Specifies when the threat submission was created.
Supports $filter = createdDateTime ge 2022-01-01T00:00:00Z and createdDateTime lt 2022-01-02T00:00:00Z.
Parameter properties
Type:
System.DateTime
Supports wildcards:
False
DontShow:
False
Parameter sets
UpdateViaIdentityExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
UpdateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-EmailThreatSubmissionId
The unique identifier of emailThreatSubmission
Parameter properties
Type:
System.String
Supports wildcards:
False
DontShow:
False
Parameter sets
UpdateExpanded
Position:
Named
Mandatory:
True
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
Update
Position:
Named
Mandatory:
True
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-Headers
Optional headers that will be added to the request.
Parameter properties
Type:
System.Collections.IDictionary
Supports wildcards:
False
DontShow:
False
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
True
Value from pipeline by property name:
False
Value from remaining arguments:
False
-HttpPipelineAppend
SendAsync Pipeline Steps to be appended to the front of the pipeline
Indicates the tenant id of the submitter.
Not required when created using a POST operation.
It's extracted from the token of the post API call.
Parameter properties
Type:
System.String
Supports wildcards:
False
DontShow:
False
Parameter sets
UpdateViaIdentityExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
UpdateExpanded
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
-WhatIf
Runs the command in a mode that only reports what would happen without performing the actions.
Parameter properties
Type:
System.Management.Automation.SwitchParameter
Supports wildcards:
False
DontShow:
False
Aliases:
wi
Parameter sets
(All)
Position:
Named
Mandatory:
False
Value from pipeline:
False
Value from pipeline by property name:
False
Value from remaining arguments:
False
CommonParameters
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
-InformationAction, -InformationVariable, -OutBuffer, -OutVariable, -PipelineVariable,
-ProgressAction, -Verbose, -WarningAction, and -WarningVariable. For more information, see
about_CommonParameters.
To create the parameters described below, construct a hash table containing the appropriate properties.
For information on hash tables, run Get-Help about_Hash_Tables.
ADMINREVIEW <IMicrosoftGraphSecuritySubmissionAdminReview>: submissionAdminReview
[(Any) <Object>]: This indicates any property can be added to this object.
[ReviewBy <String>]: Specifies who reviewed the email.
The identification is an email ID or other identity strings.
[ReviewDateTime <DateTime?>]: Specifies the date time when the review occurred.
[ReviewResult <String>]: submissionResultCategory
ATTACKSIMULATIONINFO <IMicrosoftGraphSecurityAttackSimulationInfo>: attackSimulationInfo
[(Any) <Object>]: This indicates any property can be added to this object.
[AttackSimDateTime <DateTime?>]: The date and time of the attack simulation.
[AttackSimDurationTime <TimeSpan?>]: The duration (in time) for the attack simulation.
[AttackSimId <String>]: The activity ID for the attack simulation.
[AttackSimUserId <String>]: The unique identifier for the user who got the attack simulation email.
BODYPARAMETER <IMicrosoftGraphSecurityEmailThreatSubmission>: emailThreatSubmission
[(Any) <Object>]: This indicates any property can be added to this object.
[AdminReview <IMicrosoftGraphSecuritySubmissionAdminReview>]: submissionAdminReview
[(Any) <Object>]: This indicates any property can be added to this object.
[ReviewBy <String>]: Specifies who reviewed the email.
The identification is an email ID or other identity strings.
[ReviewDateTime <DateTime?>]: Specifies the date time when the review occurred.
[ReviewResult <String>]: submissionResultCategory
[Category <String>]: submissionCategory
[ClientSource <String>]: submissionClientSource
[ContentType <String>]: submissionContentType
[CreatedBy <IMicrosoftGraphSecuritySubmissionUserIdentity>]: submissionUserIdentity
[(Any) <Object>]: This indicates any property can be added to this object.
[DisplayName <String>]: The display name of the identity.
For drive items, the display name might not always be available or up to date.
For example, if a user changes their display name the API might show the new value in a future response, but the items associated with the user don't show up as changed when using delta.
[Id <String>]: Unique identifier for the identity or actor.
For example, in the access reviews decisions API, this property might record the id of the principal, that is, the group, user, or application that's subject to review.
[Email <String>]: The email of user who is making the submission when logged in (delegated token case).
