Compartir a través de


New-MgRiskDetection

Create new navigation property to riskDetections for identityProtection

Note

To view the beta release of this cmdlet, view New-MgBetaRiskDetection

Syntax

New-MgRiskDetection
   [-ResponseHeadersVariable <String>]
   [-Activity <String>]
   [-ActivityDateTime <DateTime>]
   [-AdditionalInfo <String>]
   [-AdditionalProperties <Hashtable>]
   [-CorrelationId <String>]
   [-DetectedDateTime <DateTime>]
   [-DetectionTimingType <String>]
   [-IPAddress <String>]
   [-Id <String>]
   [-LastUpdatedDateTime <DateTime>]
   [-Location <IMicrosoftGraphSignInLocation>]
   [-RequestId <String>]
   [-RiskDetail <String>]
   [-RiskEventType <String>]
   [-RiskLevel <String>]
   [-RiskState <String>]
   [-Source <String>]
   [-TokenIssuerType <String>]
   [-UserDisplayName <String>]
   [-UserId <String>]
   [-UserPrincipalName <String>]
   [-Headers <IDictionary>]
   [-ProgressAction <ActionPreference>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]
New-MgRiskDetection
   -BodyParameter <IMicrosoftGraphRiskDetection>
   [-ResponseHeadersVariable <String>]
   [-Headers <IDictionary>]
   [-ProgressAction <ActionPreference>]
   [-WhatIf]
   [-Confirm]
   [<CommonParameters>]

Description

Create new navigation property to riskDetections for identityProtection

Parameters

-Activity

activityType

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ActivityDateTime

Date and time that the risky activity occurred. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is look like this: 2014-01-01T00:00:00Z

Type:DateTime
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-AdditionalInfo

Additional information associated with the risk detection in JSON format. For example, '[{/'Key/':/'userAgent/',/'Value/':/'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36/'}]'. Possible keys in the additionalInfo JSON string are: userAgent, alertUrl, relatedEventTimeInUtc, relatedUserAgent, deviceInformation, relatedLocation, requestId, correlationId, lastActivityTimeInUtc, malwareName, clientLocation, clientIp, riskReasons. For more information about riskReasons and possible values, see riskReasons values.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-AdditionalProperties

Additional Parameters

Type:Hashtable
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-BodyParameter

riskDetection To construct, see NOTES section for BODYPARAMETER properties and create a hash table.

Type:IMicrosoftGraphRiskDetection
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:False

-Confirm

Prompts you for confirmation before running the cmdlet.

Type:SwitchParameter
Aliases:cf
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-CorrelationId

Correlation ID of the sign-in associated with the risk detection. This property is null if the risk detection is not associated with a sign-in.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DetectedDateTime

Date and time that the risk was detected. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like this: 2014-01-01T00:00:00Z

Type:DateTime
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DetectionTimingType

riskDetectionTimingType

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Headers

Optional headers that will be added to the request.

Type:IDictionary
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-Id

The unique identifier for an entity. Read-only.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-IPAddress

Provides the IP address of the client from where the risk occurred.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-LastUpdatedDateTime

Date and time that the risk detection was last updated. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is look like this: 2014-01-01T00:00:00Z

Type:DateTime
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Location

signInLocation To construct, see NOTES section for LOCATION properties and create a hash table.

Type:IMicrosoftGraphSignInLocation
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ProgressAction

{{ Fill ProgressAction Description }}

Type:ActionPreference
Aliases:proga
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-RequestId

Request ID of the sign-in associated with the risk detection. This property is null if the risk detection is not associated with a sign-in.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-ResponseHeadersVariable

Optional Response Headers Variable.

Type:String
Aliases:RHV
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-RiskDetail

riskDetail

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-RiskEventType

The type of risk event detected. The possible values are adminConfirmedUserCompromised, anomalousToken, anomalousUserActivity, anonymizedIPAddress, generic, impossibleTravel, investigationsThreatIntelligence, suspiciousSendingPatterns, leakedCredentials, maliciousIPAddress,malwareInfectedIPAddress, mcasSuspiciousInboxManipulationRules, newCountry, passwordSpray,riskyIPAddress, suspiciousAPITraffic, suspiciousBrowser,suspiciousInboxForwarding, suspiciousIPAddress, tokenIssuerAnomaly, unfamiliarFeatures, unlikelyTravel. If the risk detection is a premium detection, will show generic. For more information about each value, see Risk types and detection.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-RiskLevel

riskLevel

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-RiskState

riskState

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-Source

Source of the risk detection. For example, activeDirectory.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-TokenIssuerType

tokenIssuerType

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-UserDisplayName

The user principal name (UPN) of the user.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-UserId

Unique ID of the user.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-UserPrincipalName

The user principal name (UPN) of the user.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-WhatIf

Shows what would happen if the cmdlet runs. The cmdlet is not run.

