-
Notifications
You must be signed in to change notification settings - Fork 72
Real time Response
NOTE: PSFalcon has a custom command named Invoke-FalconRTR
that is designed to perform all the necessary steps to initiate a session with one or more hosts, send a command and output the results.
Invoke-FalconRTR -Command ls -Arguments C:\Windows -HostIds <id>, <id> [-QueueOffline]
If you find that your script needs to be more complex, you can follow the instructions below to create a custom Real-time Response workflow with multiple commands.
NOTE: PSFalcon includes commands for each Real-time Response permission level.
-
Invoke-FalconCommand
,Confirm-FalconCommand
-
Invoke-FalconResponderCommand
,Confirm-FalconResponderCommand
-
Invoke-FalconAdminCommand
,Confirm-FalconAdminCommand
$Batch = Start-FalconSession -HostIds <id>, <id>
Invoke-FalconCommand -Command ls -Arguments C:\Windows -BatchId $Batch.batch_id
NOTE: Required when you expect to exceed the default session expiration time (5 minutes).
Update-FalconSession -BatchId $Batch.batch_id
$Session = Start-FalconSession -HostId <id>
$Command = Invoke-FalconCommand -Command ls -Arguments C:\Windows -SessionId $Session.session_id
Confirm-FalconCommand -CloudRequestId $Command.cloud_request_id
NOTE: Required when you expect to exceed the default session expiration time (10 minutes).
Update-FalconSession -SessionId $Session.session_id
NOTE: The command Invoke-FalconDeploy
was developed to support mass-deployment of Falcon Forensics. It is designed to upload a file to your ‘Put’ Files library, create a session with target hosts, push the file to those hosts, then execute it and output the results to CSV.
NOTE: Because Real-time Response does not interact with logged in users, the executable must be able to be run silently and without user interaction.
Invoke-FalconDeploy -HostIds <id>, <id> -Path $pwd\File.exe [-QueueOffline]
NOTE: Only sessions created by your OAuth2 API Client will be visible using the following commands.
Get-FalconSession [-Detailed] [-All]
NOTE: Only sessions created by your OAuth2 API Client will be visible using the following commands.
Get-FalconSession -Ids <id>, <id> -Queue
NOTE: PSFalcon has a custom command named Get-FalconQueue
which will create a CSV file with information about sessions that have pending queued commands or have been created in the last 7 days (by default). If you wish to get more specific, you can use Get-FalconSession
to find queued sessions, and the command below to get detailed information.
Get-FalconQueue [-Days]
Send-FalconScript -Path $pwd\hello_world.ps1 -Platform windows -PermissionType group
Get-FalconScript [-Detailed] [-All]
Edit-FalconScript -Id <id>
Remove-FalconScript -Ids <id>, <id>
Send-FalconPutFile -Path $pwd\File.exe
Get-FalconPutFile [-Detailed] [-All]
Remove-FalconPutFile -Ids <id>
- Using PSFalcon
-
Commands by Permission
- Actors (Falcon Intelligence)
- Alerts
- API integrations
- App Logs
- Channel File Control Settings
- Configuration Assessment
- Content Update Policies
- Correlation Rules
- CSPM registration
- Custom IOA rules
- Detections
- Device Content
- Device control policies
- Event streams
- Falcon Complete Dashboards
- Falcon Container Image
- Falcon Data Replicator
- Falcon Discover
- Falcon FileVantage
- Falcon FileVantage Content
- Firewall management
- Flight Control
- Host groups
- Host Migration
- Hosts
- Identity Protection Entities
- Identity Protection GraphQL
- Identity Protection Policy Rules
- Incidents
- Indicators (Falcon Intelligence)
- Installation tokens
- Installation token settings
- IOA Exclusions
- IOC Manager APIs
- IOCs
- Kubernetes Protection
- Machine Learning exclusions
- MalQuery
- Malware Families (Falcon Intelligence)
- Message Center
- Mobile Enrollment
- Monitoring rules (Falcon Intelligence Recon)
- On demand scans (ODS)
- OverWatch Dashboard
- Prevention Policies
- Quarantined Files
- QuickScan Pro
- Real time response
- Real time response (admin)
- Reports (Falcon Intelligence)
- Response policies
- Rules (Falcon Intelligence)
- Sample uploads
- Sandbox (Falcon Intelligence)
- Scheduled Reports
- Sensor Download
- Sensor update policies
- Sensor Usage
- Sensor Visibility Exclusions
- Snapshot
- Snapshot Scanner Image Download
- Tailored Intelligence
- Threatgraph
- User management
- Vulnerabilities
- Vulnerabilities (Falcon Intelligence)
- Workflow
- Zero Trust Assessment
- Other Commands
- Examples
-
CrowdStrike SDKs
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust