-
Notifications
You must be signed in to change notification settings - Fork 69
Invoke FalconQuarantineAction
bk-cs edited this page Sep 22, 2022
·
22 revisions
Perform actions on quarantined files
Requires 'Quarantined Files: Write'.
Name | Type | Min | Max | Allowed | Pipeline | PipelineByName | Description |
---|---|---|---|---|---|---|---|
Action | String |
release unrelease delete
|
False | False | Action to perform | ||
Filter | String | False | False | Falcon Query Language statement | |||
Query | String | False | False | Match phrase prefix | |||
Comment | String | False | False | Audit log comment | |||
Id | String[] | True | True | Quarantined file identifier |
Invoke-FalconQuarantineAction [-Action] <String> [[-Comment] <String>] [-Id] <String[]> [-WhatIf] [-Confirm] [<CommonParameters>]
Invoke-FalconQuarantineAction [-Action] <String> -Filter <String> [[-Query] <String>] [[-Comment] <String>] [-WhatIf] [-Confirm] <CommonParameters>]
Generated 20220922 using PSFalcon v2.2.3
- Using PSFalcon
-
Commands and Permissions
- Configuration Import/Export
- Container Security
- Detection and Prevention Policies
- Discover for Cloud and Containers
- Discover
- Event Streams
- Falcon Complete Dashboards
- Falcon Complete Message Center
- Falcon Data Replicator
- Falcon Intelligence
- Falcon Intelligence Recon
- Falcon OverWatch Dashboards
- Falcon Sandbox
- FileVantage
- Firewall Management
- Flight Control
- Horizon
- Host and Host Group Management
- Identity Protection
- Image Assessment
- Incident and Detection Monitoring
- Installation Tokens
- Kubernetes Protection
- MalQuery
- Mobile Host Enrollment
- On-Demand Scanning
- Quarantine
- Real-time Response
- Real-time Response Policy
- Scheduled Reports and Searches
- Sensor Download
- Sensor Update Policy
- Spotlight
- Tailored Intelligence
- Third-party ingestion
- USB Device Control Policy
- Users and Roles
- Zero Trust Assessment
- Examples
-
CrowdStrike SDKs
- PSFalcon - PowerShell
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust