-
Notifications
You must be signed in to change notification settings - Fork 119
Firewall Policies
Operation ID | Description | ||||
---|---|---|---|---|---|
|
Search for members of a Firewall Policy in your environment by providing a FQL filter and paging details. Returns a set of host details which match the filter criteria | ||||
|
Search for Firewall Policies in your environment by providing a FQL filter and paging details. Returns a set of Firewall Policies which match the filter criteria | ||||
|
Perform the specified action on the Firewall Policies specified in the request | ||||
|
Sets the precedence of Firewall Policies based on the order of IDs specified in the request. The first ID specified will have the highest precedence and the last ID specified will have the lowest. You must specify all non-Default Policies for a platform when updating precedence | ||||
|
Retrieve a set of Firewall Policies by specifying their IDs | ||||
|
Create Firewall Policies by specifying details about the policy to create | ||||
|
Delete a set of Firewall Policies by specifying their IDs | ||||
|
Update Firewall Policies by specifying the ID of the policy and details to update | ||||
|
Search for members of a Firewall Policy in your environment by providing a FQL filter and paging details. Returns a set of Agent IDs which match the filter criteria | ||||
|
Search for Firewall Policies in your environment by providing a FQL filter and paging details. Returns a set of Firewall Policy IDs which match the filter criteria |
WARNING
client_id
andclient_secret
are keyword arguments that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Search for members of a Firewall Policy in your environment by providing a FQL filter and paging details. Returns a set of host details which match the filter criteria
query_combined_policy_members
Method | Route |
---|---|
/policy/combined/firewall-members/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
filter |
|
|
query | string | FQL Syntax formatted string used to limit the results. |
id |
|
|
query | integer | The ID of the Firewall Policy to search for members of. |
limit |
|
|
query | integer | Maximum number of records to return. (Max: 5000) |
offset |
|
|
query | integer | Starting index of overall result set from which to return ids. |
sort |
|
|
query | string | The property to sort by. (Ex: modified_timestamp.desc) |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_combined_policy_members(id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.queryCombinedFirewallPolicyMembers(id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("queryCombinedFirewallPolicyMembers",
id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
Search for Firewall Policies in your environment by providing a FQL filter and paging details. Returns a set of Firewall Policies which match the filter criteria
query_combined_policies
Method | Route |
---|---|
/policy/combined/firewall/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
filter |
|
|
query | string | FQL Syntax formatted string used to limit the results. |
limit |
|
|
query | integer | Maximum number of records to return. (Max: 5000) |
offset |
|
|
query | integer | Starting index of overall result set from which to return ids. |
sort |
|
|
query | string | The property to sort by. (Ex: modified_timestamp.desc) |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_combined_policies(filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.queryCombinedFirewallPolicies(filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("queryCombinedFirewallPolicies",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
Perform the specified action on the Firewall Policies specified in the request
perform_policies_action
Method | Route |
---|---|
/policy/entities/firewall-actions/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
action_name |
|
|
query | string | The action to perform. Allowed values:
|
action_parameters |
|
|
body | list of dictionaries | List of name / value pairs in JSON format. |
body |
|
|
body | dictionary | Full body payload in JSON format. |
group_id |
|
|
body action_parameters |
string | Host Group ID to apply the policy to. String. Overridden if action_parameters is specified. |
ids |
|
|
body | string or list of strings | Response Policy ID(s) to perform actions against. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.perform_policies_action(action_name="string",
group_id="HOST_GROUP_ID",
ids="ID_TO_UPDATE"
)
print(response)
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
# Can also be provided using the keyword `group_id`
act_params = [{
"name": "group_id",
"value": "HOST_GROUP_ID"
}]
response = falcon.performFirewallPoliciesAction(action_name="string",
action_parameters=act_params,
ids="ID_TO_UPDATE"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
PARAMS = {
"action_name": "string" # Can also pass this using the keyword 'action_name'
}
act_params = [{
"name": "group_id",
"value": "HOST_GROUP_ID"
}]
# You can only update one ID at a time
BODY = {
"action_parameters": act_params,
"ids": ["ID_TO_UPDATE"]
}
response = falcon.command("performFirewallPoliciesAction", parameters=PARAMS, body=BODY)
print(response)
Sets the precedence of Firewall Policies based on the order of IDs specified in the request. The first ID specified will have the highest precedence and the last ID specified will have the lowest. You must specify all non-Default Policies for a platform when updating precedence
set_policies_precedence
Method | Route |
---|---|
/policy/entities/firewall-precedence/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
body |
|
|
body | dictionary | Full body payload in JSON format. |
ids |
|
|
body | string or list of strings | Firewall Policy ID(s) to adjust precedence. |
platform_name |
|
|
body | string | OS platform name. (Linux, Mac, Windows) |
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.set_policies_precedence(ids=id_list, platform_name="string")
print(response)
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.setFirewallPoliciesPrecedence(ids=id_list, platform_name="string")
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = ['ID1', 'ID2', 'ID3']
BODY = {
"ids": id_list,
"platform_name": "string"
}
response = falcon.command("setFirewallPoliciesPrecedence", body=BODY)
print(response)
Retrieve a set of Firewall Policies by specifying their IDs
get_policies
Method | Route |
---|---|
/policy/entities/firewall/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | The ID(s) of the Firewall Policies to return. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_policies(ids=id_list)
