Share via


Update-MgBetaSecurityRuleDetectionRule

Update the navigation property detectionRules in security

Syntax

Update-MgBetaSecurityRuleDetectionRule
      -DetectionRuleId <String>
      [-ResponseHeadersVariable <String>]
      [-AdditionalProperties <Hashtable>]
      [-CreatedBy <String>]
      [-CreatedDateTime <DateTime>]
      [-DetectionAction <IMicrosoftGraphSecurityDetectionAction>]
      [-DetectorId <String>]
      [-DisplayName <String>]
      [-Id <String>]
      [-IsEnabled]
      [-LastModifiedBy <String>]
      [-LastModifiedDateTime <DateTime>]
      [-LastRunDetails <IMicrosoftGraphSecurityRunDetails>]
      [-QueryCondition <IMicrosoftGraphSecurityQueryCondition>]
      [-Schedule <IMicrosoftGraphSecurityRuleSchedule>]
      [-Headers <IDictionary>]
      [-ProgressAction <ActionPreference>]
      [-WhatIf]
      [-Confirm]
      [<CommonParameters>]
Update-MgBetaSecurityRuleDetectionRule
      -DetectionRuleId <String>
      -BodyParameter <IMicrosoftGraphSecurityDetectionRule>
      [-ResponseHeadersVariable <String>]
      [-Headers <IDictionary>]
      [-ProgressAction <ActionPreference>]
      [-WhatIf]
      [-Confirm]
      [<CommonParameters>]
Update-MgBetaSecurityRuleDetectionRule
      -InputObject <ISecurityIdentity>
      [-ResponseHeadersVariable <String>]
      [-AdditionalProperties <Hashtable>]
      [-CreatedBy <String>]
      [-CreatedDateTime <DateTime>]
      [-DetectionAction <IMicrosoftGraphSecurityDetectionAction>]
      [-DetectorId <String>]
      [-DisplayName <String>]
      [-Id <String>]
      [-IsEnabled]
      [-LastModifiedBy <String>]
      [-LastModifiedDateTime <DateTime>]
      [-LastRunDetails <IMicrosoftGraphSecurityRunDetails>]
      [-QueryCondition <IMicrosoftGraphSecurityQueryCondition>]
      [-Schedule <IMicrosoftGraphSecurityRuleSchedule>]
      [-Headers <IDictionary>]
      [-ProgressAction <ActionPreference>]
      [-WhatIf]
      [-Confirm]
      [<CommonParameters>]
Update-MgBetaSecurityRuleDetectionRule
      -InputObject <ISecurityIdentity>
      -BodyParameter <IMicrosoftGraphSecurityDetectionRule>
      [-ResponseHeadersVariable <String>]
      [-Headers <IDictionary>]
      [-ProgressAction <ActionPreference>]
      [-WhatIf]
      [-Confirm]
      [<CommonParameters>]

Description

Update the navigation property detectionRules in security

Permissions

Permission type Permissions (from least to most privileged)
Delegated (work or school account) CustomDetection.ReadWrite.All,
Delegated (personal Microsoft account) Not supported
Application CustomDetection.ReadWrite.All,

Parameters

-AdditionalProperties

Additional Parameters

Type:Hashtable
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-BodyParameter

detectionRule To construct, see NOTES section for BODYPARAMETER properties and create a hash table.

Type:IMicrosoftGraphSecurityDetectionRule
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:False

-Confirm

Prompts you for confirmation before running the cmdlet.

Type:SwitchParameter
Aliases:cf
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-CreatedBy

Name of the user or application that created the rule.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-CreatedDateTime

Timestamp of rule creation.

Type:DateTime
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DetectionAction

detectionAction To construct, see NOTES section for DETECTIONACTION properties and create a hash table.

Type:IMicrosoftGraphSecurityDetectionAction
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DetectionRuleId

The unique identifier of detectionRule

Type:String
Position:Named
Default value:None
Required:True
Accept pipeline input:False
Accept wildcard characters:False

-DetectorId

The ID of the detector that triggered the alert. Also see the 'detectorId' field in microsoft.graph.security.alert.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DisplayName

Name of the rule.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Headers

Optional headers that will be added to the request.

Type:IDictionary
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-Id

The unique identifier for an entity. Read-only.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-InputObject

Identity Parameter To construct, see NOTES section for INPUTOBJECT properties and create a hash table.

Type:ISecurityIdentity
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:False

-IsEnabled

Whether rule is turned on for the tenant.

Type:SwitchParameter
Position:Named
Default value:False
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-LastModifiedBy

Name of the user or application who last updated the rule.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-LastModifiedDateTime

Timestamp of when the rule was last updated.

Type:DateTime
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-LastRunDetails

runDetails To construct, see NOTES section for LASTRUNDETAILS properties and create a hash table.

