exports/v1.0/ProxyCmdletDefinitions.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Get alerts from Security .Description Get alerts from Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.ISecurityIdentity .Outputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlert .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <ISecurityIdentity>: Identity Parameter [AlertId <String>]: key: id of alert [CloudAppSecurityProfileId <String>]: key: id of cloudAppSecurityProfile [DomainSecurityProfileId <String>]: key: id of domainSecurityProfile [FileSecurityProfileId <String>]: key: id of fileSecurityProfile [HostSecurityProfileId <String>]: key: id of hostSecurityProfile [IPSecurityProfileId <String>]: key: id of ipSecurityProfile [ProviderTenantSettingId <String>]: key: id of providerTenantSetting [SecureScoreControlProfileId <String>]: key: id of secureScoreControlProfile [SecureScoreId <String>]: key: id of secureScore [SecurityActionId <String>]: key: id of securityAction [TiIndicatorId <String>]: key: id of tiIndicator [UserSecurityProfileId <String>]: key: id of userSecurityProfile .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/get-mgsecurityalert #> function Get-MgSecurityAlert { [OutputType([Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlert])] [CmdletBinding(DefaultParameterSetName='List1', PositionalBinding=$false)] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Get1', Mandatory)] [Microsoft.Graph.PowerShell.Category('Path')] [System.String] # key: id of alert ${AlertId}, [Parameter(ParameterSetName='GetViaIdentity1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Path')] [Microsoft.Graph.PowerShell.Models.ISecurityIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Alias('Expand')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String[]] # Expand related entities ${ExpandProperty}, [Parameter()] [Alias('Select')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String[]] # Select properties to be returned ${Property}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.Management.Automation.SwitchParameter] # Include count of items ${Count}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String] # Filter items by property values ${Filter}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String] # Search items by search phrases ${Search}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.Int32] # Skip the first n items ${Skip}, [Parameter(ParameterSetName='List1')] [Alias('OrderBy')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String[]] # Order items by property values ${Sort}, [Parameter(ParameterSetName='List1')] [Alias('Limit')] [Microsoft.Graph.PowerShell.Category('Query')] [System.Int32] # Show only the first n items ${Top}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Int32] # Sets the page size of results. ${PageSize}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # List all pages. ${All} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Get1 = 'Microsoft.Graph.Security.private\Get-MgSecurityAlert_Get1'; GetViaIdentity1 = 'Microsoft.Graph.Security.private\Get-MgSecurityAlert_GetViaIdentity1'; List1 = 'Microsoft.Graph.Security.private\Get-MgSecurityAlert_List1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Get secureScoreControlProfiles from Security .Description Get secureScoreControlProfiles from Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.ISecurityIdentity .Outputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScoreControlProfile .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <ISecurityIdentity>: Identity Parameter [AlertId <String>]: key: id of alert [CloudAppSecurityProfileId <String>]: key: id of cloudAppSecurityProfile [DomainSecurityProfileId <String>]: key: id of domainSecurityProfile [FileSecurityProfileId <String>]: key: id of fileSecurityProfile [HostSecurityProfileId <String>]: key: id of hostSecurityProfile [IPSecurityProfileId <String>]: key: id of ipSecurityProfile [ProviderTenantSettingId <String>]: key: id of providerTenantSetting [SecureScoreControlProfileId <String>]: key: id of secureScoreControlProfile [SecureScoreId <String>]: key: id of secureScore [SecurityActionId <String>]: key: id of securityAction [TiIndicatorId <String>]: key: id of tiIndicator [UserSecurityProfileId <String>]: key: id of userSecurityProfile .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/get-mgsecuritysecurescorecontrolprofile #> function Get-MgSecuritySecureScoreControlProfile { [OutputType([Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScoreControlProfile])] [CmdletBinding(DefaultParameterSetName='List1', PositionalBinding=$false)] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Get1', Mandatory)] [Microsoft.Graph.PowerShell.Category('Path')] [System.String] # key: id of secureScoreControlProfile ${SecureScoreControlProfileId}, [Parameter(ParameterSetName='GetViaIdentity1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Path')] [Microsoft.Graph.PowerShell.Models.ISecurityIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Alias('Expand')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String[]] # Expand related entities ${ExpandProperty}, [Parameter()] [Alias('Select')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String[]] # Select properties to be returned ${Property}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.Management.Automation.SwitchParameter] # Include count of items ${Count}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String] # Filter items by property values ${Filter}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String] # Search items by search phrases ${Search}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.Int32] # Skip the first n items ${Skip}, [Parameter(ParameterSetName='List1')] [Alias('OrderBy')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String[]] # Order items by property values ${Sort}, [Parameter(ParameterSetName='List1')] [Alias('Limit')] [Microsoft.Graph.PowerShell.Category('Query')] [System.Int32] # Show only the first n items ${Top}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Int32] # Sets the page size of results. ${PageSize}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # List all pages. ${All} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Get1 = 'Microsoft.Graph.Security.private\Get-MgSecuritySecureScoreControlProfile_Get1'; GetViaIdentity1 = 'Microsoft.Graph.Security.private\Get-MgSecuritySecureScoreControlProfile_GetViaIdentity1'; List1 = 'Microsoft.Graph.Security.private\Get-MgSecuritySecureScoreControlProfile_List1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Get secureScores from Security .Description Get secureScores from Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.ISecurityIdentity .Outputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScore .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <ISecurityIdentity>: Identity Parameter [AlertId <String>]: key: id of alert [CloudAppSecurityProfileId <String>]: key: id of cloudAppSecurityProfile [DomainSecurityProfileId <String>]: key: id of domainSecurityProfile [FileSecurityProfileId <String>]: key: id of fileSecurityProfile [HostSecurityProfileId <String>]: key: id of hostSecurityProfile [IPSecurityProfileId <String>]: key: id of ipSecurityProfile [ProviderTenantSettingId <String>]: key: id of providerTenantSetting [SecureScoreControlProfileId <String>]: key: id of secureScoreControlProfile [SecureScoreId <String>]: key: id of secureScore [SecurityActionId <String>]: key: id of securityAction [TiIndicatorId <String>]: key: id of tiIndicator [UserSecurityProfileId <String>]: key: id of userSecurityProfile .