Prompts you for confirmation before running the cmdlet.
Parameter properties
Type:
System.Management.Automation.SwitchParameter
Supports wildcards:
False
DontShow:
False
Aliases:
cf
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-CountriesOrRegionsOfOrigin
The country/region of origin for the given actor or threat associated with this intelligenceProfile.
To construct, see NOTES section for COUNTRIESORREGIONSOFORIGIN properties and create a hash table.
The date and time when this intelligenceProfile was first active.
The timestamp type represents date and time information using ISO 8601 format and is always in UTC time.
For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.
Parameter properties
Type:
System.DateTime
Supports wildcards:
False
DontShow:
False
Parameter sets
CreateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-Headers
Optional headers that will be added to the request.
Parameter properties
Type:
System.Collections.IDictionary
Supports wildcards:
False
DontShow:
False
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
True
Value from pipeline by property name:
False
Value from remaining arguments:
False
-HttpPipelineAppend
SendAsync Pipeline Steps to be appended to the front of the pipeline
Includes an assemblage of high-fidelity network indicators of compromise.
To construct, see NOTES section for INDICATORS properties and create a hash table.
Runs the command in a mode that only reports what would happen without performing the actions.
Parameter properties
Type:
System.Management.Automation.SwitchParameter
Supports wildcards:
False
DontShow:
False
Aliases:
wi
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
CommonParameters
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
-InformationAction, -InformationVariable, -OutBuffer, -OutVariable, -PipelineVariable,
-ProgressAction, -Verbose, -WarningAction, and -WarningVariable. For more information, see
about_CommonParameters.
To create the parameters described below, construct a hash table containing the appropriate properties.
For information on hash tables, run Get-Help about_Hash_Tables.
BODYPARAMETER <IMicrosoftGraphSecurityIntelligenceProfile>: intelligenceProfile
[(Any) <Object>]: This indicates any property can be added to this object.
[Id <String>]: The unique identifier for an entity.
Read-only.
[Aliases <String[]>]: A list of commonly-known aliases for the threat intelligence included in the intelligenceProfile.
[CountriesOrRegionsOfOrigin <IMicrosoftGraphSecurityIntelligenceProfileCountryOrRegionOfOrigin[]>]: The country/region of origin for the given actor or threat associated with this intelligenceProfile.
[Code <String>]: A codified representation for this country/region of origin.
[Label <String>]: A display label for this ountry/region of origin.
[Description <IMicrosoftGraphSecurityFormattedContent>]: formattedContent
[(Any) <Object>]: This indicates any property can be added to this object.
[Content <String>]: The content of this formattedContent.
[Format <String>]: contentFormat
[FirstActiveDateTime <DateTime?>]: The date and time when this intelligenceProfile was first active.
The timestamp type represents date and time information using ISO 8601 format and is always in UTC time.
For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.
[Indicators <IMicrosoftGraphSecurityIntelligenceProfileIndicator[]>]: Includes an assemblage of high-fidelity network indicators of compromise.
[Artifact <IMicrosoftGraphSecurityArtifact>]: artifact
[(Any) <Object>]: This indicates any property can be added to this object.
[Id <String>]: The unique identifier for an entity.
Read-only.
[Source <String>]: indicatorSource
[Id <String>]: The unique identifier for an entity.
Read-only.
[FirstSeenDateTime <DateTime?>]: Designate when an artifact was first used actively in an attack, when a particular sample was compiled, or if neither of those could be ascertained when the file was first seen in public repositories (for example, VirusTotal, ANY.RUN, Hybrid Analysis) or reported publicly.
[LastSeenDateTime <DateTime?>]: Designate when an artifact was most recently used actively in an attack, when a particular sample was compiled, or if neither of those could be ascertained when the file was first seen in public repositories (for example, VirusTotal, ANY.RUN, Hybrid Analysis) or reported publicly.
[Kind <String>]: intelligenceProfileKind
[Summary <IMicrosoftGraphSecurityFormattedContent>]: formattedContent
[Targets <String[]>]: Known targets related to this intelligenceProfile.
[Title <String>]: The title of this intelligenceProfile.
[Tradecraft <IMicrosoftGraphSecurityFormattedContent>]: formattedContent
COUNTRIESORREGIONSOFORIGIN <IMicrosoftGraphSecurityIntelligenceProfileCountryOrRegionOfOrigin[]>: The country/region of origin for the given actor or threat associated with this intelligenceProfile.
[Code <String>]: A codified representation for this country/region of origin.
[Label <String>]: A display label for this ountry/region of origin.
DESCRIPTION <IMicrosoftGraphSecurityFormattedContent>: formattedContent
[(Any) <Object>]: This indicates any property can be added to this object.
[Content <String>]: The content of this formattedContent.
[Format <String>]: contentFormat
INDICATORS <IMicrosoftGraphSecurityIntelligenceProfileIndicator[]>: Includes an assemblage of high-fidelity network indicators of compromise.
[Artifact <IMicrosoftGraphSecurityArtifact>]: artifact
[(Any) <Object>]: This indicates any property can be added to this object.
[Id <String>]: The unique identifier for an entity.
Read-only.
[Source <String>]: indicatorSource
[Id <String>]: The unique identifier for an entity.
Read-only.
[FirstSeenDateTime <DateTime?>]: Designate when an artifact was first used actively in an attack, when a particular sample was compiled, or if neither of those could be ascertained when the file was first seen in public repositories (for example, VirusTotal, ANY.RUN, Hybrid Analysis) or reported publicly.
[LastSeenDateTime <DateTime?>]: Designate when an artifact was most recently used actively in an attack, when a particular sample was compiled, or if neither of those could be ascertained when the file was first seen in public repositories (for example, VirusTotal, ANY.RUN, Hybrid Analysis) or reported publicly.
SUMMARY <IMicrosoftGraphSecurityFormattedContent>: formattedContent
[(Any) <Object>]: This indicates any property can be added to this object.
[Content <String>]: The content of this formattedContent.
[Format <String>]: contentFormat
TRADECRAFT <IMicrosoftGraphSecurityFormattedContent>: formattedContent
[(Any) <Object>]: This indicates any property can be added to this object.
[Content <String>]: The content of this formattedContent.
[Format <String>]: contentFormat