Indicates an informational URL to learn more about the malware
Parameter properties
Type:
String
Default value:
None
Supports wildcards:
False
DontShow:
False
Parameter sets
CreateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-AdditionalProperties
Additional Parameters
Parameter properties
Type:
Hashtable
Default value:
None
Supports wildcards:
False
DontShow:
False
Parameter sets
CreateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-BodyParameter
Malware information entity.
To construct, see NOTES section for BODYPARAMETER properties and create a hash table.
Parameter properties
Type:
IMicrosoftGraphWindowsMalwareInformation
Default value:
None
Supports wildcards:
False
DontShow:
False
Parameter sets
Create
Position:
Named
Mandatory:
True
Value from pipeline:
True
Value from pipeline by property name:
False
Value from remaining arguments:
False
-Category
Malware category id
Parameter properties
Type:
WindowsMalwareCategory
Default value:
None
Supports wildcards:
False
DontShow:
False
Parameter sets
CreateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-Confirm
Prompts you for confirmation before running the cmdlet.
Parameter properties
Type:
SwitchParameter
Default value:
None
Supports wildcards:
False
DontShow:
False
Aliases:
cf
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-DeviceMalwareStates
List of devices affected by current malware with the malware state on each device
To construct, see NOTES section for DEVICEMALWARESTATES properties and create a hash table.
Parameter properties
Type:
IMicrosoftGraphMalwareStateForWindowsDevice[]
Default value:
None
Supports wildcards:
False
DontShow:
False
Parameter sets
CreateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-DisplayName
Indicates the name of the malware
Parameter properties
Type:
String
Default value:
None
Supports wildcards:
False
DontShow:
False
Parameter sets
CreateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-Headers
Optional headers that will be added to the request.
Parameter properties
Type:
IDictionary
Default value:
None
Supports wildcards:
False
DontShow:
False
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
True
Value from pipeline by property name:
False
Value from remaining arguments:
False
-Id
The unique identifier for an entity.
Read-only.
Parameter properties
Type:
String
Default value:
None
Supports wildcards:
False
DontShow:
False
Parameter sets
CreateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-LastDetectionDateTime
Indicates the last time the malware was detected in UTC
Parameter properties
Type:
DateTime
Default value:
None
Supports wildcards:
False
DontShow:
False
Parameter sets
CreateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-ResponseHeadersVariable
Optional Response Headers Variable.
Parameter properties
Type:
String
Default value:
None
Supports wildcards:
False
DontShow:
False
Aliases:
RHV
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-Severity
Malware severity
Parameter properties
Type:
WindowsMalwareSeverity
Default value:
None
Supports wildcards:
False
DontShow:
False
Parameter sets
CreateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-WhatIf
Shows what would happen if the cmdlet runs.
The cmdlet is not run.
Parameter properties
Type:
SwitchParameter
Default value:
None
Supports wildcards:
False
DontShow:
False
Aliases:
wi
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
CommonParameters
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
-InformationAction, -InformationVariable, -OutBuffer, -OutVariable, -PipelineVariable,
-ProgressAction, -Verbose, -WarningAction, and -WarningVariable. For more information, see
about_CommonParameters.
To create the parameters described below, construct a hash table containing the appropriate properties.
For information on hash tables, run Get-Help about_Hash_Tables.
BODYPARAMETER <IMicrosoftGraphWindowsMalwareInformation>: Malware information entity.
[(Any) <Object>]: This indicates any property can be added to this object.
[Id <String>]: The unique identifier for an entity.
Read-only.
[AdditionalInformationUrl <String>]: Indicates an informational URL to learn more about the malware
[Category <WindowsMalwareCategory?>]: Malware category id
[DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice- []>]: List of devices affected by current malware with the malware state on each device
[Id <String>]: The unique identifier for an entity.
Read-only.
[DetectionCount <Int32?>]: Indicates the number of times the malware is detected
[DeviceName <String>]: Indicates the name of the device being evaluated for malware state
[ExecutionState <WindowsMalwareExecutionState?>]: Malware execution status
[InitialDetectionDateTime <DateTime?>]: Initial detection datetime of the malware
[LastStateChangeDateTime <DateTime?>]: The last time this particular threat was changed
[ThreatState <WindowsMalwareThreatState?>]: Malware threat status
[DisplayName <String>]: Indicates the name of the malware
[LastDetectionDateTime <DateTime?>]: Indicates the last time the malware was detected in UTC
DEVICEMALWARESTATES <IMicrosoftGraphMalwareStateForWindowsDevice- []>: List of devices affected by current malware with the malware state on each device
[Id <String>]: The unique identifier for an entity.
Read-only.
[DetectionCount <Int32?>]: Indicates the number of times the malware is detected
[DeviceName <String>]: Indicates the name of the device being evaluated for malware state
[ExecutionState <WindowsMalwareExecutionState?>]: Malware execution status
[InitialDetectionDateTime <DateTime?>]: Initial detection datetime of the malware
[LastStateChangeDateTime <DateTime?>]: The last time this particular threat was changed
[ThreatState <WindowsMalwareThreatState?>]: Malware threat status