Skip to content

Latest commit

 

History

History
140 lines (109 loc) · 6.68 KB

intune-devices-malwarestateforwindowsdevice-create.md

File metadata and controls

140 lines (109 loc) · 6.68 KB
title description author ms.localizationpriority ms.subservice doc_type
Create malwareStateForWindowsDevice
Create a new malwareStateForWindowsDevice object.
jaiprakashmb
medium
intune
apiPageType

Create malwareStateForWindowsDevice

Namespace: microsoft.graph

Note: The Microsoft Graph API for Intune requires an active Intune license for the tenant.

Create a new malwareStateForWindowsDevice object.

[!INCLUDE national-cloud-support]

Permissions

One of the following permissions is required to call this API. To learn more, including how to choose permissions, see Permissions.

Permission type Permissions (from least to most privileged)
Delegated (work or school account) DeviceManagementManagedDevices.ReadWrite.All
Delegated (personal Microsoft account) Not supported.
Application DeviceManagementManagedDevices.ReadWrite.All

HTTP Request

POST /deviceManagement/windowsMalwareInformation/{windowsMalwareInformationId}/deviceMalwareStates

Request headers

Header Value
Authorization Bearer {token}. Required. Learn more about authentication and authorization.
Accept application/json

Request body

In the request body, supply a JSON representation for the malwareStateForWindowsDevice object.

The following table shows the properties that are required when you create the malwareStateForWindowsDevice.

Property Type Description
id String The unique Identifier. This is device id.
deviceName String Indicates the name of the device being evaluated for malware state
executionState windowsMalwareExecutionState Indicates execution status of the malware. Possible values are: unknown, blocked, allowed, running, notRunning. Defaults to unknown. Possible values are: unknown, blocked, allowed, running, notRunning.
threatState windowsMalwareThreatState Indicates threat status of the malware. Possible values are: active, actionFailed, manualStepsRequired, fullScanRequired, rebootRequired, remediatedWithNonCriticalFailures, quarantined, removed, cleaned, allowed, noStatusCleared. defaults to noStatusCleared. Possible values are: active, actionFailed, manualStepsRequired, fullScanRequired, rebootRequired, remediatedWithNonCriticalFailures, quarantined, removed, cleaned, allowed, noStatusCleared.
initialDetectionDateTime DateTimeOffset Initial detection datetime of the malware
lastStateChangeDateTime DateTimeOffset The last time this particular threat was changed
detectionCount Int32 Indicates the number of times the malware is detected

Response

If successful, this method returns a 201 Created response code and a malwareStateForWindowsDevice object in the response body.

Example

Request

Here is an example of the request.

POST https://graph.microsoft.com/v1.0/deviceManagement/windowsMalwareInformation/{windowsMalwareInformationId}/deviceMalwareStates
Content-type: application/json
Content-length: 334

{
  "@odata.type": "#microsoft.graph.malwareStateForWindowsDevice",
  "deviceName": "Device Name value",
  "executionState": "blocked",
  "threatState": "actionFailed",
  "initialDetectionDateTime": "2016-12-31T23:57:05.3889692-08:00",
  "lastStateChangeDateTime": "2016-12-31T23:59:51.0767794-08:00",
  "detectionCount": 14
}

[!INCLUDE sample-code] [!INCLUDE sdk-documentation]

[!INCLUDE sample-code] [!INCLUDE sdk-documentation]

[!INCLUDE sample-code] [!INCLUDE sdk-documentation]

[!INCLUDE sample-code] [!INCLUDE sdk-documentation]

[!INCLUDE sample-code] [!INCLUDE sdk-documentation]

[!INCLUDE sample-code] [!INCLUDE sdk-documentation]

[!INCLUDE sample-code] [!INCLUDE sdk-documentation]

[!INCLUDE sample-code] [!INCLUDE sdk-documentation]


Response

Here is an example of the response. Note: The response object shown here may be truncated for brevity. All of the properties will be returned from an actual call.

HTTP/1.1 201 Created
Content-Type: application/json
Content-Length: 383

{
  "@odata.type": "#microsoft.graph.malwareStateForWindowsDevice",
  "id": "ce06da73-da73-ce06-73da-06ce73da06ce",
  "deviceName": "Device Name value",
  "executionState": "blocked",
  "threatState": "actionFailed",
  "initialDetectionDateTime": "2016-12-31T23:57:05.3889692-08:00",
  "lastStateChangeDateTime": "2016-12-31T23:59:51.0767794-08:00",
  "detectionCount": 14
}