-
Notifications
You must be signed in to change notification settings - Fork 0
Recon
Operation ID | Description | ||||
---|---|---|---|---|---|
|
Get notification aggregates as specified via JSON in request body. | ||||
|
Preview rules notification count and distribution. This will return aggregations on: channel, count, site. | ||||
|
Get actions based on their IDs. IDs can be retrieved using the GET /queries/actions/v1 endpoint. | ||||
|
Create actions for a monitoring rule. Accepts a list of actions that will be attached to the monitoring rule. | ||||
|
Delete an action from a monitoring rule based on the action ID. | ||||
|
Update an action for a monitoring rule. | ||||
|
Get detailed notifications based on their IDs. These include the raw intelligence content that generated the match.This endpoint will return translated notification content. The only target language available is English. A single notification can be translated per request | ||||
|
Get detailed notifications based on their IDs. These include the raw intelligence content that generated the match. | ||||
|
Get notifications based on their IDs. IDs can be retrieved using the GET /queries/notifications/v1 endpoint. This endpoint will return translated notification content. The only target language available is English. | ||||
|
Get notifications based on their IDs. IDs can be retrieved using the GET /queries/notifications/v1 endpoint. | ||||
|
Delete notifications based on IDs. Notifications cannot be recovered after they are deleted. | ||||
|
Update notification status or assignee. Accepts bulk requests | ||||
|
Get monitoring rules rules by provided IDs. | ||||
|
Create monitoring rules. | ||||
|
Delete monitoring rules. | ||||
|
Update monitoring rules. | ||||
|
Query actions based on provided criteria. Use the IDs from this response to get the action entities on GET /entities/actions/v1. | ||||
|
Query notifications based on provided criteria. Use the IDs from this response to get the notification entities on GET /entities/notifications/v1 or GET /entities/notifications-detailed/v1. | ||||
|
Query monitoring rules based on provided criteria. Use the IDs from this response to fetch the rules on /entities/rules/v1. |
WARNING
client_id
andclient_secret
are input variables that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Get notification aggregates as specified via JSON in request body.
aggregate_notifications
Method | Route |
---|---|
/recon/aggregates/notifications/GET/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
body |
|
|
body | list of dictionaries | Full body payload in JSON format. |
date_ranges |
|
|
body | list of dictionaries | Applies to date_range aggregations. Example: [ { "from": "2016-05-28T09:00:31Z", "to": "2016-05-30T09:00:31Z" }, { "from": "2016-06-01T09:00:31Z", "to": "2016-06-10T09:00:31Z" } ] |
field |
|
|
body | string | The field on which to compute the aggregation. |
filter |
|
|
body | string | FQL syntax formatted string to use to filter the results. |
interval |
|
|
body | string | Time interval for date histogram aggregations. Valid values include:
|
min_doc_count |
|
|
body | integer | Only return buckets if values are greater than or equal to the value here. |
missing |
|
|
body | string | Missing is the value to be used when the aggregation field is missing from the object. In other words, the missing parameter defines how documents that are missing a value should be treated. By default they will be ignored, but it is also possible to treat them as if they had a value. |
name |
|
|
body | string | Name of the aggregate query, as chosen by the user. Used to identify the results returned to you. |
q |
|
|
body | string | Full text search across all metadata fields. |
ranges |
|
|
body | list of dictionaries | Applies to range aggregations. Ranges values will depend on field. For example, if max_severity is used, ranges might look like: [ { "From": 0, "To": 70 }, { "From": 70, "To": 100 } ] |
size |
|
|
body | integer | The max number of term buckets to be returned. |
sub_aggregates |
|
|
body | list of dictionaries | A nested aggregation, such as: [ { "name": "max_first_behavior", "type": "max", "field": "first_behavior" } ] There is a maximum of 3 nested aggregations per request. |
sort |
|
|
body | string |
FQL syntax string to sort bucket results.
asc and desc using | format. Example: _count|desc
|
time_zone |
|
|
body | string | Time zone for bucket results. |
type |
|
|
body | string | Type of aggregation. Valid values include:
|
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
date_ranges = [
{
"from": "2021-05-15T14:55:21.892315096Z",
"to": "2021-05-17T13:42:16.493180643Z"
}
]
ranges = [
{
"From": 1,
"To": 100
}
]
response = falcon.aggregate_notifications(date_ranges=date_ranges,
field="string",
filter="string",
interval="string",
min_doc_count=integer,
missing="string",
name="string",
q="string",
ranges=ranges,
size=integer,
sort="string",
time_zone="string",
type="string"
)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
date_ranges = [
{
"from": "2021-05-15T14:55:21.892315096Z",
"to": "2021-05-17T13:42:16.493180643Z"
}
]
ranges = [
{
"From": 1,
"To": 100
}
]
response = falcon.AggregateNotificationsV1(date_ranges=date_ranges,
field="string",
filter="string",
interval="string",
min_doc_count=integer,
missing="string",
name="string",
q="string",
ranges=ranges,
size=integer,
sort="string",
time_zone="string",
type="string"
)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
date_ranges = [
{
"from": "2021-05-15T14:55:21.892315096Z",
"to": "2021-05-17T13:42:16.493180643Z"
}
]
ranges = [
{
"From": 1,
"To": 100
}
]
BODY = [{
"date_ranges": date_ranges,
"field": "string",
"filter": "string",
"interval": "string",
"min_doc_count": 0,
"missing": "string",
"name": "string",
"q": "string",
"ranges": ranges,
"size": 0,
"sort": "string",
"time_zone": "string",
"type": "string"
}]
response = falcon.command("AggregateNotificationsV1", body=BODY)
print(response)
Preview rules notification count and distribution. This will return aggregations on: channel, count, site.
preview_rule
Method | Route |
---|---|
/recon/aggregates/rules-preview/GET/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
body |
|
|
body | dictionary | Full body payload in JSON format. |
filter |
|
|
body | string | FQL Syntax formatted string used to limit results. |
topic |
|
|
body | string | Restricts results to the topic specified. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.preview_rule(filter="string", topic="string")
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.PreviewRuleV1(filter="string", topic="string")
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = {
"filter": "string",
"topic": "string"
}
response = falcon.command("PreviewRuleV1", body=BODY)
print(response)
Get actions based on their IDs. IDs can be retrieved using the GET /queries/actions/v1 endpoint.
get_actions
Method | Route |
---|---|
/recon/entities/actions/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | Action IDs to retrieve. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_actions(ids=id_list)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.GetActionsV1(ids=id_list)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("GetActionsV1", ids=id_list)
print(response)
Create actions for a monitoring rule. Accepts a list of actions that will be attached to the monitoring rule.
create_actions
Method | Route |
---|---|
/recon/entities/actions/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
actions |
|
|
body | list of dictionaries | List of actions to attach to the monitoring rule. When provided, actions overrides other keywords (excluding body). |
body |
|
|
body | dictionary | Full body payload in JSON format. |
frequency |
|
|
body | string | Frequency of the action. Only one action can be applied when using this keyword. |
recipients |
|
|
body | list of strings | List of action recipients. Only one action can be applied when using this keyword. |
rule_id |
|
|
body | string | Rule ID to attach action(s) to. |
type |
|
|
body | string | Action type. Only one action can be applied when using this keyword. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
recips = ["RECIP1", "RECIP2", "RECIP3"]
response = falcon.create_actions(frequency="string",
recipients=recips,
rule_id="string",
type="string"
)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
recips = ["RECIP1", "RECIP2", "RECIP3"]
response = falcon.CreateActionsV1(frequency="string",
recipients=recips,
rule_id="string",
type="string"
)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
recips = ["RECIP1", "RECIP2", "RECIP3"]
BODY = {
"actions": [
{
"frequency": "string",
"recipients": recips,
"type": "string"
}
],
"rule_id": "string"
}
response = falcon.command("CreateActionsV1", body=BODY)
print(response)
Delete an action from a monitoring rule based on the action ID.
delete_action
Method | Route |
---|---|
/recon/entities/actions/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
id |
|
|
query | string | Action ID to delete. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.delete_action(id="string")
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.DeleteActionV1(id="string")
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("DeleteActionV1", id="string")
print(response)
Update an action for a monitoring rule.
update_action
Method | Route |
---|---|
/recon/entities/actions/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
body |
|
|
body | dictionary | Full body payload in JSON format. |
frequency |
|
|
body | string | Frequency of the action. |
recipients |
|
|
body | list of strings | List of action recipients. |
id |
|
|
body | string | Action ID to update. |
status |
|
|
body | string | Action status. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
recips = ["RECIP1", "RECIP2", "RECIP3"]
response = falcon.update_action(frequency="string",
recipients=recips,
id="string",
status="string"
)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
recips = ["RECIP1", "RECIP2", "RECIP3"]
response = falcon.UpdateActionV1(frequency="string",
recipients=recips,
id="string",
status="string"
)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
recips = ["RECIP1", "RECIP2", "RECIP3"]
BODY = {
"frequency": "string",
"id": "string",
"recipients": recips,
"status": "string"
}
response = falcon.command("UpdateActionV1", body=BODY)
print(response)
Get detailed notifications based on their IDs. These include the raw intelligence content that generated the match.This endpoint will return translated notification content. The only target language available is English. A single notification can be translated per request
get_notifications_detailed_translated
Method | Route |
---|---|
/recon/entities/notifications-detailed-translated/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | Notification IDs to retrieve. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_notifications_detailed_translated(ids=id_list)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.GetNotificationsDetailedTranslatedV1(ids=id_list)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("GetNotificationsDetailedTranslatedV1", ids=id_list)
print(response)
Get detailed notifications based on their IDs. These include the raw intelligence content that generated the match.
