Share via


Update-MgBetaSecurityCollaboration

Update the navigation property collaboration in security

Syntax

UpdateExpanded (Default)

Update-MgBetaSecurityCollaboration
    [-ResponseHeadersVariable <string>]
    [-AdditionalProperties <hashtable>]
    [-AnalyzedEmails <IMicrosoftGraphSecurityAnalyzedEmail[]>]
    [-Id <string>]
    [-Break]
    [-Headers <IDictionary>]
    [-HttpPipelineAppend <SendAsyncStep[]>]
    [-HttpPipelinePrepend <SendAsyncStep[]>]
    [-Proxy <uri>]
    [-ProxyCredential <pscredential>]
    [-ProxyUseDefaultCredentials]
    [-WhatIf]
    [-Confirm]
    [<CommonParameters>]

Update

Update-MgBetaSecurityCollaboration
    -BodyParameter <IMicrosoftGraphSecurityCollaborationRoot>
    [-ResponseHeadersVariable <string>]
    [-Break]
    [-Headers <IDictionary>]
    [-HttpPipelineAppend <SendAsyncStep[]>]
    [-HttpPipelinePrepend <SendAsyncStep[]>]
    [-Proxy <uri>]
    [-ProxyCredential <pscredential>]
    [-ProxyUseDefaultCredentials]
    [-WhatIf]
    [-Confirm]
    [<CommonParameters>]

Parameters

-AdditionalProperties

Additional Parameters

Parameter properties

Type:System.Collections.Hashtable
Supports wildcards:False
DontShow:False

Parameter sets

UpdateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-AnalyzedEmails

Contains metadata for analyzed emails. To construct, see NOTES section for ANALYZEDEMAILS properties and create a hash table.

Parameter properties

Type:

Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphSecurityAnalyzedEmail[]

Supports wildcards:False
DontShow:False

Parameter sets

UpdateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-BodyParameter

collaborationRoot To construct, see NOTES section for BODYPARAMETER properties and create a hash table.

Parameter properties

Type:Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphSecurityCollaborationRoot
Supports wildcards:False
DontShow:False

Parameter sets

Update
Position:Named
Mandatory:True
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False

-Break

Wait for .NET debugger to attach

Parameter properties

Type:System.Management.Automation.SwitchParameter
Default value:False
Supports wildcards:False
DontShow:False

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Confirm

Prompts you for confirmation before running the cmdlet.

Parameter properties

Type:System.Management.Automation.SwitchParameter
Supports wildcards:False
DontShow:False
Aliases:cf

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Headers

Optional headers that will be added to the request.

Parameter properties

Type:System.Collections.IDictionary
Supports wildcards:False
DontShow:False

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:True
Value from pipeline by property name:False
Value from remaining arguments:False

-HttpPipelineAppend

SendAsync Pipeline Steps to be appended to the front of the pipeline

Parameter properties

Type:

Microsoft.Graph.Beta.PowerShell.Runtime.SendAsyncStep[]

Supports wildcards:False
DontShow:False

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-HttpPipelinePrepend

SendAsync Pipeline Steps to be prepended to the front of the pipeline

Parameter properties

Type:

Microsoft.Graph.Beta.PowerShell.Runtime.SendAsyncStep[]

Supports wildcards:False
DontShow:False

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Id

The unique identifier for an entity. Read-only.

Parameter properties

Type:System.String
Supports wildcards:False
DontShow:False

Parameter sets

UpdateExpanded
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-Proxy

The URI for the proxy server to use

Parameter properties

Type:System.Uri
Supports wildcards:False
DontShow:False

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-ProxyCredential

Credentials for a proxy server to use for the remote call

Parameter properties

Type:System.Management.Automation.PSCredential
Supports wildcards:False
DontShow:False

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-ProxyUseDefaultCredentials

Use the default credentials for the proxy

Parameter properties

Type:System.Management.Automation.SwitchParameter
Default value:False
Supports wildcards:False
DontShow:False

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-ResponseHeadersVariable

Optional Response Headers Variable.

