-
Notifications
You must be signed in to change notification settings - Fork 72
New FalconIoaRule
bk-cs edited this page Sep 22, 2022
·
22 revisions
Create a custom Indicator of Attack rule within a rule group
Requires 'Custom IOA Rules: Write'.
Name | Type | Min | Max | Pattern | Allowed | Pipeline | PipelineByName | Description |
---|---|---|---|---|---|---|---|---|
Name | String | False | True | Rule name | ||||
PatternSeverity | String |
critical high medium low informational
|
False | True | Rule severity | |||
RuletypeId | String |
1 2 5 6 9 10 11 12
|
False | True | Rule type | |||
DispositionId | Int32 |
10 20 30
|
False | True | Disposition identifier [10: Monitor, 20: Detect, 30: Block] | |||
FieldValue | Object[] | False | True | An array of rule properties | ||||
Description | String | False | True | Rule description | ||||
Comment | String | False | True | Audit log comment | ||||
RulegroupId | String | ^[a-fA-F0-9]{32}$ |
False | True | Rule group identifier |
New-FalconIoaRule [-Name] <String> [-PatternSeverity] <String> [-RuletypeId] <String> [-DispositionId] <Int32> -FieldValue] <Object[]> [[-Description] <String>] [[-Comment] <String>] [-RulegroupId] <String> [-WhatIf] [-Confirm] <CommonParameters>]
Generated 20220922 using PSFalcon v2.2.3
- Using PSFalcon
-
Commands by Permission
- Actors (Falcon Intelligence)
- Alerts
- API integrations
- App Logs
- Channel File Control Settings
- Configuration Assessment
- Content Update Policies
- Correlation Rules
- CSPM registration
- Custom IOA rules
- Detections
- Device Content
- Device control policies
- Event streams
- Falcon Complete Dashboards
- Falcon Container Image
- Falcon Data Replicator
- Falcon Discover
- Falcon FileVantage
- Falcon FileVantage Content
- Firewall management
- Flight Control
- Host groups
- Host Migration
- Hosts
- Identity Protection Entities
- Identity Protection GraphQL
- Identity Protection Policy Rules
- Incidents
- Indicators (Falcon Intelligence)
- Installation tokens
- Installation token settings
- IOA Exclusions
- IOC Manager APIs
- IOCs
- Kubernetes Protection
- Machine Learning exclusions
- MalQuery
- Malware Families (Falcon Intelligence)
- Message Center
- Mobile Enrollment
- Monitoring rules (Falcon Intelligence Recon)
- On demand scans (ODS)
- OverWatch Dashboard
- Prevention Policies
- Quarantined Files
- QuickScan Pro
- Real time response
- Real time response (admin)
- Reports (Falcon Intelligence)
- Response policies
- Rules (Falcon Intelligence)
- Sample uploads
- Sandbox (Falcon Intelligence)
- Scheduled Reports
- Sensor Download
- Sensor update policies
- Sensor Usage
- Sensor Visibility Exclusions
- Snapshot
- Snapshot Scanner Image Download
- Tailored Intelligence
- Threatgraph
- User management
- Vulnerabilities
- Vulnerabilities (Falcon Intelligence)
- Workflow
- Zero Trust Assessment
- Other Commands
- Examples
-
CrowdStrike SDKs
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust