Export-SentinelOneThreats
SYNOPSIS
Exports data of threats that match the filter.
SYNTAX
Export-SentinelOneThreats [-accountIds <Int64[]>] [-agentIds <Int64[]>] [-agentIsActive] [-agentMachineTypes <String[]>]
[-agentMachineTypesNin <String[]>] [-agentVersions <String[]>] [-agentVersionsNin <String[]>]
[-analystVerdicts <String[]>] [-analystVerdictsNin <String[]>] [-awsRole__contains <String[]>]
[-awsSecurityGroups__contains <String[]>] [-awsSubnetIds__contains <String[]>]
[-azureResourceGroup__contains <String[]>] [-classifications <String[]>] [-classificationsNin <String[]>]
[-classificationSources <String[]>] [-classificationSourcesNin <String[]>]
[-cloudAccount__contains <String[]>] [-cloudImage__contains <String[]>]
[-cloudInstanceId__contains <String[]>] [-cloudInstanceSize__contains <String[]>]
[-cloudLocation__contains <String[]>] [-cloudNetwork__contains <String[]>] [-cloudProvider <String[]>]
[-cloudProviderNin <String[]>] [-collectionIds <String[]>] [-commandLineArguments__contains <String[]>]
[-computerName__contains <String[]>] [-confidenceLevels <String[]>] [-confidenceLevelsNin <String[]>]
[-containerImageName__contains <String[]>] [-containerLabels__contains <String[]>]
[-containerName__contains <String[]>] [-contentHash__contains <String[]>] [-contentHashes <String[]>]
[-countsFor <String[]>] [-createdAt__gt <DateTime>] [-createdAt__gte <DateTime>] [-createdAt__lt <DateTime>]
[-createdAt__lte <DateTime>] [-detectionAgentDomain__contains <String[]>]
[-detectionAgentVersion__contains <String[]>] [-detectionEngines <String[]>] [-detectionEnginesNin <String[]>]
[-displayName <String>] [-engines <String[]>] [-enginesNin <String[]>] [-externalTicketExists]
[-externalTicketId__contains <String[]>] [-externalTicketIds <String[]>] [-failedActions]
[-filePath__contains <String[]>] [-gcpServiceAccount__contains <String[]>] [-groupIds <Int64[]>]
[-ids <Int64[]>] [-incidentStatuses <String[]>] [-incidentStatusesNin <String[]>] [-initiatedBy <String[]>]
[-initiatedByNin <String[]>] [-initiatedByUsername__contains <String[]>]
[-k8sClusterName__contains <String[]>] [-k8sControllerLabels__contains <String[]>]
[-k8sControllerName__contains <String[]>] [-k8sNamespaceLabels__contains <String[]>]
[-k8sNamespaceName__contains <String[]>] [-k8sNodeName__contains <String[]>]
[-k8sPodLabels__contains <String[]>] [-k8sPodName__contains <String[]>] [-mitigatedPreemptively]
[-mitigationStatuses <String[]>] [-mitigationStatusesNin <String[]>] [-noteExists] [-osArchs <String[]>]
[-osNames <String[]>] [-osNamesNin <String[]>] [-osTypes <String[]>] [-osTypesNin <String[]>]
[-pendingActions] [-publisherName__contains <String[]>] [-query <String>]
[-realtimeAgentVersion__contains <String[]>] [-rebootRequired] [-resolved] [-siteIds <Int64[]>]
[-storyline__contains <String[]>] [-storylines <String[]>] [-tenant] [-threatDetails__contains <String[]>]
[-updatedAt__gt <DateTime>] [-updatedAt__gte <DateTime>] [-updatedAt__lt <DateTime>]
[-updatedAt__lte <DateTime>] [-uuid__contains <String[]>] [-fileName <String>] [-filePath <String>]
[-showReport] [<CommonParameters>]
DESCRIPTION
The Export-SentinelOneThreats cmdlet exports data of threats that match the filter.
Note: Use the filter. This command exports only 20,000 items (each datum is an item).
EXAMPLES
EXAMPLE 1
Export-SentinelOneThreats
Returns data of threats from a global scope and saves the results to a csv in the current working directory.
fileName: threats-2022-10-29_105845.csv
If the data is over 20k then this will no work
EXAMPLE 2
Export-SentinelOneThreats -siteIds 225494730938493804
Returns data of threats from a defined scope and saves the results to a csv in the current working directory.
fileName: threats-2022-10-29_105845.csv
EXAMPLE 3
225494730938493804 | Export-SentinelOneThreats
Returns data of threats from a defined scope and saves the results to a csv in the current working directory.
fileName: threats-2022-10-29_105845.csv
EXAMPLE 4
Export-SentinelOneThreats -createdAt__gt '2018-02-27 14:32'
Returns threats that were created after the defined dataTime and saves the results to a csv in the current working directory.
DataTime values are converted to UTC, use -verbose to see the value it is converted to.
EXAMPLE 5
Export-SentinelOneThreats -siteIds 225494730938493804 -fileName MyCustomFile -filePath C:\Logs -showReport
Returns threat from the defined siteIds and saves the results in the defined directory with the defined name and opens the location to were the file is saved.
fileName: MyCustomFile.csv
PARAMETERS
-accountIds
List of Account IDs to filter by.
Example: “225494730938493804,225494730938493915”.
Type: Int64[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-agentIds
List of Agent IDs.
Example: “225494730938493804,225494730938493915”.
Type: Int64[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-agentIsActive
Include Agents currently connected to the Management Console
Type: SwitchParameter
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: False
Accept pipeline input: False
Accept wildcard characters: False
-agentMachineTypes
Include Agent machine types.
Allowed values: ‘desktop’, ‘kubernetes node’, ‘laptop’, ‘server’, ‘storage’, ‘unknown’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-agentMachineTypesNin
Excluded Agent machine types.
Allowed values: ‘desktop’, ‘kubernetes node’, ‘laptop’, ‘server’, ‘storage’, ‘unknown’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-agentVersions
Agent versions to include.
Example: “2.0.0.0,2.1.5.144”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-agentVersionsNin
Agent versions not to include.
Example: “2.0.0.0,2.1.5.144”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-analystVerdicts
Filter threats by a specific analyst verdict.
Allowed values: ‘false_positive’, ‘suspicious’, ‘true_positive’, ‘undefined’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-analystVerdictsNin
Exclude threats with specific analyst verdicts.
Allowed values: ‘false_positive’, ‘suspicious’, ‘true_positive’, ‘undefined’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-awsRole__contains
Free-text filter by aws role
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-awsSecurityGroups__contains
Free-text filter by aws securityGroups
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-awsSubnetIds__contains
Free-text filter by aws subnet ids
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-azureResourceGroup__contains
Free-text filter by azure resource group
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-classifications
List of threat classifications to search
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-classificationsNin
List of threat classifications not to search
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-classificationSources
Classification sources list.
Allowed values: ‘Behavioral’, ‘Cloud’, ‘Engine’, ‘Static’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-classificationSourcesNin
Classification sources list to exclude.
Allowed values: ‘Behavioral’, ‘Cloud’, ‘Engine’, ‘Static’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-cloudAccount__contains
Free-text filter by cloud account
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-cloudImage__contains
Free-text filter by cloud image
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-cloudInstanceId__contains
Free-text filter by cloud instance id
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-cloudInstanceSize__contains
Free-text filter by cloud instance size
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-cloudLocation__contains
Free-text filter by cloud location
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-cloudNetwork__contains
Free-text filter by cloud network
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-cloudProvider
Agents from which cloud provider
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-cloudProviderNin
Exclude Agents from these cloud provider
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-collectionIds
List of collection IDs to search.
Example: “225494730938493804,225494730938493915”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-commandLineArguments__contains
Free-text filter by threat command line arguments
Example: “/usr/sbin/,wget”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-computerName__contains
Free-text filter by computer name.
Example: “john-office,WIN”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-confidenceLevels
Filter threats by a specific confidence level.
Allowed values: ‘malicious’, ‘n/a’, ‘suspicious’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-confidenceLevelsNin
Exclude threats with specific confidence level.
Allowed values: ‘malicious’, ‘n/a’, ‘suspicious’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-containerImageName__contains
Free-text filter by the endpoint container image name
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-containerLabels__contains
Free-text filter by the endpoint container labels
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-containerName__contains
Free-text filter by the endpoint container name
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-contentHash__contains
Free-text filter by file content hash
Example: “5f09bcff3”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-contentHashes
List of sha1 hashes to search for.
Example: “d,d,d,5,0,3,0,a,3,d,0,2,9,f,3,8,4,5,f,c,1,0,5,2,4,1,9,8,2,9,f,0,8,f,3,1,2,2,4,0”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-countsFor
comma-separated list of fields to be shown.
Example: “osTypes,machineTypes”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-createdAt__gt
Returns threats created after this timestamp.
Inputted data is converted to UTC time
Example: yyyy-MM-ddTHH:mm:ss.ffffffZ 2018-02-27T04:49:26.257525Z
Type: DateTime
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-createdAt__gte
Returns threats created after or at this timestamp.
Inputted data is converted to UTC time
Example: yyyy-MM-ddTHH:mm:ss.ffffffZ 2018-02-27T04:49:26.257525Z
Type: DateTime
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-createdAt__lt
Returns threats created before this timestamp.
Inputted data is converted to UTC time
Example: yyyy-MM-ddTHH:mm:ss.ffffffZ 2018-02-27T04:49:26.257525Z
Type: DateTime
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-createdAt__lte
Returns threats created before or at this timestamp.
Inputted data is converted to UTC time
Example: yyyy-MM-ddTHH:mm:ss.ffffffZ 2018-02-27T04:49:26.257525Z
Type: DateTime
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-detectionAgentDomain__contains
Free-text filter by Agent domain at detection time
Example: “sentinel,sentinelone.com”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-detectionAgentVersion__contains
Free-text filter by Agent version at detection time
Example: “1.1.1.1,2.2.”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-detectionEngines
Included engines.
Allowed values: ‘application_control’, ‘data_files’, ‘executables’, ‘exploits’, ‘lateral_movement’, ‘manual’, ‘penetration’, ‘pre_execution’, ‘pre_execution_suspicious’, ‘pup’, ‘remote_shell’, ‘reputation’, ‘sentinelone_cloud’, ‘user_blacklist’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-detectionEnginesNin
Excluded engines.
Allowed values: ‘application_control’, ‘data_files’, ‘executables’, ‘exploits’, ‘lateral_movement’, ‘manual’, ‘penetration’, ‘pre_execution’, ‘pre_execution_suspicious’, ‘pup’, ‘remote_shell’, ‘reputation’, ‘sentinelone_cloud’, ‘user_blacklist’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-displayName
Display name
Type: String
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-engines
Included engines.
Allowed values: ‘application_control’, ‘data_files’, ‘executables’, ‘exploits’, ‘lateral_movement’, ‘manual’, ‘penetration’, ‘pre_execution’, ‘pre_execution_suspicious’, ‘pup’, ‘remote_shell’, ‘reputation’, ‘sentinelone_cloud’, ‘user_blacklist’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-enginesNin
Excluded engines.
Allowed values: ‘application_control’, ‘data_files’, ‘executables’, ‘exploits’, ‘lateral_movement’, ‘manual’, ‘penetration’, ‘pre_execution’, ‘pre_execution_suspicious’, ‘pup’, ‘remote_shell’, ‘reputation’, ‘sentinelone_cloud’, ‘user_blacklist’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-externalTicketExists
The threat contains ticket number
Type: SwitchParameter
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: False
Accept pipeline input: False
Accept wildcard characters: False
-externalTicketId__contains
Free-text filter by the threat external ticket ID
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-externalTicketIds
External ticket ID for the threat
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-failedActions
At least one action failed on the threat
Type: SwitchParameter
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: False
Accept pipeline input: False
Accept wildcard characters: False
-filePath__contains
Free-text filter by file path
Example: “\MyUser\Downloads”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-gcpServiceAccount__contains
Free-text filter by gcp service account
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-groupIds
List of Group IDs to filter by.
Example: “225494730938493804,225494730938493915”.
Type: Int64[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-ids
A list of Agent IDs.
Example: “225494730938493804,225494730938493915”.
Type: Int64[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-incidentStatuses
Filter threats by a specific incident status.
Allowed values: ‘in_progress’, ‘resolved’, ‘unresolved’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-incidentStatusesNin
Exclude threats with specific incident statuses.
Allowed values: ‘in_progress’, ‘resolved’, ‘unresolved’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-initiatedBy
Only include threats from specific initiating sources.
Allowed values: ‘agent_policy’, ‘cloud_detection’, ‘console_api’, ‘dv_command’, ‘full_disk_scan’, ‘on_demand_scan’, ‘sentinelctl’, ‘star_active’, ‘star_manual’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-initiatedByNin
Exclude threats with specific initiating sources.
Allowed values: ‘agent_policy’, ‘cloud_detection’, ‘console_api’, ‘dv_command’, ‘full_disk_scan’, ‘on_demand_scan’, ‘sentinelctl’, ‘star_active’, ‘star_manual’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-initiatedByUsername__contains
Free-text filter by the username that initiated that threat
Example: “John,John Doe”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-k8sClusterName__contains
Free-text filter by the endpoint Kubernetes cluster name
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-k8sControllerLabels__contains
Free-text filter by the endpoint Kubernetes controller labels
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-k8sControllerName__contains
Free-text filter by the endpoint Kubernetes controller name
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-k8sNamespaceLabels__contains
Free-text filter by the endpoint Kubernetes namespace labels
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-k8sNamespaceName__contains
Free-text filter by the endpoint Kubernetes namespace name
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-k8sNodeName__contains
Free-text filter by the endpoint Kubernetes node name
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-k8sPodLabels__contains
Free-text filter by the endpoint Kubernetes pod labels
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-k8sPodName__contains
Free-text filter by the endpoint Kubernetes pod name
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-mitigatedPreemptively
If the threat was detected pre-execution or post-execution
Type: SwitchParameter
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: False
Accept pipeline input: False
Accept wildcard characters: False
-mitigationStatuses
Filter threats by a specific status.
