- 02 Apr 2025
- 1 Minute to read
- DarkLight
- PDF
CrowdStrike - Query for Hosts
- Updated on 02 Apr 2025
- 1 Minute to read
- DarkLight
- PDF
CrowdStrike - Query for Hosts
Description
CrowdStrike's Query for Hosts Automation is a powerful tool that allows organizations to quickly and easily query their CrowdStrike Falcon Hosts for relevant information. With this automation, users can quickly and accurately query their hosts for information such as active processes, recent file activity, and user logins. This automation can be used to quickly identify potential security threats and take action to protect their systems. Additionally, the Query for Hosts automation can be used to quickly identify any hosts that may have been compromised, as well as any hosts that may be exhibiting suspicious behavior. This automation also enables organizations to quickly and accurately identify any hosts that may be running outdated software or operating systems, making it easier to ensure their systems are up to date and secure. With the Query for Hosts automation, organizations can quickly and easily get the information they need to ensure their systems are secure and up to date.
Trigger Request
HTTP Post Request
Headers:
Key | Value |
---|---|
Content-Type | application/json |
- Json body parameters:
Parameters | Type | Description |
---|---|---|
access_token | string | Access token for the CrowdStrike API. Can be acheived by calling to CrowdStrike_Base_Token flow. |
filter | string | FQL (Falcon Query Language) expression to filter hosts by. |
limit | integer | Please provide the description of this parameter. |
offset | integer | Please provide the description of this parameter. |
query | string | Please provide the description of this parameter. |
sort | string | Please provide the description of this parameter. |
Supported CDC Versions
- 2.8