-
Notifications
You must be signed in to change notification settings - Fork 162
Response Policies
| Operation ID | Description | ||||
|---|---|---|---|---|---|
|
Search for members of a Response policy in your environment by providing a FQL filter and paging details. Returns a set of host details which match the filter criteria | ||||
|
Search for Response Policies in your environment by providing a FQL filter and paging details. Returns a set of Response Policies which match the filter criteria | ||||
|
Perform the specified action on the Response Policies specified in the request | ||||
|
Sets the precedence of Response Policies based on the order of IDs specified in the request. The first ID specified will have the highest precedence and the last ID specified will have the lowest. You must specify all non-Default Policies for a platform when updating precedence | ||||
|
Retrieve a set of Response Policies by specifying their IDs | ||||
|
Create Response Policies by specifying details about the policy to create | ||||
|
Delete a set of Response Policies by specifying their IDs | ||||
|
Update Response Policies by specifying the ID of the policy and details to update | ||||
|
Search for members of a Response policy in your environment by providing a FQL filter and paging details. Returns a set of Agent IDs which match the filter criteria | ||||
|
Search for Response Policies in your environment by providing a FQL filter with sort and/or paging details. This returns a set of Response Policy IDs that match the given criteria. | ||||
WARNING
client_idandclient_secretare keyword arguments that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Search for members of a Response policy in your environment by providing a FQL filter and paging details. Returns a set of host details which match the filter criteria
query_combined_policy_members
| Method | Route |
|---|---|
/policy/combined/response-members/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| id |
|
|
query | string | The ID of the Response policy to search for members of. |
| filter |
|
|
query | string | The filter expression that should be used to limit the results. |
| offset |
|
|
query | integer | The offset to start retrieving records from. |
| limit |
|
|
query | integer | The maximum records to return. [1-5000] |
| sort |
|
|
query | string | The property to sort by. |
| parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_combined_policy_members(id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.queryCombinedRTResponsePolicyMembers(id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("queryCombinedRTResponsePolicyMembers",
id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)Back to Table of Contents
Search for Response Policies in your environment by providing a FQL filter and paging details. Returns a set of Response Policies which match the filter criteria
query_combined_policies
| Method | Route |
|---|---|
/policy/combined/response/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| filter |
|
|
query | string | The filter expression that should be used to limit the results. |
| offset |
|
|
query | integer | The offset to start retrieving records from. |
| limit |
|
|
query | integer | The maximum records to return. [1-5000] |
| sort |
|
|
query | string | The property to sort by. |
| parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_combined_policies(filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.queryCombinedRTResponsePolicies(filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
PARAMS = {
"filter": "string",
"offset": integer,
"limit": integer,
"sort": "string"
}
response = falcon.command("queryCombinedRTResponsePolicies",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)Back to Table of Contents
Perform the specified action on the Response Policies specified in the request
perform_policies_action
| Method | Route |
|---|---|
/policy/entities/response-actions/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| action_name |
|
|
query | string | The action to perform. Allowed values:
|
| action_parameters |
|
|
body | list of dictionaries | List of name / value pairs in JSON format. |
| body |
|
|
body | dictionary | Full body payload in JSON format. |
| group_id |
|
|
body action_parameters |
string | Host Group ID to apply the policy to. String. Overridden if action_parameters is specified. |
| ids |
|
|
body | string or list of strings | Response Policy ID(s) to perform actions against. |
| parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.perform_policies_action(action_name="string",
group_id="HOST_GROUP_ID",
ids="ID_TO_UPDATE"
)
print(response)from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
# Can also be provided using the keyword `group_id`
act_params = [{
"name": "group_id",
"value": "HOST_GROUP_ID"
}]
response = falcon.performRTResponsePoliciesAction(action_name="string",
action_parameters=act_params,
ids="ID_TO_UPDATE"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
PARAMS = {
"action_name": "string" # Can also pass action_name using a keyword
}
act_params = [{
"name": "group_id",
"value": "HOST_GROUP_ID"
}]
# Only one ID may be updated at a time
BODY = {
"action_parameters": act_params,
"ids": ["ID_TO_UPDATE"]
}
response = falcon.command("performRTResponsePoliciesAction", parameters=PARAMS, body=BODY)
print(response)Back to Table of Contents
Sets the precedence of Response Policies based on the order of IDs specified in the request. The first ID specified will have the highest precedence and the last ID specified will have the lowest. You must specify all non-Default Policies for a platform when updating precedence
set_policies_precedence
| Method | Route |
|---|---|
/policy/entities/response-precedence/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body |
|
|
body | dictionary | Full body payload in JSON format. |
| ids |
|
|
body | string or list of strings | Response Policy ID(s) to adjust precedence. |
| platform_name |
|
|
body | string | OS platform name. (Linux, Mac, Windows) |