[CreatedDateTime <DateTime?>]: Specifies when the threat submission was created.
Supports $filter = createdDateTime ge 2022-01-01T00:00:00Z and createdDateTime lt 2022-01-02T00:00:00Z.
[Result <IMicrosoftGraphSecuritySubmissionResult>]: submissionResult
[(Any) <Object>]: This indicates any property can be added to this object.
[Category <String>]: submissionResultCategory
[Detail <String>]: submissionResultDetail
[DetectedFiles <IMicrosoftGraphSecuritySubmissionDetectedFile[]>]: Specifies the files detected by Microsoft in the submitted emails.
[FileHash <String>]: The file hash.
[FileName <String>]: The file name.
[DetectedUrls <String[]>]: Specifies the URLs detected by Microsoft in the submitted email.
[UserMailboxSetting <String>]: userMailboxSetting
[Source <String>]: submissionSource
[Status <String>]: longRunningOperationStatus
[TenantId <String>]: Indicates the tenant id of the submitter.
Not required when created using a POST operation.
It's extracted from the token of the post API call.
[Id <String>]: The unique identifier for an entity.
Read-only.
[AttackSimulationInfo <IMicrosoftGraphSecurityAttackSimulationInfo>]: attackSimulationInfo
[(Any) <Object>]: This indicates any property can be added to this object.
[AttackSimDateTime <DateTime?>]: The date and time of the attack simulation.
[AttackSimDurationTime <TimeSpan?>]: The duration (in time) for the attack simulation.
[AttackSimId <String>]: The activity ID for the attack simulation.
[AttackSimUserId <String>]: The unique identifier for the user who got the attack simulation email.
[InternetMessageId <String>]: Specifies the internet message ID of the email being submitted.
This information is present in the email header.
[OriginalCategory <String>]: submissionCategory
[ReceivedDateTime <DateTime?>]: Specifies the date and time stamp when the email was received.
[RecipientEmailAddress <String>]: Specifies the email address (in smtp format) of the recipient who received the email.
[Sender <String>]: Specifies the email address of the sender.
[SenderIP <String>]: Specifies the IP address of the sender.
[Subject <String>]: Specifies the subject of the email.
[TenantAllowOrBlockListAction <IMicrosoftGraphSecurityTenantAllowOrBlockListAction>]: tenantAllowOrBlockListAction
[(Any) <Object>]: This indicates any property can be added to this object.
[Action <String>]: tenantAllowBlockListAction
[ExpirationDateTime <DateTime?>]: Specifies when the tenant allow-block-list expires in date time.
[Note <String>]: Specifies the note added to the tenant allow-or-block list entry in the format of string.
[Results <IMicrosoftGraphSecurityTenantAllowBlockListEntryResult[]>]: Contains the result of the submission that lead to the tenant allow-block-list entry creation.
[EntryType <String>]: tenantAllowBlockListEntryType
[ExpirationDateTime <DateTime?>]: Specifies the date and time when the entry expires.
[Identity <String>]: Specifies the identity of the entry generated by the tenant allow block list system.
[Status <String>]: longRunningOperationStatus
[Value <String>]: Specifies the value of the created tenant allow block list entry.
CREATEDBY <IMicrosoftGraphSecuritySubmissionUserIdentity>: submissionUserIdentity
[(Any) <Object>]: This indicates any property can be added to this object.
[DisplayName <String>]: The display name of the identity.
For drive items, the display name might not always be available or up to date.
For example, if a user changes their display name the API might show the new value in a future response, but the items associated with the user don't show up as changed when using delta.
[Id <String>]: Unique identifier for the identity or actor.
For example, in the access reviews decisions API, this property might record the id of the principal, that is, the group, user, or application that's subject to review.
[Email <String>]: The email of user who is making the submission when logged in (delegated token case).
