-
Notifications
You must be signed in to change notification settings - Fork 162
Quick Scan Pro
| Operation ID | Description | ||||
|---|---|---|---|---|---|
|
Uploads a file to be further analyzed with QuickScan Pro. The samples expire after 90 days. | ||||
|
Deletes file by its sha256 identifier. | ||||
|
Gets the result of an QuickScan Pro scan. | ||||
|
Starts scanning a file uploaded through UploadFileQuickScanPro. | ||||
|
Deletes the result of an QuickScan Pro scan. | ||||
|
Gets QuickScan Pro scan jobs for a given FQL filter. | ||||
WARNING
client_idandclient_secretare keyword arguments that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Uploads a file to be further analyzed with QuickScan Pro. The samples expire after 90 days.
upload_file
| Method | Route |
|---|---|
/quickscanpro/entities/files/v1 |
- Consumes: multipart/form-data
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| file | formData | file | Binary file to be uploaded. Max file size: 256 MB. | ||
| file_name | query | string | Name of the file being uploaded. | ||
| scan | formData | boolean | If True, after upload, it starts scanning immediately. Default scan mode is False. |
||
| password | formData | string | MULTIPART ONLY - Password for encrypted archives (use for multipart/form-data uploads). If scan is true, the value is used for the scan just starting. |
||
| x_file_password | header | string | OCTET-STREAM ONLY - Password for encrypted archives (use for octet-stream uploads). If scan is true, the value is used for the scan just starting. |
from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
scan_file = "file_to_scan.ext"
with open(scan_file, "rb") as file_upload:
response = falcon.upload_file(file=file_upload.read(), file_name=scan_file, scan=boolean)
print(response)from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
scan_file = "file_to_scan.ext"
with open(scan_file, "rb") as file_upload:
response = falcon.UploadFileQuickScanPro(file=file_upload.read(), file_name=scan_file, scan=boolean)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
scan_file = "file_to_scan.ext"
form_payload = {
"file_name": scan_file,
"scan": boolean
}
with open(scan_file, "rb") as file_upload:
response = falcon.command("UploadFileQuickScanPro",
files=[("file", ("UploadedFile", file_upload.read()))],
data=form_payload
)
print(response)Back to Table of Contents
Deletes file by its SHA256 identifier.
delete_file
| Method | Route |
|---|---|
/quickscanpro/entities/files/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids | query | string or list of strings | File's SHA256 | ||
| parameters | query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.delete_file(ids=id_list)
print(response)from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.DeleteFile(ids=id_list)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("DeleteFile", ids=id_list)
print(response)Back to Table of Contents
Gets the result of an QuickScan Pro scan.
get_scan_result
| Method | Route |
|---|---|
/quickscanpro/entities/scans/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids | query | string or list of strings | Scan job IDs previously created by LaunchScan. | ||
| parameters | query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_scan_result(ids=id_list)
print(response)from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.GetScanResult(ids=id_list)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("GetScanResult", ids=id_list)
print(response)Back to Table of Contents
Starts scanning a file uploaded through '/quickscanpro/entities/files/v1'.
launch_scan
| Method | Route |
|---|---|
/quickscanpro/entities/scans/v1 |
- Consumes: application/json
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload in JSON format. | ||
| sha256 | body | string | Full body payload in JSON format. |
from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.launch_scan(sha256="string")
print(response)from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.LaunchScan(sha256="string")
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"resources": [
{
"sha256": "string"
}
]
}
response = falcon.command("LaunchScan", body=body_payload)
print(response)Back to Table of Contents
Deletes the result of an QuickScan Pro scan.
delete_scan_result
| Method | Route |
|---|---|
/quickscanpro/entities/scans/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids | query | string or list of strings | Scan job IDs previously created by LaunchScan | ||
| parameters | query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.delete_scan_result(ids=id_list)
print(response)from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.DeleteScanResult(ids=id_list)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("DeleteScanResult", ids=id_list)
print(response)Back to Table of Contents
Gets QuickScan Pro scan jobs for a given FQL filter.