Type:IMicrosoftGraphSecurityRunDetails
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ProgressAction

{{ Fill ProgressAction Description }}

Type:ActionPreference
Aliases:proga
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-QueryCondition

queryCondition To construct, see NOTES section for QUERYCONDITION properties and create a hash table.

Type:IMicrosoftGraphSecurityQueryCondition
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ResponseHeadersVariable

Optional Response Headers Variable.

Type:String
Aliases:RHV
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Schedule

ruleSchedule To construct, see NOTES section for SCHEDULE properties and create a hash table.

Type:IMicrosoftGraphSecurityRuleSchedule
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-WhatIf

Shows what would happen if the cmdlet runs. The cmdlet is not run.

Type:SwitchParameter
Aliases:wi
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

Inputs

Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphSecurityDetectionRule

Microsoft.Graph.Beta.PowerShell.Models.ISecurityIdentity

System.Collections.IDictionary

Outputs

Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphSecurityDetectionRule

Notes

COMPLEX PARAMETER PROPERTIES

To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.

BODYPARAMETER <IMicrosoftGraphSecurityDetectionRule>: detectionRule

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [CreatedBy <String>]: Name of the user or application that created the rule.
  • [CreatedDateTime <DateTime?>]: Timestamp of rule creation.
  • [DisplayName <String>]: Name of the rule.
  • [IsEnabled <Boolean?>]: Whether rule is turned on for the tenant.
  • [LastModifiedBy <String>]: Name of the user or application who last updated the rule.
  • [LastModifiedDateTime <DateTime?>]: Timestamp of when the rule was last updated.
  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [DetectionAction <IMicrosoftGraphSecurityDetectionAction>]: detectionAction
    • [(Any) <Object>]: This indicates any property can be added to this object.
    • [AlertTemplate <IMicrosoftGraphSecurityAlertTemplate>]: alertTemplate
      • [(Any) <Object>]: This indicates any property can be added to this object.
      • [Category <String>]: Category assigned to the alert triggered by the custom detection rule.
      • [Description <String>]: Description of the alert triggered by the custom detection rule.
      • [ImpactedAssets <IMicrosoftGraphSecurityImpactedAsset- []>]: Which asset or assets were impacted based on the alert triggered by the custom detection rule.
      • [MitreTechniques <String- []>]: MITRE technique assigned to the alert triggered by the custom detection rule.
      • [RecommendedActions <String>]: Recommended actions to mitigate the threat related to the alert triggered by the custom detection rule.
      • [Severity <String>]: alertSeverity
      • [Title <String>]: Name of the alert triggered by the custom detection rule.
    • [OrganizationalScope <IMicrosoftGraphSecurityOrganizationalScope>]: organizationalScope
      • [(Any) <Object>]: This indicates any property can be added to this object.
      • [ScopeNames <String- []>]: List of groups to which the custom detection rule applies.
      • [ScopeType <String>]: scopeType
    • [ResponseActions <IMicrosoftGraphSecurityResponseAction- []>]: Actions taken on impacted assets as set in the custom detection rule.
  • [DetectorId <String>]: The ID of the detector that triggered the alert. Also see the 'detectorId' field in microsoft.graph.security.alert.
  • [LastRunDetails <IMicrosoftGraphSecurityRunDetails>]: runDetails
    • [(Any) <Object>]: This indicates any property can be added to this object.
    • [ErrorCode <String>]: huntingRuleErrorCode
    • [FailureReason <String>]: Reason for failure when the custom detection last ran and failed. See the table below.
    • [LastRunDateTime <DateTime?>]: Timestamp when the custom detection was last run.
    • [Status <String>]: huntingRuleRunStatus
  • [QueryCondition <IMicrosoftGraphSecurityQueryCondition>]: queryCondition
    • [(Any) <Object>]: This indicates any property can be added to this object.
    • [LastModifiedDateTime <DateTime?>]: Timestamp of when the query in the custom detection rule was last updated.
    • [QueryText <String>]: Contents of the query.
  • [Schedule <IMicrosoftGraphSecurityRuleSchedule>]: ruleSchedule
    • [(Any) <Object>]: This indicates any property can be added to this object.
    • [NextRunDateTime <DateTime?>]: Timestamp of the custom detection rule's next scheduled run.
    • [Period <String>]: How often the detection rule is set to run. The allowed values are: 0, 1H, 3H, 12H, or 24H. '0' signifies the rule is run continuously.

