Skip to content

Get FalconVulnerabilityLogic

bk-cs edited this page Oct 31, 2022 · 22 revisions

Get-FalconVulnerabilityLogic

SYNOPSIS

Search for Falcon Spotlight vulnerability evaluation logic

DESCRIPTION

Requires 'Spotlight Vulnerabilities: Read'.

PARAMETERS

Name Type Min Max Allowed Pipeline PipelineByName Description
Id Object[] X X Vulnerability logic identifier
Filter String Falcon Query Language expression to limit results
Sort String Property and direction to sort results
Limit Int32 Maximum number of results per request
After String Pagination token to retrieve the next set of results
Detailed Switch Retrieve detailed information
All Switch Repeat requests until all available results are retrieved
Total Switch Display total result count instead of results

SYNTAX

Get-FalconVulnerabilityLogic [-Filter] <String> [[-Sort] <String>] [[-Limit] <Int32>] [-After <String>] [-All] [-Total] [-WhatIf] [-Confirm] [<CommonParameters>]
Get-FalconVulnerabilityLogic -Id <Object[]> [-WhatIf] [-Confirm] [<CommonParameters>]
Get-FalconVulnerabilityLogic [-Filter] <String> [[-Sort] <String>] [[-Limit] <Int32>] [-After <String>] -Detailed [-All] [-WhatIf] [-Confirm] [<CommonParameters>]

SDK Reference

falconpy

queryEvaluationLogic
getEvaluationLogic
combinedQueryEvaluationLogic

USAGE

2022-10-31: PSFalcon v2.2.3

Clone this wiki locally