New-MgBetaSecurityThreatIntelligenceIntelProfile

Create new navigation property to intelProfiles for security

Note

To view the v1.0 release of this cmdlet, view New-MgSecurityThreatIntelligenceIntelProfile

Syntax

PowerShell
New-MgBetaSecurityThreatIntelligenceIntelProfile
   [-ResponseHeadersVariable <String>]
   [-AdditionalProperties <Hashtable>]
   [-Aliases <String[]>]
   [-CountriesOrRegionsOfOrigin <IMicrosoftGraphSecurityIntelligenceProfileCountryOrRegionOfOrigin[]>]
   [-Description <IMicrosoftGraphSecurityFormattedContent>]
   [-FirstActiveDateTime <DateTime>]
   [-Id <String>]
   [-Indicators <IMicrosoftGraphSecurityIntelligenceProfileIndicator[]>]
   [-Kind <String>]
   [-Summary <IMicrosoftGraphSecurityFormattedContent>]
   [-Targets <String[]>]
   [-Title <String>]
   [-Tradecraft <IMicrosoftGraphSecurityFormattedContent>]
   [-Headers <IDictionary>]
   [-ProgressAction <ActionPreference>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]
PowerShell
New-MgBetaSecurityThreatIntelligenceIntelProfile
   -BodyParameter <IMicrosoftGraphSecurityIntelligenceProfile>
   [-ResponseHeadersVariable <String>]
   [-Headers <IDictionary>]
   [-ProgressAction <ActionPreference>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]

Description

Create new navigation property to intelProfiles for security

Parameters

-AdditionalProperties

Additional Parameters

Type:Hashtable
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Aliases

A list of commonly-known aliases for the threat intelligence included in the intelligenceProfile.

Type:String[]
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-BodyParameter

intelligenceProfile To construct, see NOTES section for BODYPARAMETER properties and create a hash table.

Type:IMicrosoftGraphSecurityIntelligenceProfile
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:False

-Confirm

Prompts you for confirmation before running the cmdlet.

Type:SwitchParameter
Aliases:cf
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-CountriesOrRegionsOfOrigin

The country/region of origin for the given actor or threat associated with this intelligenceProfile. To construct, see NOTES section for COUNTRIESORREGIONSOFORIGIN properties and create a hash table.

Type:IMicrosoftGraphSecurityIntelligenceProfileCountryOrRegionOfOrigin[]
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Description

formattedContent To construct, see NOTES section for DESCRIPTION properties and create a hash table.

Type:IMicrosoftGraphSecurityFormattedContent
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-FirstActiveDateTime

The date and time when this intelligenceProfile was first active. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.

Type:DateTime
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Headers

Optional headers that will be added to the request.

Type:IDictionary
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-Id

The unique identifier for an entity. Read-only.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Indicators

Includes an assemblage of high-fidelity network indicators of compromise. To construct, see NOTES section for INDICATORS properties and create a hash table.

Type:IMicrosoftGraphSecurityIntelligenceProfileIndicator[]
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Kind

intelligenceProfileKind

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ProgressAction

{{ Fill ProgressAction Description }}

Type:ActionPreference
Aliases:proga
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ResponseHeadersVariable

Optional Response Headers Variable.

Type:String
Aliases:RHV
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Summary

formattedContent To construct, see NOTES section for SUMMARY properties and create a hash table.

Type:IMicrosoftGraphSecurityFormattedContent
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Targets

Known targets related to this intelligenceProfile.

Type:String[]
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Title

The title of this intelligenceProfile.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Tradecraft

formattedContent To construct, see NOTES section for TRADECRAFT properties and create a hash table.

Type:IMicrosoftGraphSecurityFormattedContent
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-WhatIf

Shows what would happen if the cmdlet runs. The cmdlet is not run.

Type:SwitchParameter
Aliases:wi
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

Inputs

Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphSecurityIntelligenceProfile

System.Collections.IDictionary

Outputs

Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphSecurityIntelligenceProfile

Notes

COMPLEX PARAMETER PROPERTIES

To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.

BODYPARAMETER <IMicrosoftGraphSecurityIntelligenceProfile>: intelligenceProfile

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [Aliases <String- []>]: A list of commonly-known aliases for the threat intelligence included in the intelligenceProfile.
  • [CountriesOrRegionsOfOrigin <IMicrosoftGraphSecurityIntelligenceProfileCountryOrRegionOfOrigin- []>]: The country/region of origin for the given actor or threat associated with this intelligenceProfile.
    • [Code <String>]: A codified representation for this country/region of origin.
    • [Label <String>]: A display label for this ountry/region of origin.
  • [Description <IMicrosoftGraphSecurityFormattedContent>]: formattedContent
    • [(Any) <Object>]: This indicates any property can be added to this object.
    • [Content <String>]: The content of this formattedContent.
    • [Format <String>]: contentFormat
  • [FirstActiveDateTime <DateTime?>]: The date and time when this intelligenceProfile was first active. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.
  • [Indicators <IMicrosoftGraphSecurityIntelligenceProfileIndicator- []>]: Includes an assemblage of high-fidelity network indicators of compromise.
    • [Artifact <IMicrosoftGraphSecurityArtifact>]: artifact
      • [(Any) <Object>]: This indicates any property can be added to this object.
      • [Id <String>]: The unique identifier for an entity. Read-only.
    • [Source <String>]: indicatorSource
    • [Id <String>]: The unique identifier for an entity. Read-only.
    • [FirstSeenDateTime <DateTime?>]: Designate when an artifact was first used actively in an attack, when a particular sample was compiled, or if neither of those could be ascertained when the file was first seen in public repositories (for example, VirusTotal, ANY.RUN, Hybrid Analysis) or reported publicly.
    • [LastSeenDateTime <DateTime?>]: Designate when an artifact was most recently used actively in an attack, when a particular sample was compiled, or if neither of those could be ascertained when the file was first seen in public repositories (for example, VirusTotal, ANY.RUN, Hybrid Analysis) or reported publicly.
  • [Kind <String>]: intelligenceProfileKind
  • [Summary <IMicrosoftGraphSecurityFormattedContent>]: formattedContent
  • [Targets <String- []>]: Known targets related to this intelligenceProfile.
  • [Title <String>]: The title of this intelligenceProfile.
  • [Tradecraft <IMicrosoftGraphSecurityFormattedContent>]: formattedContent

COUNTRIESORREGIONSOFORIGIN <IMicrosoftGraphSecurityIntelligenceProfileCountryOrRegionOfOrigin- []>: The country/region of origin for the given actor or threat associated with this intelligenceProfile.

  • [Code <String>]: A codified representation for this country/region of origin.
  • [Label <String>]: A display label for this ountry/region of origin.

DESCRIPTION <IMicrosoftGraphSecurityFormattedContent>: formattedContent

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [Content <String>]: The content of this formattedContent.
  • [Format <String>]: contentFormat

INDICATORS <IMicrosoftGraphSecurityIntelligenceProfileIndicator- []>: Includes an assemblage of high-fidelity network indicators of compromise.

  • [Artifact <IMicrosoftGraphSecurityArtifact>]: artifact
    • [(Any) <Object>]: This indicates any property can be added to this object.
    • [Id <String>]: The unique identifier for an entity. Read-only.
  • [Source <String>]: indicatorSource
  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [FirstSeenDateTime <DateTime?>]: Designate when an artifact was first used actively in an attack, when a particular sample was compiled, or if neither of those could be ascertained when the file was first seen in public repositories (for example, VirusTotal, ANY.RUN, Hybrid Analysis) or reported publicly.
  • [LastSeenDateTime <DateTime?>]: Designate when an artifact was most recently used actively in an attack, when a particular sample was compiled, or if neither of those could be ascertained when the file was first seen in public repositories (for example, VirusTotal, ANY.RUN, Hybrid Analysis) or reported publicly.

SUMMARY <IMicrosoftGraphSecurityFormattedContent>: formattedContent

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [Content <String>]: The content of this formattedContent.
  • [Format <String>]: contentFormat

TRADECRAFT <IMicrosoftGraphSecurityFormattedContent>: formattedContent

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [Content <String>]: The content of this formattedContent.
  • [Format <String>]: contentFormat