CrowdStrike Falcon 3.0.0
App Vendor: CrowdStrike Falcon
App Category: Endpoint Security
Connector Version: 3.0.0
API Version: 1.0.0
About App
Crowdstrike Falcon is a comprehensive cybersecurity platform that provides advanced threat protection, endpoint security, and threat intelligence to defend against cyberattacks and secure organizations' digital assets. It utilizes cloud-native technology and artificial intelligence to deliver real-time threat detection and response capabilities.
The CrowdStrike Falcon app is configured with Cyware Orchestrate to perform the following actions:
Action Name | Description |
|---|---|
Add Host Group to Prevention Policies | This action assigns prevention policies to host groups. |
Add Hosts to Static Host Group | This action adds hosts to a host group in CrowdStrike Falcon. |
Adding IOA Exclusion | The action adds an IOA exclusion. |
Add Tags To Falcon Grouping | This action appends one or more Falcon grouping tags for one or more hosts. |
Assign Sensor Policies to Host Groups | This action assigns sensor policies to host groups. |
Bulk Fetch Indicators | This action is used to fetch details about a large batch of indicators. Results can be filtered with FQL queries. |
Contain a Host | This action contains the host, which stops any network communications to locations other than the CrowdStrike cloud and IPs specified in your containment policy. |
Create Host Group | This action is used to create host groups by specifying details about the group to create. |
Create Machine Learning Exclusions | This action creates machine learning exclusions. |
Create Response Time File | The action creates a response time file. |
Create Scan (Beta) | This action creates an On-Demand Scan (ODS) and starts or schedules it for the given request. |
Create Sensor Visibility Learning Exclusions | This action creates sensor visibility exclusions. |
Delete File from Real-Time Response Session | This action deletes a file from the specified RTR session. |
Delete Indicator ID | This action deletes indicators by their IDs. |
Delete ML Exclusion | The action deletes an ML exclusion. |
Delete Response Time File | The action deletes the response time file. |
Delete SV Exclusion | The action deletes SV exclusion. |
Execute Active Responder Command in Real-Time | This action runs an active responder command on a specific host. |
Extract File Content from Real-Time Response | This action extracts a file from the specified RTR session and SHA256 hash, writes the contents to a file, and returns the file path. |
Fetch Detection Details | The action retrieves a particular detection's details. |
Fetch Detection IDs | The action searches for detections that match the given query. |
Fetch Incident Detail | The action retrieves a particular incident's details. |
Fetch Particular IOA Exclusion | The action retrieves the particular IOA exclusion. |
Fetch Particular ML Exclusion Details | The action retrieves details of a particular ml exclusion. |
Fetch Particular Sensor Visibility Exclusion | The action retrieves a particular sensor visibility exclusion. |
Fetch Real Time Response Script | This action searches and filters existing scripts uploaded to CrowdStrike Falcon. |
Find Existing Prevention Policies | The action finds existing prevention policies. |
Find Existing Sensor Policies | The action searches existing sensor policies. |
Find Host Group Members | This action searches for members of a host group in your environment by providing an FQL filter and paging details. Returns a set of agent IDs that match the filter criteria. |
Find Host Groups | This action searches for host groups in your environment by providing an FQL filter and paging details. Returns a set of host group IDs that match the filter criteria. |
Find IOA Exclusion | The action searches for ioa exclusion. |
Find Machine Learning Exclusion | The action searches for machine learning exclusions. |
Find Sensor Visibility Exclusion | The action retrieves the list of all sensor visibility exclusion. |
Generic Action | This generic action performs any additional use case required in CrowdStrike Falcon |
Get Aggregated Alerts V2 | This action is used to fetch aggregated alerts from crowdstrike |
Get Alert Details V2 | This action retrieves detailed information about an alert. |
Get Device Info By ID | The action searches for the device information through the device id. |
Get Host Details | This action retrieves detailed information for one or more host ids. |
Get Host Details for Observed Indicator | This action retrieves the host details using the observed indicator. |
Get Malicious Files by IDs (Beta) | This action retrieves malicious file entities using the specified malicious file IDs. |
Get Real Time Response Scripts | This action retrieves real-time response scripts using their IDs. |
Get Remediation Details | This action retrieves remediation details using remediation ids. |
Get Response Time Files | The action retrieves the response time files. |
Get Scan Hosts by IDs (Beta) | This action retrieves the metadata for host entities using the specified scan IDs. |
Get Status of Host | This action retrieves the online status for one or more hosts by specifying each host's unique ID. |
Get Vulnerability Details | This action retrieves details of a vulnerability using the vulnerability ID. |
Get Vulnerability Entities Using FQL Filters | This action searches vulnerabilities using FQL filters. This returns a set of vulnerability entities that match the filter criteria |
Get Vulnerability IDs Using FQL Filters | This action searches vulnerabilities using FQL filters. This returns a set of vulnerability IDs that match the filter criteria |
Lift Host Containment | This action lifts containment on the host, which returns its network communications to normal. |
List Alerts V2 | This action is used to fetch all alert IDs from CrowdStrike Falcon. |
List Files from Real-Time Response Session | This action retrieves a list of files from the specified RTR session. |
List Hidden Host IDs | This action is used to get a list of hidden host IDs. |
List Incident IDs | This action retrieves the IDs of incidents |
List Real Time Response policy agent IDs | The action retrieves a list of agent IDs for hosts assigned to a real time response policy. |
List Real Time Response policy hosts | The action retrieves a list of hosts assigned to a real-time response policy |
List Response Time Files | The action retrieves the list of all the response time files. |
Modify Detections | The action modifies detections. |
Modify Incidents | This action modifies incidents in CrowdStrike Falcon. |
Modify ML Exclusion | The action modifies the machine learning exclusion. |
Modify SV Exclusion | The action modifies the sv exclusion. |
Query Indicator | This action queries for various indicators |
Query Malicious Files (Beta) | This action retrieves a list of malicious file IDs based on the Falcon Query Language (FQL) filters. |
Real Time Execute Command Single Host | The action executes a command on a single host. |
Real Time Read Command | The action executes the RTR read-only command across the hosts mapped to the given batch ID. |
Real Time Response Admin Command | The action executes the RTR admin command across the hosts mapped to the given batch ID. |
Real Time Write Command | The action executes the RTR write-only command across the hosts mapped to the given batch ID. |
Remove Hosts from Static Host Group | This action removes hosts from a host group in CrowdStrike Falcon. |
Removing Falcon Grouping Tags | This action removes one or more Falcon grouping tags for one or more hosts. |
Retrieve Zero Trust Assessment Data by Host | The action retrieves ZTA from the host. |
Retrieving Host NIC History | This action can be used to retrieve the host NIC history. |
Retrieving Host With Device Scroll | The action can be used to retrieve the host with the device scroll. |
Retrieving Indicator ID Details | This action retrieves the details of the indicator by its ID. |
Retrieving Last Logged User Info | This action retrieves details about recent login sessions for a set of devices. |
Search Host for Observed Indicator | The action is used for searching a host for an observed indicator. |
Search Hosts | The action searches for hosts in your environment by platform, hostname, IP, and other criteria. |
Search Indicator IDs | This action retrieves the IDs of the indicators. |
Send Real Time Response to a Batch of Hosts | The action initiates a session with one or more hosts. |
Send Real Time Response to a Single Host | The action initiates a real-time session for a single host. |
Update Alerts V3 | This action is used to update alerts in CrowdStrike |
Update Detection Status | This action updates the status of the detections in incidents. |
Update Indicators | This action updates the indicators. |
Upload Indicators | This action is used to upload indicators in CrowdStrike Falcon. |
Configuration Parameters
The following configuration parameters are required for the CrowdStrike Falcon app to communicate with the CrowdStrike Falcon enterprise application. The parameters can be configured by creating instances in the app.
