falconx_sandbox
Falcon Intelligence Sandbox examples
The examples within this folder focus on leveraging CrowdStrike's Falcon Intelligence Sandbox and Sample Uploads APIs to analyze potential malware in different environments.
Analyze a single file using Falcon Intelligence sandbox
Documentation for the single file scan samples can be found here.
Retrieve all artifacts for all Falcon Intelligence reports
Downloads all artifacts for all Falcon Intelligence reports.
Running the program
In order to run this demonstration, you you will need access to CrowdStrike API keys with the following scopes:
Falcon Intelligence Sandbox
READ
Execution syntax
This sample leverages simple command-line arguments to implement functionality.
Basic usage
Download all report artifacts.
GovCloud users can change their CrowdStrike region using the
-bargument.
Command-line help
Command-line help is available via the -h argument.
Example source code
The source code for this example can be found here.
Last updated
Was this helpful?

