Share via


New-MgDeviceManagementManagedDeviceWindowsProtectionStateDetectedMalwareState

Create new navigation property to detectedMalwareState for deviceManagement

Syntax

CreateExpanded (Default)

New-MgDeviceManagementManagedDeviceWindowsProtectionStateDetectedMalwareState
    -ManagedDeviceId <String>
    [-ResponseHeadersVariable <String>]
    [-AdditionalInformationUrl <String>]
    [-AdditionalProperties <Hashtable>]
    [-Category <WindowsMalwareCategory>]
    [-DetectionCount <Int32>]
    [-DisplayName <String>]
    [-ExecutionState <WindowsMalwareExecutionState>]
    [-Id <String>]
    [-InitialDetectionDateTime <DateTime>]
    [-LastStateChangeDateTime <DateTime>]
    [-Severity <WindowsMalwareSeverity>]
    [-State <WindowsMalwareState>]
    [-ThreatState <WindowsMalwareThreatState>]
    [-Headers <IDictionary>]
    [-WhatIf]
    [-Confirm]
    [<CommonParameters>]

Create

New-MgDeviceManagementManagedDeviceWindowsProtectionStateDetectedMalwareState
    -ManagedDeviceId <String>
    -BodyParameter <IMicrosoftGraphWindowsDeviceMalwareState>
    [-ResponseHeadersVariable <String>]
    [-Headers <IDictionary>]
    [-WhatIf]
    [-Confirm]
    [<CommonParameters>]

CreateViaIdentityExpanded

New-MgDeviceManagementManagedDeviceWindowsProtectionStateDetectedMalwareState

    -InputObject <IDeviceManagementIdentity>
    [-ResponseHeadersVariable <String>]
    [-AdditionalInformationUrl <String>]
    [-AdditionalProperties <Hashtable>]
    [-Category <WindowsMalwareCategory>]
    [-DetectionCount <Int32>]
    [-DisplayName <String>]
    [-ExecutionState <WindowsMalwareExecutionState>]
    [-Id <String>]
    [-InitialDetectionDateTime <DateTime>]
    [-LastStateChangeDateTime <DateTime>]
    [-Severity <WindowsMalwareSeverity>]
    [-State <WindowsMalwareState>]
    [-ThreatState <WindowsMalwareThreatState>]
    [-Headers <IDictionary>]
    [-WhatIf]
    [-Confirm]
    [<CommonParameters>]

CreateViaIdentity

New-MgDeviceManagementManagedDeviceWindowsProtectionStateDetectedMalwareState

    -InputObject <IDeviceManagementIdentity>
    -BodyParameter <IMicrosoftGraphWindowsDeviceMalwareState>
    [-ResponseHeadersVariable <String>]
    [-Headers <IDictionary>]
    [-WhatIf]
    [-Confirm]
    [<CommonParameters>]

Description

Create new navigation property to detectedMalwareState for deviceManagement

Parameters

-AdditionalInformationUrl

Information URL to learn more about the malware

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-AdditionalProperties

Additional Parameters

Parameter properties

Type:Hashtable
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-BodyParameter

Malware detection entity. To construct, see NOTES section for BODYPARAMETER properties and create a hash table.

Parameter properties

Type:IMicrosoftGraphWindowsDeviceMalwareState
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

Create
Position:Named
Mandatory:True
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentity
Position:Named
Mandatory:True
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False

-Category

Malware category id

Parameter properties

Type:WindowsMalwareCategory
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Confirm

Prompts you for confirmation before running the cmdlet.

Parameter properties

Type:SwitchParameter
Default value:None
Supports wildcards:False
DontShow:False
Aliases:cf

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-DetectionCount

Number of times the malware is detected

Parameter properties

Type:Int32
Default value:0
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-DisplayName

Malware name

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-ExecutionState

Malware execution status

Parameter properties

Type:WindowsMalwareExecutionState
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Headers

Optional headers that will be added to the request.

Parameter properties

Type:IDictionary
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False

-Id

The unique identifier for an entity. Read-only.

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-InitialDetectionDateTime

Initial detection datetime of the malware

Parameter properties

Type:DateTime
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-InputObject

Identity Parameter To construct, see NOTES section for INPUTOBJECT properties and create a hash table.

Parameter properties

Type:IDeviceManagementIdentity
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateViaIdentityExpanded
Position:Named
Mandatory:True
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentity
Position:Named
Mandatory:True
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False

-LastStateChangeDateTime

The last time this particular threat was changed

Parameter properties

Type:DateTime
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-ManagedDeviceId

The unique identifier of managedDevice

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:True
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
Create
Position:Named
Mandatory:True
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-ResponseHeadersVariable

Optional Response Headers Variable.

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False
Aliases:RHV

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Severity

Malware severity

Parameter properties

Type:WindowsMalwareSeverity
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-State

Malware current status

Parameter properties

Type:WindowsMalwareState
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-ThreatState

Malware threat status

Parameter properties

Type:WindowsMalwareThreatState
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False
CreateViaIdentityExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-WhatIf

Shows what would happen if the cmdlet runs. The cmdlet is not run.

Parameter properties

Type:SwitchParameter
Default value:None
Supports wildcards:False
DontShow:False
Aliases:wi

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutBuffer, -OutVariable, -PipelineVariable, -ProgressAction, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

Inputs

Microsoft.Graph.PowerShell.Models.IDeviceManagementIdentity

Microsoft.Graph.PowerShell.Models.IMicrosoftGraphWindowsDeviceMalwareState

System.Collections.IDictionary

Outputs

Microsoft.Graph.PowerShell.Models.IMicrosoftGraphWindowsDeviceMalwareState

Notes

COMPLEX PARAMETER PROPERTIES

To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.

BODYPARAMETER <IMicrosoftGraphWindowsDeviceMalwareState>: Malware detection entity.

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [AdditionalInformationUrl <String>]: Information URL to learn more about the malware
  • [Category <WindowsMalwareCategory?>]: Malware category id
  • [DetectionCount <Int32?>]: Number of times the malware is detected
  • [DisplayName <String>]: Malware name
  • [ExecutionState <WindowsMalwareExecutionState?>]: Malware execution status
  • [InitialDetectionDateTime <DateTime?>]: Initial detection datetime of the malware
  • [LastStateChangeDateTime <DateTime?>]: The last time this particular threat was changed
  • [Severity <WindowsMalwareSeverity?>]: Malware severity
  • [State <WindowsMalwareState?>]: Malware current status
  • [ThreatState <WindowsMalwareThreatState?>]: Malware threat status

INPUTOBJECT <IDeviceManagementIdentity>: Identity Parameter

  • [AppLogCollectionRequestId <String>]: The unique identifier of appLogCollectionRequest
  • [BrowserSharedCookieId <String>]: The unique identifier of browserSharedCookie
  • [BrowserSiteId <String>]: The unique identifier of browserSite
  • [BrowserSiteListId <String>]: The unique identifier of browserSiteList
  • [DetectedAppId <String>]: The unique identifier of detectedApp
  • [DeviceCategoryId <String>]: The unique identifier of deviceCategory
  • [DeviceComplianceActionItemId <String>]: The unique identifier of deviceComplianceActionItem
  • [DeviceComplianceDeviceStatusId <String>]: The unique identifier of deviceComplianceDeviceStatus
  • [DeviceCompliancePolicyAssignmentId <String>]: The unique identifier of deviceCompliancePolicyAssignment
  • [DeviceCompliancePolicyId <String>]: The unique identifier of deviceCompliancePolicy
  • [DeviceCompliancePolicySettingStateSummaryId <String>]: The unique identifier of deviceCompliancePolicySettingStateSummary
  • [DeviceCompliancePolicyStateId <String>]: The unique identifier of deviceCompliancePolicyState
  • [DeviceComplianceScheduledActionForRuleId <String>]: The unique identifier of deviceComplianceScheduledActionForRule
  • [DeviceComplianceSettingStateId <String>]: The unique identifier of deviceComplianceSettingState
  • [DeviceComplianceUserStatusId <String>]: The unique identifier of deviceComplianceUserStatus
  • [DeviceConfigurationAssignmentId <String>]: The unique identifier of deviceConfigurationAssignment
  • [DeviceConfigurationDeviceStatusId <String>]: The unique identifier of deviceConfigurationDeviceStatus
  • [DeviceConfigurationId <String>]: The unique identifier of deviceConfiguration
  • [DeviceConfigurationStateId <String>]: The unique identifier of deviceConfigurationState
  • [DeviceConfigurationUserStatusId <String>]: The unique identifier of deviceConfigurationUserStatus
  • [DeviceLogCollectionResponseId <String>]: The unique identifier of deviceLogCollectionResponse
  • [DeviceManagementTroubleshootingEventId <String>]: The unique identifier of deviceManagementTroubleshootingEvent
  • [LocalizedNotificationMessageId <String>]: The unique identifier of localizedNotificationMessage
  • [MalwareStateForWindowsDeviceId <String>]: The unique identifier of malwareStateForWindowsDevice
  • [ManagedDeviceId <String>]: The unique identifier of managedDevice
  • [MobileAppTroubleshootingEventId <String>]: The unique identifier of mobileAppTroubleshootingEvent
  • [NotificationMessageTemplateId <String>]: The unique identifier of notificationMessageTemplate
  • [SecretReferenceValueId <String>]: Usage: secretReferenceValueId='{secretReferenceValueId}'
  • [SettingStateDeviceSummaryId <String>]: The unique identifier of settingStateDeviceSummary
  • [WindowsDeviceMalwareStateId <String>]: The unique identifier of windowsDeviceMalwareState
  • [WindowsInformationProtectionAppLearningSummaryId <String>]: The unique identifier of windowsInformationProtectionAppLearningSummary
  • [WindowsInformationProtectionNetworkLearningSummaryId <String>]: The unique identifier of windowsInformationProtectionNetworkLearningSummary
  • [WindowsMalwareInformationId <String>]: The unique identifier of windowsMalwareInformation