Share via


New-MgBetaDeviceManagementWindowsMalwareInformation

Create new navigation property to windowsMalwareInformation for deviceManagement

Note

To view the v1.0 release of this cmdlet, view New-MgDeviceManagementWindowsMalwareInformation

Syntax

CreateExpanded (Default)

New-MgBetaDeviceManagementWindowsMalwareInformation
    [-ResponseHeadersVariable <String>]
    [-AdditionalInformationUrl <String>]
    [-AdditionalProperties <Hashtable>]
    [-Category <WindowsMalwareCategory>]
    [-DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice[]>]
    [-DisplayName <String>]
    [-Id <String>]
    [-LastDetectionDateTime <DateTime>]
    [-Severity <WindowsMalwareSeverity>]
    [-Headers <IDictionary>]
    [-WhatIf]
    [-Confirm]
    [<CommonParameters>]

Create

New-MgBetaDeviceManagementWindowsMalwareInformation
    -BodyParameter <IMicrosoftGraphWindowsMalwareInformation>
    [-ResponseHeadersVariable <String>]
    [-Headers <IDictionary>]
    [-WhatIf]
    [-Confirm]
    [<CommonParameters>]

Description

Create new navigation property to windowsMalwareInformation for deviceManagement

Permissions

Permission type Permissions (from least to most privileged)
Delegated (work or school account) DeviceManagementManagedDevices.ReadWrite.All, DeviceManagementConfiguration.ReadWrite.All,
Delegated (personal Microsoft account) Not supported
Application DeviceManagementManagedDevices.ReadWrite.All, DeviceManagementConfiguration.ReadWrite.All,

Parameters

-AdditionalInformationUrl

Indicates an informational URL to learn more about the malware

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-AdditionalProperties

Additional Parameters

Parameter properties

Type:Hashtable
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-BodyParameter

Malware information entity. To construct, see NOTES section for BODYPARAMETER properties and create a hash table.

Parameter properties

Type:IMicrosoftGraphWindowsMalwareInformation
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

Create
Position:Named
Mandatory:True
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False

-Category

Malware category id

Parameter properties

Type:WindowsMalwareCategory
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Confirm

Prompts you for confirmation before running the cmdlet.

Parameter properties

Type:SwitchParameter
Default value:None
Supports wildcards:False
DontShow:False
Aliases:cf

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-DeviceMalwareStates

List of devices affected by current malware with the malware state on each device To construct, see NOTES section for DEVICEMALWARESTATES properties and create a hash table.

Parameter properties

Type:

IMicrosoftGraphMalwareStateForWindowsDevice[]

Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-DisplayName

Indicates the name of the malware

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Headers

Optional headers that will be added to the request.

Parameter properties

Type:IDictionary
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False

-Id

The unique identifier for an entity. Read-only.

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-LastDetectionDateTime

Indicates the last time the malware was detected in UTC

Parameter properties

Type:DateTime
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-ResponseHeadersVariable

Optional Response Headers Variable.

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False
Aliases:RHV

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Severity

Malware severity

Parameter properties

Type:WindowsMalwareSeverity
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-WhatIf

Shows what would happen if the cmdlet runs. The cmdlet is not run.

Parameter properties

Type:SwitchParameter
Default value:None
Supports wildcards:False
DontShow:False
Aliases:wi

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutBuffer, -OutVariable, -PipelineVariable, -ProgressAction, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

Inputs

Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphWindowsMalwareInformation

System.Collections.IDictionary

Outputs

Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphWindowsMalwareInformation

Notes

COMPLEX PARAMETER PROPERTIES

To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.

BODYPARAMETER <IMicrosoftGraphWindowsMalwareInformation>: Malware information entity.

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [AdditionalInformationUrl <String>]: Indicates an informational URL to learn more about the malware
  • [Category <WindowsMalwareCategory?>]: Malware category id
  • [DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice- []>]: List of devices affected by current malware with the malware state on each device
    • [Id <String>]: The unique identifier for an entity. Read-only.
    • [DetectionCount <Int32?>]: Indicates the number of times the malware is detected
    • [DeviceName <String>]: Indicates the name of the device being evaluated for malware state
    • [ExecutionState <WindowsMalwareExecutionState?>]: Malware execution status
    • [InitialDetectionDateTime <DateTime?>]: Initial detection datetime of the malware
    • [LastStateChangeDateTime <DateTime?>]: The last time this particular threat was changed
    • [ThreatState <WindowsMalwareThreatState?>]: Malware threat status
  • [DisplayName <String>]: Indicates the name of the malware
  • [LastDetectionDateTime <DateTime?>]: Indicates the last time the malware was detected in UTC
  • [Severity <WindowsMalwareSeverity?>]: Malware severity

DEVICEMALWARESTATES <IMicrosoftGraphMalwareStateForWindowsDevice- []>: List of devices affected by current malware with the malware state on each device

  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [DetectionCount <Int32?>]: Indicates the number of times the malware is detected
  • [DeviceName <String>]: Indicates the name of the device being evaluated for malware state
  • [ExecutionState <WindowsMalwareExecutionState?>]: Malware execution status
  • [InitialDetectionDateTime <DateTime?>]: Initial detection datetime of the malware
  • [LastStateChangeDateTime <DateTime?>]: The last time this particular threat was changed
  • [ThreatState <WindowsMalwareThreatState?>]: Malware threat status