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/get-mgsecuritysecurescore #> function Get-MgSecuritySecureScore { [OutputType([Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScore])] [CmdletBinding(DefaultParameterSetName='List1', PositionalBinding=$false)] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Get1', Mandatory)] [Microsoft.Graph.PowerShell.Category('Path')] [System.String] # key: id of secureScore ${SecureScoreId}, [Parameter(ParameterSetName='GetViaIdentity1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Path')] [Microsoft.Graph.PowerShell.Models.ISecurityIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Alias('Expand')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String[]] # Expand related entities ${ExpandProperty}, [Parameter()] [Alias('Select')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String[]] # Select properties to be returned ${Property}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.Management.Automation.SwitchParameter] # Include count of items ${Count}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String] # Filter items by property values ${Filter}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String] # Search items by search phrases ${Search}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Query')] [System.Int32] # Skip the first n items ${Skip}, [Parameter(ParameterSetName='List1')] [Alias('OrderBy')] [Microsoft.Graph.PowerShell.Category('Query')] [System.String[]] # Order items by property values ${Sort}, [Parameter(ParameterSetName='List1')] [Alias('Limit')] [Microsoft.Graph.PowerShell.Category('Query')] [System.Int32] # Show only the first n items ${Top}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Int32] # Sets the page size of results. ${PageSize}, [Parameter(ParameterSetName='List1')] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # List all pages. ${All} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Get1 = 'Microsoft.Graph.Security.private\Get-MgSecuritySecureScore_Get1'; GetViaIdentity1 = 'Microsoft.Graph.Security.private\Get-MgSecuritySecureScore_GetViaIdentity1'; List1 = 'Microsoft.Graph.Security.private\Get-MgSecuritySecureScore_List1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Create new navigation property to alerts for Security .Description Create new navigation property to alerts for Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlert .Outputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlert .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. BODYPARAMETER <IMicrosoftGraphAlert>: alert [(Any) <Object>]: This indicates any property can be added to this object. [Id <String>]: Read-only. [ActivityGroupName <String>]: Name or alias of the activity group (attacker) this alert is attributed to. [AssignedTo <String>]: Name of the analyst the alert is assigned to for triage, investigation, or remediation (supports update). [AzureSubscriptionId <String>]: Azure subscription ID, present if this alert is related to an Azure resource. [AzureTenantId <String>]: Azure Active Directory tenant ID. Required. [Category <String>]: Category of the alert (for example, credentialTheft, ransomware, etc.). [ClosedDateTime <DateTime?>]: Time at which the alert was closed. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z' (supports update). [CloudAppStates <IMicrosoftGraphCloudAppSecurityState[]>]: Security-related stateful information generated by the provider about the cloud application/s related to this alert. [DestinationServiceIP <String>]: Destination IP Address of the connection to the cloud application/service. [DestinationServiceName <String>]: Cloud application/service name (for example 'Salesforce', 'DropBox', etc.). [RiskScore <String>]: Provider-generated/calculated risk score of the Cloud Application/Service. Recommended value range of 0-1, which equates to a percentage. [Comments <String[]>]: Customer-provided comments on alert (for customer alert management) (supports update). [Confidence <Int32?>]: Confidence of the detection logic (percentage between 1-100). [CreatedDateTime <DateTime?>]: Time at which the alert was created by the alert provider. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. Required. [Description <String>]: Alert description. [DetectionIds <String[]>]: Set of alerts related to this alert entity (each alert is pushed to the SIEM as a separate record). [EventDateTime <DateTime?>]: Time at which the event(s) that served as the trigger(s) to generate the alert occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. Required. [Feedback <String>]: alertFeedback [FileStates <IMicrosoftGraphFileSecurityState[]>]: Security-related stateful information generated by the provider about the file(s) related to this alert. [FileHash <IMicrosoftGraphFileHash>]: fileHash [(Any) <Object>]: This indicates any property can be added to this object. [HashType <String>]: fileHashType [HashValue <String>]: Value of the file hash. [Name <String>]: File name (without path). [Path <String>]: Full file path of the file/imageFile. [RiskScore <String>]: Provider generated/calculated risk score of the alert file. Recommended value range of 0-1, which equates to a percentage. [HistoryStates <IMicrosoftGraphAlertHistoryState[]>]: [AppId <String>]: [AssignedTo <String>]: [Comments <String[]>]: [Feedback <String>]: alertFeedback [Status <String>]: alertStatus [UpdatedDateTime <DateTime?>]: [User <String>]: [HostStates <IMicrosoftGraphHostSecurityState[]>]: Security-related stateful information generated by the provider about the host(s) related to this alert. [Fqdn <String>]: Host FQDN (Fully Qualified Domain Name) (for example, machine.company.com). [IsAzureAdJoined <Boolean?>]: [IsAzureAdRegistered <Boolean?>]: [IsHybridAzureDomainJoined <Boolean?>]: True if the host is domain joined to an on-premises Active Directory domain. [NetBiosName <String>]: The local host name, without the DNS domain name. [OS <String>]: Host Operating System. (For example, Windows10, MacOS, RHEL, etc.). [PrivateIPAddress <String>]: Private (not routable) IPv4 or IPv6 address (see RFC 1918) at the time of the alert. [PublicIPAddress <String>]: Publicly routable IPv4 or IPv6 address (see RFC 1918) at time of the alert. [RiskScore <String>]: Provider-generated/calculated risk score of the host. Recommended value range of 0-1, which equates to a percentage. [IncidentIds <String[]>]: IDs of incidents related to current alert. [LastModifiedDateTime <DateTime?>]: Time at which the alert entity was last modified. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [MalwareStates <IMicrosoftGraphMalwareState[]>]: Threat Intelligence pertaining to malware related to this alert. [Category <String>]: Provider-generated malware category (for example, trojan, ransomware, etc.). [Family <String>]: Provider-generated malware family (for example, 'wannacry', 'notpetya', etc.). [Name <String>]: Provider-generated malware variant name (for example, Trojan:Win32/Powessere.H). [Severity <String>]: Provider-determined severity of this malware. [WasRunning <Boolean?>]: Indicates whether the detected file (malware/vulnerability) was running at the time of detection or was detected at rest on the disk. [NetworkConnections <IMicrosoftGraphNetworkConnection[]>]: Security-related stateful information generated by the provider about the network connection(s) related to this alert. [ApplicationName <String>]: Name of the application managing the network connection (for example, Facebook or SMTP). [DestinationAddress <String>]: Destination IP address (of the network connection). [DestinationDomain <String>]: Destination domain portion of the destination URL. (for example 'www.contoso.com'). [DestinationLocation <String>]: Location (by IP address mapping) associated with the destination of a network connection. [DestinationPort <String>]: Destination port (of the network connection). [DestinationUrl <String>]: Network connection URL/URI string - excluding parameters. (for example 'www.contoso.com/products/default.html') [Direction <String>]: connectionDirection [DomainRegisteredDateTime <DateTime?>]: Date when the destination domain was registered. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z' [LocalDnsName <String>]: The local DNS name resolution as it appears in the host's local DNS cache (for example, in case the 'hosts' file was tampered with). [NatDestinationAddress <String>]: Network Address Translation destination IP address. [NatDestinationPort <String>]: Network Address Translation destination port. [NatSourceAddress <String>]: Network Address Translation source IP address. [NatSourcePort <String>]: Network Address Translation source port. [Protocol <String>]: securityNetworkProtocol [RiskScore <String>]: Provider generated/calculated risk score of the network connection. Recommended value range of 0-1, which equates to a percentage. [SourceAddress <String>]: Source (i.e. origin) IP address (of the network connection). [SourceLocation <String>]: Location (by IP address mapping) associated with the source of a network connection. [SourcePort <String>]: Source (i.e. origin) IP port (of the network connection). [Status <String>]: connectionStatus [UrlParameters <String>]: Parameters (suffix) of the destination URL. [Processes <IMicrosoftGraphProcess[]>]: Security-related stateful information generated by the provider about the process or processes related to this alert. [AccountName <String>]: User account identifier (user account context the process ran under) for example, AccountName, SID, and so on. [CommandLine <String>]: The full process invocation commandline including all parameters. [CreatedDateTime <DateTime?>]: Time at which the process was started. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [FileHash <IMicrosoftGraphFileHash>]: fileHash [IntegrityLevel <String>]: processIntegrityLevel [IsElevated <Boolean?>]: True if the process is elevated. [Name <String>]: The name of the process' Image file. [ParentProcessCreatedDateTime <DateTime?>]: DateTime at which the parent process was started. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [ParentProcessId <Int32?>]: The Process ID (PID) of the parent process. [ParentProcessName <String>]: The name of the image file of the parent process. [Path <String>]: Full path, including filename. [ProcessId <Int32?>]: The Process ID (PID) of the process. [RecommendedActions <String[]>]: Vendor/provider recommended action(s) to take as a result of the alert (for example, isolate machine, enforce2FA, reimage host). [RegistryKeyStates <IMicrosoftGraphRegistryKeyState[]>]: Security-related stateful information generated by the provider about the registry keys related to this alert. [Hive <String>]: registryHive [Key <String>]: Current (i.e. changed) registry key (excludes HIVE). [OldKey <String>]: Previous (i.e. before changed) registry key (excludes HIVE). [OldValueData <String>]: Previous (i.e. before changed) registry key value data (contents). [OldValueName <String>]: Previous (i.e. before changed) registry key value name. [Operation <String>]: registryOperation [ProcessId <Int32?>]: Process ID (PID) of the process that modified the registry key (process details will appear in the alert 'processes' collection). [ValueData <String>]: Current (i.e. changed) registry key value data (contents). [ValueName <String>]: Current (i.e. changed) registry key value name [ValueType <String>]: registryValueType [SecurityResources <IMicrosoftGraphSecurityResource[]>]: Resources related to current alert. For example, for some alerts this can have the Azure Resource value. [Resource <String>]: Name of the resource that is related to current alert. Required. [ResourceType <String>]: securityResourceType [Severity <String>]: alertSeverity [SourceMaterials <String[]>]: Hyperlinks (URIs) to the source material related to the alert, for example, provider's user interface for alerts or log search, etc. [Status <String>]: alertStatus [Tags <String[]>]: User-definable labels that can be applied to an alert and can serve as filter conditions (for example 'HVA', 'SAW', etc.) (supports update). [Title <String>]: Alert title. Required. [Triggers <IMicrosoftGraphAlertTrigger[]>]: Security-related information about the specific properties that triggered the alert (properties appearing in the alert). Alerts might contain information about multiple users, hosts, files, ip addresses. This field indicates which properties triggered the alert generation. [Name <String>]: Name of the property serving as a detection trigger. [Type <String>]: Type of the property in the key:value pair for interpretation. For example, String, Boolean, etc. [Value <String>]: Value of the property serving as a detection trigger. [UserStates <IMicrosoftGraphUserSecurityState[]>]: Security-related stateful information generated by the provider about the user accounts related to this alert. [AadUserId <String>]: AAD User object identifier (GUID) - represents the physical/multi-account user entity. [AccountName <String>]: Account name of user account (without Active Directory domain or DNS domain) - (also called mailNickName). [DomainName <String>]: NetBIOS/Active Directory domain of user account (that is, domain/account format). [EmailRole <String>]: emailRole [IsVpn <Boolean?>]: Indicates whether the user logged on through a VPN. [LogonDateTime <DateTime?>]: Time at which the sign-in occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [LogonIP <String>]: IP Address the sign-in request originated from. [LogonId <String>]: User sign-in ID. [LogonLocation <String>]: Location (by IP address mapping) associated with a user sign-in event by this user. [LogonType <String>]: logonType [OnPremisesSecurityIdentifier <String>]: Active Directory (on-premises) Security Identifier (SID) of the user. [RiskScore <String>]: Provider-generated/calculated risk score of the user account. Recommended value range of 0-1, which equates to a percentage. [UserAccountType <String>]: userAccountSecurityType [UserPrincipalName <String>]: User sign-in name - internet format: (user account name)@(user account DNS domain name). [VendorInformation <IMicrosoftGraphSecurityVendorInformation>]: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required [VulnerabilityStates <IMicrosoftGraphVulnerabilityState[]>]: Threat intelligence pertaining to one or more vulnerabilities related to this alert. [Cve <String>]: Common Vulnerabilities and Exposures (CVE) for the vulnerability. [Severity <String>]: Base Common Vulnerability Scoring System (CVSS) severity score for this vulnerability. [WasRunning <Boolean?>]: Indicates whether the detected vulnerability (file) was running at the time of detection or was the file detected at rest on the disk. CLOUDAPPSTATES <IMicrosoftGraphCloudAppSecurityState[]>: Security-related stateful information generated by the provider about the cloud application/s related to this alert. [DestinationServiceIP <String>]: Destination IP Address of the connection to the cloud application/service. [DestinationServiceName <String>]: Cloud application/service name (for example 'Salesforce', 'DropBox', etc.). [RiskScore <String>]: Provider-generated/calculated risk score of the Cloud Application/Service. Recommended value range of 0-1, which equates to a percentage. FILESTATES <IMicrosoftGraphFileSecurityState[]>: Security-related stateful information generated by the provider about the file(s) related to this alert. [FileHash <IMicrosoftGraphFileHash>]: fileHash [(Any) <Object>]: This indicates any property can be added to this object. [HashType <String>]: fileHashType [HashValue <String>]: Value of the file hash. [Name <String>]: File name (without path). [Path <String>]: Full file path of the file/imageFile. [RiskScore <String>]: Provider generated/calculated risk score of the alert file. Recommended value range of 0-1, which equates to a percentage. HISTORYSTATES <IMicrosoftGraphAlertHistoryState[]>: . [AppId <String>]: [AssignedTo <String>]: [Comments <String[]>]: [Feedback <String>]: alertFeedback [Status <String>]: alertStatus [UpdatedDateTime <DateTime?>]: [User <String>]: HOSTSTATES <IMicrosoftGraphHostSecurityState[]>: Security-related stateful information generated by the provider about the host(s) related to this alert. [Fqdn <String>]: Host FQDN (Fully Qualified Domain Name) (for example, machine.company.com). [IsAzureAdJoined <Boolean?>]: [IsAzureAdRegistered <Boolean?>]: [IsHybridAzureDomainJoined <Boolean?>]: True if the host is domain joined to an on-premises Active Directory domain. [NetBiosName <String>]: The local host name, without the DNS domain name. [OS <String>]: Host Operating System. (For example, Windows10, MacOS, RHEL, etc.). [PrivateIPAddress <String>]: Private (not routable) IPv4 or IPv6 address (see RFC 1918) at the time of the alert. [PublicIPAddress <String>]: Publicly routable IPv4 or IPv6 address (see RFC 1918) at time of the alert. [RiskScore <String>]: Provider-generated/calculated risk score of the host. Recommended value range of 0-1, which equates to a percentage. MALWARESTATES <IMicrosoftGraphMalwareState[]>: Threat Intelligence pertaining to malware related to this alert. [Category <String>]: Provider-generated malware category (for example, trojan, ransomware, etc.). [Family <String>]: Provider-generated malware family (for example, 'wannacry', 'notpetya', etc.). [Name <String>]: Provider-generated malware variant name (for example, Trojan:Win32/Powessere.H). [Severity <String>]: Provider-determined severity of this malware. [WasRunning <Boolean?>]: Indicates whether the detected file (malware/vulnerability) was running at the time of detection or was detected at rest on the disk. NETWORKCONNECTIONS <IMicrosoftGraphNetworkConnection[]>: Security-related stateful information generated by the provider about the network connection(s) related to this alert. [ApplicationName <String>]: Name of the application managing the network connection (for example, Facebook or SMTP). [DestinationAddress <String>]: Destination IP address (of the network connection). [DestinationDomain <String>]: Destination domain portion of the destination URL. (for example 'www.contoso.com'). [DestinationLocation <String>]: Location (by IP address mapping) associated with the destination of a network connection. [DestinationPort <String>]: Destination port (of the network connection). [DestinationUrl <String>]: Network connection URL/URI string - excluding parameters. (for example 'www.contoso.com/products/default.html') [Direction <String>]: connectionDirection [DomainRegisteredDateTime <DateTime?>]: Date when the destination domain was registered. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z' [LocalDnsName <String>]: The local DNS name resolution as it appears in the host's local DNS cache (for example, in case the 'hosts' file was tampered with). [NatDestinationAddress <String>]: Network Address Translation destination IP address. [NatDestinationPort <String>]: Network Address Translation destination port. [NatSourceAddress <String>]: Network Address Translation source IP address. [NatSourcePort <String>]: Network Address Translation source port. [Protocol <String>]: securityNetworkProtocol [RiskScore <String>]: Provider generated/calculated risk score of the network connection. Recommended value range of 0-1, which equates to a percentage. [SourceAddress <String>]: Source (i.e. origin) IP address (of the network connection). [SourceLocation <String>]: Location (by IP address mapping) associated with the source of a network connection. [SourcePort <String>]: Source (i.e. origin) IP port (of the network connection). [Status <String>]: connectionStatus [UrlParameters <String>]: Parameters (suffix) of the destination URL. PROCESSES <IMicrosoftGraphProcess[]>: Security-related stateful information generated by the provider about the process or processes related to this alert. [AccountName <String>]: User account identifier (user account context the process ran under) for example, AccountName, SID, and so on. [CommandLine <String>]: The full process invocation commandline including all parameters. [CreatedDateTime <DateTime?>]: Time at which the process was started. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [FileHash <IMicrosoftGraphFileHash>]: fileHash [(Any) <Object>]: This indicates any property can be added to this object. [HashType <String>]: fileHashType [HashValue <String>]: Value of the file hash. [IntegrityLevel <String>]: processIntegrityLevel [IsElevated <Boolean?>]: True if the process is elevated. [Name <String>]: The name of the process' Image file. [ParentProcessCreatedDateTime <DateTime?>]: DateTime at which the parent process was started. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [ParentProcessId <Int32?>]: The Process ID (PID) of the parent process. [ParentProcessName <String>]: The name of the image file of the parent process. [Path <String>]: Full path, including filename. [ProcessId <Int32?>]: The Process ID (PID) of the process. REGISTRYKEYSTATES <IMicrosoftGraphRegistryKeyState[]>: Security-related stateful information generated by the provider about the registry keys related to this alert. [Hive <String>]: registryHive [Key <String>]: Current (i.e. changed) registry key (excludes HIVE). [OldKey <String>]: Previous (i.e. before changed) registry key (excludes HIVE). [OldValueData <String>]: Previous (i.e. before changed) registry key value data (contents). [OldValueName <String>]: Previous (i.e. before changed) registry key value name. [Operation <String>]: registryOperation [ProcessId <Int32?>]: Process ID (PID) of the process that modified the registry key (process details will appear in the alert 'processes' collection). [ValueData <String>]: Current (i.e. changed) registry key value data (contents). [ValueName <String>]: Current (i.e. changed) registry key value name [ValueType <String>]: registryValueType SECURITYRESOURCES <IMicrosoftGraphSecurityResource[]>: Resources related to current alert. For example, for some alerts this can have the Azure Resource value. [Resource <String>]: Name of the resource that is related to current alert. Required. [ResourceType <String>]: securityResourceType TRIGGERS <IMicrosoftGraphAlertTrigger[]>: Security-related information about the specific properties that triggered the alert (properties appearing in the alert). Alerts might contain information about multiple users, hosts, files, ip addresses. This field indicates which properties triggered the alert generation. [Name <String>]: Name of the property serving as a detection trigger. [Type <String>]: Type of the property in the key:value pair for interpretation. For example, String, Boolean, etc. [Value <String>]: Value of the property serving as a detection trigger. USERSTATES <IMicrosoftGraphUserSecurityState[]>: Security-related stateful information generated by the provider about the user accounts related to this alert. [AadUserId <String>]: AAD User object identifier (GUID) - represents the physical/multi-account user entity. [AccountName <String>]: Account name of user account (without Active Directory domain or DNS domain) - (also called mailNickName). [DomainName <String>]: NetBIOS/Active Directory domain of user account (that is, domain/account format). [EmailRole <String>]: emailRole [IsVpn <Boolean?>]: Indicates whether the user logged on through a VPN. [LogonDateTime <DateTime?>]: Time at which the sign-in occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [LogonIP <String>]: IP Address the sign-in request originated from. [LogonId <String>]: User sign-in ID. [LogonLocation <String>]: Location (by IP address mapping) associated with a user sign-in event by this user. [LogonType <String>]: logonType [OnPremisesSecurityIdentifier <String>]: Active Directory (on-premises) Security Identifier (SID) of the user. [RiskScore <String>]: Provider-generated/calculated risk score of the user account. Recommended value range of 0-1, which equates to a percentage. [UserAccountType <String>]: userAccountSecurityType [UserPrincipalName <String>]: User sign-in name - internet format: (user account name)@(user account DNS domain name). VENDORINFORMATION <IMicrosoftGraphSecurityVendorInformation>: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required VULNERABILITYSTATES <IMicrosoftGraphVulnerabilityState[]>: Threat intelligence pertaining to one or more vulnerabilities related to this alert. [Cve <String>]: Common Vulnerabilities and Exposures (CVE) for the vulnerability. [Severity <String>]: Base Common Vulnerability Scoring System (CVSS) severity score for this vulnerability. [WasRunning <Boolean?>]: Indicates whether the detected vulnerability (file) was running at the time of detection or was the file detected at rest on the disk. .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/new-mgsecurityalert #> function New-MgSecurityAlert { [OutputType([Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlert])] [CmdletBinding(DefaultParameterSetName='CreateExpanded1', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Create1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlert] # alert # To construct, see NOTES section for BODYPARAMETER properties and create a hash table. ${BodyParameter}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Name or alias of the activity group (attacker) this alert is attributed to. ${ActivityGroupName}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Collections.Hashtable] # Additional Parameters ${AdditionalProperties}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Name of the analyst the alert is assigned to for triage, investigation, or remediation (supports update). ${AssignedTo}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Azure subscription ID, present if this alert is related to an Azure resource. ${AzureSubscriptionId}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Azure Active Directory tenant ID. # Required. ${AzureTenantId}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Category of the alert (for example, credentialTheft, ransomware, etc.). ${Category}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # Time at which the alert was closed. # The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. # For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z' (supports update). ${ClosedDateTime}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphCloudAppSecurityState[]] # Security-related stateful information generated by the provider about the cloud application/s related to this alert. # To construct, see NOTES section for CLOUDAPPSTATES properties and create a hash table. ${CloudAppStates}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # Customer-provided comments on alert (for customer alert management) (supports update). ${Comments}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Int32] # Confidence of the detection logic (percentage between 1-100). ${Confidence}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # Time at which the alert was created by the alert provider. # The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. # For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. # Required. ${CreatedDateTime}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Alert description. ${Description}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # Set of alerts related to this alert entity (each alert is pushed to the SIEM as a separate record). ${DetectionIds}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # Time at which the event(s) that served as the trigger(s) to generate the alert occurred. # The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. # For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. # Required. ${EventDateTime}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # alertFeedback ${Feedback}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphFileSecurityState[]] # Security-related stateful information generated by the provider about the file(s) related to this alert. # To construct, see NOTES section for FILESTATES properties and create a hash table. ${FileStates}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlertHistoryState[]] # . # To construct, see NOTES section for HISTORYSTATES properties and create a hash table. ${HistoryStates}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphHostSecurityState[]] # Security-related stateful information generated by the provider about the host(s) related to this alert. # To construct, see NOTES section for HOSTSTATES properties and create a hash table. ${HostStates}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Read-only. ${Id}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # IDs of incidents related to current alert. ${IncidentIds}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # Time at which the alert entity was last modified. # The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. # For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. ${LastModifiedDateTime}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphMalwareState[]] # Threat Intelligence pertaining to malware related to this alert. # To construct, see NOTES section for MALWARESTATES properties and create a hash table. ${MalwareStates}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphNetworkConnection[]] # Security-related stateful information generated by the provider about the network connection(s) related to this alert. # To construct, see NOTES section for NETWORKCONNECTIONS properties and create a hash table. ${NetworkConnections}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphProcess[]] # Security-related stateful information generated by the provider about the process or processes related to this alert. # To construct, see NOTES section for PROCESSES properties and create a hash table. ${Processes}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # Vendor/provider recommended action(s) to take as a result of the alert (for example, isolate machine, enforce2FA, reimage host). ${RecommendedActions}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphRegistryKeyState[]] # Security-related stateful information generated by the provider about the registry keys related to this alert. # To construct, see NOTES section for REGISTRYKEYSTATES properties and create a hash table. ${RegistryKeyStates}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecurityResource[]] # Resources related to current alert. # For example, for some alerts this can have the Azure Resource value. # To construct, see NOTES section for SECURITYRESOURCES properties and create a hash table. ${SecurityResources}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # alertSeverity ${Severity}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # Hyperlinks (URIs) to the source material related to the alert, for example, provider's user interface for alerts or log search, etc. ${SourceMaterials}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # alertStatus ${Status}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # User-definable labels that can be applied to an alert and can serve as filter conditions (for example 'HVA', 'SAW', etc.) (supports update). ${Tags}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Alert title. # Required. ${Title}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlertTrigger[]] # Security-related information about the specific properties that triggered the alert (properties appearing in the alert). # Alerts might contain information about multiple users, hosts, files, ip addresses. # This field indicates which properties triggered the alert generation. # To construct, see NOTES section for TRIGGERS properties and create a hash table. ${Triggers}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphUserSecurityState[]] # Security-related stateful information generated by the provider about the user accounts related to this alert. # To construct, see NOTES section for USERSTATES properties and create a hash table. ${UserStates}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecurityVendorInformation] # securityVendorInformation # To construct, see NOTES section for VENDORINFORMATION properties and create a hash table. ${VendorInformation}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphVulnerabilityState[]] # Threat intelligence pertaining to one or more vulnerabilities related to this alert. # To construct, see NOTES section for VULNERABILITYSTATES properties and create a hash table. ${VulnerabilityStates}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Create1 = 'Microsoft.Graph.Security.private\New-MgSecurityAlert_Create1'; CreateExpanded1 = 'Microsoft.Graph.Security.private\New-MgSecurityAlert_CreateExpanded1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Create new navigation property to secureScoreControlProfiles for Security .Description Create new navigation property to secureScoreControlProfiles for Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScoreControlProfile .Outputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScoreControlProfile .