-
Notifications
You must be signed in to change notification settings - Fork 69
Get FalconVulnerabilityLogic
bk-cs edited this page Sep 3, 2024
·
22 revisions
Search for Falcon Spotlight vulnerability evaluation logic
Requires 'Vulnerabilities: Read'.
Name | Type | Description | Min | Max | Allowed | Pipeline | PipelineByName |
---|---|---|---|---|---|---|---|
Id | Object[] | Vulnerability logic identifier | X | X | |||
Filter | String | Falcon Query Language expression to limit results | |||||
Sort | String | Property and direction to sort results | |||||
Limit | Int32 | Maximum number of results per request | |||||
After | String | Pagination token to retrieve the next set of results | |||||
Detailed | Switch | Retrieve detailed information | |||||
All | Switch | Repeat requests until all available results are retrieved | |||||
Total | Switch | Display total result count instead of results |
Get-FalconVulnerabilityLogic [-Filter] <String> [[-Sort] <String>] [[-Limit] <Int32>] [-After <String>] [-All] [-Total] [-WhatIf] [-Confirm] [<CommonParameters>]
Get-FalconVulnerabilityLogic -Id <Object[]> [-WhatIf] [-Confirm] [<CommonParameters>]
Get-FalconVulnerabilityLogic [-Filter] <String> [[-Sort] <String>] [[-Limit] <Int32>] [-After <String>] -Detailed [-All] [-WhatIf] [-Confirm] [<CommonParameters>]
GET /spotlight/combined/evaluation-logic/v1
GET /spotlight/entities/evaluation-logic/v1
GET /spotlight/queries/evaluation-logic/v1
queryEvaluationLogic
getEvaluationLogic
combinedQueryEvaluationLogic
2024-09-03: PSFalcon v2.2.7
- Using PSFalcon
-
Commands and Permissions
- Configuration Import/Export
- Container Security
- Detection and Prevention Policies
- Discover for Cloud and Containers
- Discover
- Event Streams
- Falcon Complete Dashboards
- Falcon Complete Message Center
- Falcon Data Replicator
- Falcon Intelligence
- Falcon Intelligence Recon
- Falcon OverWatch Dashboards
- Falcon Sandbox
- FileVantage
- Firewall Management
- Flight Control
- Horizon
- Host and Host Group Management
- Identity Protection
- Image Assessment
- Incident and Detection Monitoring
- Installation Tokens
- Kubernetes Protection
- MalQuery
- Mobile Host Enrollment
- On-Demand Scanning
- Quarantine
- Real-time Response
- Real-time Response Policy
- Scheduled Reports and Searches
- Sensor Download
- Sensor Update Policy
- Spotlight
- Tailored Intelligence
- Third-party ingestion
- USB Device Control Policy
- Users and Roles
- Zero Trust Assessment
- Examples
-
CrowdStrike SDKs
- PSFalcon - PowerShell
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust