New-MgBetaDeviceManagementWindowsMalwareInformation
Create new navigation property to windowsMalwareInformation for deviceManagement
Note
To view the v1.0 release of this cmdlet, view New-MgDeviceManagementWindowsMalwareInformation
New-MgBetaDeviceManagementWindowsMalwareInformation
[-ResponseHeadersVariable <String>]
[-AdditionalInformationUrl <String>]
[-AdditionalProperties <Hashtable>]
[-Category <WindowsMalwareCategory>]
[-DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice[]>]
[-DisplayName <String>]
[-Id <String>]
[-LastDetectionDateTime <DateTime>]
[-Severity <WindowsMalwareSeverity>]
[-Headers <IDictionary>]
[-ProgressAction <ActionPreference>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
New-MgBetaDeviceManagementWindowsMalwareInformation
-BodyParameter <IMicrosoftGraphWindowsMalwareInformation>
[-ResponseHeadersVariable <String>]
[-Headers <IDictionary>]
[-ProgressAction <ActionPreference>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Create new navigation property to windowsMalwareInformation for deviceManagement
Indicates an informational URL to learn more about the malware
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Additional Parameters
Type: | Hashtable |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Malware information entity. To construct, see NOTES section for BODYPARAMETER properties and create a hash table.
Type: | IMicrosoftGraphWindowsMalwareInformation |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
Malware category id
Type: | WindowsMalwareCategory |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Prompts you for confirmation before running the cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
List of devices affected by current malware with the malware state on each device To construct, see NOTES section for DEVICEMALWARESTATES properties and create a hash table.
Type: | IMicrosoftGraphMalwareStateForWindowsDevice[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Indicates the name of the malware
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Optional headers that will be added to the request.
Type: | IDictionary |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | True |
Accept wildcard characters: | False |
The unique identifier for an entity. Read-only.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Indicates the last time the malware was detected in UTC
Type: | DateTime |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
{{ Fill ProgressAction Description }}
Type: | ActionPreference |
Aliases: | proga |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Optional Response Headers Variable.
Type: | String |
Aliases: | RHV |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Malware severity
Type: | WindowsMalwareSeverity |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Shows what would happen if the cmdlet runs. The cmdlet is not run.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphWindowsMalwareInformation
System.Collections.IDictionary
Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphWindowsMalwareInformation
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
BODYPARAMETER <IMicrosoftGraphWindowsMalwareInformation>
: Malware information entity.
[(Any) <Object>]
: This indicates any property can be added to this object.[Id <String>]
: The unique identifier for an entity. Read-only.[AdditionalInformationUrl <String>]
: Indicates an informational URL to learn more about the malware[Category <WindowsMalwareCategory?>]
: Malware category id[DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice-
[]>]
: List of devices affected by current malware with the malware state on each device[Id <String>]
: The unique identifier for an entity. Read-only.[DetectionCount <Int32?>]
: Indicates the number of times the malware is detected[DeviceName <String>]
: Indicates the name of the device being evaluated for malware state[ExecutionState <WindowsMalwareExecutionState?>]
: Malware execution status[InitialDetectionDateTime <DateTime?>]
: Initial detection datetime of the malware[LastStateChangeDateTime <DateTime?>]
: The last time this particular threat was changed[ThreatState <WindowsMalwareThreatState?>]
: Malware threat status
[DisplayName <String>]
: Indicates the name of the malware[LastDetectionDateTime <DateTime?>]
: Indicates the last time the malware was detected in UTC[Severity <WindowsMalwareSeverity?>]
: Malware severity
DEVICEMALWARESTATES <IMicrosoftGraphMalwareStateForWindowsDevice- []
>: List of devices affected by current malware with the malware state on each device
[Id <String>]
: The unique identifier for an entity. Read-only.[DetectionCount <Int32?>]
: Indicates the number of times the malware is detected[DeviceName <String>]
: Indicates the name of the device being evaluated for malware state[ExecutionState <WindowsMalwareExecutionState?>]
: Malware execution status[InitialDetectionDateTime <DateTime?>]
: Initial detection datetime of the malware[LastStateChangeDateTime <DateTime?>]
: The last time this particular threat was changed[ThreatState <WindowsMalwareThreatState?>]
: Malware threat status