Rediger

Del via


Get-SPOMalwareFile

Extracts and displays the malware-related information of an infected file stored in SharePoint.

Syntax

Get-SPOMalwareFile
   -FileUri <String>
   [<CommonParameters>]

Description

The Get-SPOMalwareFile cmdlet runs on a single file. If the file is malware-infected then it returns an object of the type SPOMalwareFile which contains siteURL, filePath, malwareStatus flag, and malwareInfo (if applicable). You must be a SharePoint Online administrator to run the Get-SPOMalwareFile cmdlet. Note that this cmdlet does not work on files that are not malware-infected.

For permissions and the most current information about Windows PowerShell for SharePoint Online, see the online documentation at Intro to SharePoint Online Management Shell.

Examples

EXAMPLE 1

Get-SPOMalwareFile -FileUri "https://contoso.com/sites/Marketing/Shared Documents/Doc1.docx"

Example 1 returns an object of the type SPOMalwareFile which contains siteURL, filePath, malwareStatus flag, and malwareInfo (if applicable).

Parameters

-FileUri

Full URL for the file.

Type:String
Position:Named
Default value:None
Required:True
Accept pipeline input:False
Accept wildcard characters:False
Applies to:SharePoint Online

Notes

The Get-SPOMalwareFile cmdlet returns an object of the type SPOMalwareFile. To get the file stream of the infected file, pass this object as a parameter to the Get-SPOMalwareFileContent cmdlet.