Share via


New-MgDeviceManagementWindowsMalwareInformation

Create a new windowsMalwareInformation object.

Note

To view the beta release of this cmdlet, view New-MgBetaDeviceManagementWindowsMalwareInformation

Syntax

CreateExpanded (Default)

New-MgDeviceManagementWindowsMalwareInformation
    [-ResponseHeadersVariable <String>]
    [-AdditionalInformationUrl <String>]
    [-AdditionalProperties <Hashtable>]
    [-Category <WindowsMalwareCategory>]
    [-DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice[]>]
    [-DisplayName <String>]
    [-Id <String>]
    [-LastDetectionDateTime <DateTime>]
    [-Severity <WindowsMalwareSeverity>]
    [-Headers <IDictionary>]
    [-WhatIf]
    [-Confirm]
    [<CommonParameters>]

Create

New-MgDeviceManagementWindowsMalwareInformation
    -BodyParameter <IMicrosoftGraphWindowsMalwareInformation>
    [-ResponseHeadersVariable <String>]
    [-Headers <IDictionary>]
    [-WhatIf]
    [-Confirm]
    [<CommonParameters>]

Description

Create a new windowsMalwareInformation object.

Permissions

Permission type Permissions (from least to most privileged)
Delegated (work or school account) DeviceManagementManagedDevices.ReadWrite.All, DeviceManagementConfiguration.ReadWrite.All,
Delegated (personal Microsoft account) Not supported
Application DeviceManagementManagedDevices.ReadWrite.All, DeviceManagementConfiguration.ReadWrite.All,

Examples

Example 1: Code snippet


Import-Module Microsoft.Graph.DeviceManagement

$params = @{
	"@odata.type" = "#microsoft.graph.windowsMalwareInformation"
	displayName = "Display Name value"
	additionalInformationUrl = "https://example.com/additionalInformationUrl/"
	severity = "low"
	category = "adware"
	lastDetectionDateTime = [System.DateTime]::Parse("2016-12-31T23:59:27.3805104-08:00")
}

New-MgDeviceManagementWindowsMalwareInformation -BodyParameter $params

This example shows how to use the New-MgDeviceManagementWindowsMalwareInformation Cmdlet.

Parameters

-AdditionalInformationUrl

Indicates an informational URL to learn more about the malware

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-AdditionalProperties

Additional Parameters

Parameter properties

Type:Hashtable
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-BodyParameter

Malware information entity. To construct, see NOTES section for BODYPARAMETER properties and create a hash table.

Parameter properties

Type:IMicrosoftGraphWindowsMalwareInformation
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

Create
Position:Named
Mandatory:True
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False

-Category

Malware category id

Parameter properties

Type:WindowsMalwareCategory
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Confirm

Prompts you for confirmation before running the cmdlet.

Parameter properties

Type:SwitchParameter
Default value:None
Supports wildcards:False
DontShow:False
Aliases:cf

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-DeviceMalwareStates

List of devices affected by current malware with the malware state on each device To construct, see NOTES section for DEVICEMALWARESTATES properties and create a hash table.

Parameter properties

Type:

IMicrosoftGraphMalwareStateForWindowsDevice[]

Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-DisplayName

Indicates the name of the malware

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Headers

Optional headers that will be added to the request.

Parameter properties

Type:IDictionary
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False

-Id

The unique identifier for an entity. Read-only.

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-LastDetectionDateTime

Indicates the last time the malware was detected in UTC

Parameter properties

Type:DateTime
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-ResponseHeadersVariable

Optional Response Headers Variable.

Parameter properties

Type:String
Default value:None
Supports wildcards:False
DontShow:False
Aliases:RHV

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Severity

Malware severity

Parameter properties

Type:WindowsMalwareSeverity
Default value:None
Supports wildcards:False
DontShow:False

Parameter sets

CreateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-WhatIf

Shows what would happen if the cmdlet runs. The cmdlet is not run.

Parameter properties

Type:SwitchParameter
Default value:None
Supports wildcards:False
DontShow:False
Aliases:wi

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutBuffer, -OutVariable, -PipelineVariable, -ProgressAction, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

Inputs

Microsoft.Graph.PowerShell.Models.IMicrosoftGraphWindowsMalwareInformation

System.Collections.IDictionary

Outputs

Microsoft.Graph.PowerShell.Models.IMicrosoftGraphWindowsMalwareInformation

Notes

COMPLEX PARAMETER PROPERTIES

To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.

BODYPARAMETER <IMicrosoftGraphWindowsMalwareInformation>: Malware information entity.

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [AdditionalInformationUrl <String>]: Indicates an informational URL to learn more about the malware
  • [Category <WindowsMalwareCategory?>]: Malware category id
  • [DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice- []>]: List of devices affected by current malware with the malware state on each device
    • [Id <String>]: The unique identifier for an entity. Read-only.
    • [DetectionCount <Int32?>]: Indicates the number of times the malware is detected
    • [DeviceName <String>]: Indicates the name of the device being evaluated for malware state
    • [ExecutionState <WindowsMalwareExecutionState?>]: Malware execution status
    • [InitialDetectionDateTime <DateTime?>]: Initial detection datetime of the malware
    • [LastStateChangeDateTime <DateTime?>]: The last time this particular threat was changed
    • [ThreatState <WindowsMalwareThreatState?>]: Malware threat status
  • [DisplayName <String>]: Indicates the name of the malware
  • [LastDetectionDateTime <DateTime?>]: Indicates the last time the malware was detected in UTC
  • [Severity <WindowsMalwareSeverity?>]: Malware severity

DEVICEMALWARESTATES <IMicrosoftGraphMalwareStateForWindowsDevice- []>: List of devices affected by current malware with the malware state on each device

  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [DetectionCount <Int32?>]: Indicates the number of times the malware is detected
  • [DeviceName <String>]: Indicates the name of the device being evaluated for malware state
  • [ExecutionState <WindowsMalwareExecutionState?>]: Malware execution status
  • [InitialDetectionDateTime <DateTime?>]: Initial detection datetime of the malware
  • [LastStateChangeDateTime <DateTime?>]: The last time this particular threat was changed
  • [ThreatState <WindowsMalwareThreatState?>]: Malware threat status