INPUTOBJECT <ISecurityIdentity>: Identity Parameter
[AlertId <String>]: The unique identifier of alert
[AnalyzedEmailId <String>]: The unique identifier of analyzedEmail
[ArticleId <String>]: The unique identifier of article
[ArticleIndicatorId <String>]: The unique identifier of articleIndicator
[AttackSimulationOperationId <String>]: The unique identifier of attackSimulationOperation
[AuditLogQueryId <String>]: The unique identifier of auditLogQuery
[AuditLogRecordId <String>]: The unique identifier of auditLogRecord
[AuthoredNoteId <String>]: The unique identifier of authoredNote
[AuthorityTemplateId <String>]: The unique identifier of authorityTemplate
[CaseOperationId <String>]: The unique identifier of caseOperation
[CategoryTemplateId <String>]: The unique identifier of categoryTemplate
[CitationTemplateId <String>]: The unique identifier of citationTemplate
[CloudAppDiscoveryReportId <String>]: The unique identifier of cloudAppDiscoveryReport
[CloudAppSecurityProfileId <String>]: The unique identifier of cloudAppSecurityProfile
[ContentFormats <String[]>]: Usage: contentFormats={contentFormats}
[CustomerInsightTenantId <String>]: The unique identifier of customerInsight
[DataSourceId <String>]: The unique identifier of dataSource
[DepartmentTemplateId <String>]: The unique identifier of departmentTemplate
[DetectionRuleId <String>]: The unique identifier of detectionRule
[DispositionReviewStageNumber <String>]: The unique identifier of dispositionReviewStage
[DomainSecurityProfileId <String>]: The unique identifier of domainSecurityProfile
[EdiscoveryCaseId <String>]: The unique identifier of ediscoveryCase
[EdiscoveryCaseMemberId <String>]: The unique identifier of ediscoveryCaseMember
[EdiscoveryCustodianId <String>]: The unique identifier of ediscoveryCustodian
[EdiscoveryFileId <String>]: The unique identifier of ediscoveryFile
[EdiscoveryHoldPolicyId <String>]: The unique identifier of ediscoveryHoldPolicy
[EdiscoveryNoncustodialDataSourceId <String>]: The unique identifier of ediscoveryNoncustodialDataSource
[EdiscoveryReviewSetId <String>]: The unique identifier of ediscoveryReviewSet
[EdiscoveryReviewSetQueryId <String>]: The unique identifier of ediscoveryReviewSetQuery
[EdiscoveryReviewTagId <String>]: The unique identifier of ediscoveryReviewTag
[EdiscoveryReviewTagId1 <String>]: The unique identifier of ediscoveryReviewTag
[EdiscoverySearchId <String>]: The unique identifier of ediscoverySearch
[EmailThreatSubmissionId <String>]: The unique identifier of emailThreatSubmission
[EmailThreatSubmissionPolicyId <String>]: The unique identifier of emailThreatSubmissionPolicy
[EndUserNotificationDetailId <String>]: The unique identifier of endUserNotificationDetail
[EndUserNotificationId <String>]: The unique identifier of endUserNotification
[FilePlanReferenceTemplateId <String>]: The unique identifier of filePlanReferenceTemplate
[FileSecurityProfileId <String>]: The unique identifier of fileSecurityProfile
[FileThreatSubmissionId <String>]: The unique identifier of fileThreatSubmission
[HealthIssueId <String>]: The unique identifier of healthIssue
[HostComponentId <String>]: The unique identifier of hostComponent
[HostCookieId <String>]: The unique identifier of hostCookie
[HostId <String>]: The unique identifier of host
[HostPairId <String>]: The unique identifier of hostPair
[HostPortId <String>]: The unique identifier of hostPort
[HostSecurityProfileId <String>]: The unique identifier of hostSecurityProfile
[HostSslCertificateId <String>]: The unique identifier of hostSslCertificate
[HostTrackerId <String>]: The unique identifier of hostTracker
[IPSecurityProfileId <String>]: The unique identifier of ipSecurityProfile
[IdentityAccountsId <String>]: The unique identifier of identityAccounts
[IncidentId <String>]: The unique identifier of incident
[IncidentTaskId <String>]: The unique identifier of incidentTask
[IntelligenceProfileId <String>]: The unique identifier of intelligenceProfile
[IntelligenceProfileIndicatorId <String>]: The unique identifier of intelligenceProfileIndicator
[LabelIds <String[]>]: Usage: labelIds={labelIds}
[LandingPageDetailId <String>]: The unique identifier of landingPageDetail
[LandingPageId <String>]: The unique identifier of landingPage
[Locale <String>]: Usage: locale='{locale}'