Allowed values: ‘marked_as_benign’, ‘mitigated’, ‘not_mitigated’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-mitigationStatusesNin
Filter threats not by a specific status.
Allowed values: ‘marked_as_benign’, ‘mitigated’, ‘not_mitigated’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-noteExists
The threat contains at least one note
Type: SwitchParameter
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: False
Accept pipeline input: False
Accept wildcard characters: False
-osArchs
OS architecture.
Allowed values: ‘32 bit’, ‘64 bit’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-osNames
osNames
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-osNamesNin
osNamesNin
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-osTypes
Included OS types.
Allowed values: ‘linux’, ‘macos’, ‘windows’, ‘windows_legacy’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-osTypesNin
Not included OS types.
Allowed values: ‘linux’, ‘macos’, ‘windows’, ‘windows_legacy’
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-pendingActions
At least one action is pending for the Agent for the threat
Type: SwitchParameter
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: False
Accept pipeline input: False
Accept wildcard characters: False
-publisherName__contains
Free-text filter by threat’s publisher name
Example: “GOOGLE,Apple Inc.”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-query
Full text search for fields:
threat_details, content_hash, computer_name, file_path, uuid, detection_agent_version, realtime_agent_version, detection_agent_domain, command_line_arguments, initiated_by_username, storyline, originated_process, k8s_cluster_name, k8s_node_name, k8s_namespace_name, k8s_namespace_labels, k8s_controller_name, k8s_controller_labels, k8s_pod_name, k8s_pod_labels, container_name, container_image_name, container_labels, external_ticket_id
Type: String
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-realtimeAgentVersion__contains
Free-text filter by Agent version at current time
Example: “1.1.1.1,2.2.”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-rebootRequired
A reboot is required on any endpoint for at least one action on the threat
Type: SwitchParameter
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: False
Accept pipeline input: False
Accept wildcard characters: False
-resolved
This is used for backward-compatibility with API 2.0.
Type: SwitchParameter
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: False
Accept pipeline input: False
Accept wildcard characters: False
-siteIds
List of Site IDs to filter by.
Example: “225494730938493804,225494730938493915”.
Type: Int64[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: True (ByValue)
Accept wildcard characters: False
-storyline__contains
Free-text filter by threat storyline
Example: “0000C2E97648,0006FC73-77B4-470F-AAC7-“.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-storylines
List of Agent context to search for
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-tenant
Indicates a tenant scope request
Type: SwitchParameter
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: False
Accept pipeline input: False
Accept wildcard characters: False
-threatDetails__contains
Free-text filter by threat details
Example: “malware.exe,virus.exe”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-updatedAt__gt
Returns threats updated after this timestamp.
Inputted data is converted to UTC time
Example: yyyy-MM-ddTHH:mm:ss.ffffffZ 2018-02-27T04:49:26.257525Z
Type: DateTime
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-updatedAt__gte
Returns threats updated after or at this timestamp.
Inputted data is converted to UTC time
Example: yyyy-MM-ddTHH:mm:ss.ffffffZ 2018-02-27T04:49:26.257525Z
Type: DateTime
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-updatedAt__lt
Returns threats updated before this timestamp.
Inputted data is converted to UTC time
Example: yyyy-MM-ddTHH:mm:ss.ffffffZ 2018-02-27T04:49:26.257525Z
Type: DateTime
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-updatedAt__lte
Returns threats updated before or at this timestamp.
Inputted data is converted to UTC time
Example: yyyy-MM-ddTHH:mm:ss.ffffffZ 2018-02-27T04:49:26.257525Z
Type: DateTime
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-uuid__contains
Free-text filter by Agent UUID (supports multiple values).
Example: “e92-01928,b055”.
Type: String[]
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-fileName
Name of the file
Example: ‘MyAgents-2022’
The default name format is ‘threats-yyyy-MM-dd_HHmmss’
Type: String
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: "threats-$( Get-date -Format 'yyyy-MM-dd_HHmmss' )"
Accept pipeline input: False
Accept wildcard characters: False
-filePath
The location to save the file to
Example: ‘C:\Logs’
The default save location is the current working directory
Type: String
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: $( (Get-Location).Path )
Accept pipeline input: False
Accept wildcard characters: False
-showReport
Open the location where the file was saved to
Type: SwitchParameter
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: False
Accept pipeline input: False
Accept wildcard characters: False
CommonParameters
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.
INPUTS
OUTPUTS
NOTES
Review\validate every parameter & parameter help
RELATED LINKS
https://celerium.github.io/SentinelOne-PowerShellWrapper/site/Threats/Export-SentinelOneThreats.html