from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = "ID1,ID2,ID3" # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.set_policies_precedence(ids=id_list, platform_name="string")
print(response)from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = "ID1,ID2,ID3" # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.setRTResponsePoliciesPrecedence(ids=id_list, platform_name="string")
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = ['ID1', 'ID2', 'ID3']
BODY = {
"ids": id_list,
"platform_name": "string"
}
response = falcon.command("setRTResponsePoliciesPrecedence", body=BODY)
print(response)Back to Table of Contents
Retrieve a set of Response Policies by specifying their IDs
get_policies
| Method | Route |
|---|---|
/policy/entities/response/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids |
|
|
query | string or list of strings | The ID(s) of the Response Policies to return. |
| parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_policies(ids=id_list)
print(response)from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.getRTResponsePolicies(ids=id_list)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("getRTResponsePolicies", ids=id_list)
print(response)Back to Table of Contents
Create Response Policies by specifying details about the policy to create
create_policies
| Method | Route |
|---|---|
/policy/entities/response/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body |
|
|
body | dictionary | Full body payload in JSON format. |
| clone_id |
|
|
body | string | Response Policy ID to clone. |
| description |
|
|
body | string | Response Policy description. |
| name |
|
|
body | string | Response Policy name. |
| platform_name |
|
|
body | string | Operating system platform name. |
| settings |
|
|
body | list of dictionaries | List of policy-specific settings to apply to the newly created policy. Multiple settings can be applied by passing a list containing multiple entries. |
from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
policy_settings = {
"id": "string",
"value": {}
}
response = falcon.create_policies(clone_id="string",
description="string",
name="string",
platform_name="string",
settings=policy_settings
)
print(response)from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
policy_settings = {
"id": "string",
"value": {}
}
response = falcon.createRTResponsePolicies(clone_id="string",
description="string",
name="string",
platform_name="string",
settings=policy_settings
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = {
"resources": [
{
"clone_id": "string",
"description": "string",
"name": "string",
"platform_name": "string",
"settings": [
{
"id": "string",
"value": {}
}
]
}
]
}
response = falcon.command("createRTResponsePolicies", body=BODY)
print(response)Back to Table of Contents
Delete a set of Response Policies by specifying their IDs
delete_policies
| Method | Route |
|---|---|
/policy/entities/response/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids |
|
|
query | string or list of strings | The ID(s) of the Response Policies to delete. |
| parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.delete_policies(ids=id_list)
print(response)from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.deleteRTResponsePolicies(ids=id_list)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("deleteRTResponsePolicies", ids=id_list)
print(response)Back to Table of Contents
Update Response Policies by specifying the ID of the policy and details to update
update_policies
| Method | Route |
|---|---|
/policy/entities/response/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body |
|
|
body | dictionary | Full body payload in JSON format. |
| description |
|
|
body | string | Prevention Policy description. |
| id |
|
|
body | string | Prevention Policy ID to update. |
| name |
|
|
body | string | Prevention Policy name. |
| settings |
|
|
body | list of dictionaries | List of policy-specific settings to apply to the newly created policy. Multiple settings can be applied by passing a list containing multiple entries. |
from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
policy_settings = {
"id": "string",
"value": "string"
}
response = falcon.update_policies(id="string",
description="string",
name="string",
settings=policy_settings
)
print(response)from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
policy_settings = {
"id": "string",
"value": "string"
}
response = falcon.updateRTResponsePolicies(id="string",
description="string",
name="string",
settings=policy_settings
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = {
"resources": [
{
"description": "string",
"id": "string",
"name": "string",
"settings": [
{
"id": "string",
"value": {}
}
]
}
]
}
response = falcon.command("updateRTResponsePolicies", body=BODY)
print(response)Back to Table of Contents
Search for members of a Response policy in your environment by providing a FQL filter and paging details. Returns a set of Agent IDs which match the filter criteria
query_policy_members
| Method | Route |
|---|---|
/policy/queries/response-members/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| filter |
|
|
query | string | FQL query expression that should be used to limit the results. |
| limit |
|
|
query | integer | Maximum number of records to return. Max: 5000. |
| offset |
|
|
query | string | Starting index of overall result set from which to return ids. |
| id |
|
|
query | string | The ID of the Response Policy to search for members of. |
| sort |
|
|
query | string | The property to sort by. |
| parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_policy_members(id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.queryRTResponsePolicyMembers(id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("queryRTResponsePolicyMembers",
id="string",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)Back to Table of Contents
Search for Response Policies in your environment by providing a FQL filter with sort and/or paging details. This returns a set of Response Policy IDs that match the given criteria.
