Create windowsMalwareInformation

Namespace: microsoft.graph

Note: The Microsoft Graph API for Intune requires an active Intune license for the tenant.

Create a new windowsMalwareInformation object.

This API is available in the following national cloud deployments.

Global service US Government L4 US Government L5 (DOD) China operated by 21Vianet

Permissions

One of the following permissions is required to call this API. To learn more, including how to choose permissions, see Permissions.

Permission type Permissions (from least to most privileged)
Delegated (work or school account) DeviceManagementManagedDevices.ReadWrite.All
Delegated (personal Microsoft account) Not supported.
Application DeviceManagementManagedDevices.ReadWrite.All

HTTP Request

POST /deviceManagement/windowsMalwareInformation

Request headers

Header Value
Authorization Bearer {token}. Required. Learn more about authentication and authorization.
Accept application/json

Request body

In the request body, supply a JSON representation for the windowsMalwareInformation object.

The following table shows the properties that are required when you create the windowsMalwareInformation.

Property Type Description
id String The unique Identifier. This is malware id.
displayName String Indicates the name of the malware
additionalInformationUrl String Indicates an informational URL to learn more about the malware
severity windowsMalwareSeverity Severity of the malware. Possible values are: unknown, low, moderate, high, severe. default is unknown. Possible values are: unknown, low, moderate, high, severe.
category windowsMalwareCategory Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remote_Control_Software, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule. default value is invalid. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remote_Control_Software, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.
lastDetectionDateTime DateTimeOffset Indicates the last time the malware was detected in UTC

Response

If successful, this method returns a 201 Created response code and a windowsMalwareInformation object in the response body.

Example

Request

Here is an example of the request.

POST https://graph.microsoft.com/v1.0/deviceManagement/windowsMalwareInformation
Content-type: application/json
Content-length: 299

{
  "@odata.type": "#microsoft.graph.windowsMalwareInformation",
  "displayName": "Display Name value",
  "additionalInformationUrl": "https://example.com/additionalInformationUrl/",
  "severity": "low",
  "category": "adware",
  "lastDetectionDateTime": "2016-12-31T23:59:27.3805104-08:00"
}

Response

Here is an example of the response. Note: The response object shown here may be truncated for brevity. All of the properties will be returned from an actual call.

HTTP/1.1 201 Created
Content-Type: application/json
Content-Length: 348

{
  "@odata.type": "#microsoft.graph.windowsMalwareInformation",
  "id": "8ebd2b9b-2b9b-8ebd-9b2b-bd8e9b2bbd8e",
  "displayName": "Display Name value",
  "additionalInformationUrl": "https://example.com/additionalInformationUrl/",
  "severity": "low",
  "category": "adware",
  "lastDetectionDateTime": "2016-12-31T23:59:27.3805104-08:00"
}