- 02 Apr 2025
- 1 Minute to read
- DarkLight
- PDF
CrowdStrike - Check Historical Detection
- Updated on 02 Apr 2025
- 1 Minute to read
- DarkLight
- PDF
CrowdStrike - Check Historical Detection
Description
CrowdStrike's Check Historical Detection automation provides organizations with a comprehensive and secure solution for monitoring their networks for malicious activities. The automation leverages the power of CrowdStrike’s Falcon platform to continuously monitor for malicious activities, detect and respond to threats, and investigate incidents. The automation works by collecting data from the Falcon platform and analyzing it for suspicious activity. It then sends notifications to the appropriate personnel when suspicious activity is detected. Additionally, the automation can be used to review historical data to identify trends in malicious activity, allowing organizations to better understand their risk profile and take proactive steps to mitigate threats. The automation also provides detailed reports on the activity that has been detected, allowing organizations to take the appropriate steps to remediate any issues. With CrowdStrike's Check Historical Detection automation, organizations can rest assured that their networks are secure and their data is safe.
Trigger Request
HTTP Post Request
Headers:
Key | Value |
---|---|
Content-Type | application/json |
- Json body parameters:
Parameters | Type | Description |
---|---|---|
access_token | string | Access token for the CrowdStrike API. Can be achieved by calling to CrowdStrike_Base_Token flow. |
detectionId | string | Past detection ID to assess. |
Supported CDC Versions
- 2.8