All URIs are relative to https://api.us-2.crowdstrike.com
Method | HTTP request | Description |
---|---|---|
get_aggregate_detects | POST /detects/aggregates/detects/GET/v1 | Get detect aggregates as specified via json in request body. |
get_detect_summaries | POST /detects/entities/summaries/GET/v1 | View information about detections |
query_detects | GET /detects/queries/detects/v1 | Search for detection IDs that match a given query |
update_detects_by_ids_v2 | PATCH /detects/entities/detects/v2 | Modify the state, assignee, and visibility of detections |
get_aggregate_detects(body)
Get detect aggregates as specified via json in request body.
require 'time'
require 'crimson-falcon'
# Setup authorization
Falcon.configure do |config|
config.client_id = "Your_Client_ID"
config.client_secret = "Your_Client_Secret"
config.cloud = "us-1" # or "us-2", "eu-1", "us-gov1"
end
api_instance = Falcon::Detects.new
body = [Falcon::MsaAggregateQueryRequest.new({date_ranges: [Falcon::MsaDateRangeSpec.new({from: 'from_example', to: 'to_example'})], exclude: 'exclude_example', field: 'field_example', filter: 'filter_example', from: 37, include: 'include_example', interval: 'interval_example', missing: 'missing_example', name: 'name_example', q: 'q_example', ranges: [Falcon::MsaRangeSpec.new({from: 3.56, to: 3.56})], size: 37, sort: 'sort_example', sub_aggregates: [Falcon::MsaAggregateQueryRequest.new({date_ranges: [Falcon::MsaDateRangeSpec.new({from: 'from_example', to: 'to_example'})], exclude: 'exclude_example', field: 'field_example', filter: 'filter_example', from: 37, include: 'include_example', interval: 'interval_example', missing: 'missing_example', name: 'name_example', q: 'q_example', ranges: [Falcon::MsaRangeSpec.new({from: 3.56, to: 3.56})], size: 37, sort: 'sort_example', sub_aggregates: [], time_zone: 'time_zone_example', type: 'type_example'})], time_zone: 'time_zone_example', type: 'type_example'})] # Array<MsaAggregateQueryRequest> | Query criteria and settings
begin
# Get detect aggregates as specified via json in request body.
result = api_instance.get_aggregate_detects(body)
p result
rescue Falcon::ApiError => e
puts "Error when calling Detects->get_aggregate_detects: #{e}"
end
This returns an Array which contains the response data, status code and headers.
<Array(, Integer, Hash)> get_aggregate_detects_with_http_info(body)
begin
# Get detect aggregates as specified via json in request body.
data, status_code, headers = api_instance.get_aggregate_detects_with_http_info(body)
p status_code # => 2xx
p headers # => { ... }
p data # => <MsaAggregatesResponse>
rescue Falcon::ApiError => e
puts "Error when calling Detects->get_aggregate_detects_with_http_info: #{e}"
end
Name | Type | Description | Notes |
---|---|---|---|
body | Array<MsaAggregateQueryRequest> | Query criteria and settings |
oauth2
- Content-Type: application/json
- Accept: application/json
get_detect_summaries(body)
View information about detections
require 'time'
require 'crimson-falcon'
# Setup authorization
Falcon.configure do |config|
config.client_id = "Your_Client_ID"
config.client_secret = "Your_Client_Secret"
config.cloud = "us-1" # or "us-2", "eu-1", "us-gov1"
end
api_instance = Falcon::Detects.new
body = Falcon::MsaIdsRequest.new({ids: ['ids_example']}) # MsaIdsRequest | View key attributes of detections, including the associated host, [disposition](https://falcon.crowdstrike.com/documentation/86/detections-monitoring-apis#pattern-disposition-value-descriptions), objective/tactic/technique, adversary, and more. Specify one or more detection IDs (max 1000 per request). Find detection IDs with the `/detects/queries/detects/v1` endpoint, the Falcon console, or the Streaming API.
begin
# View information about detections
result = api_instance.get_detect_summaries(body)
p result
rescue Falcon::ApiError => e
puts "Error when calling Detects->get_detect_summaries: #{e}"
end
This returns an Array which contains the response data, status code and headers.
<Array(, Integer, Hash)> get_detect_summaries_with_http_info(body)
begin
# View information about detections
data, status_code, headers = api_instance.get_detect_summaries_with_http_info(body)
p status_code # => 2xx
p headers # => { ... }
p data # => <DomainMsaDetectSummariesResponse>
rescue Falcon::ApiError => e
puts "Error when calling Detects->get_detect_summaries_with_http_info: #{e}"
end
Name | Type | Description | Notes |
---|---|---|---|
body | MsaIdsRequest | View key attributes of detections, including the associated host, disposition, objective/tactic/technique, adversary, and more. Specify one or more detection IDs (max 1000 per request). Find detection IDs with the `/detects/queries/detects/v1` endpoint, the Falcon console, or the Streaming API. |
DomainMsaDetectSummariesResponse
oauth2
- Content-Type: application/json
- Accept: application/json
query_detects(opts)
Search for detection IDs that match a given query
require 'time'
require 'crimson-falcon'
# Setup authorization
Falcon.configure do |config|
config.client_id = "Your_Client_ID"
config.client_secret = "Your_Client_Secret"
config.cloud = "us-1" # or "us-2", "eu-1", "us-gov1"
end
api_instance = Falcon::Detects.new
opts = {
offset: 56, # Integer | The first detection to return, where `0` is the latest detection. Use with the `limit` parameter to manage pagination of results.
limit: 56, # Integer | The maximum number of detections to return in this response (default: 9999; max: 9999). Use with the `offset` parameter to manage pagination of results.
sort: 'sort_example', # String | Sort detections using these options: - `first_behavior`: Timestamp of the first behavior associated with this detection - `last_behavior`: Timestamp of the last behavior associated with this detection - `max_severity`: Highest severity of the behaviors associated with this detection - `max_confidence`: Highest confidence of the behaviors associated with this detection - `adversary_id`: ID of the adversary associated with this detection, if any - `device.hostname`: Hostname of the host where this detection was detected Sort either `asc` (ascending) or `desc` (descending). For example: `last_behavior|asc`
filter: 'filter_example', # String | Filter detections using a query in Falcon Query Language (FQL) An asterisk wildcard `*` includes all results. Common filter options include: - `status` - `device.device_id` - `max_severity` The full list of valid filter options is extensive. Review it in our [documentation inside the Falcon console](https://falcon.crowdstrike.com/documentation/45/falcon-query-language-fql).
q: 'q_example' # String | Search all detection metadata for the provided string
}
begin
# Search for detection IDs that match a given query
result = api_instance.query_detects(opts)
p result
rescue Falcon::ApiError => e
puts "Error when calling Detects->query_detects: #{e}"
end
This returns an Array which contains the response data, status code and headers.
