malwareStateForWindowsDevice resource type

Namespace: microsoft.graph

Note: The Microsoft Graph API for Intune requires an active Intune license for the tenant.

Malware state for a windows device

Methods

Method Return Type Description
List malwareStateForWindowsDevices malwareStateForWindowsDevice collection List properties and relationships of the malwareStateForWindowsDevice objects.
Get malwareStateForWindowsDevice malwareStateForWindowsDevice Read properties and relationships of the malwareStateForWindowsDevice object.
Create malwareStateForWindowsDevice malwareStateForWindowsDevice Create a new malwareStateForWindowsDevice object.
Delete malwareStateForWindowsDevice None Deletes a malwareStateForWindowsDevice.
Update malwareStateForWindowsDevice malwareStateForWindowsDevice Update the properties of a malwareStateForWindowsDevice object.

Properties

Property Type Description
id String The unique Identifier. This is device id.
deviceName String Indicates the name of the device being evaluated for malware state
executionState windowsMalwareExecutionState Indicates execution status of the malware. Possible values are: unknown, blocked, allowed, running, notRunning. Defaults to unknown. Possible values are: unknown, blocked, allowed, running, notRunning.
threatState windowsMalwareThreatState Indicates threat status of the malware. Possible values are: active, actionFailed, manualStepsRequired, fullScanRequired, rebootRequired, remediatedWithNonCriticalFailures, quarantined, removed, cleaned, allowed, noStatusCleared. defaults to noStatusCleared. Possible values are: active, actionFailed, manualStepsRequired, fullScanRequired, rebootRequired, remediatedWithNonCriticalFailures, quarantined, removed, cleaned, allowed, noStatusCleared.
initialDetectionDateTime DateTimeOffset Initial detection datetime of the malware
lastStateChangeDateTime DateTimeOffset The last time this particular threat was changed
detectionCount Int32 Indicates the number of times the malware is detected

Relationships

None

JSON Representation

Here is a JSON representation of the resource.

{
  "@odata.type": "#microsoft.graph.malwareStateForWindowsDevice",
  "id": "String (identifier)",
  "deviceName": "String",
  "executionState": "String",
  "threatState": "String",
  "initialDetectionDateTime": "String (timestamp)",
  "lastStateChangeDateTime": "String (timestamp)",
  "detectionCount": 1024
}