-
Notifications
You must be signed in to change notification settings - Fork 119
Zero Trust Assessment
Operation ID | Description | ||||
---|---|---|---|---|---|
|
Get Zero Trust Assessment data for one or more hosts by providing agent IDs (AID) and a customer ID (CID). | ||||
|
Get the Zero Trust Assessment audit report for one customer ID (CID). | ||||
|
Get Zero Trust Assessment data for one or more hosts by providing a customer ID (CID) and a range of scores. |
WARNING
client_id
andclient_secret
are keyword arguments that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Get Zero Trust Assessment data for one or more hosts by providing agent IDs (AID) and a customer ID (CID).
get_assessment
Method | Route |
---|---|
/zero-trust-assessment/entities/assessments/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | One or more agent IDs, which you can find in the data.zta file, or the Falcon console. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import ZeroTrustAssessment
# Do not hardcode API credentials!
falcon = ZeroTrustAssessment(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_assessment(ids=id_list)
print(response)
from falconpy import ZeroTrustAssessment
# Do not hardcode API credentials!
falcon = ZeroTrustAssessment(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.getAssessmentV1(ids=id_list)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("getAssessmentV1", ids=id_list)
print(response)
Get the Zero Trust Assessment audit report for one customer ID (CID).
get_audit
This operation ID has recently been changed.
FalconPy supports deprecated IDs and method names via aliases. Developers should consider moving code to leverage the updated ID and method name for this operation whenever possible.
- Legacy Operation ID:
getComplianceV1
- Legacy PEP8 method name:
get_compliance
Method | Route |
---|---|
/zero-trust-assessment/entities/audit/v1 |
- Consumes: application/json
- Produces: application/json
No keywords or arguments accepted.
from falconpy import ZeroTrustAssessment
# Do not hardcode API credentials!
falcon = ZeroTrustAssessment(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.get_audit()
print(response)
from falconpy import ZeroTrustAssessment
# Do not hardcode API credentials!
falcon = ZeroTrustAssessment(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.getAuditV1()
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("getAuditV1")
print(response)
Get Zero Trust Assessment data for one or more hosts by providing a customer ID (CID) and a range of scores.
get_assessments_by_score
Method | Route |
---|---|
/zero-trust-assessment/queries/assessments/v1 |
- Consumes: application/json
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
filter |
|
|
query | string | FQL formatted string containing the filter to use to limit results. |
limit |
|
|
query | integer | The number of scores to return in this response. (Min: 1, Max: 1,000, Default: 100). Use in conjuction with the after parameter to limit results. |
after |
|
|
query | string | A pagination token used with the limit parameter to manage pagination of results. On your first request, do not provided an after token. On subsequent requests, provide the after token from the previous response to continue from that place in the results. |
sort |
|
|
query | string |
FQL formatted string containing the sort specification. A single sort field is allowed score , which can be sorted ascending or descending. (Defaults to desc , Example: score|asc or score|desc ). |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import ZeroTrustAssessment
# Do not hardcode API credentials!
falcon = ZeroTrustAssessment(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.get_assessments_by_score(filter="string",
limit=integer,
after="string",
sort="string"
)
print(response)
from falconpy import ZeroTrustAssessment
# Do not hardcode API credentials!
falcon = ZeroTrustAssessment(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.getAssessmentsByScoreV1(filter="string",
limit=integer,
after="string",
sort="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("getAssessmentsByScoreV1",
filter="string",
limit=integer,
after="string",
sort="string"
)
print(response)
- Home
- Discussions Board
- Glossary of Terms
- Installation, Upgrades and Removal
- Samples Collection
- Using FalconPy
- API Operations
-
Service Collections
- Alerts
- API Integrations
- Certificate Based Exclusions
- Cloud Connect AWS (deprecated)
- Cloud Snapshots
- Compliance Assessments
- Configuration Assessment
- Configuration Assessment Evaluation Logic
- Container Alerts
- Container Detections
- Container Images
- Container Packages
- Container Vulnerabilities
- CSPM Registration
- Custom IOAs
- Custom Storage
- D4C Registration (deprecated)
- Detects
- Device Control Policies
- Discover
- Drift Indicators
- Event Streams
- Exposure Management
- Falcon Complete Dashboard
- Falcon Container
- Falcon Intelligence Sandbox
- FDR
- FileVantage
- Firewall Management
- Firewall Policies
- Foundry LogScale
- Host Group
- Host Migration
- Hosts
- Identity Protection
- Image Assessment Policies
- Incidents
- Installation Tokens
- Intel
- IOA Exclusions
- IOC
- IOCs (deprecated)
- Kubernetes Protection
- MalQuery
- Message Center
- ML Exclusions
- Mobile Enrollment
- MSSP (Flight Control)
- OAuth2
- ODS (On Demand Scan)
- Overwatch Dashboard
- Prevention Policy
- Quarantine
- Quick Scan
- Quick Scan Pro
- Real Time Response
- Real Time Response Admin
- Real Time Response Audit
- Recon
- Report Executions
- Response Policies
- Sample Uploads
- Scheduled Reports
- Sensor Download
- Sensor Update Policy
- Sensor Visibility Exclusions
- Spotlight Evaluation Logic
- Spotlight Vulnerabilities
- Tailored Intelligence
- ThreatGraph
- Unidentified Containers
- User Management
- Workflows
- Zero Trust Assessment
- Documentation Support
-
CrowdStrike SDKs
- Crimson Falcon - Ruby
- FalconPy - Python 3
- FalconJS - Javascript
- goFalcon - Go
- PSFalcon - Powershell
- Rusty Falcon - Rust