Skip to main content
Falcon Spotlight provides vulnerability assessment and management capabilities for devices in your environment. Use these cmdlets to search for vulnerabilities, retrieve remediation details, and review evaluation logic.

Get-FalconVulnerability

Search for Falcon Spotlight vulnerabilities.
Get-FalconVulnerability -Filter "status:'open'" -Detailed

Parameters

Id
string[]
Vulnerability identifier(s) in format [aid]_[cve]
Filter
string
required
Falcon Query Language expression to limit results
Facet
string[]
Include additional properties: cve, evaluation_logic, host_info, remediation
Sort
string
Property and direction to sort resultsOptions: created_timestamp.asc, created_timestamp.desc, closed_timestamp.asc, closed_timestamp.desc, updated_timestamp.asc, updated_timestamp.desc
Limit
int32
Maximum number of results per request (1-5000)
After
string
Pagination token to retrieve the next set of results
Detailed
switch
Retrieve detailed information
All
switch
Repeat requests until all available results are retrieved
Total
switch
Display total result count instead of results

Example: Find Critical Vulnerabilities

# Search for open critical vulnerabilities
$Vulnerabilities = Get-FalconVulnerability -Filter "status:'open'+severity:'critical'" -Detailed -All

# Group by CVE
$Vulnerabilities | Group-Object -Property cve.id | Select-Object Name, Count

Example: Get Vulnerability Details

# Get detailed information for specific vulnerabilities
$VulnIds = @('aid1_cve123', 'aid2_cve456')
Get-FalconVulnerability -Id $VulnIds

Get-FalconRemediation

Retrieve details about remediations for Falcon Spotlight vulnerabilities.
Get-FalconRemediation -Id <remediation_id>

Parameters

Id
object[]
required
Remediation identifier(s) or detailed vulnerability objects containing remediation IDs

Example: Get Remediation Steps

# Get vulnerabilities with remediation facet
$Vulns = Get-FalconVulnerability -Filter "status:'open'" -Facet remediation -Detailed

# Extract and retrieve remediation details
$Vulns | Get-FalconRemediation

Get-FalconVulnerabilityLogic

Search for Falcon Spotlight vulnerability evaluation logic.
Get-FalconVulnerabilityLogic -Filter "created_timestamp:>'2024-01-01'" -Detailed

Parameters

Id
object[]
Vulnerability logic identifier(s) or detailed vulnerability objects
Filter
string
required
Falcon Query Language expression to limit results
Sort
string
Property and direction to sort results
Limit
int
Maximum number of results per request
After
string
Pagination token to retrieve the next set of results
Detailed
switch
Retrieve detailed information
All
switch
Repeat requests until all available results are retrieved
Total
switch
Display total result count instead of results

Example: Review Evaluation Logic

# Get vulnerabilities with evaluation logic facet
$Vulns = Get-FalconVulnerability -Filter "cve.id:'CVE-2024-1234'" -Facet evaluation_logic -Detailed

# Retrieve evaluation logic details
$Vulns | Get-FalconVulnerabilityLogic

Use Cases

Vulnerability Assessment Report

# Generate vulnerability report by severity
$OpenVulns = Get-FalconVulnerability -Filter "status:'open'" -Detailed -All

$Report = $OpenVulns | Group-Object -Property { $_.cve.severity } | ForEach-Object {
    [PSCustomObject]@{
        Severity = $_.Name
        Count = $_.Count
        CVEs = ($_.Group | Select-Object -ExpandProperty cve.id -Unique) -join ', '
    }
}

$Report | Format-Table -AutoSize

Remediation Tracking

# Get vulnerabilities with available remediations
$VulnsWithRemediation = Get-FalconVulnerability -Filter "status:'open'" -Facet remediation -Detailed

# Extract remediation details
$Remediations = $VulnsWithRemediation | Get-FalconRemediation

# Display remediation information
$Remediations | Select-Object id, title, action | Format-Table -AutoSize

Host-Specific Vulnerabilities

# Find vulnerabilities for a specific host
$HostAid = 'abc123...'
$HostVulns = Get-FalconVulnerability -Filter "aid:'$HostAid'" -Facet host_info,cve -Detailed

# Display vulnerabilities with host context
$HostVulns | Select-Object cve.id, cve.severity, host_info.hostname | Format-Table
Requires Vulnerabilities: Read scope for all Spotlight cmdlets.

Build docs developers (and LLMs) love