get_notifications_detailed
Method | Route |
---|---|
/recon/entities/notifications-detailed/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | Notification IDs to retrieve. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_notifications_detailed(ids=id_list)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.GetNotificationsDetailedV1(ids=id_list)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("GetNotificationsDetailedV1", ids=id_list)
print(response)
Get notifications based on their IDs. IDs can be retrieved using the GET /queries/notifications/v1 endpoint. This endpoint will return translated notification content. The only target language available is English.
get_notifications_translated
Method | Route |
---|---|
/recon/entities/notifications-translated/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | Notification IDs to retrieve. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_notifications_translated(ids=id_list)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.GetNotificationsTranslatedV1(ids=id_list)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("GetNotificationsTranslatedV1", ids=id_list)
print(response)
Get notifications based on their IDs. IDs can be retrieved using the GET /queries/notifications/v1 endpoint.
get_notifications
Method | Route |
---|---|
/recon/entities/notifications/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | Notification IDs to retrieve. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_notifications(ids=id_list)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.GetNotificationsV1(ids=id_list)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("GetNotificationsV1", ids=id_list)
print(response)
Delete notifications based on IDs. Notifications cannot be recovered after they are deleted.
delete_notifications
Method | Route |
---|---|
/recon/entities/notifications/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | Notification IDs to delete. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.delete_notifications(ids=id_list)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.DeleteNotificationsV1(ids=id_list)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("DeleteNotificationsV1", ids=id_list)
print(response)
Update notification status or assignee. Accepts bulk requests
update_notifications
Method | Route |
---|---|
/recon/entities/notifications/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
assigned_to_uuid |
|
|
body | string | UUID of the assigned user. |
body |
|
|
body | dictionary | Full body payload in JSON format. |
id |
|
|
body | string | Notification ID. |
status |
|
|
body | string | Notification status. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.update_notifications(assigned_to_uuid="string",
id="string",
status="string"
)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.UpdateNotificationsV1(assigned_to_uuid="string",
id="string",
status="string"
)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = [
{
"assigned_to_uuid": "string",
"id": "string",
"status": "string"
}
]
response = falcon.command("UpdateNotificationsV1", body=BODY)
print(response)
Get monitoring rules rules by provided IDs.
get_rules
Method | Route |
---|---|
/recon/entities/rules/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | Rule IDs to retrieve. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_rules(ids=id_list)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.GetRulesV1(ids=id_list)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("GetRulesV1", ids=id_list)
print(response)
Create monitoring rules.
create_rules
Method | Route |
---|---|
/recon/entities/rules/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
body |
|
|
body | dictionary | Full body payload in JSON format. |
filter |
|
|
body | string | Rule filter. |
name |
|
|
body | string | Rule name. |
permissions |
|
|
body | string | Permissions. private or public . |
priority |
|
|
body | string | Priority. high , medium , low
|
topic |
|
|
body | string | Rule topic. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.create_rules(filter="string",
name="string",
permissions="string",
priority="string",
topic="string"
)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.CreateRulesV1(filter="string",
name="string",
permissions="string",
priority="string",
topic="string"
)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = [
{
"filter": "string",
"name": "string",
"permissions": "string",
"priority": "string",
"topic": "string"
}
]
response = falcon.command("CreateRulesV1", body=BODY)
print(response)
Delete monitoring rules.
delete_rules
Method | Route |
---|---|
/recon/entities/rules/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | Rule IDs to delete. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.delete_rules(ids=id_list)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.DeleteRulesV1(ids=id_list)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("DeleteRulesV1", ids=id_list)
print(response)
Update monitoring rules.
update_rules
Method | Route |
---|---|
/recon/entities/rules/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
body |
|
|
body | dictionary | Full body payload in JSON format. |
filter |
|
|
body | string | Rule filter. |
name |
|
|
body | string | Rule name. |
permissions |
|
|
body | string | Permissions. private or public . |
priority |
|
|
body | string | Priority. high , medium , low
|
id |
|
|
body | string | Rule ID to update. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.update_rules(filter="string",
id="string",
name="string",
permissions="string",
priority="string"
)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = {
"Body Payload": "See body description above"
}
response = falcon.UpdateRulesV1(filter="string",
id="string",
name="string",
permissions="string",
priority="string"
)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = [
{
"filter": "string",
"id": "string",
"name": "string",
"permissions": "string",
"priority": "string"
}
]
response = falcon.command("UpdateRulesV1", body=BODY)
print(response)
Query actions based on provided criteria. Use the IDs from this response to get the action entities on GET /entities/actions/v1.
query_actions
Method | Route |
---|---|
/recon/queries/actions/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
filter |
|
|
query | string | FQL query expression that should be used to limit the results. |
limit |
|
|
query | integer | Maximum number of records to return. |
offset |
|
|
query | string | Starting index of overall result set from which to return ids. |
q |
|
|
query | string | Free text search across all indexed fields. |
sort |
|
|
query | string | The property to sort by. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_actions(offset="string",
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.QueryActionsV1(offset="string",
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("QueryActionsV1",
offset="string",
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
Query notifications based on provided criteria. Use the IDs from this response to get the notification entities on GET /entities/notifications/v1 or GET /entities/notifications-detailed/v1.
query_notifications
Method | Route |
---|---|
/recon/queries/notifications/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
filter |
|
|
query | string | FQL query expression that should be used to limit the results. |
limit |
|
|
query | integer | Maximum number of records to return. |
offset |
|
|
query | string | Starting index of overall result set from which to return ids. |
q |
|
|
query | string | Free text search across all indexed fields. |
sort |
|
|
query | string | The property to sort by. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_notifications(offset=integer,
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.QueryNotificationsV1(offset=integer,
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("QueryNotificationsV1",
offset=integer,
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
Query monitoring rules based on provided criteria. Use the IDs from this response to fetch the rules on /entities/rules/v1.
query_rules
Method | Route |
---|---|
/recon/queries/rules/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
filter |
|
|
query | string | FQL query expression that should be used to limit the results. |
limit |
|
|
query | integer | Maximum number of records to return. |
offset |
|
|
query | string | Starting index of overall result set from which to return ids. |
q |
|
|
query | string | Free text search across all indexed fields. |
sort |
|
|
query | string | The property to sort by. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_rules(offset="string",
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
from falconpy import Recon
# Do not hardcode API credentials!
falcon = Recon(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.QueryRulesV1(offset="string",
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
from falconpy import APIHarness
# Do not hardcode API credentials!
falcon = APIHarness(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("QueryRulesV1",
offset="string",
limit=integer,
sort="string",
filter="string",
q="string"
)
print(response)
- Home
- Discussions Board
- Glossary of Terms
- Installation, Upgrades and Removal
- Samples Collection
- Using FalconPy
- API Operations
-
Service Collections
- Alerts
- API Integrations
- ASPM
- Certificate Based Exclusions
- Cloud Connect AWS (deprecated)
- Cloud Snapshots
- Compliance Assessments
- Configuration Assessment
- Configuration Assessment Evaluation Logic
- Container Alerts
- Container Detections
- Container Images
- Container Packages
- Container Vulnerabilities
- CSPM Registration
- Custom IOAs
- Custom Storage
- D4C Registration (deprecated)
- DataScanner
- Delivery Settings
- Detects
- Device Control Policies
- Discover
- Downloads
- Drift Indicators
- Event Streams
- Exposure Management
- Falcon Complete Dashboard
- Falcon Container
- Falcon Intelligence Sandbox
- FDR
- FileVantage
- Firewall Management
- Firewall Policies
- Foundry LogScale
- Host Group
- Host Migration
- Hosts
- Identity Protection
- Image Assessment Policies
- Incidents
- Installation Tokens
- Intel
- IOA Exclusions
- IOC
- IOCs (deprecated)
- Kubernetes Protection
- MalQuery
- Message Center
- ML Exclusions
- Mobile Enrollment
- MSSP (Flight Control)
- OAuth2
- ODS (On Demand Scan)
- Overwatch Dashboard
- Prevention Policy
- Quarantine
- Quick Scan
- Quick Scan Pro
- Real Time Response
- Real Time Response Admin
- Real Time Response Audit
- Recon
- Report Executions
- Response Policies
- Sample Uploads
- Scheduled Reports
- Sensor Download
- Sensor Update Policy
- Sensor Usage
- Sensor Visibility Exclusions
- Spotlight Evaluation Logic
- Spotlight Vulnerabilities
- Tailored Intelligence
- ThreatGraph
- Unidentified Containers
- User Management
- Workflows
- Zero Trust Assessment
- Documentation Support
-
CrowdStrike SDKs
- Crimson Falcon - Ruby
- FalconPy - Python 3
- FalconJS - Javascript
- goFalcon - Go
- PSFalcon - Powershell
- Rusty Falcon - Rust