-
Notifications
You must be signed in to change notification settings - Fork 71
Edit FalconIoaRule
bk-cs edited this page Sep 3, 2024
·
21 revisions
Modify custom Indicator of Attack rules within a rule group
All fields are required when making a rule group change. PSFalcon adds missing values automatically using data from your existing rule group.
If an existing rule is submitted within 'rule_updates', it will be filtered to the required properties ('comment', 'description', 'disposition_id', 'enabled', 'field_values', 'instance_id', 'name', and 'pattern_severity') including those under 'field_values' ('name', 'label', 'type' and 'values').
Requires 'Custom IOA rules: Write'.
Name | Type | Description | Min | Max | Allowed | Pipeline | PipelineByName |
---|---|---|---|---|---|---|---|
Comment | String | Audit log comment | X | ||||
RuleUpdate | Object[] | One or more custom Indicator of Attack rules | X | ||||
RulegroupId | String | Rule group identifier | X |
Edit-FalconIoaRule [-Comment] <String> [-RuleUpdate] <Object[]> [-RulegroupId] <String> [-WhatIf] [-Confirm] [<CommonParameters>]
PATCH /ioarules/entities/rules/v2
$Group = Get-FalconIoaGroup -Filter "name:'updatedRuleGroup'" -Detailed
$RuleUpdates = @(
@{
name = 'BugRule'
pattern_severity = 'critical'
enabled = $true
description = 'Stops the bug'
disposition_id = 30
instance_id = '1'
field_values = @(
@{
label = 'Grandparent Image Filename'
name = 'GrandparentImageFilename'
type = 'excludable'
values = @(
@{
label = 'include'
value = '.+updatebug.exe'
}
)
},
@{
label = 'Grandparent Command Line'
name = 'GrandparentCommandLine'
type = 'excludable'
values = @(
@{
label = 'include'
value = '.*'
}
)
},
@{
label = 'Parent Image Filename'
name = 'ParentImageFilename'
type = 'excludable'
values = @(
@{
label = 'include'
value = '.*'
}
)
},
@{
label = 'Parent Command Line'
name = 'ParentCommandLine'
type = 'excludable'
values = @(
@{
label = 'include'
value = '.*'
}
)
},
@{
label = 'Image Filename'
name = 'ImageFilename'
type = 'excludable'
values = @(
@{
label = 'include'
value = '.*'
}
)
},
@{
label = 'Command Line'
name = 'CommandLine'
type = 'excludable'
values = @(
@{
label = 'include'
value = '.*'
}
)
}
)
}
)
Edit-FalconIoaRule -RulegroupId $Group.id -RulegroupVersion $Group.version -RuleUpdate $RuleUpdates -Comment 'Updated using PSFalcon'
$Group = Get-FalconIoaGroup -Filter "name:'my group'" -Detailed
@($Group.rules).foreach{ $_.enabled = $true }
Edit-FalconIoaGroup -RulegroupId $Group.id -RuleUpdate $Group.rules
2024-09-03: PSFalcon v2.2.7
- Using PSFalcon
-
Commands and Permissions
- Configuration Import/Export
- Container Security
- Detection and Prevention Policies
- Discover for Cloud and Containers
- Discover
- Event Streams
- Falcon Complete Dashboards
- Falcon Complete Message Center
- Falcon Data Replicator
- Falcon Intelligence
- Falcon Intelligence Recon
- Falcon OverWatch Dashboards
- Falcon Sandbox
- FileVantage
- Firewall Management
- Flight Control
- Horizon
- Host and Host Group Management
- Identity Protection
- Image Assessment
- Incident and Detection Monitoring
- Installation Tokens
- Kubernetes Protection
- MalQuery
- Mobile Host Enrollment
- On-Demand Scanning
- Quarantine
- Real-time Response
- Real-time Response Policy
- Scheduled Reports and Searches
- Sensor Download
- Sensor Update Policy
- Spotlight
- Tailored Intelligence
- Third-party ingestion
- USB Device Control Policy
- Users and Roles
- Zero Trust Assessment
- Examples
-
CrowdStrike SDKs
- PSFalcon - PowerShell
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust