-
Notifications
You must be signed in to change notification settings - Fork 121
Quarantine
Operation ID | Description | ||||
---|---|---|---|---|---|
|
Returns count of potentially affected quarantined files for each action. | ||||
|
Get quarantine file aggregates as specified via json in request body. | ||||
|
Get quarantine file metadata for specified ids. | ||||
|
Apply action by quarantine file ids | ||||
|
Get quarantine file ids that match the provided filter criteria. | ||||
|
Apply quarantine file actions by query. |
WARNING
client_id
andclient_secret
are keyword arguments that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Returns count of potentially affected quarantined files for each action.
action_update_count
Method | Route |
---|---|
/quarantine/aggregates/action-update-count/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
filter |
|
|
query | string | The filter expression that should be used to filter results. FQL syntax. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.action_update_count(filter="string")
print(response)
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.ActionUpdateCount(filter="string")
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("ActionUpdateCount", filter="string")
print(response)
Get quarantine file aggregates as specified via json in request body.
get_aggregate_files
Method | Route |
---|---|
/quarantine/aggregates/quarantined-files/GET/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
body |
|
|
body | list of dictionaries | Full body payload in JSON format. |
date_ranges |
|
|
body | list of dictionaries | Applies to date_range aggregations. Example: [ { "from": "2016-05-28T09:00:31Z", "to": "2016-05-30T09:00:31Z" }, { "from": "2016-06-01T09:00:31Z", "to": "2016-06-10T09:00:31Z" } ] |
exclude |
|
|
body | string | Elements to exclude. |
field |
|
|
body | string | The field on which to compute the aggregation. |
filter |
|
|
body | string | FQL syntax formatted string to use to filter the results. |
from |
|
|
body | integer | Starting position. |
include |
|
|
body | string | Elements to include. |
interval |
|
|
body | string | Time interval for date histogram aggregations. Valid values include:
|
max_doc_count |
|
|
body | integer | Only return buckets if values are less than or equal to the value here. |
min_doc_count |
|
|
body | integer | Only return buckets if values are greater than or equal to the value here. |
missing |
|
|
body | string | Missing is the value to be used when the aggregation field is missing from the object. In other words, the missing parameter defines how documents that are missing a value should be treated. By default they will be ignored, but it is also possible to treat them as if they had a value. |
name |
|
|
body | string | Name of the aggregate query, as chosen by the user. Used to identify the results returned to you. |
q |
|
|
body | string | Full text search across all metadata fields. |
ranges |
|
|
body | list of dictionaries | Applies to range aggregations. Ranges values will depend on field. For example, if max_severity is used, ranges might look like: [ { "From": 0, "To": 70 }, { "From": 70, "To": 100 } ] |
size |
|
|
body | integer | The max number of term buckets to be returned. |
sub_aggregates |
|
|
body | list of dictionaries | A nested aggregation, such as: [ { "name": "max_first_behavior", "type": "max", "field": "first_behavior" } ] There is a maximum of 3 nested aggregations per request. |
sort |
|
|
body | string |
FQL syntax string to sort bucket results.
asc and desc using | format. Example: _count|desc
|
time_zone |
|
|
body | string | Time zone for bucket results. |
type |
|
|
body | string | Type of aggregation. Valid values include:
|
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
date_ranges = [
{
"from": "2021-05-15T14:55:21.892315096Z",
"to": "2021-05-17T13:42:16.493180643Z"
}
]
ranges = [
{
"From": 1,
"To": 100
}
]
response = falcon.get_aggregate_files(date_ranges=date_ranges,
exclude="string",
field="string",
filter="string",
from=integer,
include="string",
interval="string",
max_doc_count=integer,
min_doc_count=integer,
missing="string",
name="string",
q="string",
ranges=ranges,
size=integer,
sort="string",
time_zone="string",
type="string"
)
print(response)
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
date_ranges = [
{
"from": "2021-05-15T14:55:21.892315096Z",
"to": "2021-05-17T13:42:16.493180643Z"
}
]
ranges = [
{
"From": 1,
"To": 100
}
]
response = falcon.GetAggregateFiles(date_ranges=date_ranges,
exclude="string",
field="string",
filter="string",
from=integer,
include="string",
interval="string",
max_doc_count=integer,
min_doc_count=integer,
missing="string",
name="string",
q="string",
ranges=ranges,
size=integer,
sort="string",
time_zone="string",
type="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
date_ranges = [
{
"from": "2021-05-15T14:55:21.892315096Z",
"to": "2021-05-17T13:42:16.493180643Z"
}
]
ranges = [
{
"From": 1,
"To": 100
}
]
BODY = {
"date_ranges": date_ranges,
"exclude": "string",
"field": "string",
"filter": "string",
"from": integer,
"include": "string",
"interval": "string",
"max_doc_count": integer,
"min_doc_count": integer,
"missing": "string",
"name": "string",
"q": "string",
"ranges": ranges,
"size": integer,
"sort": "string",
"sub_aggregates": [
null
]
"time_zone": "string",
"type": "string"
}
response = falcon.command("GetAggregateFiles", body=BODY)
print(response)
Get quarantine file metadata for specified ids.
get_quarantine_files
Method | Route |
---|---|
/quarantine/entities/quarantined-files/GET/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
body |
|
|
body | dictionary | Full body payload in JSON format. |
ids |
|
|
body | string or list of strings | List of Quarantine IDs to retrieve. |
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_quarantine_files(ids=id_list)
print(response)
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.GetQuarantineFiles(ids=id_list)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = ['ID1', 'ID2', 'ID3']
BODY = {
"ids": id_list
}
response = falcon.command("GetQuarantineFiles", body=BODY)
print(response)
Apply action by quarantine file ids
update_quarantined_detects_by_id
Method | Route |
---|---|
/quarantine/entities/quarantined-files/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
action |
|
|
body | string | Action to perform against the quarantined file. Allowed values:
|
body |
|
|
body | dictionary | Full body payload in JSON format. |
comment |
|
|
body | string | Comment to list along with action taken. |
ids |
|
|
body | string or list of strings | List of Quarantine IDs to update. |
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.update_quarantined_detects_by_id(action="string",
comment="string",
ids=id_list
)
print(response)
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.UpdateQuarantinedDetectsByIds(action="string",
comment="string",
ids=id_list
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = ['ID1', 'ID2', 'ID3']
BODY = {
"action": "string",
"comment": "string",
"ids": id_list
}
response = falcon.command("UpdateQuarantinedDetectsByIds", body=BODY)
print(response)
Get quarantine file ids that match the provided filter criteria.
query_quarantine_files
Method | Route |
---|---|
/quarantine/queries/quarantined-files/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
filter |
|
|
query | string |
FQL query specifying the filter parameters. Special value * means to not filter on anything.Filter term criteria:
|
limit |
|
|
query | integer | Maximum number of IDs to return. Max: 5000. |
offset |
|
|
query | string | Starting index of overall result set from which to return ids. |
q |
|
|
query | string | Match phrase_prefix query criteria, included fields:
|
sort |
|
|
query | string | Possible order by fields:
date_created|asc .Sort order: asc or desc . |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_quarantine_files(offset="string",
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.QueryQuarantineFiles(offset="string",
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("QueryQuarantineFiles",
offset="string",
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
Apply quarantine file actions by query.
update_quarantined_detects_by_query
Method | Route |
---|---|
/quarantine/queries/quarantined-files/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
action |
|
|
body | string | Action to perform against the quarantined file. Allowed values:
|
body |
|
|
body | dictionary | Full body payload in JSON format. |
comment |
|
|
body | string | Comment to list along with action taken. |
filter |
|
|
body | string or list of strings | Filter string to use to match to quarantine records. FQL syntax |
q |
|
|
body | string | Match phrase_prefix query criteria, included fields:
|
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.update_quarantined_detects_by_query(action="string",
comment="string",
filter="string",
q="string"
)
print(response)
from falconpy import Quarantine
# Do not hardcode API credentials!
falcon = Quarantine(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.UpdateQfByQuery(action="string",
comment="string",
filter="string",
q="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = {
"action": "string",
"comment": "string",
"filter": "string",
"q": "string"
}
response = falcon.command("UpdateQfByQuery", body=BODY)
print(response)
- Home
- Discussions Board
- Glossary of Terms
- Installation, Upgrades and Removal
- Samples Collection
- Using FalconPy
- API Operations
-
Service Collections
- Alerts
- API Integrations
- ASPM
- Certificate Based Exclusions
- Cloud Connect AWS (deprecated)
- Cloud Snapshots
- Compliance Assessments
- Configuration Assessment
- Configuration Assessment Evaluation Logic
- Container Alerts
- Container Detections
- Container Images
- Container Packages
- Container Vulnerabilities
- CSPM Registration
- Custom IOAs
- Custom Storage
- D4C Registration (deprecated)
- DataScanner
- Delivery Settings
- Detects
- Device Control Policies
- Discover
- Downloads
- Drift Indicators
- Event Streams
- Exposure Management
- Falcon Complete Dashboard
- Falcon Container
- Falcon Intelligence Sandbox
- FDR
- FileVantage
- Firewall Management
- Firewall Policies
- Foundry LogScale
- Host Group
- Host Migration
- Hosts
- Identity Protection
- Image Assessment Policies
- Incidents
- Installation Tokens
- Intel
- IOA Exclusions
- IOC
- IOCs (deprecated)
- Kubernetes Protection
- MalQuery
- Message Center
- ML Exclusions
- Mobile Enrollment
- MSSP (Flight Control)
- OAuth2
- ODS (On Demand Scan)
- Overwatch Dashboard
- Prevention Policy
- Quarantine
- Quick Scan
- Quick Scan Pro
- Real Time Response
- Real Time Response Admin
- Real Time Response Audit
- Recon
- Report Executions
- Response Policies
- Sample Uploads
- Scheduled Reports
- Sensor Download
- Sensor Update Policy
- Sensor Usage
- Sensor Visibility Exclusions
- Spotlight Evaluation Logic
- Spotlight Vulnerabilities
- Tailored Intelligence
- ThreatGraph
- Unidentified Containers
- User Management
- Workflows
- Zero Trust Assessment
- Documentation Support
-
CrowdStrike SDKs
- Crimson Falcon - Ruby
- FalconPy - Python 3
- FalconJS - Javascript
- goFalcon - Go
- PSFalcon - Powershell
- Rusty Falcon - Rust