-
Notifications
You must be signed in to change notification settings - Fork 72
Get FalconCloudIoa
bk-cs edited this page Sep 3, 2024
·
1 revision
Search for Falcon Cloud Security Indicators of Attack
Requires 'CSPM registration: Read'.
Name | Type | Description | Min | Max | Allowed | Pipeline | PipelineByName |
---|---|---|---|---|---|---|---|
CloudPlatform | String | Cloud platform |
aws azure
|
||||
AccountId | String | Cloud account identifier | X | ||||
AwsAccountId | String | AWS account identifier | X | ||||
AzureSubscriptionId | String | Azure subscription identifier | X | ||||
AzureTenantId | String | Azure tenant identifier | X | ||||
ResourceId | String[] | Resource identifier | |||||
ResourceUuid | String[] | Resource UUID | |||||
Severity | String | Indicator of Attack severity |
High Medium Informational
|
||||
Service | String | Cloud service |
ACM ACR Any App Engine AppService BigQuery Cloud Load Balancing Cloud Logging Cloud SQL Cloud Storage CloudFormation CloudTrail CloudWatch Logs Cloudfront Compute Engine Config Disk DynamoDB EBS EC2 ECR EFS EKS ELB EMR Elasticache GuardDuty IAM Identity KMS KeyVault Kinesis Kubernetes Lambda LoadBalancer Monitor NLB/ALB NetworkSecurityGroup PostgreSQL RDS Redshift S3 SES SNS SQLDatabase SQLServer SQS SSM Serverless Application Repository StorageAccount Subscriptions VPC VirtualMachine VirtualNetwork
|
||||
State | String | Indicator of Attack state |
open closed
|
||||
Since | String | Filter events using a duration string (e.g. 24h) | |||||
DateTimeSince | String | Include results that occur after a specific date and time (RFC3339) | |||||
Limit | Int32 | Maximum number of results per request | 1 |
1000 |
|||
NextToken | String | Pagination token to retrieve the next set of results | |||||
All | Switch | Repeat requests until all available results are retrieved | |||||
Total | Switch | Display total result count instead of results |
Get-FalconCloudIoa [-CloudPlatform] <String> [[-AccountId] <String>] [[-AwsAccountId] <String>] [[-AzureSubscriptionId] <String>] [[-AzureTenantId] <String>] [[-ResourceId] <String[]>] [[-ResourceUuid] <String[]>] [[-Severity] <String>] [[-Service] <String>] [[-State] <String>] [[-Since] <String>] [[-DateTimeSince] <String>] [[-Limit] <Int32>] [-NextToken <String>] [-All] [-Total] [-WhatIf] [-Confirm] [<CommonParameters>]
GET /detects/entities/ioa/v1
2024-09-03: PSFalcon v2.2.7
- Using PSFalcon
-
Commands by Permission
- Actors (Falcon Intelligence)
- Alerts
- API integrations
- App Logs
- Channel File Control Settings
- Configuration Assessment
- Content Update Policies
- Correlation Rules
- CSPM registration
- Custom IOA rules
- Detections
- Device Content
- Device control policies
- Event streams
- Falcon Complete Dashboards
- Falcon Container Image
- Falcon Data Replicator
- Falcon Discover
- Falcon FileVantage
- Falcon FileVantage Content
- Firewall management
- Flight Control
- Host groups
- Host Migration
- Hosts
- Identity Protection Entities
- Identity Protection GraphQL
- Identity Protection Policy Rules
- Incidents
- Indicators (Falcon Intelligence)
- Installation tokens
- Installation token settings
- IOA Exclusions
- IOC Manager APIs
- IOCs
- Kubernetes Protection
- Machine Learning exclusions
- MalQuery
- Malware Families (Falcon Intelligence)
- Message Center
- Mobile Enrollment
- Monitoring rules (Falcon Intelligence Recon)
- On demand scans (ODS)
- OverWatch Dashboard
- Prevention Policies
- Quarantined Files
- QuickScan Pro
- Real time response
- Real time response (admin)
- Reports (Falcon Intelligence)
- Response policies
- Rules (Falcon Intelligence)
- Sample uploads
- Sandbox (Falcon Intelligence)
- Scheduled Reports
- Sensor Download
- Sensor update policies
- Sensor Usage
- Sensor Visibility Exclusions
- Snapshot
- Snapshot Scanner Image Download
- Tailored Intelligence
- Threatgraph
- User management
- Vulnerabilities
- Vulnerabilities (Falcon Intelligence)
- Workflow
- Zero Trust Assessment
- Other Commands
- Examples
-
CrowdStrike SDKs
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust