-
Notifications
You must be signed in to change notification settings - Fork 72
Import FalconConfig
Import items from a 'FalconConfig' archive into your Falcon environment
Creates groups, policies, exclusions, rules and scripts within a 'FalconConfig' archive within your authenticated Falcon environment.
Anything that already exists will be ignored and no existing items will be modified unless the relevant switch parameters are included.
Name | Type | Description | Min | Max | Allowed | Pipeline | PipelineByName |
---|---|---|---|---|---|---|---|
Path | String | FalconConfig archive path | |||||
AssignExisting | Switch | Assign existing host groups with identical names to imported items | |||||
ModifyDefault | String[] | Modify specified 'platform_default' policies to match import |
ContentPolicy DeviceControlPolicy PreventionPolicy ResponsePolicy SensorUpdatePolicy
|
||||
ModifyExisting | String[] | Modify existing specified items to match import |
ContentPolicy DeviceControlPolicy FileVantagePolicy FileVantageRuleGroup FirewallGroup FirewallPolicy HostGroup IoaExclusion IoaGroup Ioc MlExclusion PreventionPolicy ResponsePolicy Script SensorUpdatePolicy SvExclusion
|
Import-FalconConfig [-Path] <String> [-AssignExisting] [-ModifyDefault <String[]>] [-ModifyExisting <String[]>] [-WhatIf] [-Confirm] [<CommonParameters>]
Using the Import-FalconConfig
command, you can re-create any items that are present in the export but are not
present in your authenticated Falcon environment. Import-FalconConfig
loads the files within the ZIP, checks
them against the existing items in the target environment, and creates any items that are not present.
Import-FalconConfig -Path .\FalconConfig_<FileDateTime>.zip
NOTE: Unless AssignExisting
is included, items that depend on the existence of a specific host group will
not be created. For example, if you attempt to import a Machine Learning Exclusion that is assigned to the host
group "Example Group" and "Example Group" already exists in your environment, the exclusion will not be created.
If it is possible to create the item without the dependency (like a policy without assigned host groups), it will be created.
Including the AssignExisting
parameter when running Import-FalconConfig
will cause existing host groups to be
assigned to created items when they match groups that would have been created as part of the import.
Import-FalconConfig -Path .\FalconConfig_<FileDateTime>.zip -AssignExisting
If AssignExisting
is not specified, existing items will not be assigned to created items when using
Import-FalconConfig
.
The ModifyExisting
parameter forces the Import-FalconConfig
command to analyze and modify a list of selected
items based on your target import.
Import-FalconConfig -Path .\FalconConfig_<FileDateTime>.zip -ModifyExisting PreventionPolicy, SensorUpdatePolicy
If ModifyExisting
is not specified, existing items will not be modified when using Import-FalconConfig
.
ModifyDefault
works similarly to ModifyExisting
, but allows Import-FalconConfig
to modify
platform_default
policies based on your target import.
Import-FalconConfig -Path .\FalconConfig_<FileDateTime>.zip -ModifyDefault PreventionPolicy
If ModifyDefault
is not specified, platform_default
policies will not be modified when using
Import-FalconConfig
.
See Export-FalconConfig.
2024-12-19: PSFalcon v2.2.8
- Using PSFalcon
-
Commands by Permission
- Actors (Falcon Intelligence)
- Alerts
- API integrations
- App Logs
- Channel File Control Settings
- Configuration Assessment
- Content Update Policies
- Correlation Rules
- CSPM registration
- Custom IOA rules
- Detections
- Device Content
- Device control policies
- Event streams
- Falcon Complete Dashboards
- Falcon Container Image
- Falcon Data Replicator
- Falcon Discover
- Falcon FileVantage
- Falcon FileVantage Content
- Firewall management
- Flight Control
- Host groups
- Host Migration
- Hosts
- Identity Protection Entities
- Identity Protection GraphQL
- Identity Protection Policy Rules
- Incidents
- Indicators (Falcon Intelligence)
- Installation tokens
- Installation token settings
- IOA Exclusions
- IOC Manager APIs
- IOCs
- Kubernetes Protection
- Machine Learning exclusions
- MalQuery
- Malware Families (Falcon Intelligence)
- Message Center
- Mobile Enrollment
- Monitoring rules (Falcon Intelligence Recon)
- On demand scans (ODS)
- OverWatch Dashboard
- Prevention Policies
- Quarantined Files
- QuickScan Pro
- Real time response
- Real time response (admin)
- Reports (Falcon Intelligence)
- Response policies
- Rules (Falcon Intelligence)
- Sample uploads
- Sandbox (Falcon Intelligence)
- Scheduled Reports
- Sensor Download
- Sensor update policies
- Sensor Usage
- Sensor Visibility Exclusions
- Snapshot
- Snapshot Scanner Image Download
- Tailored Intelligence
- Threatgraph
- User management
- Vulnerabilities
- Vulnerabilities (Falcon Intelligence)
- Workflow
- Zero Trust Assessment
- Other Commands
- Examples
-
CrowdStrike SDKs
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust