Copy python3 get_all_artifacts.py -h
usage: get_all_artifacts.py [-h] -k CLIENT_ID -s CLIENT_SECRET [-b BASE_URL]
Retrieve all artifacts from all available Falcon X reports.
_______ __
| _ .---.-| .----.-----.-----.
|. 1___| _ | | __| _ | |
|. __) |___._|__|____|_____|__|__|
|: |
|::.|
`---'
___ __ __ __ __
| .-----| |_.-----| | |__.-----.-----.-----.----.-----.
|. | | _| -__| | | | _ | -__| | __| -__|
|. |__|__|____|_____|__|__|__|___ |_____|__|__|____|_____|
|: | |_____|
|::.|
`---' CrowdStrike FalconPy
Creation date: 01.12.2021 - jshcodes@CrowdStrike
You will need the following scopes on your API keys:
Falcon Intelligence Sandbox: READ, WRITE
optional arguments:
-h, --help show this help message and exit
-k CLIENT_ID, --client_id CLIENT_ID
CrowdStrike Falcon API key ID
-s CLIENT_SECRET, --client_secret CLIENT_SECRET
CrowdStrike Falcon API key secret
-b BASE_URL, --base_url BASE_URL
CrowdStrike API region (us1, us2, eu1, usgov1) NOT required unless you are using `usgov1`