Filtering Vulnerability Data Using host_info.groups #290
-
Hello, My name is Kris. I am using the PSFalcon to export the vulnerability data. First I ran an example script which had the following filter: But both return [{"code":400,"message":"invalid input data"}] I am using the latest version of the PSFalcon. Any help on resolving this issue would be appreciated. Thank you. Kris |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
The [ EU-1 | US-1 | US-2 | US-GOV-1 ] Give this a try: Get-FalconVulnerability -Filter "status:!'closed'+host_info.groups:['44df8f70a7cc4eb495a9977c07594c95']+suppression_info.is_suppressed:false" |
Beta Was this translation helpful? Give feedback.
The
host_info.groups
filter expects a group identifier and does not accept a name. See the Spotlight API documentation for examples:[ EU-1 | US-1 | US-2 | US-GOV-1 ]
Give this a try: