-
Notifications
You must be signed in to change notification settings - Fork 82
New FalconItTask
bk-cs edited this page Sep 2, 2025
·
2 revisions
Create Falcon for IT tasks
Requires 'IT Automation - Tasks: Write'.
| Name | Type | Description | Min | Max | Allowed | Pipeline | PipelineByName |
|---|---|---|---|---|---|---|---|
| Name | String | Task name | X | ||||
| Description | String | Task description | X | ||||
| TaskType | String | Task type |
queryremediation
|
X | |||
| AccessType | String | Task access type |
PublicShared
|
X | |||
| Target | String | Falcon Query Language expression to define target hosts | X | ||||
| Parameter | Object[] | Task | X | ||||
| Query | Object | Query | X | ||||
| CompositeQuery | Object | Composite query | X | ||||
| Remediation | Object | Remediation | X | ||||
| Trigger | Object[] | Trigger condition | X | ||||
| Verification | Object[] | Verification condition | X | ||||
| OsQuery | String | OsQuery statement | X | ||||
| TaskGroupId | String | Task group identifier | X | ||||
| UserGroupId | String[] | User group identifier (for 'Shared' AccessType) | X | ||||
| UserId | String[] | User identifier (for 'Shared' AccessType) | X | ||||
| OutputParser | Object | Column and delimiter values to parse result output | X |
New-FalconItTask [-Name] <String> [[-Description] <String>] [[-TaskType] <String>] [[-AccessType] <String>] [[-Target] <String>] [[-Parameter] <Object[]>] [[-Query] <Object>] [[-CompositeQuery] <Object>] [[-Remediation] <Object>] [[-Trigger] <Object[]>] [[-Verification] <Object[]>] [[-OsQuery] <String>] [[-TaskGroupId] <String>] [[-UserGroupId] <String[]>] [[-UserId] <String[]>] [[-OutputParser] <Object>] [-WhatIf] [-Confirm] [<CommonParameters>]POST /it-automation/entities/tasks/v1
New-FalconItTask -Name 'it automation' -description 'test' -TaskType query -AccessType Public -Query @{ windows = @{ content = 'pwd'; language = 'powershell' }}New-FalconItTask -Name 'Test 870769' -Description 'query with parameters' -TaskType query -AccessType Public -TaskParameter @{ key = 'file_path';label = 'Enter the file path'; input_type = 'text' },@{ key = 'file_pattern'; label = 'Enter a file pattern (ex: *.log)'; input_type = 'text' } -Query @{ windows = @{ action_type = 'script'; content = 'Get-ChildItem -Path "{{.file_path}}" -Filter "{{.file_pattern}}" -Force | Select-Object Name, LastWriteTime, Length'; language = 'powershell' }}New-FalconItTask -Name 'Automated Task Example' -Description 'Automated task with trigger and verification criteria' -TaskType remediation -AccessType Public -Remediation @{ windows = @{ content = 'echo "This script executes only if below trigger condition evaluation is successful"'; language = 'powershell'; action_type = 'script' }} -Trigger @{ statements = @(@{ task_id = 'cf8...e63'; key = 'running'; data_comparator = 'Equals'; data_type = 'StringType'; value = 'false' };@{ task_id = 'ca0...1ae'; key = 'script_output'; data_comparator = 'LessThan'; data_type = 'SemverType'; value = '11.6.7' }); operator = 'AND' } -Verification @{ statements = @(@{ task_id 'cf8...e63'; key = 'running'; data_comparator = 'Equals'; data_type = 'StringType'; value = 'true' }); operator = 'AND' } -Target "platform_name:!'Linux'+platform_name:!'Mac'"New-FalconItTask -Name 'Multi-column task example' -Description 'Script task with multi-column' -Target "platform_name:'Windows'" -TaskType query -AccessType Public -Query @{ windows = @{ action_type = 'script'; content = 'echo "a,b"'; language = 'powershell' }} -OutputParser @{ default_group_by = $false; delimiter = ","; columns = @(@{ name = 'c1' },@{ name = 'c2' })}New-FalconItTask -Name 'test rem with file v2' -Description 'test rem with file' -Target "platform_name:'Windows'" -TaskType remediation -AccessType Public -Remediation @{ windows = @{ action_type = 'command'; content = 'cmd /c echo "Hello, World!"'; file_ids = @('5ff...647_eb4...b8f') }}2025-09-02: PSFalcon v2.2.9

- Using PSFalcon
-
Commands by Permission
- Actors (Falcon Intelligence)
- Alerts
- API integrations
- App Logs
- Assets
- CAO Hunting
- Case Templates
- Cases
- Channel File Control Settings
- Cloud Security API Assets
- Configuration Assessment
- Content Update Policies
- Correlation Rules
- CSPM registration
- Custom IOA rules
- Device Content
- Device control policies
- Event streams
- Falcon Complete Dashboards
- Falcon Container Image
- Falcon Data Replicator
- Falcon FileVantage
- Falcon FileVantage Content
- Firewall management
- Flight Control
- Host groups
- Host Migration
- Hosts
- Identity Protection Entities
- Identity Protection GraphQL
- Identity Protection Policy Rules
- Incidents
- Indicators (Falcon Intelligence)
- Installation tokens
- Installation token settings
- IOA Exclusions
- IOC Manager APIs
- IOCs
- IT Automation - Policies
- IT Automation - Task Executions
- IT Automation - Tasks
- IT Automation - User Groups
- Kubernetes Protection
- Machine Learning exclusions
- MalQuery
- Malware Families (Falcon Intelligence)
- Message Center
- Mobile Enrollment
- Monitoring rules (Falcon Intelligence Recon)
- NGSIEM
- NGSIEM Dashboards
- NGSIEM Lookup Files
- NGSIEM Parsers
- NGSIEM Saved Queries
- On demand scans (ODS)
- OverWatch Dashboard
- Prevention Policies
- Quarantined Files
- QuickScan Pro
- Real time response
- Real time response (admin)
- Reports (Falcon Intelligence)
- Response policies
- Rules (Falcon Intelligence)
- Sample uploads
- Sandbox (Falcon Intelligence)
- Scheduled Reports
- Sensor Download
- Sensor update policies
- Sensor Usage
- Sensor Visibility Exclusions
- Snapshot
- Snapshot Scanner Image Download
- Tailored Intelligence
- Threatgraph
- User management
- Vulnerabilities
- Vulnerabilities (Falcon Intelligence)
- Workflow
- Zero Trust Assessment
- Other Commands
- Examples
-
CrowdStrike SDKs
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust