Get FalconVulnerabilityLogic - CrowdStrike/psfalcon GitHub Wiki

Get-FalconVulnerabilityLogic

SYNOPSIS

Search for Falcon Spotlight vulnerability evaluation logic

DESCRIPTION

Requires 'Spotlight vulnerabilities: Read'.

PARAMETERS

Name Type Description Min Max Allowed Pipeline PipelineByName
Id Object[] Vulnerability logic identifier X X
Filter String Falcon Query Language expression to limit results
Sort String Property and direction to sort results
Limit Int32 Maximum number of results per request
After String Pagination token to retrieve the next set of results
Detailed Switch Retrieve detailed information
All Switch Repeat requests until all available results are retrieved
Total Switch Display total result count instead of results

SYNTAX

Get-FalconVulnerabilityLogic [-Filter] <String> [[-Sort] <String>] [[-Limit] <Int32>] [-After <String>] [-All] [-Total] [-WhatIf] [-Confirm] [<CommonParameters>]
Get-FalconVulnerabilityLogic -Id <Object[]> [-WhatIf] [-Confirm] [<CommonParameters>]
Get-FalconVulnerabilityLogic [-Filter] <String> [[-Sort] <String>] [[-Limit] <Int32>] [-After <String>] -Detailed [-All] [-WhatIf] [-Confirm] [<CommonParameters>]

REFERENCE

Endpoints

GET /spotlight/combined/evaluation-logic/v1
GET /spotlight/entities/evaluation-logic/v1
GET /spotlight/queries/evaluation-logic/v1

falconpy

queryEvaluationLogic
getEvaluationLogic
combinedQueryEvaluationLogic

USAGE

2023-04-25: PSFalcon v2.2.5

⚠️ **GitHub.com Fallback** ⚠️