Update-MgDeviceManagementWindowsMalwareInformationDeviceMalwareState
Update the properties of a malwareStateForWindowsDevice object.
Note
To view the beta release of this cmdlet, view Update-MgBetaDeviceManagementWindowsMalwareInformationDeviceMalwareState
Syntax
Update-MgDeviceManagementWindowsMalwareInformationDeviceMalwareState
-MalwareStateForWindowsDeviceId <String>
-WindowsMalwareInformationId <String>
[-ResponseHeadersVariable <String>]
[-AdditionalProperties <Hashtable>]
[-DetectionCount <Int32>]
[-DeviceName <String>]
[-ExecutionState <WindowsMalwareExecutionState>]
[-Id <String>]
[-InitialDetectionDateTime <DateTime>]
[-LastStateChangeDateTime <DateTime>]
[-ThreatState <WindowsMalwareThreatState>]
[-Headers <IDictionary>]
[-ProgressAction <ActionPreference>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Update-MgDeviceManagementWindowsMalwareInformationDeviceMalwareState
-MalwareStateForWindowsDeviceId <String>
-WindowsMalwareInformationId <String>
-BodyParameter <IMicrosoftGraphMalwareStateForWindowsDevice>
[-ResponseHeadersVariable <String>]
[-Headers <IDictionary>]
[-ProgressAction <ActionPreference>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Update-MgDeviceManagementWindowsMalwareInformationDeviceMalwareState
-InputObject <IDeviceManagementIdentity>
[-ResponseHeadersVariable <String>]
[-AdditionalProperties <Hashtable>]
[-DetectionCount <Int32>]
[-DeviceName <String>]
[-ExecutionState <WindowsMalwareExecutionState>]
[-Id <String>]
[-InitialDetectionDateTime <DateTime>]
[-LastStateChangeDateTime <DateTime>]
[-ThreatState <WindowsMalwareThreatState>]
[-Headers <IDictionary>]
[-ProgressAction <ActionPreference>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Update-MgDeviceManagementWindowsMalwareInformationDeviceMalwareState
-InputObject <IDeviceManagementIdentity>
-BodyParameter <IMicrosoftGraphMalwareStateForWindowsDevice>
[-ResponseHeadersVariable <String>]
[-Headers <IDictionary>]
[-ProgressAction <ActionPreference>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Description
Update the properties of a malwareStateForWindowsDevice object.
Examples
Example 1: Code snippet
Import-Module Microsoft.Graph.DeviceManagement
$params = @{
"@odata.type" = "#microsoft.graph.malwareStateForWindowsDevice"
deviceName = "Device Name value"
executionState = "blocked"
threatState = "actionFailed"
initialDetectionDateTime = [System.DateTime]::Parse("2016-12-31T23:57:05.3889692-08:00")
lastStateChangeDateTime = [System.DateTime]::Parse("2016-12-31T23:59:51.0767794-08:00")
detectionCount = 14
}
Update-MgDeviceManagementWindowsMalwareInformationDeviceMalwareState -WindowsMalwareInformationId $windowsMalwareInformationId -MalwareStateForWindowsDeviceId $malwareStateForWindowsDeviceId -BodyParameter $params
This example shows how to use the Update-MgDeviceManagementWindowsMalwareInformationDeviceMalwareState Cmdlet.
Parameters
-AdditionalProperties
Additional Parameters
Type: | Hashtable |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-BodyParameter
Malware state for a windows device To construct, see NOTES section for BODYPARAMETER properties and create a hash table.
Type: | IMicrosoftGraphMalwareStateForWindowsDevice |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-Confirm
Prompts you for confirmation before running the cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DetectionCount
Indicates the number of times the malware is detected
Type: | Int32 |
Position: | Named |
Default value: | 0 |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DeviceName
Indicates the name of the device being evaluated for malware state
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ExecutionState
Malware execution status
Type: | WindowsMalwareExecutionState |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Headers
Optional headers that will be added to the request.