query_scan_results
| Method | Route |
|---|---|
/quickscanpro/queries/scans/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| filter | query | string |
Required. FQL query which mentions the SHA256 field. Empty value means to not filter on anything. Available filter fields that support match (~): _all, mitre_attacks.description. Available filter fields that support exact match: cid, sha256, id, status, type, entity, executor, verdict, verdict_reason, verdict_source, file_size, file_type_short, artifacts.file_artifacts.sha256, artifacts.file_artifacts.filename, artifacts.file_artifacts.verdict, artifacts.file_artifacts.verdict_reasons, artifacts.url_artifacts.url, artifacts.url_artifacts.verdict, artifacts.url_artifacts.verdict_reasons, mitre_attacks.attack_id, mitre_attacks.attack_id_wiki, mitre_attacks.tactic, mitre_attacks.technique, mitre_attacks.capec_id, mitre_attacks.parent.attack_id, mitre_attacks.parent.attack_id_wiki, mitre_attacks.parent.technique. Available filter fields that support wildcard (*): mitre_attacks.description. Available filter fields that support range comparisons (>, <, >=, <=): created_timestamp, updated_timestamp, file_size. All filter fields and operations support negation (!). _all field is used to search between all fields. |
||
| offset | query | integer | The offset to start retrieving ids from. | ||
| limit | query | integer | Maximum number of IDs to return. Max: 5000. Default: 50. | ||
| sort | query | string | Sort order: asc or desc. Sort supported fields created_timestamp
|
||
| parameters | query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_scan_results(filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)from falconpy import QuickScanPro
# Do not hardcode API credentials!
falcon = QuickScanPro(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.QueryScanResults(filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("QueryScanResults",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)Back to Table of Contents

- Home
- Discussions Board
- Glossary of Terms
- Installation, Upgrades and Removal
- Samples Collection
- Using FalconPy
- API Operations
-
Service Collections
- Admission Control Policies
- Alerts
- API Integrations
- ASPM
- CAO Hunting
- Case Management
- Certificate Based Exclusions
- Cloud AWS Registration
- Cloud Azure Registration
- Cloud GCP Registration
- Cloud OCI Registration
- Cloud Policies
- Cloud Connect AWS (deprecated)
- Cloud Security Assets
- Cloud Security
- Cloud Security Compliance
- Cloud Security Detections
- Cloud Snapshots
- Configuration Assessment
- Configuration Assessment Evaluation Logic
- Container Alerts
- Container Detections
- Container Image Compliance
- Container Images
- Container Packages
- Container Vulnerabilities
- Content Update Policies
- Correlation Rules
- Correlation Rules Admin
- CSPM Registration
- Custom IOAs
- Custom Storage
- D4C Registration (deprecated)
- Data Protection Configuration
- DataScanner (deprecated)
- Delivery Settings
- Deployments
- Detects (deprecated)
- Device Content
- Device Control Policies
- Discover
- Downloads
- Drift Indicators
- Event Streams
- Exposure Management
- FaaS Execution
- Falcon Complete Dashboard
- Falcon Container
- Falcon Intelligence Sandbox
- FDR
- FileVantage
- Firewall Management
- Firewall Policies
- Foundry LogScale
- Host Group
- Host Migration
- Hosts
- Identity Protection
- Image Assessment Policies
- Incidents
- Installation Tokens
- Intel
- Intelligence Feeds
- Intelligence Indicator Graph
- IOA Exclusions
- IOC
- IOCs (deprecated)
- IT Automation
- Kubernetes Container Compliance
- Kubernetes Protection
- MalQuery
- Message Center
- ML Exclusions
- Mobile Enrollment
- MSSP (Flight Control)
- NGSIEM
- OAuth2
- ODS (On Demand Scan)
- Prevention Policy
- Quarantine
- Quick Scan
- Quick Scan Pro
- Real Time Response
- Real Time Response Admin
- Real Time Response Audit
- Recon
- Report Executions
- Response Policies
- Sample Uploads
- SaaS Security
- Scheduled Reports
- Sensor Download
- Sensor Update Policy
- Sensor Usage
- Sensor Visibility Exclusions
- Serverless Exports
- Serverless Vulnerabilities
- Spotlight Evaluation Logic
- Spotlight Vulnerabilities
- Spotlight Vulnerability Metadata
- Tailored Intelligence
- ThreatGraph
- Unidentified Containers
- User Management
- Workflows
- Zero Trust Assessment
- Documentation Support
-
CrowdStrike SDKs
- Crimson Falcon - Ruby
- FalconPy - Python 3
- FalconJS - Javascript
- goFalcon - Go
- PSFalcon - Powershell
- Rusty Falcon - Rust
