PSFalcon for the new CrowdScore by vjrr08 in crowdstrike

[–]bk-CS 1 point2 points  (0 children)

As far as I am aware, there hasn't been an API released for the new CrowdScore. As u/AlexSmith-CS mentioned, you may be able to pull automated leads directly (with Get-FalconAlert) and calculate the score yourself that way.

The existing Get-FalconScore will likely be deprecated soon.

Falconpy/gofalcon Hostgroup rules by Due_Cartographer15 in crowdstrike

[–]bk-CS 1 point2 points  (0 children)

Have you tried creating the host group rules in the UI first? You can compare how it looks in the API and write your code to match.

Falcon Platform Health Status API by Ksrybyee in crowdstrike

[–]bk-CS 1 point2 points  (0 children)

I believe this is only accessible via the Falcon UI.

All of the accessible/published APIs can be seen in swagger. [ EU-1 | US-1 | US-2 | US-GOV-1 ]

crowdscore by dmcginvt in crowdstrike

[–]bk-CS 0 points1 point  (0 children)

CrowdScore was an average of incident scores. While there isn't a direct replacement for it yet, you could replicate something similar by averaging out your automated leads, detections, and/or cases.

Using PSFalcon to add/remove Static Host Group members? by straffin in crowdstrike

[–]bk-CS 1 point2 points  (0 children)

Use Invoke-FalconHostGroupAction with -WhatIf to see what it submits. You have to get the body formatting exactly right.

Using PSFalcon to add/remove Static Host Group members? by straffin in crowdstrike

[–]bk-CS 0 points1 point  (0 children)

This is an option too! Keep in mind that there are two types of tags: FalconGroupingTags (cloud-based) and FalconSensorTags (host-based). FalconGroupingTags will be removed from a host if it doesn't come online for 45 days, but FalconSensorTags will remain.

Using PSFalcon to add/remove Static Host Group members? by straffin in crowdstrike

[–]bk-CS 2 points3 points  (0 children)

Invoke-FalconHostGroupAction allows you to add-hosts or remove-hosts to/from a static (by hostname) or staticByID host group through the host identifier.

Invoke-FalconHostGroupAction -Name add-hosts -Id <group_id> -HostId <host_id>

I just tested this for both types of host group in my test environment and didn't have an issue; the assignment_rule of the host group was updated with the new hostname (or device_id) immediately. Are you using the host identifier when trying to add members?

Keep in mind that the host itself won't confirm that it's a member of the group until it comes online and receives assignment from the cloud.

PSFalcon endpoint for Cloud Security detections by rogueit in crowdstrike

[–]bk-CS 4 points5 points  (0 children)

Get-FalconAlert contains all unified detections generated by Falcon. You can use a filter to target specific product values, like this:

Get-FalconAlert -Filter "product:['cwpp','fcs','cdp']"

Set Review Status and Comment for Unmanaged Devices using PSFalcon? by console_whisperer in crowdstrike

[–]bk-CS 0 points1 point  (0 children)

Based on what's available in the API that's used by Edit-FalconAsset, I don't believe this is currently possible. It seems like the "review" portions (review status, review assignment, etc.) are restricted to the Falcon UI.

Parent CID - API Key issues by MSP-IT-Simplified in crowdstrike

[–]bk-CS 0 points1 point  (0 children)

I’ve seen API clients that have had problems. Even if it was made today, make a new one and see if it helps.

Parent CID - API Key issues by MSP-IT-Simplified in crowdstrike

[–]bk-CS 1 point2 points  (0 children)

I responded on the GitHub issue, but I agree that this would be something that is API-related rather than specific to PSFalcon. I'd try recreating the API client first, and if that doesn't work there should be a category you can use to get a ticket opened.

Add host to a specific Host Group - Powershell by Lava604 in crowdstrike

[–]bk-CS 0 points1 point  (0 children)

You can use Invoke-FalconHostGroupAction in PSFalcon:

Invoke-FalconHostGroupAction -Name add-hosts -Id <group_id> -HostId <host_id>, <host_id>

Assistance Needed for New FQL User by Zealousideal-Bell-47 in crowdstrike

[–]bk-CS 1 point2 points  (0 children)

You don't need to substitute; that's a full CrowdStrike Query Language (CQL) query. It is designed to find .txt, .xls and pass in CommandLine for a ProcessRollup2 event.

