windowsMalwareInformation resource type

Namespace: microsoft.graph

Note: The Microsoft Graph API for Intune requires an active Intune license for the tenant.

Malware information entity.

Methods

Method Return Type Description
List windowsMalwareInformations windowsMalwareInformation collection List properties and relationships of the windowsMalwareInformation objects.
Get windowsMalwareInformation windowsMalwareInformation Read properties and relationships of the windowsMalwareInformation object.
Create windowsMalwareInformation windowsMalwareInformation Create a new windowsMalwareInformation object.
Delete windowsMalwareInformation None Deletes a windowsMalwareInformation.
Update windowsMalwareInformation windowsMalwareInformation Update the properties of a windowsMalwareInformation object.

Properties

Property Type Description
id String The unique Identifier. This is malware id.
displayName String Indicates the name of the malware
additionalInformationUrl String Indicates an informational URL to learn more about the malware
severity windowsMalwareSeverity Severity of the malware. Possible values are: unknown, low, moderate, high, severe. default is unknown. Possible values are: unknown, low, moderate, high, severe.
category windowsMalwareCategory Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remote_Control_Software, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule. default value is invalid. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remote_Control_Software, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.
lastDetectionDateTime DateTimeOffset Indicates the last time the malware was detected in UTC

Relationships

Relationship Type Description
deviceMalwareStates malwareStateForWindowsDevice collection List of devices affected by current malware with the malware state on each device

JSON Representation

Here is a JSON representation of the resource.

{
  "@odata.type": "#microsoft.graph.windowsMalwareInformation",
  "id": "String (identifier)",
  "displayName": "String",
  "additionalInformationUrl": "String",
  "severity": "String",
  "category": "String",
  "lastDetectionDateTime": "String (timestamp)"
}