Parameter properties

Type:System.String
Supports wildcards:False
DontShow:False
Aliases:RHV

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

-WhatIf

Runs the command in a mode that only reports what would happen without performing the actions.

Parameter properties

Type:System.Management.Automation.SwitchParameter
Supports wildcards:False
DontShow:False
Aliases:wi

Parameter sets

(All)
Position:Named
Mandatory:False
Value from pipeline:False
Value from pipeline by property name:False
Value from remaining arguments:False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutBuffer, -OutVariable, -PipelineVariable, -ProgressAction, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

Inputs

Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphSecurityCollaborationRoot

{{ Fill in the Description }}

System.Collections.IDictionary

{{ Fill in the Description }}

Outputs

Microsoft.Graph.Beta.PowerShell.Models.IMicrosoftGraphSecurityCollaborationRoot

{{ Fill in the Description }}

Notes

COMPLEX PARAMETER PROPERTIES

To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.

ANALYZEDEMAILS <IMicrosoftGraphSecurityAnalyzedEmail[]>: Contains metadata for analyzed emails. [Id <String>]: The unique identifier for an entity. Read-only. [AlertIds <String[]>]: A collection of values that contain the IDs of any alerts associated with the email. [Attachments <IMicrosoftGraphSecurityAnalyzedEmailAttachment[]>]: A collection of the attachments in the email. [DetonationDetails <IMicrosoftGraphSecurityDetonationDetails>]: detonationDetails [(Any) <Object>]: This indicates any property can be added to this object. [AnalysisDateTime <DateTime?>]: The time of detonation. [CompromiseIndicators <IMicrosoftGraphSecurityCompromiseIndicator[]>]: Represents indicators and its associated verdict that suggests whether an email is compromised. [Value <String>]: Indicator. [Verdict <String>]: verdictCategory [DetonationBehaviourDetails <IMicrosoftGraphSecurityDetonationBehaviourDetails>]: detonationBehaviourDetails [(Any) <Object>]: This indicates any property can be added to this object. [ActionStatus <String>]: The status of the action performed during detonation (e.g., 'Successful', 'Failed', 'Blocked'). [BehaviourCapability <String>]: Categorizes the capability or type of behavior observed. [BehaviourGroup <String>]: Groups related behaviors together for classification purposes. [Details <String>]: More contextual information about the observed behavior or action. [EventDateTime <DateTime?>]: The date and time when the behavior or action was observed during detonation. [Operation <String>]: The specific operation or action that was performed. [ProcessId <String>]: The unique identifier of the process involved in the behavior. [ProcessName <String>]: The name of the process that performed or was involved in the behavior. [Target <String>]: The target of the operation. [DetonationChain <IMicrosoftGraphSecurityDetonationChain>]: detonationChain [(Any) <Object>]: This indicates any property can be added to this object. [ChildNodes <IMicrosoftGraphSecurityDetonationChain[]>]: A list of all child nodes in the chain. [Value <String>]: The value of the chain. [DetonationObservables <IMicrosoftGraphSecurityDetonationObservables>]: detonationObservables [(Any) <Object>]: This indicates any property can be added to this object. [ContactedIps <String[]>]: The list of all contacted IPs in the detonation. [ContactedUrls <String[]>]: The list of all URLs found in the detonation. [Droppedfiles <String[]>]: The list of all dropped files in the detonation. [DetonationScreenshotUri <String>]: Show any screenshots that were captured during detonation. No screenshots are captured if the URL opens into a link that directly downloads a file. However, you see the downloaded file in the detonation chain. [DetonationVerdict <String>]: The verdict of the detonation. [DetonationVerdictReason <String>]: The reason for the verdict of the detonation. [FileExtension <String>]: Extension of the file. [FileName <String>]: The name of the attachment in the email. [FileSize <Int32?