[LoginPageId <String>]: The unique identifier of loginPage
[PartnerSecurityAlertId <String>]: The unique identifier of partnerSecurityAlert
[PassiveDnsRecordId <String>]: The unique identifier of passiveDnsRecord
[PayloadId <String>]: The unique identifier of payload
[PolicyFileId <String>]: The unique identifier of policyFile
[ProviderTenantSettingId <String>]: The unique identifier of providerTenantSetting
[RetentionEventId <String>]: The unique identifier of retentionEvent
[RetentionEventTypeId <String>]: The unique identifier of retentionEventType
[RetentionLabelId <String>]: The unique identifier of retentionLabel
[SecureScoreControlProfileId <String>]: The unique identifier of secureScoreControlProfile
[SecureScoreId <String>]: The unique identifier of secureScore
[SecurityActionId <String>]: The unique identifier of securityAction
[SecurityRequirementId <String>]: The unique identifier of securityRequirement
[SecurityScoreHistoryId <String>]: The unique identifier of securityScoreHistory
[SensitivityLabelId <String>]: The unique identifier of sensitivityLabel
[SensitivityLabelId1 <String>]: The unique identifier of sensitivityLabel
[SensorId <String>]: The unique identifier of sensor
[SimulationAutomationId <String>]: The unique identifier of simulationAutomation
[SimulationAutomationRunId <String>]: The unique identifier of simulationAutomationRun
[SimulationId <String>]: The unique identifier of simulation
[SiteSourceId <String>]: The unique identifier of siteSource
[SslCertificateId <String>]: The unique identifier of sslCertificate
[SubcategoryTemplateId <String>]: The unique identifier of subcategoryTemplate
[SubdomainId <String>]: The unique identifier of subdomain
[SubjectRightsRequestId <String>]: The unique identifier of subjectRightsRequest
[TiIndicatorId <String>]: The unique identifier of tiIndicator
[TrainingCampaignId <String>]: The unique identifier of trainingCampaign
[TrainingId <String>]: The unique identifier of training
[TrainingLanguageDetailId <String>]: The unique identifier of trainingLanguageDetail
[UnifiedGroupSourceId <String>]: The unique identifier of unifiedGroupSource
[UrlThreatSubmissionId <String>]: The unique identifier of urlThreatSubmission
[UserId <String>]: The unique identifier of user
[UserPrincipalName <String>]: Alternate key of user
[UserSecurityProfileId <String>]: The unique identifier of userSecurityProfile
[UserSourceId <String>]: The unique identifier of userSource
[VulnerabilityComponentId <String>]: The unique identifier of vulnerabilityComponent
[VulnerabilityId <String>]: The unique identifier of vulnerability
[WhoisHistoryRecordId <String>]: The unique identifier of whoisHistoryRecord
[WhoisRecordId <String>]: The unique identifier of whoisRecord
RESULT <IMicrosoftGraphSecuritySubmissionResult>: submissionResult
[(Any) <Object>]: This indicates any property can be added to this object.
[Category <String>]: submissionResultCategory
[Detail <String>]: submissionResultDetail
[DetectedFiles <IMicrosoftGraphSecuritySubmissionDetectedFile[]>]: Specifies the files detected by Microsoft in the submitted emails.
[FileHash <String>]: The file hash.
[FileName <String>]: The file name.
[DetectedUrls <String[]>]: Specifies the URLs detected by Microsoft in the submitted email.
[UserMailboxSetting <String>]: userMailboxSetting
TENANTALLOWORBLOCKLISTACTION <IMicrosoftGraphSecurityTenantAllowOrBlockListAction>: tenantAllowOrBlockListAction
[(Any) <Object>]: This indicates any property can be added to this object.
[Action <String>]: tenantAllowBlockListAction
[ExpirationDateTime <DateTime?>]: Specifies when the tenant allow-block-list expires in date time.
[Note <String>]: Specifies the note added to the tenant allow-or-block list entry in the format of string.
[Results <IMicrosoftGraphSecurityTenantAllowBlockListEntryResult[]>]: Contains the result of the submission that lead to the tenant allow-block-list entry creation.
[EntryType <String>]: tenantAllowBlockListEntryType
[ExpirationDateTime <DateTime?>]: Specifies the date and time when the entry expires.
[Identity <String>]: Specifies the identity of the entry generated by the tenant allow block list system.
[Status <String>]: longRunningOperationStatus
[Value <String>]: Specifies the value of the created tenant allow block list entry.