Type: | IDictionary |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-Id
The unique identifier for an entity. Read-only.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-InitialDetectionDateTime
Initial detection datetime of the malware
Type: | DateTime |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-InputObject
Identity Parameter To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
Type: | IDeviceManagementIdentity |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-LastStateChangeDateTime
The last time this particular threat was changed
Type: | DateTime |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-MalwareStateForWindowsDeviceId
The unique identifier of malwareStateForWindowsDevice
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ProgressAction
{{ Fill ProgressAction Description }}
Type: | ActionPreference |
Aliases: | proga |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ResponseHeadersVariable
Optional Response Headers Variable.
Type: | String |
Aliases: | RHV |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ThreatState
Malware threat status
Type: | WindowsMalwareThreatState |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-WhatIf
Shows what would happen if the cmdlet runs. The cmdlet is not run.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-WindowsMalwareInformationId
The unique identifier of windowsMalwareInformation
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Inputs
Microsoft.Graph.PowerShell.Models.IDeviceManagementIdentity
Microsoft.Graph.PowerShell.Models.IMicrosoftGraphMalwareStateForWindowsDevice
System.Collections.IDictionary
Outputs
Microsoft.Graph.PowerShell.Models.IMicrosoftGraphMalwareStateForWindowsDevice
Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
BODYPARAMETER <IMicrosoftGraphMalwareStateForWindowsDevice>
: Malware state for a windows device
[(Any) <Object>]
: This indicates any property can be added to this object.[Id <String>]
: The unique identifier for an entity. Read-only.[DetectionCount <Int32?>]
: Indicates the number of times the malware is detected[DeviceName <String>]
: Indicates the name of the device being evaluated for malware state[ExecutionState <WindowsMalwareExecutionState?>]
: Malware execution status[InitialDetectionDateTime <DateTime?>]
: Initial detection datetime of the malware[LastStateChangeDateTime <DateTime?>]
: The last time this particular threat was changed[ThreatState <WindowsMalwareThreatState?>]
: Malware threat status
INPUTOBJECT <IDeviceManagementIdentity>
: Identity Parameter
[AppLogCollectionRequestId <String>]
: The unique identifier of appLogCollectionRequest[BrowserSharedCookieId <String>]
: The unique identifier of browserSharedCookie[BrowserSiteId <String>]
: The unique identifier of browserSite[BrowserSiteListId <String>]
: The unique identifier of browserSiteList[DetectedAppId <String>]
: The unique identifier of detectedApp[DeviceCategoryId <String>]
: The unique identifier of deviceCategory[DeviceComplianceActionItemId <String>]
: The unique identifier of deviceComplianceActionItem[DeviceComplianceDeviceStatusId <String>]
: The unique identifier of deviceComplianceDeviceStatus[DeviceCompliancePolicyAssignmentId <String>]
: The unique identifier of deviceCompliancePolicyAssignment[DeviceCompliancePolicyId <String>]
: The unique identifier of deviceCompliancePolicy[DeviceCompliancePolicySettingStateSummaryId <String>]
: The unique identifier of deviceCompliancePolicySettingStateSummary[DeviceCompliancePolicyStateId <String>]
: The unique identifier of deviceCompliancePolicyState[DeviceComplianceScheduledActionForRuleId <String>]
: The unique identifier of deviceComplianceScheduledActionForRule[DeviceComplianceSettingStateId <String>]
: The unique identifier of deviceComplianceSettingState[DeviceComplianceUserStatusId <String>]
: The unique identifier of deviceComplianceUserStatus[DeviceConfigurationAssignmentId <String>]
: The unique identifier of deviceConfigurationAssignment[DeviceConfigurationDeviceStatusId <String>]
: The unique identifier of deviceConfigurationDeviceStatus[DeviceConfigurationId <String>]
: The unique identifier of deviceConfiguration[DeviceConfigurationStateId <String>]
