Runs the command in a mode that only reports what would happen without performing the actions.
Parameter properties
Type:
System.Management.Automation.SwitchParameter
Supports wildcards:
False
DontShow:
False
Aliases:
wi
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
CommonParameters
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
-InformationAction, -InformationVariable, -OutBuffer, -OutVariable, -PipelineVariable,
-ProgressAction, -Verbose, -WarningAction, and -WarningVariable. For more information, see
about_CommonParameters.
To create the parameters described below, construct a hash table containing the appropriate properties.
For information on hash tables, run Get-Help about_Hash_Tables.
BODYPARAMETER <IMicrosoftGraphFileSecurityProfile>: fileSecurityProfile
[(Any) <Object>]: This indicates any property can be added to this object.
[Id <String>]: The unique identifier for an entity.
Read-only.
[ActivityGroupNames <String[]>]:
[AzureSubscriptionId <String>]:
[AzureTenantId <String>]:
[CertificateThumbprint <String>]:
[Extensions <String[]>]:
[FileType <String>]:
[FirstSeenDateTime <DateTime?>]:
[Hashes <IMicrosoftGraphFileHash[]>]:
[HashType <String>]: fileHashType
[HashValue <String>]: Value of the file hash.
[LastSeenDateTime <DateTime?>]:
[MalwareStates <IMicrosoftGraphMalwareState[]>]:
[Category <String>]: Provider-generated malware category (for example, trojan, ransomware, etc.).
[Family <String>]: Provider-generated malware family (for example, 'wannacry,' 'notpetya,' etc.).
[Name <String>]: Provider-generated malware variant name (for example, Trojan:Win32/Powessere.H).
[Severity <String>]: Provider-determined severity of this malware.
[WasRunning <Boolean?>]: Indicates whether the detected file (malware/vulnerability) was running at the time of detection or was detected at rest on the disk.
[Names <String[]>]:
[RiskScore <String>]:
[Size <Int64?>]:
[Tags <String[]>]:
[VendorInformation <IMicrosoftGraphSecurityVendorInformation>]: securityVendorInformation
[(Any) <Object>]: This indicates any property can be added to this object.
[Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP.
[ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert.
Required
[SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen.
[Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye).
Required
[VulnerabilityStates <IMicrosoftGraphVulnerabilityState[]>]:
[Cve <String>]: Common Vulnerabilities and Exposures (CVE) for the vulnerability.
[Severity <String>]: Base Common Vulnerability Scoring System (CVSS) severity score for this vulnerability.
[WasRunning <Boolean?>]: Indicates whether the detected vulnerability (file) was running at the time of detection or was the file detected at rest on the disk.
HASHES <IMicrosoftGraphFileHash[]>: .
[HashType <String>]: fileHashType
[HashValue <String>]: Value of the file hash.
MALWARESTATES <IMicrosoftGraphMalwareState[]>: .
[Category <String>]: Provider-generated malware category (for example, trojan, ransomware, etc.).
[Family <String>]: Provider-generated malware family (for example, 'wannacry,' 'notpetya,' etc.).
[Name <String>]: Provider-generated malware variant name (for example, Trojan:Win32/Powessere.H).
[Severity <String>]: Provider-determined severity of this malware.
[WasRunning <Boolean?>]: Indicates whether the detected file (malware/vulnerability) was running at the time of detection or was detected at rest on the disk.
VENDORINFORMATION <IMicrosoftGraphSecurityVendorInformation>: securityVendorInformation
[(Any) <Object>]: This indicates any property can be added to this object.
[Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP.
[ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert.
Required
[SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen.
[Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye).
Required
VULNERABILITYSTATES <IMicrosoftGraphVulnerabilityState[]>: .
[Cve <String>]: Common Vulnerabilities and Exposures (CVE) for the vulnerability.
[Severity <String>]: Base Common Vulnerability Scoring System (CVSS) severity score for this vulnerability.
[WasRunning <Boolean?>]: Indicates whether the detected vulnerability (file) was running at the time of detection or was the file detected at rest on the disk.