New-MgDeviceManagementWindowsMalwareInformation

Create a new windowsMalwareInformation object.

Note

To view the beta release of this cmdlet, view New-MgBetaDeviceManagementWindowsMalwareInformation

Syntax

New-MgDeviceManagementWindowsMalwareInformation
   [-ResponseHeadersVariable <String>]
   [-AdditionalInformationUrl <String>]
   [-AdditionalProperties <Hashtable>]
   [-Category <WindowsMalwareCategory>]
   [-DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice[]>]
   [-DisplayName <String>]
   [-Id <String>]
   [-LastDetectionDateTime <DateTime>]
   [-Severity <WindowsMalwareSeverity>]
   [-Headers <IDictionary>]
   [-ProgressAction <ActionPreference>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]
New-MgDeviceManagementWindowsMalwareInformation
   -BodyParameter <IMicrosoftGraphWindowsMalwareInformation>
   [-ResponseHeadersVariable <String>]
   [-Headers <IDictionary>]
   [-ProgressAction <ActionPreference>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]

Description

Create a new windowsMalwareInformation object.

Examples

Example 1: Code snippet

Import-Module Microsoft.Graph.DeviceManagement

$params = @{
	"@odata.type" = "#microsoft.graph.windowsMalwareInformation"
	displayName = "Display Name value"
	additionalInformationUrl = "https://example.com/additionalInformationUrl/"
	severity = "low"
	category = "adware"
	lastDetectionDateTime = [System.DateTime]::Parse("2016-12-31T23:59:27.3805104-08:00")
}

New-MgDeviceManagementWindowsMalwareInformation -BodyParameter $params

This example shows how to use the New-MgDeviceManagementWindowsMalwareInformation Cmdlet.

Parameters

-AdditionalInformationUrl

Indicates an informational URL to learn more about the malware

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-AdditionalProperties

Additional Parameters

Type:Hashtable
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-BodyParameter

Malware information entity. To construct, see NOTES section for BODYPARAMETER properties and create a hash table.

Type:IMicrosoftGraphWindowsMalwareInformation
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:False

-Category

Malware category id

Type:WindowsMalwareCategory
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Confirm

Prompts you for confirmation before running the cmdlet.

Type:SwitchParameter
Aliases:cf
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DeviceMalwareStates

List of devices affected by current malware with the malware state on each device To construct, see NOTES section for DEVICEMALWARESTATES properties and create a hash table.

Type:IMicrosoftGraphMalwareStateForWindowsDevice[]
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DisplayName

Indicates the name of the malware

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Headers

Optional headers that will be added to the request.

Type:IDictionary
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-Id

The unique identifier for an entity. Read-only.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-LastDetectionDateTime

Indicates the last time the malware was detected in UTC

Type:DateTime
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ProgressAction

{{ Fill ProgressAction Description }}

Type:ActionPreference
Aliases:proga
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ResponseHeadersVariable

Optional Response Headers Variable.

Type:String
Aliases:RHV
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Severity

Malware severity

Type:WindowsMalwareSeverity
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-WhatIf

Shows what would happen if the cmdlet runs. The cmdlet is not run.

Type:SwitchParameter
Aliases:wi
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

Inputs

Microsoft.Graph.PowerShell.Models.IMicrosoftGraphWindowsMalwareInformation

System.Collections.IDictionary

Outputs

Microsoft.Graph.PowerShell.Models.IMicrosoftGraphWindowsMalwareInformation

Notes

COMPLEX PARAMETER PROPERTIES

To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.

BODYPARAMETER <IMicrosoftGraphWindowsMalwareInformation>: Malware information entity.

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [AdditionalInformationUrl <String>]: Indicates an informational URL to learn more about the malware
  • [Category <WindowsMalwareCategory?>]: Malware category id
  • [DeviceMalwareStates <IMicrosoftGraphMalwareStateForWindowsDevice- []>]: List of devices affected by current malware with the malware state on each device
    • [Id <String>]: The unique identifier for an entity. Read-only.
    • [DetectionCount <Int32?>]: Indicates the number of times the malware is detected
    • [DeviceName <String>]: Indicates the name of the device being evaluated for malware state
    • [ExecutionState <WindowsMalwareExecutionState?>]: Malware execution status
    • [InitialDetectionDateTime <DateTime?>]: Initial detection datetime of the malware
    • [LastStateChangeDateTime <DateTime?>]: The last time this particular threat was changed
    • [ThreatState <WindowsMalwareThreatState?>]: Malware threat status
  • [DisplayName <String>]: Indicates the name of the malware
  • [LastDetectionDateTime <DateTime?>]: Indicates the last time the malware was detected in UTC
  • [Severity <WindowsMalwareSeverity?>]: Malware severity

DEVICEMALWARESTATES <IMicrosoftGraphMalwareStateForWindowsDevice- []>: List of devices affected by current malware with the malware state on each device

  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [DetectionCount <Int32?>]: Indicates the number of times the malware is detected
  • [DeviceName <String>]: Indicates the name of the device being evaluated for malware state
  • [ExecutionState <WindowsMalwareExecutionState?>]: Malware execution status
  • [InitialDetectionDateTime <DateTime?>]: Initial detection datetime of the malware
  • [LastStateChangeDateTime <DateTime?>]: The last time this particular threat was changed
  • [ThreatState <WindowsMalwareThreatState?>]: Malware threat status