Overview
Falcon ThreatGraph enables:- Entity relationship mapping: Understand connections between processes, files, users, and network activity
- Threat investigation: Trace attack paths and identify compromised systems
- Lateral movement detection: Discover how threats spread across your environment
- Indicator analysis: Find hosts where specific indicators have been observed
Vertexes
Vertexes represent entities like processes, files, domains, devices, detections, and users.Get vertex details
Get-FalconThreatGraphVertex
Vertex identifier(s)
Vertex type (default:
any-vertex). Options include:process,processes- Process executiondetection,detections- Security detectionsdevice,devices- Endpoint devicesdomain,domains- DNS domainsipv4,ipv6- IP addressesindicator,indicators- Threat indicatorsuser,users- User accountsfile,extracted-files- Filesmodule,modules- Loaded modules/librariescommand-lines- Command line executionsincident,incidents- Security incidentshunting-leads- Threat hunting leads- And many more (see full list in source)
Scope of the request. Options:
cspm, customer, cwpp, device, globalReturn nano-precision entity timestamps
Include a brief list of connected edges
Edges
Edges represent relationships between vertexes, such as “process spawned process” or “process connected to domain”.List available edge types
spawned_process, read_file, wrote_file, dns_request, network_connection
Get edges for a vertex
Get-FalconThreatGraphEdge
Vertex identifier
Edge type to retrieve (e.g.,
spawned_process, dns_request, network_connection)Scope of the request. Options:
cspm, customer, cwpp, device, globalEdge direction to filter results
Return nano-precision entity timestamps
Maximum number of results per request (1-100, default: 100)
Position to begin retrieving results
Repeat requests until all available results are retrieved
Display total result count instead of results
Indicator Searches
Search for hosts with an indicator
Get-FalconThreatGraphIndicator
Indicator type. Options:
domain, ipv4, ipv6, md5, sha1, sha256Indicator value (e.g., domain name, IP address, file hash)
Return nano-precision entity timestamps
Maximum number of results per request (1-100, default: 100)
Position to begin retrieving results
Repeat requests until all available results are retrieved
Display total result count instead of results
Common Workflows
Investigate a detection
Trace process execution chain
Analyze network connections
Hunt for lateral movement
Investigate file operations
Map attack timeline
Understanding Vertex Types
Common Vertex Types
| Type | Description |
|---|---|
process | Executing processes |
detection | Security detections and alerts |
device | Endpoint devices/hosts |
domain | DNS domains |
ipv4, ipv6 | IP addresses |
indicator | Threat indicators (IoCs) |
user | User accounts and sessions |
extracted_file | Files extracted for analysis |
module | Loaded DLLs/libraries |
command_line | Command line executions |
incident | Security incidents |
hunting_lead | Threat hunting leads |
Common Edge Types
| Edge Type | Description |
|---|---|
spawned_process | Parent-child process relationship |
spawned_by | Reverse of spawned_process |
dns_request | DNS query made by process |
network_connection | Network connection established |
wrote_file | File written by process |
read_file | File read by process |
loaded_module | DLL/library loaded by process |
associated_detection | Detection linked to entity |
associated_process | Process linked to detection |
Requires Threatgraph: Read permission.