List windowsDeviceMalwareStates

Namespace: microsoft.graph

Note: The Microsoft Graph API for Intune requires an active Intune license for the tenant.

List properties and relationships of the windowsDeviceMalwareState objects.

Permissions

One of the following permissions is required to call this API. To learn more, including how to choose permissions, see Permissions.

Permission type Permissions (from least to most privileged)
Delegated (work or school account) DeviceManagementManagedDevices.Read.All, DeviceManagementManagedDevices.ReadWrite.All
Delegated (personal Microsoft account) Not supported.
Application DeviceManagementManagedDevices.Read.All, DeviceManagementManagedDevices.ReadWrite.All

HTTP Request

GET /deviceManagement/detectedApps/{detectedAppId}/managedDevices/{managedDeviceId}/windowsProtectionState/detectedMalwareState

Request headers

Header Value
Authorization Bearer {token}. Required. Learn more about authentication and authorization.
Accept application/json

Request body

Do not supply a request body for this method.

Response

If successful, this method returns a 200 OK response code and a collection of windowsDeviceMalwareState objects in the response body.

Example

Request

Here is an example of the request.

GET https://graph.microsoft.com/v1.0/deviceManagement/detectedApps/{detectedAppId}/managedDevices/{managedDeviceId}/windowsProtectionState/detectedMalwareState

Response

Here is an example of the response. Note: The response object shown here may be truncated for brevity. All of the properties will be returned from an actual call.

HTTP/1.1 200 OK
Content-Type: application/json
Content-Length: 644

{
  "value": [
    {
      "@odata.type": "#microsoft.graph.windowsDeviceMalwareState",
      "id": "6698016c-016c-6698-6c01-98666c019866",
      "displayName": "Display Name value",
      "additionalInformationUrl": "https://example.com/additionalInformationUrl/",
      "severity": "low",
      "catetgory": "adware",
      "executionState": "blocked",
      "state": "detected",
      "threatState": "actionFailed",
      "initialDetectionDateTime": "2016-12-31T23:57:05.3889692-08:00",
      "lastStateChangeDateTime": "2016-12-31T23:59:51.0767794-08:00",
      "detectionCount": 14,
      "category": "adware"
    }
  ]
}