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Base URL | Enter the base url to access crowdstrike falcon. for example, https://api.crowdstrike.com | Text | Required | |
Client ID | Enter the client id. | Text | Required | |
Client Secret Key | Enter the client secret key to authenticate with crowdstrike falcon. | Password | Required | |
Verify | Verify the ssl/tls certificate while authenticating with the server. it's recommended to enable this option. by default, the verification is not enabled. | Boolean | Optional | |
Timeout | Enter the timeout limit for requests. allowed range is 15-120 seconds. default is 15 seconds. | Integer | Optional |
Action: Add Host Group to Prevention Policies
This action assigns prevention policies to host groups.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Name | Enter the name. Example: group_id | Text | Required | Allowed value: group_id |
Host Group ID | Enter the host group ID to which you want to assign the policy. Example: 80156bb05a144660b89426884720105d | Text | Required | |
Policy ID | Enter the policy ID. Example: $LIST[b0ceca08642b4103a344f8251c492861] | List | Required |
Action: Add Hosts to Static Host Group
This action adds hosts to a host group in crowdstrike falcon.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Host Group IDs | Enter the static host group ID to which you want to add the hosts. Example: $LIST[30c65154238e42318027c2deb0164aba] | List | Required | |
Name | Enter the name. Example: filter | Text | Required | |
Host IDs | Enter the host IDs to be added to the static host group. Example: (device_id:['e139xxxxxxxx5885', '8393xxxxxxxx9650','389axxxxxxxx5e80']) | Text | Required | |
Disable Hostname Check | Specify to disable hostname check on add-member. | Boolean | Optional | The default value is false. |
Action: Add Tags To Falcon Grouping
This action appends one or more Falcon grouping tags for one or more hosts.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Device IDs | Enter the list of device IDs. Example: $LIST[bf4fbxxxxxx4b8026] | List | Required | |
Tags List | Enter the list of tags to add. Example: $LIST["falcongroupingtags/tag1", "falcongroupingtags/tag2"] | List | Required |
Action: Adding IOA Exclusion
The action adds an IOA exclusion.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
CL Regex | Enter the CL Regex. Example: choice\s+/m\s+crowdstrike_sample_detection | Text | Required | |
Comment | Enter the comment. | Text | Required | |
Description | Enter the description. | Text | Required | |
Detection JSON | Enter the detection JSON. | Text | Optional | |
Group | Enter the groups. Example: ['2345jdsie3xxxx'] | List | Optional | |
IFN Regex | Enter the IFN Regex. Example: .*\\windows\\system32\\choice\.exe | Text | Required | |
Name | Enter the name. Example: test | Text | Required | |
Pattern ID | Enter the pattern ID. Example: 10197 | Text | Required | |
Pattern Name | Enter the pattern name. Example: sampletemplatedetection | Text | Required |
Action: Assign Sensor Policies to Host Groups
This action assigns sensor policies to host groups.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Name | Enter the name. Example: group_id | Text | Required | |
Host Group ID | Enter the host group ID to which you want to assign the sensor policy. Example: 80156bb05a144660b89426884720105d | Text | Required | |
Policy ID | Enter the policy ID. Example: $LIST[b0ceca08642b4103a344f8251c492861] | List | Required |
Action: Bulk Fetch Indicators
This action is used to fetch details about a large batch of indicators. Results can be filtered with FQL queries.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Filter | Enter the filter query. Example: type: "domain" | Text | Optional | Sample filter options are type, value, action, severity, tags, and expires. The filter is case sensitive. |
Additional Data | Enter any additional parameters to pass to the API. Example: {limit: 100} | Key Value | Optional | Allowed values: sort, limit, offset, after, and from_parent |
Action: Contain a Host
This action contains the host, which stops any network communications to locations other than the CrowdStrike Cloud and IPs specified in your containment policy.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Host IDs | Enter the host agent ID(AID) of the host you want to contain. Get an agent ID from a detection, the Falcon console, or the streaming API in CrowdStrike Falcon. Example: $LIST[cdc40c8ad8314cf296016a507469b231] | List | Required |
Action: Create Host Group
This action creates host groups by specifying details about the group to create.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Resource | Enter the details to create a host. Example: $JSON[[{"name":"test group","description":"sample test","group_type":"static"}]] | List | Required |
Action: Create Machine Learning Exclusions
This action creates machine learning exclusions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Excluded From | Enter if the hosts are excluded from blocking (detections and preventions) or extraction (uploads to CrowdStrike). Example: $LIST[extraction] | List | Required | Allowed values: blocking and extraction |
Comment | Enter a comment for the audit log. | Text | Optional | |
Groups | Enter the host groups to which the exclusion applies. To apply exclusion to all groups, enter $LIST[all] | List | Required | |
Exclusion Pattern | Enter the exclusion pattern in glob syntax. Example: /foo | Text | Required |
Action: Create Response Time File
The action creates a response time file.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
File Path | Enter the file path. Example: /tmp/intel.pdf | Text | Required | |
File Name | Enter the file name. Example: response file | Text | Required | |
Description | Enter the description. | Text | Required | |
Comments for Audit Log | Enter the audit log comment. | Text | Optional |
Action: Create Scan (Beta)
This action creates an on-demand scan (ODS) and starts or schedules it for the given request.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Scan Body | Enter the full body payload in JSON format to configure the scan. | Key Value | Required | Allowed keys: cloud_ml_level_detection, cloud_ml_level_prevention, body, cpu_priority, description, endpoint_notification, file_paths, host_groups, initiated_from, max_duration, max_file_size, pause_duration, quarantine, scan_exclusions, sensor_ml_level_detection, and sensor_ml_level_prevention |
Action: Create Sensor Visibility Learning Exclusions
This action creates sensor visibility exclusions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Comment | Enter a comment for the audit log. | Text | Required | |
Groups | Enter the host groups to which the exclusion applies. To apply exclusion to all groups, enter $LIST[all]. | List | Required | |
Value | Enter the exclusion pattern in glob syntax. Example: "/foo" | Text | Required |
Action: Delete File from Real-Time Response Session