<Array(, Integer, Hash)> query_detects_with_http_info(opts)
begin
# Search for detection IDs that match a given query
data, status_code, headers = api_instance.query_detects_with_http_info(opts)
p status_code # => 2xx
p headers # => { ... }
p data # => <MsaQueryResponse>
rescue Falcon::ApiError => e
puts "Error when calling Detects->query_detects_with_http_info: #{e}"
end
Name | Type | Description | Notes |
---|---|---|---|
offset | Integer | The first detection to return, where `0` is the latest detection. Use with the `limit` parameter to manage pagination of results. | [optional] |
limit | Integer | The maximum number of detections to return in this response (default: 9999; max: 9999). Use with the `offset` parameter to manage pagination of results. | [optional] |
sort | String | Sort detections using these options: - `first_behavior`: Timestamp of the first behavior associated with this detection - `last_behavior`: Timestamp of the last behavior associated with this detection - `max_severity`: Highest severity of the behaviors associated with this detection - `max_confidence`: Highest confidence of the behaviors associated with this detection - `adversary_id`: ID of the adversary associated with this detection, if any - `device.hostname`: Hostname of the host where this detection was detected Sort either `asc` (ascending) or `desc` (descending). For example: `last_behavior | asc` |
filter | String | Filter detections using a query in Falcon Query Language (FQL) An asterisk wildcard `*` includes all results. Common filter options include: - `status` - `device.device_id` - `max_severity` The full list of valid filter options is extensive. Review it in our documentation inside the Falcon console. | [optional] |
q | String | Search all detection metadata for the provided string | [optional] |
oauth2
- Content-Type: Not defined
- Accept: application/json
update_detects_by_ids_v2(body)
Modify the state, assignee, and visibility of detections
require 'time'
require 'crimson-falcon'
# Setup authorization
Falcon.configure do |config|
config.client_id = "Your_Client_ID"
config.client_secret = "Your_Client_Secret"
config.cloud = "us-1" # or "us-2", "eu-1", "us-gov1"
end
api_instance = Falcon::Detects.new
body = Falcon::DomainDetectsEntitiesPatchRequest.new # DomainDetectsEntitiesPatchRequest | This endpoint modifies attributes (state and assignee) of detections. This endpoint accepts a query formatted as a JSON array of key-value pairs. You can update one or more attributes one or more detections with a single request. **`assigned_to_uuid` values** A user ID, such as `1234567891234567891` **`ids` values** One or more detection IDs, which you can find with the `/detects/queries/detects/v1` endpoint, the Falcon console, or the Streaming API. **`show_in_ui` values** - `true`: This detection is displayed in Falcon - `false`: This detection is not displayed in Falcon. Most commonly used together with the `status` key's `false_positive` value. **`status` values** - `new` - `in_progress` - `true_positive` - `false_positive` - `closed` - `ignored` **`comment` values** Optional comment to add to the detection. Comments are displayed with the detection in Falcon and usually used to provide context or notes for other Falcon users. A detection can have multiple comments over time.
begin
# Modify the state, assignee, and visibility of detections
result = api_instance.update_detects_by_ids_v2(body)
p result
rescue Falcon::ApiError => e
puts "Error when calling Detects->update_detects_by_ids_v2: #{e}"
end
This returns an Array which contains the response data, status code and headers.
<Array(, Integer, Hash)> update_detects_by_ids_v2_with_http_info(body)
begin
# Modify the state, assignee, and visibility of detections
data, status_code, headers = api_instance.update_detects_by_ids_v2_with_http_info(body)
p status_code # => 2xx
p headers # => { ... }
p data # => <MsaReplyMetaOnly>
rescue Falcon::ApiError => e
puts "Error when calling Detects->update_detects_by_ids_v2_with_http_info: #{e}"
end
Name | Type | Description | Notes |
---|---|---|---|
body | DomainDetectsEntitiesPatchRequest | This endpoint modifies attributes (state and assignee) of detections. This endpoint accepts a query formatted as a JSON array of key-value pairs. You can update one or more attributes one or more detections with a single request. `assigned_to_uuid` values A user ID, such as `1234567891234567891` `ids` values One or more detection IDs, which you can find with the `/detects/queries/detects/v1` endpoint, the Falcon console, or the Streaming API. `show_in_ui` values - `true`: This detection is displayed in Falcon - `false`: This detection is not displayed in Falcon. Most commonly used together with the `status` key's `false_positive` value. `status` values - `new` - `in_progress` - `true_positive` - `false_positive` - `closed` - `ignored` `comment` values Optional comment to add to the detection. Comments are displayed with the detection in Falcon and usually used to provide context or notes for other Falcon users. A detection can have multiple comments over time. |
oauth2
- Content-Type: application/json
- Accept: application/json