DETECTIONACTION <IMicrosoftGraphSecurityDetectionAction>: detectionAction

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [AlertTemplate <IMicrosoftGraphSecurityAlertTemplate>]: alertTemplate
    • [(Any) <Object>]: This indicates any property can be added to this object.
    • [Category <String>]: Category assigned to the alert triggered by the custom detection rule.
    • [Description <String>]: Description of the alert triggered by the custom detection rule.
    • [ImpactedAssets <IMicrosoftGraphSecurityImpactedAsset- []>]: Which asset or assets were impacted based on the alert triggered by the custom detection rule.
    • [MitreTechniques <String- []>]: MITRE technique assigned to the alert triggered by the custom detection rule.
    • [RecommendedActions <String>]: Recommended actions to mitigate the threat related to the alert triggered by the custom detection rule.
    • [Severity <String>]: alertSeverity
    • [Title <String>]: Name of the alert triggered by the custom detection rule.
  • [OrganizationalScope <IMicrosoftGraphSecurityOrganizationalScope>]: organizationalScope
    • [(Any) <Object>]: This indicates any property can be added to this object.
    • [ScopeNames <String- []>]: List of groups to which the custom detection rule applies.
    • [ScopeType <String>]: scopeType
  • [ResponseActions <IMicrosoftGraphSecurityResponseAction- []>]: Actions taken on impacted assets as set in the custom detection rule.

INPUTOBJECT <ISecurityIdentity>: Identity Parameter

  • [AlertId <String>]: The unique identifier of alert
  • [AnalyzedEmailId <String>]: The unique identifier of analyzedEmail
  • [ArticleId <String>]: The unique identifier of article
  • [ArticleIndicatorId <String>]: The unique identifier of articleIndicator
  • [AttackSimulationOperationId <String>]: The unique identifier of attackSimulationOperation
  • [AuditLogQueryId <String>]: The unique identifier of auditLogQuery
  • [AuditLogRecordId <String>]: The unique identifier of auditLogRecord
  • [AuthoredNoteId <String>]: The unique identifier of authoredNote
  • [AuthorityTemplateId <String>]: The unique identifier of authorityTemplate
  • [CaseOperationId <String>]: The unique identifier of caseOperation
  • [CategoryTemplateId <String>]: The unique identifier of categoryTemplate
  • [CitationTemplateId <String>]: The unique identifier of citationTemplate
  • [CloudAppDiscoveryReportId <String>]: The unique identifier of cloudAppDiscoveryReport
  • [CloudAppSecurityProfileId <String>]: The unique identifier of cloudAppSecurityProfile
  • [CustomerInsightTenantId <String>]: The unique identifier of customerInsight
  • [DataSourceId <String>]: The unique identifier of dataSource
  • [DepartmentTemplateId <String>]: The unique identifier of departmentTemplate
  • [DetectionRuleId <String>]: The unique identifier of detectionRule
  • [DispositionReviewStageNumber <String>]: The unique identifier of dispositionReviewStage
  • [DomainSecurityProfileId <String>]: The unique identifier of domainSecurityProfile
  • [EdiscoveryCaseId <String>]: The unique identifier of ediscoveryCase
  • [EdiscoveryCaseMemberId <String>]: The unique identifier of ediscoveryCaseMember
  • [EdiscoveryCustodianId <String>]: The unique identifier of ediscoveryCustodian
  • [EdiscoveryFileId <String>]: The unique identifier of ediscoveryFile
  • [EdiscoveryHoldPolicyId <String>]: The unique identifier of ediscoveryHoldPolicy
  • [EdiscoveryNoncustodialDataSourceId <String>]: The unique identifier of ediscoveryNoncustodialDataSource
  • [EdiscoveryReviewSetId <String>]: The unique identifier of ediscoveryReviewSet
  • [EdiscoveryReviewSetQueryId <String>]: The unique identifier of ediscoveryReviewSetQuery
  • [EdiscoveryReviewTagId <String>]: The unique identifier of ediscoveryReviewTag
  • [EdiscoveryReviewTagId1 <String>]: The unique identifier of ediscoveryReviewTag
  • [EdiscoverySearchId <String>]: The unique identifier of ediscoverySearch
  • [EmailThreatSubmissionId <String>]: The unique identifier of emailThreatSubmission
  • [EmailThreatSubmissionPolicyId <String>]: The unique identifier of emailThreatSubmissionPolicy
  • [EndUserNotificationDetailId <String>]: The unique identifier of endUserNotificationDetail
  • [EndUserNotificationId <String>]: The unique identifier of endUserNotification
  • [FilePlanReferenceTemplateId <String>]: The unique identifier of filePlanReferenceTemplate
  • [FileSecurityProfileId <String>]: The unique identifier of fileSecurityProfile
  • [FileThreatSubmissionId <String>]: The unique identifier of fileThreatSubmission
  • [HealthIssueId <String>]: The unique identifier of healthIssue
  • [HostComponentId <String>]: The unique identifier of hostComponent
  • [HostCookieId <String>]: The unique identifier of hostCookie
  • [HostId <String>]: The unique identifier of host
  • [HostPairId <String>]: The unique identifier of hostPair
  • [HostPortId <String>]: The unique identifier of hostPort
  • [HostSecurityProfileId <String>]: The unique identifier of hostSecurityProfile
  • [HostSslCertificateId <String>]: The unique identifier of hostSslCertificate
  • [HostTrackerId <String>]: The unique identifier of hostTracker
  • [IPSecurityProfileId <String>]: The unique identifier of ipSecurityProfile
  • [IncidentId <String>]: The unique identifier of incident
  • [IntelligenceProfileId <String>]: The unique identifier of intelligenceProfile
  • [IntelligenceProfileIndicatorId <String>]: The unique identifier of intelligenceProfileIndicator
  • [LandingPageDetailId <String>]: The unique identifier of landingPageDetail
  • [LandingPageId <String>]: The unique identifier of landingPage
  • [LoginPageId <String>]: The unique identifier of loginPage
  • [PartnerSecurityAlertId <String>]: The unique identifier of partnerSecurityAlert
  • [PassiveDnsRecordId <String>]: The unique identifier of passiveDnsRecord
  • [PayloadId <String>]: The unique identifier of payload
  • [ProviderTenantSettingId <String>]: The unique identifier of providerTenantSetting
  • [RetentionEventId <String>]: The unique identifier of retentionEvent
  • [RetentionEventTypeId <String>]: The unique identifier of retentionEventType
  • [RetentionLabelId <String>]: The unique identifier of retentionLabel
  • [SecureScoreControlProfileId <String>]: The unique identifier of secureScoreControlProfile
  • [SecureScoreId <String>]: The unique identifier of secureScore
  • [SecurityActionId <String>]: The unique identifier of securityAction
  • [SecurityRequirementId <String>]: The unique identifier of securityRequirement
  • [SecurityScoreHistoryId <String>]: The unique identifier of securityScoreHistory
  • [SensitivityLabelId <String>]: The unique identifier of sensitivityLabel
  • [SensorId <String>]: The unique identifier of sensor
  • [SimulationAutomationId <String>]: The unique identifier of simulationAutomation
  • [SimulationAutomationRunId <String>]: The unique identifier of simulationAutomationRun
  • [SimulationId <String>]: The unique identifier of simulation
  • [SiteSourceId <String>]: The unique identifier of siteSource
  • [SslCertificateId <String>]: The unique identifier of sslCertificate
  • [SubcategoryTemplateId <String>]: The unique identifier of subcategoryTemplate
  • [SubdomainId <String>]: The unique identifier of subdomain
  • [SubjectRightsRequestId <String>]: The unique identifier of subjectRightsRequest
  • [TiIndicatorId <String>]: The unique identifier of tiIndicator
  • [TrainingCampaignId <String>]: The unique identifier of trainingCampaign
  • [TrainingId <String>]: The unique identifier of training
  • [TrainingLanguageDetailId <String>]: The unique identifier of trainingLanguageDetail
  • [UnifiedGroupSourceId <String>]: The unique identifier of unifiedGroupSource
  • [UrlThreatSubmissionId <String>]: The unique identifier of urlThreatSubmission
  • [UserId <String>]: The unique identifier of user
  • [UserPrincipalName <String>]: Alternate key of user
  • [UserSecurityProfileId <String>]: The unique identifier of userSecurityProfile
  • [UserSourceId <String>]: The unique identifier of userSource
  • [VulnerabilityComponentId <String>]: The unique identifier of vulnerabilityComponent
  • [VulnerabilityId <String>]: The unique identifier of vulnerability
  • [WhoisHistoryRecordId <String>]: The unique identifier of whoisHistoryRecord
  • [WhoisRecordId <String>]: The unique identifier of whoisRecord

LASTRUNDETAILS <IMicrosoftGraphSecurityRunDetails>: runDetails

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [ErrorCode <String>]: huntingRuleErrorCode
  • [FailureReason <String>]: Reason for failure when the custom detection last ran and failed. See the table below.
  • [LastRunDateTime <DateTime?>]: Timestamp when the custom detection was last run.
  • [Status <String>]: huntingRuleRunStatus

QUERYCONDITION <IMicrosoftGraphSecurityQueryCondition>: queryCondition

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [LastModifiedDateTime <DateTime?>]: Timestamp of when the query in the custom detection rule was last updated.
  • [QueryText <String>]: Contents of the query.

SCHEDULE <IMicrosoftGraphSecurityRuleSchedule>: ruleSchedule

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [NextRunDateTime <DateTime?>]: Timestamp of the custom detection rule's next scheduled run.
  • [Period <String>]: How often the detection rule is set to run. The allowed values are: 0, 1H, 3H, 12H, or 24H. '0' signifies the rule is run continuously.

https://learn.microsoft.com/powershell/module/microsoft.graph.beta.security/update-mgbetasecurityruledetectionrule