Get-SentinelOneThreatExclusionTypes

SYNOPSIS

Get the Exclusion types that can be created from the detection data.

SYNTAX

Get-SentinelOneThreatExclusionTypes -threat_id <String> [<CommonParameters>]

DESCRIPTION

The Get-SentinelOneThreatExclusionTypes cmdlet gets the Exclusion types that can be created from the detection data.

For example, if a threat is a file with a detected SHA1 hash and pathname, the values of the whiteningOptions in the response are “path” and “file_hash”.

This command requires the ID of the threat, which you can get from “threats” (see Get Threats).

EXAMPLES

EXAMPLE 1

Get-SentinelOneThreatExclusionTypes -threat_id 225494730938493804

Returns the exclusion types that can be created from the detection data.

EXAMPLE 2

225494730938493804 | Get-SentinelOneThreatExclusionTypes

Returns the exclusion types that can be created from the detection data.

PARAMETERS

-threat_id

Threat ID.

Example: “225494730938493804”.

Type: String
Parameter Sets: (All)
Aliases:

Required: True
Position: Named
Default value: None
Accept pipeline input: True (ByValue)
Accept wildcard characters: False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

INPUTS

OUTPUTS

NOTES

N\A

https://celerium.github.io/SentinelOne-PowerShellWrapper/site/Threats/Get-SentinelOneThreatExclusionTypes.html