoreNumberImpact score of the CVE (float values from 1-6).
CrowdStrike.Vulnerability.cve.vectorStringTextual representation of the metric values used to score the vulnerability.
CrowdStrike.Vulnerability.cve.remediation_levelStringCVSS remediation level of the vulnerability (U = Unavailable, or O = Official fix).
CrowdStrike.Vulnerability.cve.cisa_info.is_cisa_kevBooleanWhether to filter for vulnerabilities that are in the CISA Known Exploited Vulnerabilities (KEV) catalog.
CrowdStrike.Vulnerability.cve.cisa_info.due_dateDateDate before which CISA mandates subject organizations to patch the vulnerability.
CrowdStrike.Vulnerability.cve.spotlight_published_dateDateUTC timestamp with the date and time Spotlight enabled coverage for the vulnerability.
CrowdStrike.Vulnerability.cve.actorsStringAdversaries associated with the vulnerability.
CrowdStrike.Vulnerability.cve.nameStringThe vulnerability name.

Command Example#

cs-falcon-spotlight-search-vulnerability filter=status:['open','closed'] cve_id=CVE-2021-2222 cve_severity='LOW,HIGH' display_host_info=false display_evaluation_logic_info=false display_remediation_info=false limit=1

Context Example#

{
"resources": [
{
"id": "id_num",
"cid": "cid_num",
"aid": "aid_num",
"created_timestamp": "2021-07-13T01:12:57Z",
"updated_timestamp": "2022-10-27T18:32:21Z",
"status": "open",
"apps": [
{
"product_name_version": "product",
"sub_status": "open",
"remediation": {
"ids": [
"1234"
]
},
"evaluation_logic": {
"id": "1234"
}
}
],
"suppression_info": {
"is_suppressed": false
},
"cve": {
"id": "CVE-2021-2222",
"base_score": 5.5,
"severity": "MEDIUM",
"exploit_status": 0,
"exprt_rating": "LOW",
"remediation_level": "O",
"cisa_info": {
"is_cisa_kev": false
},
"spotlight_published_date": "2021-05-10T17:08:00Z",
"description": "description\n",
"published_date": "2021-02-25T23:15:00Z",
"vendor_advisory": [
"web address"
],
"exploitability_score": 1.8,
"impact_score": 3.6,
"vector": "vendor"
}
}
]
}

Human Readable Output#

CVE IDCVE SeverityCVE Base ScoreCVE Published DateCVE Impact ScoreCVE Exploitability ScoreCVE Vector
CVE-2021-2222LOW5.52021-05-10T17:08:00Z3.60vendor

cs-falcon-spotlight-list-host-by-vulnerability#


Retrieve vulnerability details for a specific ID and host. Supported with the CrowdStrike Spotlight license.

Base Command#

cs-falcon-spotlight-list-host-by-vulnerability

Input#

Argument NameDescriptionRequired
limitMaximum number of items to return (1-5000). Default is 50.Optional
cve_idsUnique identifier for a vulnerability as cataloged in the National Vulnerability Database (NVD). This filter supports multiple values and negation.Required

Context Output#

PathTypeDescription
CrowdStrike.VulnerabilityHost.idStringUnique system-assigned ID of the vulnerability.
CrowdStrike.VulnerabilityHost.cidStringUnique system-generated customer identifier (CID) of the account.
CrowdStrike.VulnerabilityHost.aidStringUnique agent identifier (AID) of the sensor where the vulnerability was found.
CrowdStrike.VulnerabilityHost.created_timestampDateUTC date and time of when the vulnerability was created in Spotlight.
CrowdStrike.VulnerabilityHost.updated_timestampDateUTC date and time of the last update made on the vulnerability.
CrowdStrike.VulnerabilityHost.statusStringVulnerability's current status. Possible values are: open, closed, reopen, or expired.
CrowdStrike.VulnerabilityHost.apps.product_name_versionStringName and version of the product associated with the vulnerability.
CrowdStrike.VulnerabilityHost.apps.sub_statusStringStatus of each product associated with the vulnerability. Possible values are: open, closed, or reopen.
CrowdStrike.VulnerabilityHost.apps.remediation.idsStringRemediation ID of each product associated with the vulnerability.
CrowdStrike.VulnerabilityHost.apps.evaluation_logic.idStringUnique system-assigned ID of the vulnerability evaluation logic.
CrowdStrike.VulnerabilityHost.suppression_info.is_suppressedBooleanIndicates if the vulnerability is suppressed by a suppression rule.
CrowdStrike.VulnerabilityHost.host_info.hostnameStringName of the machine.
CrowdStrike.VulnerabilityHost.host_info.local_ipStringDevice's local IP address.
CrowdStrike.VulnerabilityHost.host_info.machine_domainStringActive directory domain name.
CrowdStrike.VulnerabilityHost.host_info.os_versionStringOperating system version.
CrowdStrike.VulnerabilityHost.host_info.ouStringActive directory organizational unit name.
CrowdStrike.VulnerabilityHost.host_info.site_nameStringActive directory site name.
CrowdStrike.VulnerabilityHost.host_info.system_manufacturerStringName of the system manufacturer.
CrowdStrike.VulnerabilityHost.host_info.platformStringOperating system platform. This filter supports negation.
CrowdStrike.VulnerabilityHost.host_info.instance_idStringCloud instance ID of the host.
CrowdStrike.VulnerabilityHost.host_info.service_provider_account_idStringCloud service provider account ID for the host.
CrowdStrike.VulnerabilityHost.host_info.service_providerStringCloud service provider for the host.
CrowdStrike.VulnerabilityHost.host_info.os_buildStringOperating system build.
CrowdStrike.VulnerabilityHost.host_info.product_type_descStringType of host a sensor is running on.
CrowdStrike.VulnerabilityHost.cve.idStringUnique identifier for a vulnerability as cataloged in the National Vulnerability Database (NVD).

Command Example#

cs-falcon-spotlight-list-host-by-vulnerability cve_ids=CVE-2021-2222

Context Example#

{
{
"id": "id",
"cid": "cid",
"aid": "aid",
"created_timestamp": "2021-09-16T15:12:42Z",
"updated_timestamp": "2022-10-19T00:54:43Z",
"status": "open",
"apps": [
{
"product_name_version": "prod",
"sub_status": "open",
"remediation": {
"ids": [
"id"
]
},
"evaluation_logic": {
"id": "id"
}
}
],
"suppression_info": {
"is_suppressed": false
},
"host_info": {
"hostname": "host",
"local_ip": "10.128.0.7",
"machine_domain": "",
"os_version": "version",
"ou": "",
"site_name": "",
"system_manufacturer": "manufactor",
"tags": [],
"platform": "Windows",
"instance_id": "instance id",
"service_provider_account_id": "id",
"service_provider": "id",
"os_build": "os build",
"product_type_desc": "Server"
},
"cve": {
"id": "CVE-20212-2222"
}
}
}

Human Readable Output#

CVE IDHost Info hostnameHost Info os VersionHost Info Product Type DescHost Info Local IPHost Info ouHost Info Machine DomainHost Info Site NameCVE Exploitability ScoreCVE Vector
CVE-20212-2222host1Serveripsite5.5

Troubleshooting#

  • When encountering connectivity or authorization errors within Cortex XSOAR 8, it is necessary to include the IP address corresponding to the relevant region in the CrowdStrike Falcon allow list.
  • When encountering a 429 error code returned from Crowdstrike Falcon within Cortex XSOAR 8, the solution is to use an engine as explained in this link.