-
Notifications
You must be signed in to change notification settings - Fork 162
Admission Control Policies
| Operation ID | Description | ||||
|---|---|---|---|---|---|
|
Get admission control policies. | ||||
|
Create an admission control policy. | ||||
|
Update an admission control policy. | ||||
|
Delete an admission control policy. | ||||
|
Add one or more host groups to an admission control policy. | ||||
|
Remove one or more host groups from an admission control policy. | ||||
|
Update admission control policy precedence. | ||||
|
Add one or more custom Rego rules to a rule group in an admission control policy. | ||||
|
Delete one or more custom Rego rules from all rule groups in an admission control policy. | ||||
|
Change precedence of rule groups within an admission control policy. | ||||
|
Replace labels and/or namespaces of a rule group within an admission control policy. | ||||
|
Create one or more rule groups and add them to an existing admission control policy. | ||||
|
Update a rule group. | ||||
|
Delete rule groups. | ||||
|
Search admission control policies. | ||||
WARNING
client_idandclient_secretare keyword arguments that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Get admission control policies.
get_policies
| Method | Route |
|---|---|
/admission-control-policies/entities/policies/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids | query | string or list of strings | The list of policies to return (maximum 100 IDs allowed). | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_policies(ids=id_list)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.admission_control_get_policies(ids=id_list)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("admission_control_get_policies", ids=id_list)
print(response)Back to Table of Contents
Create an admission control policy.
create_policy
| Method | Route |
|---|---|
/admission-control-policies/entities/policies/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| description | body | string | Policy description. | ||
| name | body | string | Policy name. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.create_policy(description="string", name="string")
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_create_policy(description="string", name="string")
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"description": "string",
"name": "string"
}
response = falcon.command("admission_control_create_policy", body=body_payload)
print(response)Back to Table of Contents
Update an admission control policy.
update_policy
| Method | Route |
|---|---|
/admission-control-policies/entities/policies/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids | query | string | The id of the admission control policy to update. | ||
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| description | body | string | Policy description. | ||
| is_enabled | body | boolean | Flag indicating if the policy is enabled. | ||
| name | body | string | Policy name. | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.update_policy(ids="string",
description="string",
is_enabled=boolean,
name="string"
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_update_policy(ids="string",
description="string",
is_enabled=boolean,
name="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"description": "string",
"is_enabled": boolean,
"name": "string"
}
response = falcon.command("admission_control_update_policy", ids="string", body=body_payload)
print(response)Back to Table of Contents
Delete an admission control policy.
delete_policies
| Method | Route |
|---|---|
/admission-control-policies/entities/policies/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids | query | string or list of strings | The ids of the policies to delete (maximum 100 IDs allowed). | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.delete_policies(ids=id_list)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.admission_control_delete_policies(ids=id_list)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("admission_control_delete_policies", ids=id_list)
print(response)Back to Table of Contents
Add one or more host groups to an admission control policy.
add_host_groups
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-host-groups/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| host_groups | body | string or list of strings | Host group IDs to add. | ||
| id | body | string | The policy ID to modify. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.add_host_groups(host_groups=["string", "string"],
id="string"
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_add_host_groups(host_groups=["string", "string"],
id="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"host_groups": [
"string"
],
"id": "string"
}
response = falcon.command("admission_control_add_host_groups", body=body_payload)
print(response)Back to Table of Contents
Remove one or more host groups from an admission control policy.
remove_host_groups
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-host-groups/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| policy_id | query | string | The id of the policy to modify. | ||
| host_group_ids | query | string or list of strings | The ids of the host groups to remove (maximum 100 IDs allowed). | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.remove_host_groups(policy_id="string",
host_group_ids=["string", "string"]
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_remove_host_groups(policy_id="string",
host_group_ids=["string", "string"]
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("admission_control_remove_host_groups",
policy_id="string",
host_group_ids=["string", "string"]
)
print(response)Back to Table of Contents
Update admission control policy precedence.
update_policy_precedence
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-precedence/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| id | body | string | Policy ID. | ||
| precedence | body | integer | Policy precedence. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.update_policy_precedence(id="string", precedence=integer)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_update_policy_precedence(id="string",
precedence=integer
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"precedence": integer
}
response = falcon.command("admission_control_update_policy_precedence", body=body_payload)
print(response)Back to Table of Contents
Add one or more custom Rego rules to a rule group in an admission control policy. The requested custom rules are also added to all other unspecified rule groups in the policy with action 'Disabled'.
add_custom_rules
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-group-custom-rules/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| id | body | string | Policy ID. | ||
| rule_groups | body | list of dictionaries | Rule groups containing custom rules to add. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"id": "string"
}
]
response = falcon.add_custom_rules(id="string", rule_groups=rule_groups)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"id": "string"
}
]
response = falcon.admission_control_add_rule_group_custom_rule(id="string",
rule_groups=rule_groups
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"rule_groups": [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"id": "string"
}
]
}
response = falcon.command("admission_control_add_rule_group_custom_rule", body=body_payload)
print(response)Back to Table of Contents
Delete one or more custom Rego rules from all rule groups in an admission control policy.
delete_custom_rules
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-group-custom-rules/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| policy_id | query | string | The id of the policy to modify. | ||
| custom_rule_ids | query | string or list of strings | The ids of the custom Rego rules to delete (maximum 100 IDs allowed). | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.delete_custom_rules(policy_id="string",
custom_rule_ids=["string", "string"]
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_remove_rule_group_custom_rule(policy_id="string",
custom_rule_ids=["string", "string"]
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("admission_control_remove_rule_group_custom_rule",
policy_id="string",
custom_rule_ids=["string", "string"]
)
print(response)Back to Table of Contents
Change precedence of rule groups within an admission control policy.
set_rule_group_precedence
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-group-precedence/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| id | body | string | Policy ID. | ||
| rule_groups | body | list of dictionaries | List of rule groups in precedence order. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"id": "string"
}
]
response = falcon.set_rule_group_precedence(id="string", rule_groups=rule_groups)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"id": "string"
}
]
response = falcon.admission_control_set_rule_group_precedence(id="string",
rule_groups=rule_groups
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"rule_groups": [
{
"id": "string"
}
]
}
response = falcon.command("admission_control_set_rule_group_precedence", body=body_payload)
print(response)Back to Table of Contents
Replace labels and/or namespaces of a rule group within an admission control policy.
replace_rule_group_selectors
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-group-selectors/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| id | body | string | Policy ID. | ||
| rule_groups | body | list of dictionaries | Rule groups with labels and/or namespaces to replace. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"id": "string",
"labels": [
{
"key": "string",
"operator": "string",
"value": "string"
}
],
"namespaces": [
{
"value": "string"
}
]
}
]
response = falcon.replace_rule_group_selectors(id="string", rule_groups=rule_groups)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"id": "string",
"labels": [
{
"key": "string",
"operator": "string",
"value": "string"
}
],
"namespaces": [
{
"value": "string"
}
]
}
]
response = falcon.admission_control_replace_rule_group_selectors(id="string",
rule_groups=rule_groups
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"rule_groups": [
{
"id": "string",
"labels": [
{
"key": "string",
"operator": "string",
"value": "string"
}
],
"namespaces": [
{
"value": "string"
}
]
}
]
}
response = falcon.command("admission_control_replace_rule_group_selectors", body=body_payload)
print(response)Back to Table of Contents
Create one or more rule groups and add them to an existing admission control policy.
create_rule_groups
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-groups/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| id | body | string | Policy ID. | ||
| rule_groups | body | list of dictionaries | Rule groups to create. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"description": "string",
"name": "string"
}
]
response = falcon.create_rule_groups(id="string", rule_groups=rule_groups)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"description": "string",
"name": "string"
}
]
response = falcon.admission_control_create_rule_groups(id="string",
rule_groups=rule_groups
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"rule_groups": [
{
"description": "string",
"name": "string"
}
]
}
response = falcon.command("admission_control_create_rule_groups", body=body_payload)
print(response)Back to Table of Contents
Update a rule group. Change rule group name, description, deny on error, Image Assessment settings, default rule actions, and custom rule actions.
update_rule_groups
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-groups/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. Valid rule action values: Disabled, Prevent, Alert. Valid image assessment unassessed handling values: Prevent, Alert, Allow Without Alert. |
||
| id | body | string | Policy ID. | ||
| rule_groups | body | list of dictionaries | Rule groups to update. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"default_rules": [
{
"action": "string",
"code": "string"
}
],
"deny_on_error": {
"deny": boolean
},
"description": "string",
"id": "string",
"image_assessment": {
"enabled": boolean,
"unassessed_handling": "string"
},
"name": "string"
}
]
response = falcon.update_rule_groups(id="string", rule_groups=rule_groups)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"default_rules": [
{
"action": "string",
"code": "string"
}
],
"deny_on_error": {
"deny": boolean
},
"description": "string",
"id": "string",
"image_assessment": {
"enabled": boolean,
"unassessed_handling": "string"
},
"name": "string"
}
]
response = falcon.admission_control_update_rule_groups(id="string",
rule_groups=rule_groups
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"rule_groups": [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"default_rules": [
{
"action": "string",
"code": "string"
}
],
"deny_on_error": {
"deny": boolean
},
"description": "string",
"id": "string",
"image_assessment": {
"enabled": boolean,
"unassessed_handling": "string"
},
"name": "string"
}
]
}
response = falcon.command("admission_control_update_rule_groups", body=body_payload)
print(response)Back to Table of Contents
Delete rule groups.