This action deletes a file from the specified RTR session.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Session File ID | Enter the RTR session file ID to delete. Example: efa256a96af3b556cd3fc9d8b1cf587d72807d7805ced441e8149fc279db422b | Text | Required | |
Session ID | Enter the RTR session ID. Example: 3af6dd83-1691-4bb9-b6e5-530b23c14b24 | Text | Required |
Action: Delete Indicator ID
This action deletes indicators by their IDs.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Indicator ID | Enter the list of indicator IDs. Example: $LIST[5130b3232266ec3d0712faaa503b0702dbfd5cced6aa725efd2bb19de1898655,16f52bc55e498ca5a0377207431af5e9ff60d79582a8145eeb02ce476417247d] or for a single indicator, it can be used this way as well: $LIST[16f52bc55e498ca5a0377207431af5e9ff60d79582a8145eeb02ce476417247d] | List | Required | |
Filter | The FQL expression to delete indicators in bulk. | Text | Optional | If both 'filter' and 'ids' are provided, then filter takes precedence and ignores IDs. |
Comment | Enter a comment explaining why these indicators were deleted. | Text | Optional | |
From Parent | Choose true to return indicators for both the requesting customer and its MSSP parents | Boolean | Optional |
Action: Delete ML Exclusion
The action deletes an ML exclusion.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
ML Exclusion IDs | Enter the ML exclusion IDs. Example: $LIST[b0ceca08642b4103a344f8251c492861] | List | Required | |
Comment | Enter the comment. | Text | Optional |
Action: Delete Response Time File
The action deletes the response time file.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
File ID | Enter the file ID. Example: xxxxxxc611ec85f082cab6337bcd_1cff909fxxxxxx | Text | Required |
Action: Delete SV Exclusion
The action deletes the SV exclusion.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Comment | Enter the comment. | Text | Optional | |
Sv Exclusion IDs | Enter the SV exclusion IDs. Example: $LIST[b0ceca08642b4103a344f8251c492861] | List | Required |
Action: Execute Active Responder Command in Real-Time
This action runs an active responder command on a specific host.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Base Command | Enter the active-responder command type you want to execute. Example: get or cp | Text | Required | |
Command String | Enter the full command string to execute. Example: get some_file.txt | Text | Required | |
Session ID | Enter the RTR session ID to run the command against the selected host. Example: 3af6dd83-1691-4bb9-b6e5-530b23c14b24 | Text | Required | |
Extra Fields | Enter any additional parameters to pass to the API. | Key Value | Required | Allowed values: device_id, persist and id |
Action: Extract File Content from Real-Time Response
This action extracts a file from the specified RTR session and SHA256 hash, writes the contents to a file, and returns the file path.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Session ID | Enter the RTR session ID. Example: 3af6dd83-1691-4bb9-b6e5-530b23c14b24 | Text | Required | |
SHA256 | Enter the SHA-256 hash of the extracted file. Example: efa256a96af3b556cd3fc9d8b1cf587d72807d7805ced441e8149fc279db422b | Text | Required | |
Filename | Enter the filename to use for both the 7z archive and the file inside it. | Text | Optional | Default value: {sha256}.7z |
Action: Fetch Detection Details
The action retrieves the details of a specific detection.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Detection IDs | Enter the detection ID list. Example: ["ldt:3752xxxxxxxx9964:8175xxxx2029"] | List | Required |
Action: Fetch Detection IDs
The action searches for detections that match the given query.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Offset | The first detection to return, where 0 is the latest detection. Example: 1 | Integer | Optional | Use with the limit parameter to manage pagination of results. |
Limit | The maximum number of detections to return in this response (default: 9999; max: 9999). | Integer | Optional | Use with the offset parameter to manage pagination of results. |
Sort | Sort detections using these options. Example: max_confidence|asc | Text | Optional | allowed values: are first_behavior, last_behavior, max_severity, max_confidence, adversary_id, device.hostname. |
Filter | Filter detections using a query in Falcon Query Language (FQL) an asterisk wildcard * includes all results. Example: status:'normal' | Text | Optional | |
Query | Search all detection metadata for the provided string. | Text | Optional |
Action: Fetch Incident Detail
The action retrieves a particular incident's details.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Incident IDs | Enter the incident ID list. Example: $LIST[inc:a8ecce2f41df4112ae07d4e0c86d0795:3afxxx] | List | Required |
Action: Fetch Particular IOA Exclusion
The action retrieves the particular IOA exclusion.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
IOA Exclusion IDs | Enter the IOA exclusion IDs. Example: $LIST[b0ceca08642b4103a344f8251c492861] | List | Required |
Action: Fetch Particular ML Exclusion Details
The action retrieves details of a particular ML exclusion.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
ML Exclusion IDs | Enter the ML exclusion IDs. Example: $LIST[b0ceca08642b4103a344f8251c492861] | List | Required |
Action: Fetch Particular Sensor Visibility Exclusion
The action retrieves a particular sensor visibility exclusion.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Sensor Visibility Exclusion IDs | Enter the SV Exclusion IDs. Example: $LIST[b0ceca08642b4103a344xxxx] | List | Required |
Action: Fetch Real Time Response Script
This action searches and filters existing scripts uploaded to CrowdStrike Falcon.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Offset | Starting index of the overall result set from which to return IDs. | Integer | Optional | |
Limit | Number of ids to return. | Integer | Optional | |
Sort | Sort by spec. Example: name | Text | Optional | |
Search Filter | Enter optional filter criteria in the form of an FQL query. Example: platform:'windows' | Text | Optional |
Action: Find Existing Prevention Policies
The action finds existing prevention policies.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Limit | Enter the maximum number of prevention policies to be retrieved. | Integer | Optional | The maximum records to return is 1-5000. The default value is 100. |
Search Filter | The filter expression that should be used to limit the results. Example: platform_name: 'windows' | Text | Optional | |
Offset | Enter the offset value to start retrieving policies from. | Integer | Optional | Default value: 1 |
Sort | Enter to sort the result. Example: created_by.asc | Text | Optional | allowed values: created_by.asc, created_by.desc, created_timestamp.asc, created_timestamp.desc, enabled.asc, enabled.desc, modified_by.asc, modified_by.desc, modified_timestamp.asc, modified_timestamp.desc, name.asc, name.desc, platform_name.asc, platform_name.desc, precedence.asc, and precedence.desc |
Action: Find Existing Sensor Policies
