Skip to content

Detections

Accessing and analyzing CrowdStrike Falcon detections

  • Alerts:read

Required scopes: Alerts:read

Retrieve details for detection IDs you already have.

Use when you have specific composite detection ID(s). For discovering detections by criteria (severity, status, hostname, etc.), use falcon_search_detections instead. Returns full detection records.

Example prompts:

  • “Get me the details for this detection”

Required scopes: Alerts:read

Find detections by criteria and return their complete details.

Use this to discover detections by severity, status, hostname, time range, or other attributes. Consult falcon://detections/search/fql-guide before constructing filter expressions. Returns full alert records including process context, device info, tactic/technique details, and threat classification.

Example prompts:

  • “Show me new high severity detections from the last 7 days”
  • “Find all unassigned critical detections”
  • falcon://detections/search/fql-guide: Contains the guide for the filter param of the falcon_search_detections tool.