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. BODYPARAMETER <IMicrosoftGraphSecureScoreControlProfile>: secureScoreControlProfile [(Any) <Object>]: This indicates any property can be added to this object. [Id <String>]: Read-only. [ActionType <String>]: Control action type (Config, Review, Behavior). [ActionUrl <String>]: URL to where the control can be actioned. [AzureTenantId <String>]: GUID string for tenant ID. [ComplianceInformation <IMicrosoftGraphComplianceInformation[]>]: [CertificationControls <IMicrosoftGraphCertificationControl[]>]: Collection of the certification controls associated with certification [Name <String>]: Certification control name [Url <String>]: URL for the Microsoft Service Trust Portal [CertificationName <String>]: Compliance certification name (for example, ISO 27018:2014, GDPR, FedRAMP, NIST 800-171) [ControlCategory <String>]: Control action category (Identity, Data, Device, Apps, Infrastructure). [ControlStateUpdates <IMicrosoftGraphSecureScoreControlStateUpdate[]>]: [AssignedTo <String>]: Assigns the control to the user who will take the action. [Comment <String>]: Provides optional comment about the control. [State <String>]: State of the control, which can be modified via a PATCH command (for example, ignored, thirdParty). [UpdatedBy <String>]: ID of the user who updated tenant state. [UpdatedDateTime <DateTime?>]: Time at which the control state was updated. [Deprecated <Boolean?>]: Flag to indicate if a control is depreciated. [ImplementationCost <String>]: Resource cost of implemmentating control (low, moderate, high). [LastModifiedDateTime <DateTime?>]: Time at which the control profile entity was last modified. The Timestamp type represents date and time [MaxScore <Double?>]: max attainable score for the control. [Rank <Int32?>]: Microsoft's stack ranking of control. [Remediation <String>]: Description of what the control will help remediate. [RemediationImpact <String>]: Description of the impact on users of the remediation. [Service <String>]: Service that owns the control (Exchange, Sharepoint, Azure AD). [Threats <String[]>]: List of threats the control mitigates (accountBreach,dataDeletion,dataExfiltration,dataSpillage, [Tier <String>]: [Title <String>]: Title of the control. [UserImpact <String>]: [VendorInformation <IMicrosoftGraphSecurityVendorInformation>]: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required COMPLIANCEINFORMATION <IMicrosoftGraphComplianceInformation[]>: . [CertificationControls <IMicrosoftGraphCertificationControl[]>]: Collection of the certification controls associated with certification [Name <String>]: Certification control name [Url <String>]: URL for the Microsoft Service Trust Portal [CertificationName <String>]: Compliance certification name (for example, ISO 27018:2014, GDPR, FedRAMP, NIST 800-171) CONTROLSTATEUPDATES <IMicrosoftGraphSecureScoreControlStateUpdate[]>: . [AssignedTo <String>]: Assigns the control to the user who will take the action. [Comment <String>]: Provides optional comment about the control. [State <String>]: State of the control, which can be modified via a PATCH command (for example, ignored, thirdParty). [UpdatedBy <String>]: ID of the user who updated tenant state. [UpdatedDateTime <DateTime?>]: Time at which the control state was updated. VENDORINFORMATION <IMicrosoftGraphSecurityVendorInformation>: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/new-mgsecuritysecurescorecontrolprofile #> function New-MgSecuritySecureScoreControlProfile { [OutputType([Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScoreControlProfile])] [CmdletBinding(DefaultParameterSetName='CreateExpanded1', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Create1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScoreControlProfile] # secureScoreControlProfile # To construct, see NOTES section for BODYPARAMETER properties and create a hash table. ${BodyParameter}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Control action type (Config, Review, Behavior). ${ActionType}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # URL to where the control can be actioned. ${ActionUrl}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Collections.Hashtable] # Additional Parameters ${AdditionalProperties}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # GUID string for tenant ID. ${AzureTenantId}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphComplianceInformation[]] # . # To construct, see NOTES section for COMPLIANCEINFORMATION properties and create a hash table. ${ComplianceInformation}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Control action category (Identity, Data, Device, Apps, Infrastructure). ${ControlCategory}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScoreControlStateUpdate[]] # . # To construct, see NOTES section for CONTROLSTATEUPDATES properties and create a hash table. ${ControlStateUpdates}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Management.Automation.SwitchParameter] # Flag to indicate if a control is depreciated. ${Deprecated}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Read-only. ${Id}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Resource cost of implemmentating control (low, moderate, high). ${ImplementationCost}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # Time at which the control profile entity was last modified. # The Timestamp type represents date and time ${LastModifiedDateTime}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Double] # max attainable score for the control. ${MaxScore}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Int32] # Microsoft's stack ranking of control. ${Rank}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Description of what the control will help remediate. ${Remediation}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Description of the impact on users of the remediation. ${RemediationImpact}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Service that owns the control (Exchange, Sharepoint, Azure AD). ${Service}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # List of threats the control mitigates (accountBreach,dataDeletion,dataExfiltration,dataSpillage, ${Threats}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # . ${Tier}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Title of the control. ${Title}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # . ${UserImpact}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecurityVendorInformation] # securityVendorInformation # To construct, see NOTES section for VENDORINFORMATION properties and create a hash table. ${VendorInformation}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Create1 = 'Microsoft.Graph.Security.private\New-MgSecuritySecureScoreControlProfile_Create1'; CreateExpanded1 = 'Microsoft.Graph.Security.private\New-MgSecuritySecureScoreControlProfile_CreateExpanded1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Create new navigation property to secureScores for Security .Description Create new navigation property to secureScores for Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScore .Outputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScore .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. AVERAGECOMPARATIVESCORES <IMicrosoftGraphAverageComparativeScore[]>: Average score by different scopes (for example, average by industry, average by seating) and control category (Identity, Data, Device, Apps, Infrastructure) within the scope. [AverageScore <Double?>]: Average score within specified basis. [Basis <String>]: Scope type. The possible values are: AllTenants, TotalSeats, IndustryTypes. BODYPARAMETER <IMicrosoftGraphSecureScore>: secureScore [(Any) <Object>]: This indicates any property can be added to this object. [Id <String>]: Read-only. [ActiveUserCount <Int32?>]: Active user count of the given tenant. [AverageComparativeScores <IMicrosoftGraphAverageComparativeScore[]>]: Average score by different scopes (for example, average by industry, average by seating) and control category (Identity, Data, Device, Apps, Infrastructure) within the scope. [AverageScore <Double?>]: Average score within specified basis. [Basis <String>]: Scope type. The possible values are: AllTenants, TotalSeats, IndustryTypes. [AzureTenantId <String>]: GUID string for tenant ID. [ControlScores <IMicrosoftGraphControlScore[]>]: Contains tenant scores for a set of controls. [ControlCategory <String>]: Control action category (Identity, Data, Device, Apps, Infrastructure). [ControlName <String>]: Control unique name. [Description <String>]: Description of the control. [Score <Double?