The action searches existing sensor policies.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Limit | Enter the maximum number of sensor policies to be retrieved. | Integer | Optional | The maximum records to return is 1-5000. The default value is 100. |
Search Filter | The filter expression that should be used to limit the results. Example: platform_name: 'windows' | Text | Optional | |
Offset | Enter the offset value to start retrieving records from. Example: 1 | Integer | Optional | |
Sort | Enter to sort the result. Example: modified_by.asc | Text | Optional | Allowed values: created_by.asc, created_by.desc, modified_by.asc, modified_by.desc |
Action: Find Host Group Members
This action searches for members of a host group in your environment by providing an FQLl filter and paging details. Returns a set of agent IDs that match the filter criteria.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Host Group ID | Enter the host group ID to retrieve the hosts. Example: 006exxxxxxxxa3e7 | Text | Optional | |
Limit | Enter the maximum number of hosts to be retrieved. | Integer | Optional | A maximum of 5000 records can be fetched. Hosts are sorted alphabetically by host name. Default value: 100 |
Filter | Enter the filter expression that should be used to limit the results. Example: modified_timestamp:>'2025-03-10t08:26:57.840304696z' | Text | Optional | |
Offset | Enter the offset value to start retrieving records from. Example: 1 | Integer | Optional | |
Sort | Enter to sort the result. Example: status.desc | Text | Optional |
Action: Find Host Groups
This action searches for host groups in your environment by providing an FQL filter and paging details. Returns a set of host group IDs that match the filter criteria.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Search Filter | The filter expression that should be used to limit the results. Example: created_timestamp:>'2024-11-25t22:36:12z' | Text | Optional | |
Offset | Enter the offset value to start retrieving records from. Example: 1 | Integer | Optional | |
Limit | Enter the maximum number of records to return. | Integer | Optional | A maximum of 5000 records can be fetched. Default value: 100 |
Sort | Enter to sort the result. Example: created_by.asc | Text | Optional | Allowed values: created_by.asc, created_by.desc |
Action: Find IOA Exclusion
The action searches for the IOA exclusion.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Additional Prameters | Enter additional parameters. | Key Value | Optional |
Action: Find Machine Learning Exclusion
The action searches for machine learning exclusions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Filter | The filter expression that should be used to limit the results. Example: applied_globally:'true' | Text | Optional | |
Offset | Enter the offset value to start retrieving records from. Example: 0 | Integer | Optional | |
Limit | Enter the maximum number of records to return. | Integer | Optional | A maximum of 5000 records can be fetched. Default value: 100 |
Sort | Enter a value to sort the result. Example: applied_globally.desc | Text | Optional |
Action: Find Sensor Visibility Exclusion
The action retrieves the list of all sensor visibility exclusions.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Limit | Enter the maximum number of hosts to be retrieved. Hosts are sorted alphabetically by host name. | Integer | Optional | Default value: 100 |
Filter | The filter expression that should be used to limit the results. Example: applied_globally:'true' | Text | Optional | |
Offset | Enter the offset value to start retrieving records from. Example: 3 | Integer | Optional | |
Sort | Enter to sort the result. Example: value.asc | Text | Optional |
Action: Get Aggregated Alerts V2
This action is used to fetch aggregated alerts from CrowdStrike.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Name | Enter a name for the aggregate query, as chosen by the user. This is used to identify the results returned to you. | Text | Required | |
Aggregate Type | Enter the type of aggregation to perform. | Text | Required | Valid values: date_histogram, date_range, terms, range, cardinality, max, min, avg, sum, percentiles |
Aggregate Field | Enter the field on which to compute the aggregation. This can be any field returned in a query response, such as severity or tactic_id. | Text | Required |
Action: Get Alert Details V2
This action retrieves detailed information about an alert.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Alert IDs | Enter the alert ID to retrieve, Example: $LIST[28a1xxxxxxxx3914:ind:a618xxxxxxxx4d85:1328xxxxxxxx1933-117-1930xxxxxxxx9544]. | List | Required | |
Include Hidden Alerts | Choose true to allow previously hidden alerts to be retrieved. | Boolean | Optional | Default value: true |
Action: Get Device Info By ID
The action searches for the device information through the device ID.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Device ID | Enter the device ID to retrieve details for. Example: 8cfcb75a73aa48ac7b4f544b04a905b3 | Text | Required |
Action: Get Host Details
This action retrieves detailed information for one or more host IDs.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Host IDs | Enter the list of host IDs to fetch details. Example: $LIST[5b62f6d1a451c8c1a8828ce28265d65b,5c4a1e9ffc24464a9776c61af] | List | Required | Max allowed value: 5000 |
Action: Get Host Details for Observed Indicator
This action retrieves the host details using the observed indicator.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
IOC Type | Enter the IOC type. | Text | Required | Allowed values: sha256, md5, domain, ipv4, and ipv6 |
IOC Value | Enter the IOC value. Example: 8bbdead7357af7bf0efe397f9fd7e0ec578755eb8bdbaa65ae4f28ef00087ad5 | Text | Required | |
Extra Parameters | Enter the extra parameters to pass to the API. | Key Value | Optional |
Action: Get Malicious Files by IDs (Beta)
This action retrieves malicious file entities using the specified malicious file IDs.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Malicious File IDs | Enter the list of malicious file IDs to retrieve specific file entity details. | List | Required |
Action: Get Real Time Response Scripts
This action retrieves real-time response scripts using their IDs.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Script ID | Enter the list of script IDs. Example: $LIST[fc4974cd1f9011ec8b82ba35da7e613b_9236b0e5b28946de8fc2d278cecba38d] | List | Required |
Action: Get Remediation Details
This action retrieves remediation details using remediation IDs.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Remediation IDs | Enter one or more remediation IDs. Example: $LIST['5ddb0407bef249c19c7a975f17979a1f_eecd9a8f319940dfb0255e5d436822d9'] | List | Required |
Action: Get Response Time Files
The action retrieves the response time files.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
File IDs | Enter the list of file IDs. Example: $LIST[1246eaf04dc611ec85f082cab6337bcd_1cxxxxx] | List | Required |
Action: Get Scan Hosts by IDs (Beta)