>]: Size of the file. [FileType <String>]: The type of the attachment in the email. [MalwareFamily <String>]: The threat name associated with the threat type. [Sha256 <String>]: The SHA256 file hash of the attachment. [TenantAllowBlockListDetailInfo <String>]: Details of entries in tenant allow/block list configured by tenant. [ThreatType <String>]: threatType [AuthenticationDetails <IMicrosoftGraphSecurityAnalyzedEmailAuthenticationDetail>]: analyzedEmailAuthenticationDetail [(Any) <Object>]: This indicates any property can be added to this object. [CompositeAuthentication <String>]: A value used by Microsoft 365 to combine email authentication such as SPF, DKIM, and DMARC, to determine whether the message is authentic. [Dkim <String>]: DomainKeys identified mail (DKIM). Indicates whether it was pass/fail/soft fail. [Dmarc <String>]: Domain-based Message Authentication. Indicates whether it was pass/fail/soft fail. [SenderPolicyFramework <String>]: Sender Policy Framework (SPF). Indicates whether it was pass/fail/soft fail. [BulkComplaintLevel <String>]: The bulk complaint level of the email. A higher level is more likely to be spam. [ClientType <String>]: Shows the type of client that sent the message (for example, REST). [Contexts <String[]>]: Provides context of the email. [DetectionMethods <String[]>]: The methods of detection used. [Directionality <String>]: antispamDirectionality [DistributionList <String>]: The distribution list details to which the email was sent. [DlpRules <IMicrosoftGraphSecurityAnalyzedEmailDlpRuleInfo[]>]: Data loss prevention rules configured in purview. [Name <String>]: Name of the the data loss prevention rule. [RuleId <String>]: Unique identifier of the data loss prevention rule. [EmailClusterId <String>]: The identifier for the group of similar emails clustered based on heuristic analysis of their content. [ExchangeTransportRules <IMicrosoftGraphSecurityAnalyzedEmailExchangeTransportRuleInfo[]>]: The name of the Exchange transport rules (ETRs) associated with the email. [Name <String>]: Name of the Exchange transport rules (ETRs) that are part of the email. [RuleId <String>]: The ETR rule ID. [ForwardingDetail <String>]: Email smtp forwarding details. [InboundConnectorFormattedName <String>]: Custom instructions name that defines organizational mail flow and how the email was routed. [InternetMessageId <String>]: A public-facing identifier for the email that is sent. The message ID is in the format specified by RFC2822. [Language <String>]: The detected language of the email content. [LatestDelivery <IMicrosoftGraphSecurityAnalyzedEmailDeliveryDetail>]: analyzedEmailDeliveryDetail [(Any) <Object>]: This indicates any property can be added to this object. [Action <String>]: deliveryAction [LatestThreats <String>]: Latest known threat on the email. [Location <String>]: deliveryLocation [OriginalThreats <String>]: Threats identified at the time of delivery. [LoggedDateTime <DateTime?>]: Date-time when the email record was logged. [NetworkMessageId <String>]: An internal identifier for the email generated by Microsoft 365. [OriginalDelivery <IMicrosoftGraphSecurityAnalyzedEmailDeliveryDetail>]: analyzedEmailDeliveryDetail [OverrideSources <String[]>]: An aggregated list of all overrides with source on email. [PhishConfidenceLevel <String>]: The phish confidence level associated with the email [Policy <String>]: The action policy that took effect. [PolicyAction <String>]: The action taken on the email based on the configured policy. [PolicyType <String>]: Type of policy configured that defines the delivery action on email. [PrimaryOverrideSource <String>]: Shows the organization or user setting that altered the intended delivery location of the message (allowed instead of blocked, or blocked instead of allowed). [RecipientDetail <IMicrosoftGraphSecurityAnalyzedEmailRecipientDetail>]: analyzedEmailRecipientDetail [(Any) <Object>]: This indicates any property can be added to this object. [CcRecipients <String[]>]: Recipient address in the cc field. [DomainName <String>]: Domain name of the recipient. [RecipientEmailAddress <String>]: Contains the email address of the recipient. [ReturnPath <String>]: A field that indicates where and how bounced emails are processed. [SenderDetail <IMicrosoftGraphSecurityAnalyzedEmailSenderDetail>]: analyzedEmailSenderDetail [(Any) <Object>]: This indicates any property can be added to this object. [DisplayName <String>]: Display name of sender from address. [DomainCreationDateTime <DateTime?>]: Date and time of creation of the sender domain. [DomainName <String>]: Registered name of the domain. [DomainOwner <String>]: Owner of the domain. [FromAddress <String>]: The sender email address in the mail From header, also known as the envelope sender or the P1 sender. [Ipv4 <String>]: The IPv4 address of the last detected mail server that relayed the message. [Location <String>]: Location of the domain. [MailFromAddress <String>]: The sender email address in the From header, which is visible to email recipients on their email clients. Also known as P2 sender. [MailFromDomainName <String>]: Domain name of sender mail from address. [SizeInBytes <Int32?>]: Size of the email in bytes. [SpamConfidenceLevel <String>]: Spam confidence of the email. [Subject <String>]: Subject of the email. [ThreatDetectionDetails <IMicrosoftGraphSecurityThreatDetectionDetail[]>]: Information about threats detected in the email. [ConfidenceLevel <String>]: Indicates the confidence level in the threat detection. [PriorityAccountProtection <String>]: Indicates if the account has priority protection enabled. [Threats <String>]: Lists the detected threats. [ThreatTypes <String[]>]: Indicates the threat types. The possible values are: unknown, spam, malware, phish, none, unknownFutureValue. [TimelineEvents <IMicrosoftGraphSecurityTimelineEvent[]>]: Delivery and post-delivery events that happened to the email. [EventDateTime <DateTime?>]: The date and time when the event occurred. [EventDetails <String>]: Additional details or context about the event. [EventResult <String>]: The outcome or result of the event, such as delivery location or action taken. [EventSource <String>]: eventSource [EventThreats <String[]>]: Collection of threats identified or associated with this event. [EventType <String>]: timelineEventType [Urls <IMicrosoftGraphSecurityAnalyzedEmailUrl[]>]: A collection of the URLs in the email. [DetectionMethod <String>]: The method used to detect threats in the URL. [DetonationDetails <IMicrosoftGraphSecurityDetonationDetails>]: detonationDetails [TenantAllowBlockListDetailInfo <String>]: Details of entries in tenant allow/block list configured by tenant. [ThreatType <String>]: threatType [Url <String>]: The URL that is found in the email. This is full URL string, including query parameters.