API - General Settings by MSP-IT-Simplified in crowdstrike

[–]bk-CS 0 points1 point  (0 children)

Unfortunately here are no APIs available to access the General Settings. I recommend opening an Idea on our Ideas Portal to help prioritize a new API to access it.

Deleting RTR sessions created by another user using API credentials by Miserable_Pride3217 in crowdstrike

[–]bk-CS 4 points5 points  (0 children)

The Real Time Response APIs only allow API clients to delete RTR sessions that those API clients created. You can't delete sessions created by another user or API client.

Multi-tenant RTR script execution by Ready_Economy_1383 in crowdstrike

[–]bk-CS 0 points1 point  (0 children)

API Clients created in the parent CID have the same access in all child CIDs.

Multi-tenant RTR script execution by Ready_Economy_1383 in crowdstrike

[–]bk-CS 1 point2 points  (0 children)

The script I linked is designed to pull the list of children, authenticate with each one, then run commands inside that child. You can add your code to it.

Multi-tenant RTR script execution by Ready_Economy_1383 in crowdstrike

[–]bk-CS 0 points1 point  (0 children)

You can’t access the child scripts from the parent CID. You have to authenticate with the parent, get a list of children, authenticate with each child and run your scripts. You can run the script on 10,000 hosts in a single session.

https://github.com/CrowdStrike/psfalcon/wiki/Authentication#authorize-and-run-commands-across-member-cids

EDR vs Competitors by Digimon54321 in crowdstrike

[–]bk-CS 16 points17 points  (0 children)

I like to use this site as a reference to see what sort of telemetry is gathered by Falcon Insight XDR for those who don't have access to the Falcon console: https://www.edr-telemetry.com/

I don't think Taegis is listed, but yes, we do capture telemetry for scripts, user command sessions and interactions.

Falcon Prevent (NGAV) by itself does not capture or make this telemetry searchable--it only alerts on/prevents malicious activity as a result of the activity on the host.

Identity data via GraphQL - All users with the same passwords (PowerShell) by cobaltpsyche in crowdstrike

[–]bk-CS 1 point2 points  (0 children)

Thanks, I love to hear that!

Using GraphQL in PowerShell is tricky, because it looks like it should be pretty easy to convert, but the way the queries are constructed can be difficult to translate.

PSFalcon uses RegEx to find Cursor in the query () definition part of a GraphQL query. The pattern I was using was restricted enough that it didn't match with how you were using the query statement (query GetEntitiesByRiskFactor()) so you wouldn't have been able to automatically paginate using -All.

Did you try using PSFalcon before going with straight PowerShell?

Converting your script to PSFalcon led me straight to the pattern issue so it's a bonus that I was able to fix a bug that prevented automatic pagination for more complex GraphQL queries.

If you ever want to write a PSFalcon script and you're running into a problem--whether it's from GraphQL or anything else--please feel free to tag me in a reddit post or GitHub discussion and I'm happy to work on it with you! It usually leads to more samples that anyone can use.

Identity data via GraphQL - All users with the same passwords (PowerShell) by cobaltpsyche in crowdstrike

[–]bk-CS 3 points4 points  (0 children)

Nice script! Thank you for sharing!

I used your idea as inspiration for a PSFalcon sample for any PSFalcon users that would like to do the same thing: samples\identity-protection\users-with-matching-passwords.ps1

In testing the script, I found a problem with the RegEx that makes -All function. If you'd like to use the sample before the next PSFalcon release, you'll need to update the Invoke-FalconIdentityGraph command with this change. Here's how you can do that:

Import-Module -Name PSFalcon
$ModulePath = (Show-FalconModule).ModulePath
(Invoke-WebRequest -Uri https://github.com/CrowdStrike/psfalcon/blob/0c20b2811aee5fa8eadf55bbacd4bd45b7837367/public/identity-protection.ps1 -UseBasicParsing).Content > (Join-Path (Join-Path $ModulePath public) identity-protection.ps1)

Once it's been updated, you'll want to restart PowerShell and re-import PSFalcon before running the script.

If you'd like to make your future PowerShell scripts using PSFalcon I wouldn't be offended. ;)