Get-SPOMalwareFile
Extracts and displays the malware-related information of an infected file stored in SharePoint.
Syntax
Get-SPOMalwareFile
-FileUri <String>
[<CommonParameters>]
Description
The Get-SPOMalwareFile
cmdlet runs on a single file. If the file is malware-infected then it returns an object of the type SPOMalwareFile
which contains siteURL, filePath, malwareStatus flag, and malwareInfo (if applicable). You must be a SharePoint Online administrator to run the Get-SPOMalwareFile
cmdlet. Note that this cmdlet does not work on files that are not malware-infected.
For permissions and the most current information about Windows PowerShell for SharePoint Online, see the online documentation at Intro to SharePoint Online Management Shell.
Examples
EXAMPLE 1
Get-SPOMalwareFile -FileUri "https://contoso.com/sites/Marketing/Shared Documents/Doc1.docx"
Example 1 returns an object of the type SPOMalwareFile
which contains siteURL, filePath, malwareStatus flag, and malwareInfo (if applicable).
Parameters
-FileUri
Full URL for the file.
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Applies to: | SharePoint Online |
Notes
The Get-SPOMalwareFile
cmdlet returns an object of the type SPOMalwareFile
. To get the file stream of the infected file, pass this object as a parameter to the Get-SPOMalwareFileContent
cmdlet.