BODYPARAMETER <IMicrosoftGraphSecurityCollaborationRoot>: collaborationRoot [(Any) <Object>]: This indicates any property can be added to this object. [Id <String>]: The unique identifier for an entity. Read-only. [AnalyzedEmails <IMicrosoftGraphSecurityAnalyzedEmail[]>]: Contains metadata for analyzed emails. [Id <String>]: The unique identifier for an entity. Read-only. [AlertIds <String[]>]: A collection of values that contain the IDs of any alerts associated with the email. [Attachments <IMicrosoftGraphSecurityAnalyzedEmailAttachment[]>]: A collection of the attachments in the email. [DetonationDetails <IMicrosoftGraphSecurityDetonationDetails>]: detonationDetails [(Any) <Object>]: This indicates any property can be added to this object. [AnalysisDateTime <DateTime?>]: The time of detonation. [CompromiseIndicators <IMicrosoftGraphSecurityCompromiseIndicator[]>]: Represents indicators and its associated verdict that suggests whether an email is compromised. [Value <String>]: Indicator. [Verdict <String>]: verdictCategory [DetonationBehaviourDetails <IMicrosoftGraphSecurityDetonationBehaviourDetails>]: detonationBehaviourDetails [(Any) <Object>]: This indicates any property can be added to this object. [ActionStatus <String>]: The status of the action performed during detonation (e.g., 'Successful', 'Failed', 'Blocked'). [BehaviourCapability <String>]: Categorizes the capability or type of behavior observed. [BehaviourGroup <String>]: Groups related behaviors together for classification purposes. [Details <String>]: More contextual information about the observed behavior or action. [EventDateTime <DateTime?>]: The date and time when the behavior or action was observed during detonation. [Operation <String>]: The specific operation or action that was performed. [ProcessId <String>]: The unique identifier of the process involved in the behavior. [ProcessName <String>]: The name of the process that performed or was involved in the behavior. [Target <String>]: The target of the operation. [DetonationChain <IMicrosoftGraphSecurityDetonationChain>]: detonationChain [(Any) <Object>]: This indicates any property can be added to this object. [ChildNodes <IMicrosoftGraphSecurityDetonationChain[]>]: A list of all child nodes in the chain. [Value <String>]: The value of the chain. [DetonationObservables <IMicrosoftGraphSecurityDetonationObservables>]: detonationObservables [(Any) <Object>]: This indicates any property can be added to this object. [ContactedIps <String[]>]: The list of all contacted IPs in the detonation. [ContactedUrls <String[]>]: The list of all URLs found in the detonation. [Droppedfiles <String[]>]: The list of all dropped files in the detonation. [DetonationScreenshotUri <String>]: Show any screenshots that were captured during detonation. No screenshots are captured if the URL opens into a link that directly downloads a file. However, you see the downloaded file in the detonation chain. [DetonationVerdict <String>]: The verdict of the detonation. [DetonationVerdictReason <String>]: The reason for the verdict of the detonation. [FileExtension <String>]: Extension of the file. [FileName <String>]: The name of the attachment in the email. [FileSize <Int32?>]: Size of the file. [FileType <String>]: The type of the attachment in the email. [MalwareFamily <String>]: The threat name associated with the threat type. [Sha256 <String>]: The SHA256 file hash of the attachment. [TenantAllowBlockListDetailInfo <String>]: Details of entries in tenant allow/block list configured by tenant. [ThreatType <String>]: threatType [AuthenticationDetails <IMicrosoftGraphSecurityAnalyzedEmailAuthenticationDetail>]: analyzedEmailAuthenticationDetail [(Any) <Object>]: This indicates any property can be added to this object. [CompositeAuthentication <String>]: A value used by Microsoft 365 to combine email authentication such as SPF, DKIM, and DMARC, to determine whether the message is authentic. [Dkim <String>]: DomainKeys identified mail (DKIM). Indicates whether it was pass/fail/soft fail. [Dmarc <String>]: Domain-based Message Authentication. Indicates whether it was pass/fail/soft fail. [SenderPolicyFramework <String>]: Sender Policy Framework (SPF). Indicates whether it was pass/fail/soft fail. [BulkComplaintLevel <String>]: The bulk complaint level of the email. A higher level is more likely to be spam. [ClientType <String>]: Shows the type of client that sent the message (for example, REST). [Contexts <String[]>]: Provides context of the email. [DetectionMethods <String[]>]: The methods of detection used. [Directionality <String>]: antispamDirectionality [DistributionList <String>]: The distribution list details to which the email was sent. [DlpRules <IMicrosoftGraphSecurityAnalyzedEmailDlpRuleInfo[]>]: Data loss prevention rules configured in purview. [Name <String>]: Name of the the data loss prevention rule. [RuleId <String>]: Unique identifier of the data loss prevention rule. [EmailClusterId <String>]: The identifier for the group of similar emails