This action retrieves the metadata for host entities using the specified scan IDs.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Scan IDs | Enter the scan IDs to retrieve the associated scan host metadata from CrowdStrike Falcon. | List | Required |
Action: Get Status of Host
This action retrieves the online status for one or more hosts by specifying each host's unique ID.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
IDs | Enter the IDs of the host to get the status. Example: $LIST[5b62f6d1a451c8c1a8828ce28265d65b,5c4a1e9ffc24464a9776c61af] | List | Required |
Action: Get Vulnerability Details
This action retrieves details of a vulnerability using the vulnerability ID.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Vulnerability IDs | Enter the vulnerability IDs (maximum 400). Example: $LIST[3e32646d80e94c875f9db78ae533d3a3_ff751484b9433cb899a9e4755cce7a7a] | List | Required |
Action: Get Vulnerability Entities Using FQL Filters
This action searches vulnerabilities using FQL filters. This returns a set of vulnerability entities that match the filter criteria.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Sort | Specify the sorting order. Example: closed_timestamp.asc | Text | Optional | Common sort options include, updated_timestamp|asc, closed_timestamp|asc |
Facet | Enter a facet to limit the response. Example: $LIST[cve] | List | Optional | Accepted parameters are host_info, remediation, evaluation_logic, cve. |
Limit | Enter the maximum number of vulnerability records to be returned. example: 1000 | Integer | Optional | Default value: 100 Maximum allowed value: 5000 |
Filter | Enter the Falcon Query Language (FQL) filter to limit the results. Example: created_timestamp:>'2024-03-12t03:27' | Text | Required | Supported filters: created_timestamp, closed_timestamp, and aid |
Pagination Token | Enter the continuation token from the response to fetch the next set of results. Note: This token is valid for only 120 seconds after the initial request. | Text | Optional |
Action: Get Vulnerability IDs Using FQL Filters
This action searches vulnerabilities using FQL filters. This returns a set of vulnerability IDs that match the filter criteria.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Limit | Enter the maximum number of vulnerability records to be returned. example, 200 | Integer | Optional | Default value: 100 Max value: 400 |
Filter | Enter the Falcon Query Language (FQL) filter to limit the results. Example: created_timestamp:>'2024-03-12t03:27' | Text | Required | Supported filters: aid, apps.remediation.ids, closed_timestamp, created_timestamp, cve.exploit_status, cve.exprt_rating, cve.id, cve.is_cisa_kev, cve.remediation_level, cve.severity, cve.types, host_info.asset.criticality, host_info.managed_by, host_info.groups, host_info.internet_exposure, host_info.platform_name, host_info.product_type_desc, host_info.tags, host_info.third_party_asset_ids, last_seen_within, status, suppression_info.is_suppressed, suppression_info.reason, updated_timestamp, vulnerability_id, |
Sort | Specify the sorting order. Example: created_timestamp.asc | Text | Optional | Allowed values: created_timestamp|asc/desc, closed_timestamp|asc/desc, updated_timestamp|asc/desc |
Pagination Token | Enter the continuation token from the response to fetch the next set of results. Note: This token is valid for only 120 seconds after the initial request. | Text | Optional |
Action: Lift Host Containment
This action lifts containment on the host, which returns its network communications to normal.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Host IDs | Enter the host Agent ID (AID) of the host you want to lift the containment. Example: $LIST[cdc40c8ad8314cf296016a507469b231] | List | Required | Get an agent ID from a detection, the Falcon console, or the streaming API in CrowdStrike Falcon. |
Action: List Alerts V2
This action fetches all alerts IDs from CrowdStrike Falcon
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Filter | Enter a filter query to filter alerts by. Example: platform:'public_cloud' | Text | Optional | |
Limit | Enter the maximum number of alerts to return. | Integer | Optional | Default value is 100 |
Offset | Enter the number of alerts to skip. | Integer | Optional | Default value is 0 |
Extra Parameters | Enter any additional parameters to pass to the API. Example: {include_hidden : true} | Key Value | Optional | Allowed values: include_hidden, filter and q |
Action: List Files from Real-Time Response Session
This action retrieves a list of files from the specified RTR session.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Session ID | Enter the RTR session ID. Example: 3af6dd83-1691-4bb9-b6e5-530b23c14b24 | Text | Required |
Action: List Incident IDs
This action retrieves the IDs of incidents
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Limit | Enter the maximum number of incident IDs to be retrieved. | Integer | Optional | A maximum of 500 records can be retrieved Default value: 100 |
Filter | Enter the filter expression that should be used to limit the results. Example: modified_timestamp:>'2024-11-25t22:36:12z' | Text | Optional | |
Offset | Enter the starting index of the overall result set from which to return IDs. Example: 1 | Integer | Optional | |
Sort | Enter to sort the result. Example: assigned_to.asc | Text | Optional | Allowed values: assigned_to.asc, assigned_to.desc |
Action: List Real Time Response policy agent IDs
The action retrieves a list of agent IDs for hosts assigned to a real time response policy.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
ID | Enter the ID of the response policy to retrieve its members. Example: 06621b2f2f1544678acbe9f7c6789f1a | Text | Optional | |
Offset | Enter the starting index of overall result set from which to return IDs. Example: 1 | Integer | Optional | |
Limit | Enter the maximum number of records to return. | Integer | Optional | Maximum 5000 records can be fetched. Default value: 100 |
Sort | Enter the sort to filter down the search results. Example: status.asc | Text | Optional | |
Filter | Enter the filter expression that should be used to limit the results. Example: platform:'linux' | Text | Optional |
Action: List Real Time Response policy hosts
The action retrieves a list of hosts assigned to a real time response policy
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
ID | Enter the ID of the response policy to retrieve its members. Example: 06621b2f2f1544678acbe9f7c6789f1a | Text | Optional | |
Offset | Enter the starting index of overall result set from which to return IDs. | Integer | Optional | |
Limit | Enter the maximum number of records to return. | Integer | Optional | Maximum 5000 records can be fetched. Default value: 100 |
Sort | Enter to sort the result. Example: status.asc | Text | Optional | |
Filter | Enter the filter expression that should be used to limit the results. Example: platform:'linux' | Text | Optional |
Action: List Response Time Files
The action retrieves the list of all the response time files.
