-
Notifications
You must be signed in to change notification settings - Fork 72
Get FalconContainerCount
bk-cs edited this page Sep 25, 2024
·
4 revisions
List resource counts from Falcon Cloud Security
Requires 'Falcon Container Image: Read'.
Name | Type | Description | Min | Max | Allowed | Pipeline | PipelineByName |
---|---|---|---|---|---|---|---|
Filter | String |
Falcon Query Language expression to limit resultsagent_id agent_type allow_privilege_escalation cid cloud_account_id cloud_name cloud_region cluster_id cluster_name container_id container_name cve_id detection_name first_seen image_detection_count image_digest image_has_been_assessed image_id image_registry image_repository image_tag image_vulnerability_count insecure_mount_source insecure_mount_type insecure_propagation_mode interactive_mode ipv4 ipv6 labels last_seen namespace node_name node_uid package_name_version pod_id pod_name port privileged root_write_access run_as_root_group run_as_root_user running_status
|
|||||
Resource | String | Falcon Cloud Security resource to count [default: containers] |
clusters container-alerts container-compliance containers deployments detections drift-indicators images kubernetes-ioms namespaces nodes packages pods unidentified-containers vulnerabilities
|
||||
Type | String | Retrieve specific counts by type [default: count] |
assessment-history compliance-by-clusters compliance-by-rules count count-by-actively-exploited count-by-cloud count-by-container-engine-version count-by-cps-rating count-by-cvss-score count-by-date count-by-distinct count-by-kubernetes-version count-by-os-distribution count-by-registry count-by-severity count-by-state count-by-status count-by-type count-by-zero-day count-vulnerable-images failed-containers-by-rules failed-containers-count-by-severity failed-images-by-rules failed-images-count-by-severity failed-rules-by-clusters failed-rules-by-images failed-rules-count-by-severity group-by-managed image-detections-count-by-date images-by-state most-used rules-by-status sensor-coverage vulnerability-count-by-severity
|
Get-FalconContainerCount [[-Filter] <String>] [[-Resource] <String>] [[-Type] <String>] [-WhatIf] [-Confirm] [<CommonParameters>]
GET /container-security/aggregates/{resource}/{type}/v1
2024-09-25: PSFalcon v2.2.7
- Using PSFalcon
-
Commands by Permission
- Actors (Falcon Intelligence)
- Alerts
- API integrations
- App Logs
- Channel File Control Settings
- Configuration Assessment
- Content Update Policies
- Correlation Rules
- CSPM registration
- Custom IOA rules
- Detections
- Device Content
- Device control policies
- Event streams
- Falcon Complete Dashboards
- Falcon Container Image
- Falcon Data Replicator
- Falcon Discover
- Falcon FileVantage
- Falcon FileVantage Content
- Firewall management
- Flight Control
- Host groups
- Host Migration
- Hosts
- Identity Protection Entities
- Identity Protection GraphQL
- Identity Protection Policy Rules
- Incidents
- Indicators (Falcon Intelligence)
- Installation tokens
- Installation token settings
- IOA Exclusions
- IOC Manager APIs
- IOCs
- Kubernetes Protection
- Machine Learning exclusions
- MalQuery
- Malware Families (Falcon Intelligence)
- Message Center
- Mobile Enrollment
- Monitoring rules (Falcon Intelligence Recon)
- On demand scans (ODS)
- OverWatch Dashboard
- Prevention Policies
- Quarantined Files
- QuickScan Pro
- Real time response
- Real time response (admin)
- Reports (Falcon Intelligence)
- Response policies
- Rules (Falcon Intelligence)
- Sample uploads
- Sandbox (Falcon Intelligence)
- Scheduled Reports
- Sensor Download
- Sensor update policies
- Sensor Usage
- Sensor Visibility Exclusions
- Snapshot
- Snapshot Scanner Image Download
- Tailored Intelligence
- Threatgraph
- User management
- Vulnerabilities
- Vulnerabilities (Falcon Intelligence)
- Workflow
- Zero Trust Assessment
- Other Commands
- Examples
-
CrowdStrike SDKs
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust