malwareStateForWindowsDevice resource type
Namespace: microsoft.graph
Note: The Microsoft Graph API for Intune requires an active Intune license for the tenant.
Malware state for a windows device
Methods
Method | Return Type | Description |
---|---|---|
List malwareStateForWindowsDevices | malwareStateForWindowsDevice collection | List properties and relationships of the malwareStateForWindowsDevice objects. |
Get malwareStateForWindowsDevice | malwareStateForWindowsDevice | Read properties and relationships of the malwareStateForWindowsDevice object. |
Create malwareStateForWindowsDevice | malwareStateForWindowsDevice | Create a new malwareStateForWindowsDevice object. |
Delete malwareStateForWindowsDevice | None | Deletes a malwareStateForWindowsDevice. |
Update malwareStateForWindowsDevice | malwareStateForWindowsDevice | Update the properties of a malwareStateForWindowsDevice object. |
Properties
Property | Type | Description |
---|---|---|
id | String | The unique Identifier. This is device id. |
deviceName | String | Indicates the name of the device being evaluated for malware state |
executionState | windowsMalwareExecutionState | Indicates execution status of the malware. Possible values are: unknown, blocked, allowed, running, notRunning. Defaults to unknown. Possible values are: unknown , blocked , allowed , running , notRunning . |
threatState | windowsMalwareThreatState | Indicates threat status of the malware. Possible values are: active, actionFailed, manualStepsRequired, fullScanRequired, rebootRequired, remediatedWithNonCriticalFailures, quarantined, removed, cleaned, allowed, noStatusCleared. defaults to noStatusCleared. Possible values are: active , actionFailed , manualStepsRequired , fullScanRequired , rebootRequired , remediatedWithNonCriticalFailures , quarantined , removed , cleaned , allowed , noStatusCleared . |
initialDetectionDateTime | DateTimeOffset | Initial detection datetime of the malware |
lastStateChangeDateTime | DateTimeOffset | The last time this particular threat was changed |
detectionCount | Int32 | Indicates the number of times the malware is detected |
Relationships
None
JSON Representation
Here is a JSON representation of the resource.
{
"@odata.type": "#microsoft.graph.malwareStateForWindowsDevice",
"id": "String (identifier)",
"deviceName": "String",
"executionState": "String",
"threatState": "String",
"initialDetectionDateTime": "String (timestamp)",
"lastStateChangeDateTime": "String (timestamp)",
"detectionCount": 1024
}