Action Input Parameters
No input parameters are required for this action.
Action: Modify Detections
The action modifies detections.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Detection IDs | Enter the IDs of the detections that you want to modify. Example: $LIST[ldt:3752xxxxxxxx9964:8175xxxx2029] | List | Required | |
Status | Enter the status associated with the detections. | Text | Required | Allowed values: new, in_progress, true_positive, false_positive, and ignored. |
Assigned User | Enter the unique ID of the user to whom you want to assign the detections. Example: 1234567891234567891 | Text | Optional | |
Comment | Enter a comment describing the reason for updating the detection. | Text | Optional |
Action: Modify Incidents
This action modifies incidents in CrowdStrike Falcon.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Name | Enter the specific detail of the incident that you want to update. Example: if you want to update the name of the incident, enter update_name. | Text | Required | Allowed values: add_tag, delete_tag, unassign, update_name, update_assigned_to_v2, update_description, and update_status. |
Value | Enter the updated value for the specified name. Example: if name is add_tag, you can enter the tags you want to add to the incident. | Text | Required | |
Incident IDs | Enter the IDs of incidents that you want to update. Example: $LIST[inc:a8ecce2f41df4112ae07d4e0c86d0795:3afxxx] | List | Required | |
Update Detects | If true, update assigned-to-uuid and or status of detections associated with the incidents. | Boolean | Optional | Default value: false |
Overwrite Detects | If set to true and update-detects is also true, the assigned-to-uuid or status values for all detections associated with the incident will be overwritten. If set to false, only detections that have default values for assigned-to-uuid or status will be updated. | Boolean | Optional | The default value is false. This parameter is ignored if update-detects is missing or set to false. |
Action: Modify ML Exclusion
The action modifies the machine learning exclusion.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Data | Enter the data that needs to update in key-value format. Example: {'excluded_from':['blocking','extraction']} | Key Value | Required | |
Ml Exclusion ID | Enter the ML exclusion IDs. Example: 'b0ceca08642b4103a344f8251c492861' | Text | Required |
Action: Modify SV Exclusion
The action modifies the SV exclusion.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Data | Enter the data you want to update. Example: {'value':'sv_name'} | Key Value | Required | |
SV Exclusion ID | Enter the SV Exclusion ID. Example: b0ceca08642b4103a344f8251c492861 | Text | Required |
Action: Query Indicator
This action queries for various indicators
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Offset | Enter the starting row number to return from the index. | Integer | Optional | Default value: 0 |
Limit | Enter the number of rows to return. | Integer | Optional | Default value: 100 |
Sort | Enter the sorting order. Example: published_date|asc. | Text | Optional | |
Filter | Enter the filter. Example: _marker, actors, deleted | Text | Optional | |
Search | Enter the generic substring search. | Text | Optional | |
Include Deleted | Specify if deleted indicators should be included. | Boolean | Optional | Default value: false |
Include Relations | Specify if relations should be included. | Boolean | Optional | Default value: false |
Action: Query Malicious Files (Beta)
This action retrieves a list of malicious file IDs based on the Falcon Query Language (FQL) filters.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
FQL Filter | Enter the FQL syntax-formatted string to filter malicious files based on specific attributes. | Text | Optional | Allowed filters: id, cid, host_id, scan_id, host_scan_id, filepath, filename, hash, pattern_id, severity, quarantined, and last_updated |
Offset | Enter the starting index of the overall result set from which to return IDs. | Integer | Optional | Default value: 0 |
Limit | Enter the maximum number of malicious file resources to return in a single request. | Integer | Optional | Default value: 500 |
Sort | Enter the property and direction used to sort the results. allowed format is property|direction. allowed values include id|asc, id|desc, scan_id|asc, and more. | Text | Optional | Allowed format: property|direction. Allowed values: include id|asc, id|desc, scan_id|asc, and more. Default value: last_updated|desc |
Action: Real Time Execute Command Single Host
The action executes a command on a single host.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Base Command | Enter the base command. Example: ls | Text | Required | |
Device ID | Enter the device ID. Example: 9daac64e7e8xxxxx | Text | Required | |
Command String | Enter the command. for. Example: cd sample.txt | Text | Required | |
Session ID | Enter the session ID. Example: 3ee4c4-2e74-4967-884f-17xxx | Text | Required | |
IDs | Enter the IDs. Example: 234sdfkuixxxxx | Integer | Optional | Default value: 0 |
Persist All | Specify if you want to persist all. | Boolean | Optional | Default value: true |
Action: Real Time Read Command
The action executes the RTR read-only command across the hosts mapped to the given batch ID.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Base Command | Enter the base command. Example: ls | Text | Required | |
Batch ID | Enter the batch ID. Example: ea263243-ff2f-4aee-a606-xxxx | Text | Required | |
Command String | Enter the command. Example: cd sample.txt | Text | Required | |
Optional Hosts | Enter the optional hosts. Example: $LIST[cdc40c8ad8314cf296016a507460c563 | List | Optional | |
persist_all | Specify if you want to persist all. | Boolean | Optional | Default value: true |
Request Timeout | Enter the number of seconds to wait for the request. | Integer | Optional | The default value is 30 seconds. The maximum value is 5 minutes. |
Timeout Duration | Enter the timeout duration in the request in duration syntax. | Text | Optional | Default: 30s. Valid units: ns, us, ms, s, m, h. The maximum value is 5 minutes. |
Host Timeout Duration | Enter the timeout duration that defines how long a host has to complete processing. The default value is slightly less than the overall request timeout and cannot exceed it. | Text | Optional | The maximum value is < 5 minutes. For example, 10 seconds. Valid units: ns, us, ms, s, m, h |
Action: Real Time Response Admin Command
The action executes the RTR admin command across the hosts mapped to the given batch ID.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Base Command | Enter the base command. Example: ls | Text | Required | |
Batch ID | Enter the batch ID. Example: ea263243-ff2f-4aee-a606-xxxx | Text | Required | |