: The unique identifier of deviceConfigurationState[DeviceConfigurationUserStatusId <String>]
: The unique identifier of deviceConfigurationUserStatus[DeviceLogCollectionResponseId <String>]
: The unique identifier of deviceLogCollectionResponse[DeviceManagementTroubleshootingEventId <String>]
: The unique identifier of deviceManagementTroubleshootingEvent[LocalizedNotificationMessageId <String>]
: The unique identifier of localizedNotificationMessage[MalwareStateForWindowsDeviceId <String>]
: The unique identifier of malwareStateForWindowsDevice[ManagedDeviceId <String>]
: The unique identifier of managedDevice[MobileAppTroubleshootingEventId <String>]
: The unique identifier of mobileAppTroubleshootingEvent[NotificationMessageTemplateId <String>]
: The unique identifier of notificationMessageTemplate[SettingStateDeviceSummaryId <String>]
: The unique identifier of settingStateDeviceSummary[UserExperienceAnalyticsAppHealthAppPerformanceByAppVersionDetailsId <String>]
: The unique identifier of userExperienceAnalyticsAppHealthAppPerformanceByAppVersionDetails[UserExperienceAnalyticsAppHealthAppPerformanceByAppVersionDeviceId <String>]
: The unique identifier of userExperienceAnalyticsAppHealthAppPerformanceByAppVersionDeviceId[UserExperienceAnalyticsAppHealthAppPerformanceByOSVersionId <String>]
: The unique identifier of userExperienceAnalyticsAppHealthAppPerformanceByOSVersion[UserExperienceAnalyticsAppHealthApplicationPerformanceId <String>]
: The unique identifier of userExperienceAnalyticsAppHealthApplicationPerformance[UserExperienceAnalyticsAppHealthDeviceModelPerformanceId <String>]
: The unique identifier of userExperienceAnalyticsAppHealthDeviceModelPerformance[UserExperienceAnalyticsAppHealthDevicePerformanceDetailsId <String>]
: The unique identifier of userExperienceAnalyticsAppHealthDevicePerformanceDetails[UserExperienceAnalyticsAppHealthDevicePerformanceId <String>]
: The unique identifier of userExperienceAnalyticsAppHealthDevicePerformance[UserExperienceAnalyticsAppHealthOSVersionPerformanceId <String>]
: The unique identifier of userExperienceAnalyticsAppHealthOSVersionPerformance[UserExperienceAnalyticsBaselineId <String>]
: The unique identifier of userExperienceAnalyticsBaseline[UserExperienceAnalyticsCategoryId <String>]
: The unique identifier of userExperienceAnalyticsCategory[UserExperienceAnalyticsDevicePerformanceId <String>]
: The unique identifier of userExperienceAnalyticsDevicePerformance[UserExperienceAnalyticsDeviceScoresId <String>]
: The unique identifier of userExperienceAnalyticsDeviceScores[UserExperienceAnalyticsDeviceStartupHistoryId <String>]
: The unique identifier of userExperienceAnalyticsDeviceStartupHistory[UserExperienceAnalyticsDeviceStartupProcessId <String>]
: The unique identifier of userExperienceAnalyticsDeviceStartupProcess[UserExperienceAnalyticsDeviceStartupProcessPerformanceId <String>]
: The unique identifier of userExperienceAnalyticsDeviceStartupProcessPerformance[UserExperienceAnalyticsMetricHistoryId <String>]
: The unique identifier of userExperienceAnalyticsMetricHistory[UserExperienceAnalyticsMetricId <String>]
: The unique identifier of userExperienceAnalyticsMetric[UserExperienceAnalyticsModelScoresId <String>]
: The unique identifier of userExperienceAnalyticsModelScores[UserExperienceAnalyticsScoreHistoryId <String>]
: The unique identifier of userExperienceAnalyticsScoreHistory[UserExperienceAnalyticsWorkFromAnywhereDeviceId <String>]
: The unique identifier of userExperienceAnalyticsWorkFromAnywhereDevice[UserExperienceAnalyticsWorkFromAnywhereMetricId <String>]
: The unique identifier of userExperienceAnalyticsWorkFromAnywhereMetric[UserExperienceAnalyticsWorkFromAnywhereModelPerformanceId <String>]
: The unique identifier of userExperienceAnalyticsWorkFromAnywhereModelPerformance[WindowsDeviceMalwareStateId <String>]
: The unique identifier of windowsDeviceMalwareState[WindowsInformationProtectionAppLearningSummaryId <String>]
: The unique identifier of windowsInformationProtectionAppLearningSummary[WindowsInformationProtectionNetworkLearningSummaryId <String>]
: The unique identifier of windowsInformationProtectionNetworkLearningSummary[WindowsMalwareInformationId <String>]
: The unique identifier of windowsMalwareInformation