-
Notifications
You must be signed in to change notification settings - Fork 72
Configuration Import Export
The Export-FalconConfig
command gathers configurable items from your Falcon environment and exports them as a
ZIP archive. The following example will create a file called FalconConfig_<FileDateTime>.zip
in your current
directory containing all the available configurations.
Export-FalconConfig
NOTE: Users are not included in the export/import process because they are unique and cannot be duplicated.
Similar to the regular command, a zip file will be created, but in this example it will only include HostGroup
,
FirewallGroup
(including Firewall Rules) and FirewallPolicy
items.
Export-FalconConfig -Select HostGroup, FirewallGroup, FirewallPolicy
Using the Import-FalconConfig
command, you can re-create any items that are present in the export but are not
present in your authenticated Falcon environment. Import-FalconConfig
loads the files within the ZIP, checks
them against the existing items in the target environment, and creates any items that are not present.
Import-FalconConfig -Path .\FalconConfig_<FileDateTime>.zip
NOTE: Unless -AssignExisting
is included, items that depend on the existence of a specific host group will
not be created.
For example, if you attempt to import a Machine Learning Exclusion that is assigned to the host group "Example Group" and "Example Group" already exists in your environment, the exclusion will not be created. If it is possible to create the item without the dependency (like a policy without assigned host groups), it will be created.
Including the -AssignExisting
parameter when running Import-FalconConfig
will cause existing host groups to
be assigned to created items when they match groups that would have been created as part of the import.
Import-FalconConfig -Path .\FalconConfig_<FileDateTime>.zip -AssignExisting
If -AssignExisting
is not specified, existing items will not be assigned to created items when using
Import-FalconConfig
.
The -ModifyExisting
parameter forces the Import-FalconConfig
command to analyze and modify a list of selected
items based on your target import.
Import-FalconConfig -Path .\FalconConfig_<FileDateTime>.zip -ModifyExisting PreventionPolicy, SensorUpdatePolicy
If -ModifyExisting
is not specified, existing items will not be modified when using Import-FalconConfig
.
-ModifyDefault
works similarly to -ModifyExisting
, but allows Import-FalconConfig
to modify
platform_default
policies based on your target import.
Import-FalconConfig -Path .\FalconConfig_<FileDateTime>.zip -ModifyDefault PreventionPolicy
If -ModifyDefault
is not specified, platform_default
policies will not be modified when using
Import-FalconConfig
.
- Using PSFalcon
-
Commands by Permission
- Actors (Falcon Intelligence)
- Alerts
- API integrations
- App Logs
- Channel File Control Settings
- Configuration Assessment
- Content Update Policies
- Correlation Rules
- CSPM registration
- Custom IOA rules
- Detections
- Device Content
- Device control policies
- Event streams
- Falcon Complete Dashboards
- Falcon Container Image
- Falcon Data Replicator
- Falcon Discover
- Falcon FileVantage
- Falcon FileVantage Content
- Firewall management
- Flight Control
- Host groups
- Host Migration
- Hosts
- Identity Protection Entities
- Identity Protection GraphQL
- Identity Protection Policy Rules
- Incidents
- Indicators (Falcon Intelligence)
- Installation tokens
- Installation token settings
- IOA Exclusions
- IOC Manager APIs
- IOCs
- Kubernetes Protection
- Machine Learning exclusions
- MalQuery
- Malware Families (Falcon Intelligence)
- Message Center
- Mobile Enrollment
- Monitoring rules (Falcon Intelligence Recon)
- On demand scans (ODS)
- OverWatch Dashboard
- Prevention Policies
- Quarantined Files
- QuickScan Pro
- Real time response
- Real time response (admin)
- Reports (Falcon Intelligence)
- Response policies
- Rules (Falcon Intelligence)
- Sample uploads
- Sandbox (Falcon Intelligence)
- Scheduled Reports
- Sensor Download
- Sensor update policies
- Sensor Usage
- Sensor Visibility Exclusions
- Snapshot
- Snapshot Scanner Image Download
- Tailored Intelligence
- Threatgraph
- User management
- Vulnerabilities
- Vulnerabilities (Falcon Intelligence)
- Workflow
- Zero Trust Assessment
- Other Commands
- Examples
-
CrowdStrike SDKs
- FalconPy - Python 3
- goFalcon - Go
- Rusty Falcon - Rust