New FalconIoaRule - CrowdStrike/psfalcon GitHub Wiki

New-FalconIoaRule

SYNOPSIS

Create a custom Indicator of Attack rule within a rule group

DESCRIPTION

Requires 'Custom IOA rules: Write'.

PARAMETERS

Name Type Description Min Max Allowed Pipeline PipelineByName
Name String Rule name X
PatternSeverity String Rule severity X
RuletypeId String Rule type X
DispositionId Int32 Disposition identifier [10: Monitor, 20: Detect, 30: Block] 10
20
30
X
FieldValue Object[] An array of custom Indicator of Attack properties X
Description String Rule description X
Comment String Audit log comment X
RulegroupId String Rule group identifier X

SYNTAX

New-FalconIoaRule [-Name] <String> [-PatternSeverity] <String> [-RuletypeId] <String> [-DispositionId] <Int32> [-FieldValue] <Object[]> [[-Description] <String>] [[-Comment] <String>] [-RulegroupId] <String> [-WhatIf] [-Confirm] [<CommonParameters>]

REFERENCE

Endpoints

POST /ioarules/entities/rules/v1

falconpy

create_rule

USAGE

Create custom IOA rules

$Group = Get-FalconIoaGroup -Filter "name:'updatedRuleGroup'" -Detailed
$FieldValue = [PSCustomObject]@{
    label = 'Grandparent Image Filename'
    name = 'GrandparentImageFilename'
    type = 'excludable'
    values = @(
        @{
            label = 'include'
            value = '.+bug.exe'
        }
    )
}
New-FalconIoaRule -RulegroupId $Group.id -Name 'BugRule' -PatternSeverity critical -RuletypeId 5 -DispositionId 30 -FieldValue $FieldValue

2024-11-05: PSFalcon v2.2.7

⚠️ **GitHub.com Fallback** ⚠️