Skip to content

Commit

Permalink
Update README.md to 3.6
Browse files Browse the repository at this point in the history
  • Loading branch information
areino authored Sep 4, 2023
1 parent 106a6c3 commit cb9b846
Showing 1 changed file with 2 additions and 1 deletion.
3 changes: 2 additions & 1 deletion samples/proxytool/README.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
![CrowdStrike Falcon](https://raw.githubusercontent.com/CrowdStrike/falconpy/main/docs/asset/cs-logo.png)
[![CrowdStrike Subreddit](https://img.shields.io/badge/-r%2Fcrowdstrike-white?logo=reddit&labelColor=gray&link=https%3A%2F%2Freddit.com%2Fr%2Fcrowdstrike)](https://reddit.com/r/crowdstrike)

# ProxyTool v3.5
# ProxyTool v3.6
This example focuses on leveraging CrowdStrike's Hosts, Host Groups, Sensor Download, and Real-Time Response API.

It is a script that fetches CID or Host Group hosts, and uses the batch command and offline queuing of Real-Time Response API to centrally
Expand All @@ -11,6 +11,7 @@ and conveniently issue Falcon sensor proxy configuration changes.
- Because it uses the RTR API it is run centrally through our cloud, it does NOT need to be distributed to each targeted host.
- The script uses the queuing feature of RTR, so hosts don't need to be online at the time the script is executed, they will receive the commands if they connect to our cloud within the next 7 days.
- The script checks that the CID provided as a scope_id argument is the same the API client is working with.
- Handles API authentication errors gracefully.

‼️WARNING‼️
This script has the potential to disrupt communications between the Falcon sensor and the cloud. It is recommended users test with a limited Host Group first to troubleshoot any issues.
Expand Down

0 comments on commit cb9b846

Please sign in to comment.