Command String | Enter the command. Example: cd sample.txt | Text | Required | |
Optional Hosts | Enter the optional hosts. Example: $LIST[cdc40c8ad8314cf296016a507460c563] | List | Optional | |
Persist all | Specify if you want to persist all. default: true | Boolean | Optional | |
Timeout | Enter the timeout value in seconds. This is the number of seconds that requests will wait to establish a connection with CrowdStrike Falcon. | Integer | Optional | Default value: 30 seconds Maximum value: 5 minutes |
Timeout duration | Timeout duration for how long to wait for the request in duration syntax. Example: 10s | Text | Optional | Allowed units: ns, us, ms, s, m, h. Maximum value: 5 minutes |
Host Timeout Duration | Enter the timeout duration for how long the host has to complete processing. The value must be less than the overall request timeout. Example: 10s | Text | Optional | The maximum allowed value is 5 minutes. Supported units: ns, us, ms, s, m, h. |
Action: Real Time Write Command
The action executes the RTR write-only command across the hosts mapped to the given batch ID.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Base Command | Enter the base command. Example: ls | Text | Required | |
Batch ID | Enter the batch ID. Example: ea263243-ff2f-4aee-a606-xxx | Text | Required | |
Command String | Enter the command. Example: cd sample.txt | Text | Required | |
Optional Hosts | Enter the optional hosts. Example: $LIST[cdc40c8ad8314cf296016a507460c563 | List | Optional | |
Persist All | Specify if you want to persist all. | Boolean | Optional | Default value: true |
Timeout | Timeout for how long to wait for the request in seconds. | Integer | Optional | Default timeout: 30 seconds Maximum timeout: 5 minutes |
Timeout Duration | Enter the duration to wait for the request to complete. | Text | Optional | Default: 30s Maximum: 5 minutes Supported units: ns, us, ms, s, m, h |
Host Timeout Duration | Enter the timeout duration for the host to complete processing. The value must be less than the overall request timeout. Example: 10s | Text | Optional | Maximum: 5 minutes. Supported units: ns, us, ms, s, m, h. |
Action: Remove Hosts from Static Host Group
This action removes hosts from a host group in CrowdStrike Falcon.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Host Group IDs | Enter the static host group ID from which you want to remove the hosts. Example: $LIST[30c65154238e42318027c2deb0164aba] | List | Required | |
Name | Enter the name. Example: filter | Text | Required | |
Host IDs | Enter the host IDs to be removed from the static host group. Example: (device_id:['e139xxxxxxxx5885', '8393xxxxxxxx9650','389axxxxxxxx5e80']) | Text | Required | |
Disable Hostname Check | Specify whether to disable hostname verification when adding a member. | Boolean | Optional | Default value: false |
Action: Removing Falcon Grouping Tags
This action removes one or more Falcon grouping tags for one or more hosts.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Device IDs | Enter the list of device IDs. Example: $LIST[bf4fbxxxxxx4b8026] | List | Required | |
Tags List | Enter the list of tags to remove. Example: $LIST[falcongroupingtags/tag1] | List | Required |
Action: Retrieve Zero Trust Assessment Data by Host
The action retrieves ZTA by the host.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Agent IDs | Enter one or more agent IDs. Example: $LIST[8b83xxxxxxxx2098072c0496f8a0000] | List | Required |
Action: Retrieving Host NIC History
This action retrieves host NIC history.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Customer ID | Enter the customer ID. Example: 5c4a1e9ffc24464a9776c61af1d569b1 | Text | Optional | |
Device IDs | Enter the device IDs. Example: $LIST[abcuu32534z] | List | Required |
Action: Retrieving Host With Device Scroll
The action retrieves host with device scroll.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Limit | Enter the limit. | Integer | Optional | Default value: 100 |
Offset | Enter the offset. Example: fgluy2x1zgvfy29udgv4df91dwlkdnf1zxj5vghlbkzldgnoahzfcug0ttnnufjsdvdxwlnsau13yw1raaaaaajcsqswrurvx2nrm0ptvy00vfvvaeg1telpzxzqsezyvxgtbljws0rysxpmsgzubjz3aaaaaajknekwyv9uaddenkrsdenmogpsckuzakppuq== | Text | Optional | |
Filter | Enter to filter down the search results. Example: modified_timestamp:>'2024-01-25t22:36:12z' | Text | Optional | |
Sort | Enter the sort to filter down the search results. Example: status.desc or hostname.asc | Text | Optional |
Action: Retrieving Indicator ID Details
This action retrieves the details of the indicator by its ID.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Indicator IDs | Enter the list of indicator IDs. Example: $LIST[5130b3232266ec3d0712faaa503b0702dbfd5cced6aa725efd2bb19de1898655,16f52bc55e498ca5a0377207431af5e9ff60d79582a8145eeb02ce476417247d] or for single indicator, use: $LIST[16f52bc55e498ca5a0377207431af5e9ff60d79582a8145eeb02ce476417247d] | List | Required |
Action: Retrieving Last Logged User Info
This action retrieve details about recent login sessions for a set of devices.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Customer ID | Enter the customer ID. Example: 456789abcdefghijklmnopqrstuv-wx | Text | Optional | |
Device IDs | Enter the list of device IDs to retrieve details for. Example: $LIST[abcuu32534z] | List | Required |
Action: Search Host for Observed Indicator
The action searches host for observed indicator.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
IOC Type | Enter the IOC type. | Text | Required | Allowed values: sha256, md5, domain, ipv4, ipv6 |
IOC value | Enter the IOC value. | Text | Required | |
Extra Parameters | Enter the extra parameters. | Key Value | Optional |
Action: Search Hosts
The action search for hosts in your environment by platform, hostname, IP, and other criteria.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Filter | Specify the filter expression to limit the response. Example: modified_timestamp:>'2024-10-25t22:36:12z' | Text | Optional | |
Offset | Enter the offset value to start retrieving records from. Example: 0 | Integer | Optional | |
Limit | Enter the maximum number of records to return. A maximum of 5000 records can be fetched. | Integer | Optional | Default value: 100 |
Sort | Enter the property to sort by. Example: status.desc | Text | Optional |
Action: Search Indicator IDs
This action retrieves the IDs of the indicators.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Filter | Enter a filter to narrow the search result. for example, type:'domain',value:'sampledomain.com' | Text | Optional | Supported filters: type, value, action, mobile_action, severity, platforms, tags, expiration, expired, applied_globally, host_groups, created_on, created_by, modified_on, modified_by, and source |
Limit | Enter the maximum number of incident IDs to be retrieved. | Integer | Optional | Default value: 100 |
Offset | Enter the starting index of overall result set from which to return IDs. Example: 1 | Integer | Optional | |
Sort | Enter to sort the result. Example: severity_number | Text | Optional | Allowed values: action, applied_globally and more. |
After | Enter the after token from the previous response to continue retrieving results from that point. Example: wyjkzxrly3qilci2mjnjmgqyytnknwe5zwezowfjztnkztbkmzdkndq2ywrmzwzizdiwzjnkzdk1mtg2nguwnde1mtiymzdhnzfhil0= | Text | Optional | |
From Parent | Choose true to return indicators for both the requesting customer and its MSSP parents | Boolean | Optional |
Action: Send Real Time Response to a Batch of Hosts
The action initiates a session with one or more hosts.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Host IDs | Enter the IDs of hosts you want to start a session with. Example: $LIST[9daac64e7e8f453488bfde9f573960b1] | List | Required | |
Existing Batch ID | Enter the ID of the batch of hosts. Example: 5ba74666-fa78-4738-afe8-a54a14dbd413 | Text | Optional | |
Queue Offline | Specify if the session must be queued offline. | Boolean | Optional | By default, it is queued. |
Timeout | Enter the request timeout in seconds. | Integer | Optional | Default: 30 seconds Maximum: 5 minutes |
Timeout Duration | Enter the request timeout in duration format. | Text | Optional | Default: 30 Maximum: 5 minutes Supported units: ns, us, ms, s, m, h |
Host Timeout Duration | Specify the host processing timeout. It must be less than the overall request timeout. Example: 10s | Text | Optional | Maximum: 5 minutes. Supported units: ns, us, ms, s, m, h |
Action: Send Real Time Response to a Single Host
The action initiates a real-time session for a single host.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Device ID | Enter the device ID. Example: 9daac64e7e8f453xxxx | Text | Required | |
Origin | Enter the origin. Example: ls | Text | Required | |
Queue Offline | Enter the queue offline. | Boolean | Optional | Default: true |
Timeout | Enter the request timeout in seconds. | Integer | Optional | Default: 30 seconds Maximum: 5 minutes |
Timeout Duration | Specify the duration to wait for the request to complete. Example: 10s | Text | Optional | Supported units: ns, us, ms, s, m, h. Maximum value: 5 minutes. |
Action: Update Alerts V3
This action updates alerts in CrowdStrike.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Alert IDs | Enter a list of alerts to update. Example: $LIST[28a1xxxxxxxx3914:ind:a618xxxxxxxx4d85:1328xxxxxxxx1933-117-1930xxxxxxxx9544] | List | Required | |
Action | Enter the action to perform on the alerts. Example: add_tag | Text | Required | Valid values: add_tag, append_comment and more |
Action Value | Enter the value to use for the action. Example: if you are adding a tag to an alert, the value could be 'falcon_tag1' | Text | Required | |
Include Hidden Alerts | Choose true to allows previously hidden alerts to be retrieved. | Boolean | Optional | Default value: true |
Action: Update Detection Status
This action updates the status of the detections in incidents.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Update Detects | Specify if you want to update the associated detects. | Boolean | Optional | Default value: false |
Overwrite Detects | Specify if you want to overwrite the associated detects. | Boolean | Optional | Default value: false |
Name | Enter update_status as the action parameter to update the detect status. | Text | Required | |
Value | Enter the updated detection value to apply to each incident listed in incident_ids. | Text | Required | |
Incident IDs | Enter the incident IDs to update the detections. Example: $LIST[inc:62e9c3d557a5479258d9ac63a2efb118:131b5xxxx] | List | Required |
Action: Update Indicators
This action updates the indicators.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
IOC ID | Enter the ID of the indicator you want to update. Example: 9f8c43311b1801ca4159fc07d319610582c2003ccde8934d5412b1781e841e9e | Text | Required | |
Additional Data | Enter any additional data for updating the indicator. Example: {'source':'testsource','action':'detect'} | Key Value | Optional | |
Comment | Enter a comment about the update. | Text | Optional |
Action: Upload Indicators
This action uploads indicators in CrowdStrike Falcon.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
IOC Type | Enter the IOC type. | Text | Required | Allowed values: ipv4,ipv6,sha256,domain,md5 and all_subdomains |
IOC Value | Enter the IOC value. | Text | Required | |
Action | Enter the action to be performed on the indicators. | Text | Required | Allowed values: no_action, allow, prevent_no_ui, prevent, and detect allow, prevent_no_ui, and prevent actions are only applicable to hashes. Severity is mandatory if action is prevent or detect. |
Severity | Enter the severity level to apply to the indicator. severity is mandatory if actions are prevent or detect. | Text | Optional | Allowed values: informational, low, medium, high, and critical. |
Mobile Action | Enter the mobile action to be performed on the indicators. | Text | Optional | Allowed values: no_action, allow, prevent_no_ui, prevent, and detect. Severity is mandatory if mobile actions are prevent or detect. |
Platforms | Enter the platforms that the indicator applies to. | List | Required | Possible values are mac, windows, linux, android, and ios. If the platforms are Android and IOS, then mobile action is mandatory. |
Comment | Enter a comment about the uploading indicator. | Text | Optional | |
Applied Globally | Specify if the values applies globally. | Boolean | Optional | Default: true |
Additional Data | Enter any additional data while uploading the indicator | Key Value | Optional |
Action: Generic Action
This generic action performs any additional use case required in CrowdStrike Falcon.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
|---|---|---|---|---|
Method | Enter the HTTP method for the action. | Text | Required | Supported values: GET, POST, PUT, PATCH, and DELETE |
Endpoint | Enter the CrowdStrike endpoint. Example: /devices/entities/devices/v1 | Text | Required | |
JSON Payload | Enter the payload in JSON format. Example: $JSON[{"data": [{"reason": "test"}]}] | Any | Optional | |
Query Params | Enter the query parameters in JSON format. Example: {"limit": "10"} | Key Value | Optional | |
Extra Fields | Enter the extra fields to pass to the API. | Key Value | Optional |
Changelog
The following table shows the changelog for each app version:
Version | Changes |
|---|---|
v3.0.0 | Introduced Create Scan, Get Malicious Files by IDs, Get Scan Hosts by IDs, and Query Malicious Files actions. |