Cmdlets
Edit-FalconIoc
Modify custom indicators. Permissions:IOC Manager APIs: Write
One or more indicators to modify in a single request
Action to perform when a host observes the indicator
Operating system platform
Severity level
Origination source (1-256 characters)
Indicator description
Indicator filename, used with hash values
Indicator tag
Action to perform when a mobile device observes the indicator. Valid values:
allow, detect, no_action, preventHost group identifier (32-character hex)
Assign to all host groups
Expiration date and time (UTC ISO 8601). When an indicator expires it is set to ‘no_action’
Inheritance from parent CID
Audit log comment
Generate retroactive detections for hosts that have observed the indicator
Ignore warnings and modify all indicators
Indicator identifier (64-character hex)
Example
Get-FalconIoc
Search for custom indicators. Permissions:IOC Manager APIs: Read
Indicator identifier (64-character hex)
Falcon Query Language expression to limit results
Property and direction to sort results. Valid values:
action.asc,action.descapplied_globally.asc,applied_globally.descmetadata.av_hits.asc,metadata.av_hits.descmetadata.company_name.raw.asc,metadata.company_name.raw.desccreated_by.asc,created_by.desccreated_on.asc,created_on.descexpiration.asc,expiration.descexpired.asc,expired.descmetadata.filename.raw.asc,metadata.filename.raw.descmodified_by.asc,modified_by.descmodified_on.asc,modified_on.descseverity_number.asc,severity_number.descsource.asc,source.desctype.asc,type.descvalue.asc,value.desc
Maximum number of results per request (1-2000)
Inheritance from parent CID
Position to begin retrieving results
Pagination token to retrieve the next set of results
Retrieve detailed information
Repeat requests until all available results are retrieved
Display total result count instead of results
Example
Get-FalconIocAction
Search for custom indicator actions. Permissions:IOC Manager APIs: Read
Custom indicator action identifier
Maximum number of results per request
Position to begin retrieving results
Retrieve detailed information
Repeat requests until all available results are retrieved
Example
Get-FalconIocPlatform
List custom indicator platforms. Permissions:IOC Manager APIs: Read
Maximum number of results per request
Position to begin retrieving results
Repeat requests until all available results are retrieved
Example
Get-FalconIocSeverity
List custom indicator severities. Permissions:IOC Manager APIs: Read
Maximum number of results per request
Position to begin retrieving results
Repeat requests until all available results are retrieved
Example
Get-FalconIocType
List custom indicator types. Permissions:IOC Manager APIs: Read
Maximum number of results per request
Position to begin retrieving results
Repeat requests until all available results are retrieved
Example
New-FalconIoc
Create custom indicators. Permissions:IOC Manager APIs: Write
One or more indicators to create in a single request
Indicator type
String representation of the indicator
Action to perform when a host observes the indicator
Operating system platform
Severity level
Origination source (1-256 characters)
Indicator description
Indicator filename, used with hash values
Indicator tag
Action to perform when a mobile device observes the indicator. Valid values:
allow, detect, no_action, preventHost group identifier (32-character hex). Required if AppliedGlobally is not set
Assign to all host groups. Required if HostGroup is not set
Expiration date and time (UTC ISO 8601). When an indicator expires it is set to ‘no_action’
Audit log comment
Generate retroactive detections for hosts that have observed the indicator
Ignore warnings and create all indicators
Example
Remove-FalconIoc
Remove custom indicators. Permissions:IOC Manager APIs: Write
Falcon Query Language expression to find indicators for removal
Audit log comment
Inheritance from parent CID
Indicator identifier (64-character hex)
Example
IOC Management Workflow
Identify Threat Indicators
Obtain IOC values from threat intelligence feeds, incident investigations, or security research.
Validate IOC Types
Use
Get-FalconIocType to verify supported indicator types (IPv4, domain, SHA256, etc.).Create Indicators
Use
New-FalconIoc to create indicators with appropriate action, severity, and scope.Monitor and Update
Use
Get-FalconIoc to review existing indicators and Edit-FalconIoc to update as needed.Best Practices
Use Expiration Dates
Use Expiration Dates
Set expiration dates on temporary IOCs to automatically prevent them from blocking legitimate traffic after investigations conclude.
Enable Retrodetection Carefully
Enable Retrodetection Carefully
Use the
Retrodetect parameter when creating or editing IOCs only when you need to identify past compromises. This can generate significant detections.Tag for Organization
Tag for Organization
Apply meaningful tags to group related indicators (e.g., by campaign, threat actor, or investigation ID) for easier management.
Document with Comments
Document with Comments
Always use the
Comment parameter to maintain an audit trail of why indicators were created, modified, or removed.Related Resources
Falcon Intelligence
Access CrowdStrike threat intelligence
Detections
Manage and investigate detections