query_policies
| Method | Route |
|---|---|
/policy/queries/response/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| filter |
|
|
query | string | FQL query expression that should be used to limit the results. |
| limit |
|
|
query | integer | Maximum number of records to return. Max: 5000. |
| offset |
|
|
query | string | Starting index of overall result set from which to return ids. |
| sort |
|
|
query | string | The property to sort by. |
| parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_policies(filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)from falconpy import ResponsePolicies
# Do not hardcode API credentials!
falcon = ResponsePolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.queryRTResponsePolicies(filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("queryRTResponsePolicies",
filter="string",
offset=integer,
limit=integer,
sort="string"
)
print(response)Back to Table of Contents

- Home
- Discussions Board
- Glossary of Terms
- Installation, Upgrades and Removal
- Samples Collection
- Using FalconPy
- API Operations
-
Service Collections
- Admission Control Policies
- Alerts
- API Integrations
- ASPM
- CAO Hunting
- Case Management
- Certificate Based Exclusions
- Cloud AWS Registration
- Cloud Azure Registration
- Cloud GCP Registration
- Cloud OCI Registration
- Cloud Policies
- Cloud Connect AWS (deprecated)
- Cloud Security Assets
- Cloud Security
- Cloud Security Compliance
- Cloud Security Detections
- Cloud Snapshots
- Configuration Assessment
- Configuration Assessment Evaluation Logic
- Container Alerts
- Container Detections
- Container Image Compliance
- Container Images
- Container Packages
- Container Vulnerabilities
- Content Update Policies
- Correlation Rules
- Correlation Rules Admin
- CSPM Registration
- Custom IOAs
- Custom Storage
- D4C Registration (deprecated)
- Data Protection Configuration
- DataScanner (deprecated)
- Delivery Settings
- Deployments
- Detects (deprecated)
- Device Content
- Device Control Policies
- Discover
- Downloads
- Drift Indicators
- Event Streams
- Exposure Management
- FaaS Execution
- Falcon Complete Dashboard
- Falcon Container
- Falcon Intelligence Sandbox
- FDR
- FileVantage
- Firewall Management
- Firewall Policies
- Foundry LogScale
- Host Group
- Host Migration
- Hosts
- Identity Protection
- Image Assessment Policies
- Incidents
- Installation Tokens
- Intel
- Intelligence Feeds
- Intelligence Indicator Graph
- IOA Exclusions
- IOC
- IOCs (deprecated)
- IT Automation
- Kubernetes Container Compliance
- Kubernetes Protection
- MalQuery
- Message Center
- ML Exclusions
- Mobile Enrollment
- MSSP (Flight Control)
- NGSIEM
- OAuth2
- ODS (On Demand Scan)
- Prevention Policy
- Quarantine
- Quick Scan
- Quick Scan Pro
- Real Time Response
- Real Time Response Admin
- Real Time Response Audit
- Recon
- Report Executions
- Response Policies
- Sample Uploads
- SaaS Security
- Scheduled Reports
- Sensor Download
- Sensor Update Policy
- Sensor Usage
- Sensor Visibility Exclusions
- Serverless Exports
- Serverless Vulnerabilities
- Spotlight Evaluation Logic
- Spotlight Vulnerabilities
- Spotlight Vulnerability Metadata
- Tailored Intelligence
- ThreatGraph
- Unidentified Containers
- User Management
- Workflows
- Zero Trust Assessment
- Documentation Support
-
CrowdStrike SDKs
- Crimson Falcon - Ruby
- FalconPy - Python 3
- FalconJS - Javascript
- goFalcon - Go
- PSFalcon - Powershell
- Rusty Falcon - Rust