delete_rule_groups
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-groups/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| policy_id | query | string | The id of the policy to modify. | ||
| rule_group_ids | query | string or list of strings | The ids of the rule groups to delete (maximum 100 IDs allowed). | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.delete_rule_groups(policy_id="string",
rule_group_ids=["string", "string"]
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_delete_rule_groups(policy_id="string",
rule_group_ids=["string", "string"]
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("admission_control_delete_rule_groups",
policy_id="string",
rule_group_ids=["string", "string"]
)
print(response)Back to Table of Contents
Search admission control policies.
query_policies
| Method | Route |
|---|---|
/admission-control-policies/queries/policies/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| filter | query | string | FQL filter. Allowed properties: precedence, created_timestamp, modified_timestamp, name, description. |
||
| limit | query | integer | The maximum number of resources to return. The maximum allowed is 500. [Default: 100] | ||
| offset | query | integer | The number of results to skip before starting to return results. [Default: 0] | ||
| sort | query | string | Field to sort on. Sortable fields: precedence, created_timestamp, modified_timestamp. Use the |asc or |desc suffix to specify sort direction. |
||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_policies(filter="string",
limit=integer,
offset=integer,
sort="string"
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_query_policies(filter="string",
limit=integer,
offset=integer,
sort="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("admission_control_query_policies",
filter="string",
limit=integer,
offset=integer,
sort="string"
)
print(response)Back to Table of Contents

- Home
- Discussions Board
- Glossary of Terms
- Installation, Upgrades and Removal
- Samples Collection
- Using FalconPy
- API Operations
-
Service Collections
- Admission Control Policies
- Alerts
- API Integrations
- ASPM
- CAO Hunting
- Case Management
- Certificate Based Exclusions
- Cloud AWS Registration
- Cloud Azure Registration
- Cloud GCP Registration
- Cloud OCI Registration
- Cloud Policies
- Cloud Connect AWS (deprecated)
- Cloud Security Assets
- Cloud Security
- Cloud Security Compliance
- Cloud Security Detections
- Cloud Snapshots
- Configuration Assessment
- Configuration Assessment Evaluation Logic
- Container Alerts
- Container Detections
- Container Image Compliance
- Container Images
- Container Packages
- Container Vulnerabilities
- Content Update Policies
- Correlation Rules
- Correlation Rules Admin
- CSPM Registration
- Custom IOAs
- Custom Storage
- D4C Registration (deprecated)
- Data Protection Configuration
- DataScanner (deprecated)
- Delivery Settings
- Deployments
- Detects (deprecated)
- Device Content
- Device Control Policies
- Discover
- Downloads
- Drift Indicators
- Event Streams
- Exposure Management
- FaaS Execution
- Falcon Complete Dashboard
- Falcon Container
- Falcon Intelligence Sandbox
- FDR
- FileVantage
- Firewall Management
- Firewall Policies
- Foundry LogScale
- Host Group
- Host Migration
- Hosts
- Identity Protection
- Image Assessment Policies
- Incidents
- Installation Tokens
- Intel
- Intelligence Feeds
- Intelligence Indicator Graph
- IOA Exclusions
- IOC
- IOCs (deprecated)
- IT Automation
- Kubernetes Container Compliance
- Kubernetes Protection
- MalQuery
- Message Center
- ML Exclusions
- Mobile Enrollment
- MSSP (Flight Control)
- NGSIEM
- OAuth2
- ODS (On Demand Scan)
- Prevention Policy
- Quarantine
- Quick Scan
- Quick Scan Pro
- Real Time Response
- Real Time Response Admin
- Real Time Response Audit
- Recon
- Report Executions
- Response Policies
- Sample Uploads
- SaaS Security
- Scheduled Reports
- Sensor Download
- Sensor Update Policy
- Sensor Usage
- Sensor Visibility Exclusions
- Serverless Exports
- Serverless Vulnerabilities
- Spotlight Evaluation Logic
- Spotlight Vulnerabilities
- Spotlight Vulnerability Metadata
- Tailored Intelligence
- ThreatGraph
- Unidentified Containers
- User Management
- Workflows
- Zero Trust Assessment
- Documentation Support
-
CrowdStrike SDKs
- Crimson Falcon - Ruby
- FalconPy - Python 3
- FalconJS - Javascript
- goFalcon - Go
- PSFalcon - Powershell
- Rusty Falcon - Rust
