New-MgDeviceManagementWindowsMalwareInformation
Create a new windowsMalwareInformation object.
Note
To view the beta release of this cmdlet, view New-MgBetaDeviceManagementWindowsMalwareInformation
Syntax
New-MgDeviceManagementWindowsMalwareInformation
[-ResponseHeadersVariable <String>]
[-AdditionalInformationUrl <String>]
[-AdditionalProperties <Hashtable>]
[-Category <WindowsMalwareCategory>]
[-DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice[]>]
[-DisplayName <String>]
[-Id <String>]
[-LastDetectionDateTime <DateTime>]
[-Severity <WindowsMalwareSeverity>]
[-Headers <IDictionary>]
[-ProgressAction <ActionPreference>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
New-MgDeviceManagementWindowsMalwareInformation
-BodyParameter <IMicrosoftGraphWindowsMalwareInformation>
[-ResponseHeadersVariable <String>]
[-Headers <IDictionary>]
[-ProgressAction <ActionPreference>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Description
Create a new windowsMalwareInformation object.
Examples
Example 1: Code snippet
Import-Module Microsoft.Graph.DeviceManagement
$params = @{
"@odata.type" = "#microsoft.graph.windowsMalwareInformation"
displayName = "Display Name value"
additionalInformationUrl = "https://example.com/additionalInformationUrl/"
severity = "low"
category = "adware"
lastDetectionDateTime = [System.DateTime]::Parse("2016-12-31T23:59:27.3805104-08:00")
}
New-MgDeviceManagementWindowsMalwareInformation -BodyParameter $params
This example shows how to use the New-MgDeviceManagementWindowsMalwareInformation Cmdlet.
Parameters
-AdditionalInformationUrl
Indicates an informational URL to learn more about the malware
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AdditionalProperties
Additional Parameters
Type: | Hashtable |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-BodyParameter
Malware information entity. To construct, see NOTES section for BODYPARAMETER properties and create a hash table.
Type: | IMicrosoftGraphWindowsMalwareInformation |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-Category
Malware category id
Type: | WindowsMalwareCategory |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Confirm
Prompts you for confirmation before running the cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DeviceMalwareStates
List of devices affected by current malware with the malware state on each device To construct, see NOTES section for DEVICEMALWARESTATES properties and create a hash table.
Type: | IMicrosoftGraphMalwareStateForWindowsDevice[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisplayName
Indicates the name of the malware
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Headers
Optional headers that will be added to the request.
Type: | IDictionary |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-Id
The unique identifier for an entity. Read-only.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-LastDetectionDateTime
Indicates the last time the malware was detected in UTC
Type: | DateTime |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ProgressAction
{{ Fill ProgressAction Description }}
Type: | ActionPreference |
Aliases: | proga |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ResponseHeadersVariable
Optional Response Headers Variable.
Type: | String |
Aliases: | RHV |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Severity
Malware severity
Type: | WindowsMalwareSeverity |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-WhatIf
Shows what would happen if the cmdlet runs. The cmdlet is not run.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Inputs
Microsoft.Graph.PowerShell.Models.IMicrosoftGraphWindowsMalwareInformation
System.Collections.IDictionary
Outputs
Microsoft.Graph.PowerShell.Models.IMicrosoftGraphWindowsMalwareInformation
Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
BODYPARAMETER <IMicrosoftGraphWindowsMalwareInformation>
: Malware information entity.
[(Any) <Object>]
: This indicates any property can be added to this object.[Id <String>]
: The unique identifier for an entity. Read-only.[AdditionalInformationUrl <String>]
: Indicates an informational URL to learn more about the malware[Category <WindowsMalwareCategory?>]
: Malware category id[DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice-
[]>]
: List of devices affected by current malware with the malware state on each device[Id <String>]
: The unique identifier for an entity. Read-only.[DetectionCount <Int32?>]
: Indicates the number of times the malware is detected[DeviceName <String>]
: Indicates the name of the device being evaluated for malware state[ExecutionState <WindowsMalwareExecutionState?>]
: Malware execution status[InitialDetectionDateTime <DateTime?>]
: Initial detection datetime of the malware[LastStateChangeDateTime <DateTime?>]
: The last time this particular threat was changed[ThreatState <WindowsMalwareThreatState?>]
: Malware threat status
[DisplayName <String>]
: Indicates the name of the malware[LastDetectionDateTime <DateTime?>]
: Indicates the last time the malware was detected in UTC[Severity <WindowsMalwareSeverity?>]
: Malware severity
DEVICEMALWARESTATES <IMicrosoftGraphMalwareStateForWindowsDevice- []
>: List of devices affected by current malware with the malware state on each device
[Id <String>]
: The unique identifier for an entity. Read-only.[DetectionCount <Int32?>]
: Indicates the number of times the malware is detected[DeviceName <String>]
: Indicates the name of the device being evaluated for malware state[ExecutionState <WindowsMalwareExecutionState?>]
: Malware execution status[InitialDetectionDateTime <DateTime?>]
: Initial detection datetime of the malware[LastStateChangeDateTime <DateTime?>]
: The last time this particular threat was changed[ThreatState <WindowsMalwareThreatState?>]
: Malware threat status