clustered based on heuristic analysis of their content. [ExchangeTransportRules <IMicrosoftGraphSecurityAnalyzedEmailExchangeTransportRuleInfo[]>]: The name of the Exchange transport rules (ETRs) associated with the email. [Name <String>]: Name of the Exchange transport rules (ETRs) that are part of the email. [RuleId <String>]: The ETR rule ID. [ForwardingDetail <String>]: Email smtp forwarding details. [InboundConnectorFormattedName <String>]: Custom instructions name that defines organizational mail flow and how the email was routed. [InternetMessageId <String>]: A public-facing identifier for the email that is sent. The message ID is in the format specified by RFC2822. [Language <String>]: The detected language of the email content. [LatestDelivery <IMicrosoftGraphSecurityAnalyzedEmailDeliveryDetail>]: analyzedEmailDeliveryDetail [(Any) <Object>]: This indicates any property can be added to this object. [Action <String>]: deliveryAction [LatestThreats <String>]: Latest known threat on the email. [Location <String>]: deliveryLocation [OriginalThreats <String>]: Threats identified at the time of delivery. [LoggedDateTime <DateTime?>]: Date-time when the email record was logged. [NetworkMessageId <String>]: An internal identifier for the email generated by Microsoft 365. [OriginalDelivery <IMicrosoftGraphSecurityAnalyzedEmailDeliveryDetail>]: analyzedEmailDeliveryDetail [OverrideSources <String[]>]: An aggregated list of all overrides with source on email. [PhishConfidenceLevel <String>]: The phish confidence level associated with the email [Policy <String>]: The action policy that took effect. [PolicyAction <String>]: The action taken on the email based on the configured policy. [PolicyType <String>]: Type of policy configured that defines the delivery action on email. [PrimaryOverrideSource <String>]: Shows the organization or user setting that altered the intended delivery location of the message (allowed instead of blocked, or blocked instead of allowed). [RecipientDetail <IMicrosoftGraphSecurityAnalyzedEmailRecipientDetail>]: analyzedEmailRecipientDetail [(Any) <Object>]: This indicates any property can be added to this object. [CcRecipients <String[]>]: Recipient address in the cc field. [DomainName <String>]: Domain name of the recipient. [RecipientEmailAddress <String>]: Contains the email address of the recipient. [ReturnPath <String>]: A field that indicates where and how bounced emails are processed. [SenderDetail <IMicrosoftGraphSecurityAnalyzedEmailSenderDetail>]: analyzedEmailSenderDetail [(Any) <Object>]: This indicates any property can be added to this object. [DisplayName <String>]: Display name of sender from address. [DomainCreationDateTime <DateTime?>]: Date and time of creation of the sender domain. [DomainName <String>]: Registered name of the domain. [DomainOwner <String>]: Owner of the domain. [FromAddress <String>]: The sender email address in the mail From header, also known as the envelope sender or the P1 sender. [Ipv4 <String>]: The IPv4 address of the last detected mail server that relayed the message. [Location <String>]: Location of the domain. [MailFromAddress <String>]: The sender email address in the From header, which is visible to email recipients on their email clients. Also known as P2 sender. [MailFromDomainName <String>]: Domain name of sender mail from address. [SizeInBytes <Int32?>]: Size of the email in bytes. [SpamConfidenceLevel <String>]: Spam confidence of the email. [Subject <String>]: Subject of the email. [ThreatDetectionDetails <IMicrosoftGraphSecurityThreatDetectionDetail[]>]: Information about threats detected in the email. [ConfidenceLevel <String>]: Indicates the confidence level in the threat detection. [PriorityAccountProtection <String>]: Indicates if the account has priority protection enabled. [Threats <String>]: Lists the detected threats. [ThreatTypes <String[]>]: Indicates the threat types. The possible values are: unknown, spam, malware, phish, none, unknownFutureValue. [TimelineEvents <IMicrosoftGraphSecurityTimelineEvent[]>]: Delivery and post-delivery events that happened to the email. [EventDateTime <DateTime?>]: The date and time when the event occurred. [EventDetails <String>]: Additional details or context about the event. [EventResult <String>]: The outcome or result of the event, such as delivery location or action taken. [EventSource <String>]: eventSource [EventThreats <String[]>]: Collection of threats identified or associated with this event. [EventType <String>]: timelineEventType [Urls <IMicrosoftGraphSecurityAnalyzedEmailUrl[]>]: A collection of the URLs in the email. [DetectionMethod <String>]: The method used to detect threats in the URL. [DetonationDetails <IMicrosoftGraphSecurityDetonationDetails>]: detonationDetails [TenantAllowBlockListDetailInfo <String>]: Details of entries in tenant allow/block list configured by tenant. [ThreatType <String>]: threatType [Url <String>]: The URL that is found in the email. This is full URL string, including query parameters.