print(response)
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.getFirewallPolicies(ids=id_list)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("getFirewallPolicies", ids=id_list)
print(response)
Create Firewall Policies by specifying details about the policy to create
create_policies
Method | Route |
---|---|
/policy/entities/firewall/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
body |
|
|
body | dictionary | Full body payload in JSON format. |
description |
|
|
body | string | Firewall Policy description. |
clone_id |
|
|
body | string | Firewall Policy ID to clone. |
name |
|
|
body | string | Firewall Policy name. |
platform_name |
|
|
body | string | Firewall Policy platform. |
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.create_policies(clone_id="string",
description="string",
name="string",
platform_name="string"
)
print(response)
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.createFirewallPolicies(clone_id="string",
description="string",
name="string",
platform_name="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = {
"resources": [
{
"clone_id": "string",
"description": "string",
"name": "string",
"platform_name": "Windows",
}
]
}
response = falcon.command("createFirewallPolicies", body=BODY)
print(response)
Delete a set of Firewall Policies by specifying their IDs
delete_policies
Method | Route |
---|---|
/policy/entities/firewall/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | The ID(s) of the Firewall Policies to delete. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.delete_policies(ids=id_list)
print(response)
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.deleteFirewallPolicies(ids=id_list)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("deleteFirewallPolicies", ids=id_list)
print(response)
Update Firewall Policies by specifying the ID of the policy and details to update
update_policies
Method | Route |
---|---|
/policy/entities/firewall/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
body |
|
|
body | dictionary | Full body payload in JSON format. |
description |
|
|
body | string | Firewall Policy description. |
id |
|
|
body | string | Firewall Policy ID to update. |
name |
|
|
body | string | Firewall Policy name. |
platform_name |
|
|
body | string | Firewall Policy platform. |
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.update_policies(description="string",
id="string",
name="string",
platform_name="string"
)
print(response)
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.updateFirewallPolicies(description="string",
id="string",
name="string",
platform_name="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = {
"resources": [
{
"id": "string",
"description": "string",
"name": "string",
"platform_name": "Windows"
}
]
}
response = falcon.command("updateFirewallPolicies", body=BODY)
print(response)
Search for members of a Firewall Policy in your environment by providing a FQL filter and paging details. Returns a set of Agent IDs which match the filter criteria
query_policy_members
Method | Route |
---|---|
/policy/queries/firewall-members/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
filter |
|
|
query | string | FQL Syntax formatted string used to limit the results. |
id |
|
|
query | integer | The ID of the Firewall Policy to search for members of. |
limit |
|
|
query | integer | Maximum number of records to return. (Max: 5000) |
offset |
|
|
query | integer | Starting index of overall result set from which to return ids. |
sort |
|
|
query | string | The property to sort by. (Ex: modified_timestamp.desc) |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_policy_members(id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.queryFirewallPolicyMembers(id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("queryFirewallPolicyMembers",
id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
Search for Firewall Policies in your environment by providing a FQL filter and paging details. Returns a set of Firewall Policy IDs which match the filter criteria
query_policies
Method | Route |
---|---|
/policy/queries/firewall/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
filter |
|
|
query | string | FQL Syntax formatted string used to limit the results. |
limit |
|
|
query | integer | Maximum number of records to return. (Max: 5000) |
offset |
|
|
query | integer | Starting index of overall result set from which to return ids. |
sort |
|
|
query | string | The property to sort by. (Ex: modified_timestamp.desc) |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_policies(filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
from falconpy import FirewallPolicies
# Do not hardcode API credentials!
falcon = FirewallPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.queryFirewallPolicies(filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("queryFirewallPolicies",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)
- Home
- Discussions Board
- Glossary of Terms
- Installation, Upgrades and Removal
- Samples Collection
- Using FalconPy
- API Operations
-
Service Collections
- Alerts
- API Integrations
- Cloud Connect AWS (deprecated)
- Cloud Snapshots
- Configuration Assessment
- Configuration Assessment Evaluation Logic
- Container Alerts
- Container Detections
- Container Images
- Container Packages
- Container Vulnerabilities
- CSPM Registration
- Custom IOAs
- Custom Storage
- D4C Registration (deprecated)
- Detects
- Device Control Policies
- Discover
- Drift Indicators
- Event Streams
- Exposure Management
- Falcon Complete Dashboard
- Falcon Container
- Falcon Intelligence Sandbox
- FDR
- FileVantage
- Firewall Management
- Firewall Policies
- Foundry LogScale
- Host Group
- Hosts
- Identity Protection
- Image Assessment Policies
- Incidents
- Installation Tokens
- Intel
- IOA Exclusions
- IOC
- IOCs (deprecated)
- Kubernetes Protection
- MalQuery
- Message Center
- ML Exclusions
- Mobile Enrollment
- MSSP (Flight Control)
- OAuth2
- ODS (On Demand Scan)
- Overwatch Dashboard
- Prevention Policy
- Quarantine
- Quick Scan
- Real Time Response
- Real Time Response Admin
- Real Time Response Audit
- Recon
- Report Executions
- Response Policies
- Sample Uploads
- Scheduled Reports
- Sensor Download
- Sensor Update Policy
- Sensor Visibility Exclusions
- Spotlight Evaluation Logic
- Spotlight Vulnerabilities
- Tailored Intelligence
- ThreatGraph
- Unidentified Containers
- User Management
- Workflows
- Zero Trust Assessment
- Documentation Support
-
CrowdStrike SDKs
- Crimson Falcon - Ruby
- FalconPy - Python 3
- FalconJS - Javascript
- goFalcon - Go
- PSFalcon - Powershell
- Rusty Falcon - Rust