diff --git a/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh b/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh index e5d40d6..2f89da8 100755 --- a/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh +++ b/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh @@ -376,7 +376,7 @@ cs_falcon_oauth_token=$( token_result=$(echo "client_id=$FALCON_CLIENT_ID&client_secret=$FALCON_CLIENT_SECRET" | curl -X POST -s -L "https://$(cs_cloud)/oauth2/token" \ -H 'Content-Type: application/x-www-form-urlencoded; charset=utf-8' \ - -H 'User-Agent: crowdstrike-falcon-scripts/1.2.0' \ + -H 'User-Agent: crowdstrike-falcon-scripts/1.3.0' \ --dump-header "$response_headers" \ --data @-) token=$(echo "$token_result" | json_value "access_token" | sed 's/ *$//g' | sed 's/^ *//g') diff --git a/bash/install/README.md b/bash/install/README.md index 94ad284..7b54a87 100644 --- a/bash/install/README.md +++ b/bash/install/README.md @@ -56,7 +56,7 @@ ALLOW_LEGACY_CURL (default: false) **Run the script**: ```bash -curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.2.0/bash/install/falcon-linux-install.sh | bash +curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.3.0/bash/install/falcon-linux-install.sh | bash ``` Alternatively, you can run the script by cloning the repo: @@ -88,5 +88,5 @@ bash -x falcon-linux-install.sh or ```bash -curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.2.0/bash/install/falcon-linux-install.sh | bash -x +curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.3.0/bash/install/falcon-linux-install.sh | bash -x ``` diff --git a/bash/install/falcon-linux-install.sh b/bash/install/falcon-linux-install.sh index 1355f84..e7cf775 100755 --- a/bash/install/falcon-linux-install.sh +++ b/bash/install/falcon-linux-install.sh @@ -675,7 +675,7 @@ cs_falcon_oauth_token=$( token_result=$(echo "client_id=$cs_falcon_client_id&client_secret=$cs_falcon_client_secret" | curl -X POST -s -x "$proxy" -L "https://$(cs_cloud)/oauth2/token" \ -H 'Content-Type: application/x-www-form-urlencoded; charset=utf-8' \ - -H 'User-Agent: crowdstrike-falcon-scripts/1.2.0' \ + -H 'User-Agent: crowdstrike-falcon-scripts/1.3.0' \ --dump-header "${response_headers}" \ --data @-) diff --git a/powershell/install/README.md b/powershell/install/README.md index 11f954f..c9ba1e4 100644 --- a/powershell/install/README.md +++ b/powershell/install/README.md @@ -66,7 +66,7 @@ Enable verbose logging To download the script: ```pwsh -Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.2.0/powershell/install/falcon_windows_install.ps1 -OutFile falcon_windows_install.ps1 +Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.3.0/powershell/install/falcon_windows_install.ps1 -OutFile falcon_windows_install.ps1 ``` Basic example that will install the sensor with the provided provisioning token @@ -118,7 +118,7 @@ Enable verbose logging To download the script: ```pwsh -Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.2.0/powershell/install/falcon_windows_uninstall.ps1 -OutFile falcon_windows_uninstall.ps1 +Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.3.0/powershell/install/falcon_windows_uninstall.ps1 -OutFile falcon_windows_uninstall.ps1 ``` Basic example that will uninstall the sensor with the provided maintenance token diff --git a/powershell/install/falcon_windows_install.ps1 b/powershell/install/falcon_windows_install.ps1 index fa92b55..f018445 100755 --- a/powershell/install/falcon_windows_install.ps1 +++ b/powershell/install/falcon_windows_install.ps1 @@ -180,7 +180,7 @@ begin { function Invoke-FalconAuth([hashtable] $WebRequestParams, [string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.2.0') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.3.0') try { $response = Invoke-WebRequest @WebRequestParams -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body $content = ConvertFrom-Json -InputObject $response.Content diff --git a/powershell/install/falcon_windows_uninstall.ps1 b/powershell/install/falcon_windows_uninstall.ps1 index 680ea1e..056e7b8 100755 --- a/powershell/install/falcon_windows_uninstall.ps1 +++ b/powershell/install/falcon_windows_uninstall.ps1 @@ -156,7 +156,7 @@ begin { function Invoke-FalconAuth([hashtable] $WebRequestParams, [string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.2.0') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.3.0') try { $response = Invoke-WebRequest @WebRequestParams -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body $content = ConvertFrom-Json -InputObject $response.Content diff --git a/powershell/migrate/README.md b/powershell/migrate/README.md index 6b47a37..03e319e 100644 --- a/powershell/migrate/README.md +++ b/powershell/migrate/README.md @@ -94,7 +94,7 @@ Enable verbose logging To download the script, run the following command: ```pwsh -Invoke-WebRequest -Uri "https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.2.0/powershell/migrate/falcon_windows_migrate.ps1" -OutFile "falcon_windows_migrate.ps1" +Invoke-WebRequest -Uri "https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.3.0/powershell/migrate/falcon_windows_migrate.ps1" -OutFile "falcon_windows_migrate.ps1" ``` ### Example 1 diff --git a/powershell/migrate/falcon_windows_migrate.ps1 b/powershell/migrate/falcon_windows_migrate.ps1 index 6180c81..1c4b566 100644 --- a/powershell/migrate/falcon_windows_migrate.ps1 +++ b/powershell/migrate/falcon_windows_migrate.ps1 @@ -985,7 +985,7 @@ function Get-FalconCloud ([string] $xCsRegion) { function Invoke-FalconAuth([hashtable] $WebRequestParams, [string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.2.0') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.3.0') try { $response = Invoke-WebRequest @WebRequestParams -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body $content = ConvertFrom-Json -InputObject $response.Content