Type:SwitchParameter
Aliases:wi
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

Inputs

Microsoft.Graph.PowerShell.Models.IMicrosoftGraphRiskDetection

System.Collections.IDictionary

Outputs

Microsoft.Graph.PowerShell.Models.IMicrosoftGraphRiskDetection

Notes

COMPLEX PARAMETER PROPERTIES

To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.

BODYPARAMETER <IMicrosoftGraphRiskDetection>: riskDetection

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [Id <String>]: The unique identifier for an entity. Read-only.
  • [Activity <String>]: activityType
  • [ActivityDateTime <DateTime?>]: Date and time that the risky activity occurred. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is look like this: 2014-01-01T00:00:00Z
  • [AdditionalInfo <String>]: Additional information associated with the risk detection in JSON format. For example, '- [{/'Key/':/'userAgent/',/'Value/':/'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36/'}]'. Possible keys in the additionalInfo JSON string are: userAgent, alertUrl, relatedEventTimeInUtc, relatedUserAgent, deviceInformation, relatedLocation, requestId, correlationId, lastActivityTimeInUtc, malwareName, clientLocation, clientIp, riskReasons. For more information about riskReasons and possible values, see riskReasons values.
  • [CorrelationId <String>]: Correlation ID of the sign-in associated with the risk detection. This property is null if the risk detection is not associated with a sign-in.
  • [DetectedDateTime <DateTime?>]: Date and time that the risk was detected. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like this: 2014-01-01T00:00:00Z
  • [DetectionTimingType <String>]: riskDetectionTimingType
  • [IPAddress <String>]: Provides the IP address of the client from where the risk occurred.
  • [LastUpdatedDateTime <DateTime?>]: Date and time that the risk detection was last updated. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is look like this: 2014-01-01T00:00:00Z
  • [Location <IMicrosoftGraphSignInLocation>]: signInLocation
    • [(Any) <Object>]: This indicates any property can be added to this object.
    • [City <String>]: Provides the city where the sign-in originated and is determined using latitude/longitude information from the sign-in activity.
    • [CountryOrRegion <String>]: Provides the country code info (two letter code) where the sign-in originated. This is calculated using latitude/longitude information from the sign-in activity.
    • [GeoCoordinates <IMicrosoftGraphGeoCoordinates>]: geoCoordinates
      • [(Any) <Object>]: This indicates any property can be added to this object.
      • [Altitude <Double?>]: Optional. The altitude (height), in feet, above sea level for the item. Read-only.
      • [Latitude <Double?>]: Optional. The latitude, in decimal, for the item. Read-only.
      • [Longitude <Double?>]: Optional. The longitude, in decimal, for the item. Read-only.
    • [State <String>]: Provides the State where the sign-in originated. This is calculated using latitude/longitude information from the sign-in activity.
  • [RequestId <String>]: Request ID of the sign-in associated with the risk detection. This property is null if the risk detection is not associated with a sign-in.
  • [RiskDetail <String>]: riskDetail
  • [RiskEventType <String>]: The type of risk event detected. The possible values are adminConfirmedUserCompromised, anomalousToken, anomalousUserActivity, anonymizedIPAddress, generic, impossibleTravel, investigationsThreatIntelligence, suspiciousSendingPatterns, leakedCredentials, maliciousIPAddress,malwareInfectedIPAddress, mcasSuspiciousInboxManipulationRules, newCountry, passwordSpray,riskyIPAddress, suspiciousAPITraffic, suspiciousBrowser,suspiciousInboxForwarding, suspiciousIPAddress, tokenIssuerAnomaly, unfamiliarFeatures, unlikelyTravel. If the risk detection is a premium detection, will show generic. For more information about each value, see Risk types and detection.
  • [RiskLevel <String>]: riskLevel
  • [RiskState <String>]: riskState
  • [Source <String>]: Source of the risk detection. For example, activeDirectory.
  • [TokenIssuerType <String>]: tokenIssuerType
  • [UserDisplayName <String>]: The user principal name (UPN) of the user.
  • [UserId <String>]: Unique ID of the user.
  • [UserPrincipalName <String>]: The user principal name (UPN) of the user.

LOCATION <IMicrosoftGraphSignInLocation>: signInLocation

  • [(Any) <Object>]: This indicates any property can be added to this object.
  • [City <String>]: Provides the city where the sign-in originated and is determined using latitude/longitude information from the sign-in activity.
  • [CountryOrRegion <String>]: Provides the country code info (two letter code) where the sign-in originated. This is calculated using latitude/longitude information from the sign-in activity.
  • [GeoCoordinates <IMicrosoftGraphGeoCoordinates>]: geoCoordinates
    • [(Any) <Object>]: This indicates any property can be added to this object.
    • [Altitude <Double?>]: Optional. The altitude (height), in feet, above sea level for the item. Read-only.
    • [Latitude <Double?>]: Optional. The latitude, in decimal, for the item. Read-only.
    • [Longitude <Double?>]: Optional. The longitude, in decimal, for the item. Read-only.
  • [State <String>]: Provides the State where the sign-in originated. This is calculated using latitude/longitude information from the sign-in activity.