defenderDetectedMalwareActions resource type
Namespace: microsoft.graph
Important: Microsoft Graph APIs under the /beta version are subject to change; production use is not supported.
Note: The Microsoft Graph API for Intune requires an active Intune license for the tenant.
Specify Defender’s actions to take on detected Malware per threat level.
Properties
Property | Type | Description |
---|---|---|
lowSeverity | defenderThreatAction | Indicates a Defender action to take for low severity Malware threat detected. Possible values are: deviceDefault , clean , quarantine , remove , allow , userDefined , block . |
moderateSeverity | defenderThreatAction | Indicates a Defender action to take for moderate severity Malware threat detected. Possible values are: deviceDefault , clean , quarantine , remove , allow , userDefined , block . |
highSeverity | defenderThreatAction | Indicates a Defender action to take for high severity Malware threat detected. Possible values are: deviceDefault , clean , quarantine , remove , allow , userDefined , block . |
severeSeverity | defenderThreatAction | Indicates a Defender action to take for severe severity Malware threat detected. Possible values are: deviceDefault , clean , quarantine , remove , allow , userDefined , block . |
Relationships
None
JSON Representation
Here is a JSON representation of the resource.
{
"@odata.type": "#microsoft.graph.defenderDetectedMalwareActions",
"lowSeverity": "String",
"moderateSeverity": "String",
"highSeverity": "String",
"severeSeverity": "String"
}
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for