Skip to content

Latest commit

 

History

History

falcon_detection_details

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Falcon Detection Details

Stand-alone tool that uses Detects API to query all the detection details and output JSON to the stdout. This tool can be used together with JSON parsing tools like jq in order to build reports of your liking.

Installation

go get github.com/crowdstrike/gofalcon/examples/falcon_detection_details

Exemplary Usage

Get full details of all the detections

$ FALCON_CLIENT_ID="abc" FALCON_CLIENT_SECRET="XYZ" FALCON_CLOUD=us-1 \
      falcon_detection_details

Get total number of all detections

falcon_detection_details | jq length

List command-line of the processes that triggered detection.

falcon_detection_details  | jq 'map(.behaviors[].cmdline)'

List affected hostnames and the command-lines together as a key-value dictionary. (Note: this will only show the very latest detection per each hostname, when the hostname was associated with multiple detections)

falcon_detection_details  | jq -r ' map( { (.device.hostname) : .behaviors[].cmdline } ) | add'

List detections that have not yet been assigned to a responsible person

$ falcon_detection_details --filter="assigned_to_uid:NULL"

Please refer to Falcon Detection Monitoring API documentation to learn more about FQL filter parameter, the meaning of the entity properties, and best practices. Further, please refer to jq tool manual to learn how to effectively post-process JSON outputs in command-line.