>]: Tenant achieved score for the control (it varies day by day depending on tenant operations on the control). [CreatedDateTime <DateTime?>]: The date when the entity is created. [CurrentScore <Double?>]: Tenant current attained score on specified date. [EnabledServices <String[]>]: Microsoft-provided services for the tenant (for example, Exchange online, Skype, Sharepoint). [LicensedUserCount <Int32?>]: Licensed user count of the given tenant. [MaxScore <Double?>]: Tenant maximum possible score on specified date. [VendorInformation <IMicrosoftGraphSecurityVendorInformation>]: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required CONTROLSCORES <IMicrosoftGraphControlScore[]>: Contains tenant scores for a set of controls. [ControlCategory <String>]: Control action category (Identity, Data, Device, Apps, Infrastructure). [ControlName <String>]: Control unique name. [Description <String>]: Description of the control. [Score <Double?>]: Tenant achieved score for the control (it varies day by day depending on tenant operations on the control). VENDORINFORMATION <IMicrosoftGraphSecurityVendorInformation>: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/new-mgsecuritysecurescore #> function New-MgSecuritySecureScore { [OutputType([Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScore])] [CmdletBinding(DefaultParameterSetName='CreateExpanded1', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Create1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScore] # secureScore # To construct, see NOTES section for BODYPARAMETER properties and create a hash table. ${BodyParameter}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Int32] # Active user count of the given tenant. ${ActiveUserCount}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Collections.Hashtable] # Additional Parameters ${AdditionalProperties}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAverageComparativeScore[]] # Average score by different scopes (for example, average by industry, average by seating) and control category (Identity, Data, Device, Apps, Infrastructure) within the scope. # To construct, see NOTES section for AVERAGECOMPARATIVESCORES properties and create a hash table. ${AverageComparativeScores}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # GUID string for tenant ID. ${AzureTenantId}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphControlScore[]] # Contains tenant scores for a set of controls. # To construct, see NOTES section for CONTROLSCORES properties and create a hash table. ${ControlScores}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # The date when the entity is created. ${CreatedDateTime}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Double] # Tenant current attained score on specified date. ${CurrentScore}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # Microsoft-provided services for the tenant (for example, Exchange online, Skype, Sharepoint). ${EnabledServices}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Read-only. ${Id}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Int32] # Licensed user count of the given tenant. ${LicensedUserCount}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Double] # Tenant maximum possible score on specified date. ${MaxScore}, [Parameter(ParameterSetName='CreateExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecurityVendorInformation] # securityVendorInformation # To construct, see NOTES section for VENDORINFORMATION properties and create a hash table. ${VendorInformation}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Create1 = 'Microsoft.Graph.Security.private\New-MgSecuritySecureScore_Create1'; CreateExpanded1 = 'Microsoft.Graph.Security.private\New-MgSecuritySecureScore_CreateExpanded1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Delete navigation property alerts for Security .Description Delete navigation property alerts for Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.ISecurityIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <ISecurityIdentity>: Identity Parameter [AlertId <String>]: key: id of alert [CloudAppSecurityProfileId <String>]: key: id of cloudAppSecurityProfile [DomainSecurityProfileId <String>]: key: id of domainSecurityProfile [FileSecurityProfileId <String>]: key: id of fileSecurityProfile [HostSecurityProfileId <String>]: key: id of hostSecurityProfile [IPSecurityProfileId <String>]: key: id of ipSecurityProfile [ProviderTenantSettingId <String>]: key: id of providerTenantSetting [SecureScoreControlProfileId <String>]: key: id of secureScoreControlProfile [SecureScoreId <String>]: key: id of secureScore [SecurityActionId <String>]: key: id of securityAction [TiIndicatorId <String>]: key: id of tiIndicator [UserSecurityProfileId <String>]: key: id of userSecurityProfile .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/remove-mgsecurityalert #> function Remove-MgSecurityAlert { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='Delete1', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Delete1', Mandatory)] [Microsoft.Graph.PowerShell.Category('Path')] [System.String] # key: id of alert ${AlertId}, [Parameter(ParameterSetName='DeleteViaIdentity1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Path')] [Microsoft.Graph.PowerShell.Models.ISecurityIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Microsoft.Graph.PowerShell.Category('Header')] [System.String] # ETag ${IfMatch}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Delete1 = 'Microsoft.Graph.Security.private\Remove-MgSecurityAlert_Delete1'; DeleteViaIdentity1 = 'Microsoft.Graph.Security.private\Remove-MgSecurityAlert_DeleteViaIdentity1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Delete navigation property secureScoreControlProfiles for Security .Description Delete navigation property secureScoreControlProfiles for Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.ISecurityIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <ISecurityIdentity>: Identity Parameter [AlertId <String>]: key: id of alert [CloudAppSecurityProfileId <String>]: key: id of cloudAppSecurityProfile [DomainSecurityProfileId <String>]: key: id of domainSecurityProfile [FileSecurityProfileId <String>]: key: id of fileSecurityProfile [HostSecurityProfileId <String>]: key: id of hostSecurityProfile [IPSecurityProfileId <String>]: key: id of ipSecurityProfile [ProviderTenantSettingId <String>]: key: id of providerTenantSetting [SecureScoreControlProfileId <String>]: key: id of secureScoreControlProfile [SecureScoreId <String>]: key: id of secureScore [SecurityActionId <String>]: key: id of securityAction [TiIndicatorId <String>]: key: id of tiIndicator [UserSecurityProfileId <String>]: key: id of userSecurityProfile .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/remove-mgsecuritysecurescorecontrolprofile #> function Remove-MgSecuritySecureScoreControlProfile { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='Delete1', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Delete1', Mandatory)] [Microsoft.Graph.PowerShell.Category('Path')] [System.String] # key: id of secureScoreControlProfile ${SecureScoreControlProfileId}, [Parameter(ParameterSetName='DeleteViaIdentity1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Path')] [Microsoft.Graph.PowerShell.Models.ISecurityIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Microsoft.Graph.PowerShell.Category('Header')] [System.String] # ETag ${IfMatch}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Delete1 = 'Microsoft.Graph.Security.private\Remove-MgSecuritySecureScoreControlProfile_Delete1'; DeleteViaIdentity1 = 'Microsoft.Graph.Security.private\Remove-MgSecuritySecureScoreControlProfile_DeleteViaIdentity1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Delete navigation property secureScores for Security .Description Delete navigation property secureScores for Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.ISecurityIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <ISecurityIdentity>: Identity Parameter [AlertId <String>]: key: id of alert [CloudAppSecurityProfileId <String>]: key: id of cloudAppSecurityProfile [DomainSecurityProfileId <String>]: key: id of domainSecurityProfile [FileSecurityProfileId <String>]: key: id of fileSecurityProfile [HostSecurityProfileId <String>]: key: id of hostSecurityProfile [IPSecurityProfileId <String>]: key: id of ipSecurityProfile [ProviderTenantSettingId <String>]: key: id of providerTenantSetting [SecureScoreControlProfileId <String>]: key: id of secureScoreControlProfile [SecureScoreId <String>]: key: id of secureScore [SecurityActionId <String>]: key: id of securityAction [TiIndicatorId <String>]: key: id of tiIndicator [UserSecurityProfileId <String>]: key: id of userSecurityProfile .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/remove-mgsecuritysecurescore #> function Remove-MgSecuritySecureScore { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='Delete1', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Delete1', Mandatory)] [Microsoft.Graph.PowerShell.Category('Path')] [System.String] # key: id of secureScore ${SecureScoreId}, [Parameter(ParameterSetName='DeleteViaIdentity1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Path')] [Microsoft.Graph.PowerShell.Models.ISecurityIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Microsoft.Graph.PowerShell.Category('Header')] [System.String] # ETag ${IfMatch}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Delete1 = 'Microsoft.Graph.Security.private\Remove-MgSecuritySecureScore_Delete1'; DeleteViaIdentity1 = 'Microsoft.Graph.Security.private\Remove-MgSecuritySecureScore_DeleteViaIdentity1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Update the navigation property alerts in Security .Description Update the navigation property alerts in Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlert .Inputs Microsoft.Graph.PowerShell.Models.ISecurityIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. BODYPARAMETER <IMicrosoftGraphAlert>: alert [(Any) <Object>]: This indicates any property can be added to this object. [Id <String>]: Read-only. [ActivityGroupName <String>]: Name or alias of the activity group (attacker) this alert is attributed to. [AssignedTo <String>]: Name of the analyst the alert is assigned to for triage, investigation, or remediation (supports update). [AzureSubscriptionId <String>]: Azure subscription ID, present if this alert is related to an Azure resource. [AzureTenantId <String>]: Azure Active Directory tenant ID. Required. [Category <String>]: Category of the alert (for example, credentialTheft, ransomware, etc.). [ClosedDateTime <DateTime?>]: Time at which the alert was closed. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z' (supports update). [CloudAppStates <IMicrosoftGraphCloudAppSecurityState[]>]: Security-related stateful information generated by the provider about the cloud application/s related to this alert. [DestinationServiceIP <String>]: Destination IP Address of the connection to the cloud application/service. [DestinationServiceName <String>]: Cloud application/service name (for example 'Salesforce', 'DropBox', etc.). [RiskScore <String>]: Provider-generated/calculated risk score of the Cloud Application/Service. Recommended value range of 0-1, which equates to a percentage. [Comments <String[]>]: Customer-provided comments on alert (for customer alert management) (supports update). [Confidence <Int32?>]: Confidence of the detection logic (percentage between 1-100). [CreatedDateTime <DateTime?>]: Time at which the alert was created by the alert provider. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. Required. [Description <String>]: Alert description. [DetectionIds <String[]>]: Set of alerts related to this alert entity (each alert is pushed to the SIEM as a separate record). [EventDateTime <DateTime?>]: Time at which the event(s) that served as the trigger(s) to generate the alert occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. Required. [Feedback <String>]: alertFeedback [FileStates <IMicrosoftGraphFileSecurityState[]>]: Security-related stateful information generated by the provider about the file(s) related to this alert. [FileHash <IMicrosoftGraphFileHash>]: fileHash [(Any) <Object>]: This indicates any property can be added to this object. [HashType <String>]: fileHashType [HashValue <String>]: Value of the file hash. [Name <String>]: File name (without path). [Path <String>]: Full file path of the file/imageFile. [RiskScore <String>]: Provider generated/calculated risk score of the alert file. Recommended value range of 0-1, which equates to a percentage. [HistoryStates <IMicrosoftGraphAlertHistoryState[]>]: [AppId <String>]: [AssignedTo <String>]: [Comments <String[]>]: [Feedback <String>]: alertFeedback [Status <String>]: alertStatus [UpdatedDateTime <DateTime?>]: [User <String>]: [HostStates <IMicrosoftGraphHostSecurityState[]>]: Security-related stateful information generated by the provider about the host(s) related to this alert. [Fqdn <String>]: Host FQDN (Fully Qualified Domain Name) (for example, machine.company.com). [IsAzureAdJoined <Boolean?>]: [IsAzureAdRegistered <Boolean?>]: [IsHybridAzureDomainJoined <Boolean?>]: True if the host is domain joined to an on-premises Active Directory domain. [NetBiosName <String>]: The local host name, without the DNS domain name. [OS <String>]: Host Operating System. (For example, Windows10, MacOS, RHEL, etc.). [PrivateIPAddress <String>]: Private (not routable) IPv4 or IPv6 address (see RFC 1918) at the time of the alert. [PublicIPAddress <String>]: Publicly routable IPv4 or IPv6 address (see RFC 1918) at time of the alert. [RiskScore <String>]: Provider-generated/calculated risk score of the host. Recommended value range of 0-1, which equates to a percentage. [IncidentIds <String[]>]: IDs of incidents related to current alert. [LastModifiedDateTime <DateTime?>]: Time at which the alert entity was last modified. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [MalwareStates <IMicrosoftGraphMalwareState[]>]: Threat Intelligence pertaining to malware related to this alert. [Category <String>]: Provider-generated malware category (for example, trojan, ransomware, etc.). [Family <String>]: Provider-generated malware family (for example, 'wannacry', 'notpetya', etc.). [Name <String>]: Provider-generated malware variant name (for example, Trojan:Win32/Powessere.H). [Severity <String>]: Provider-determined severity of this malware. [WasRunning <Boolean?>]: Indicates whether the detected file (malware/vulnerability) was running at the time of detection or was detected at rest on the disk. [NetworkConnections <IMicrosoftGraphNetworkConnection[]>]: Security-related stateful information generated by the provider about the network connection(s) related to this alert. [ApplicationName <String>]: Name of the application managing the network connection (for example, Facebook or SMTP). [DestinationAddress <String>]: Destination IP address (of the network connection). [DestinationDomain <String>]: Destination domain portion of the destination URL. (for example 'www.contoso.com'). [DestinationLocation <String>]: Location (by IP address mapping) associated with the destination of a network connection. [DestinationPort <String>]: Destination port (of the network connection). [DestinationUrl <String>]: Network connection URL/URI string - excluding parameters. (for example 'www.contoso.com/products/default.html') [Direction <String>]: connectionDirection [DomainRegisteredDateTime <DateTime?>]: Date when the destination domain was registered. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z' [LocalDnsName <String>]: The local DNS name resolution as it appears in the host's local DNS cache (for example, in case the 'hosts' file was tampered with). [NatDestinationAddress <String>]: Network Address Translation destination IP address. [NatDestinationPort <String>]: Network Address Translation destination port. [NatSourceAddress <String>]: Network Address Translation source IP address. [NatSourcePort <String>]: Network Address Translation source port. [Protocol <String>]: securityNetworkProtocol [RiskScore <String>]: Provider generated/calculated risk score of the network connection. Recommended value range of 0-1, which equates to a percentage. [SourceAddress <String>]: Source (i.e. origin) IP address (of the network connection). [SourceLocation <String>]: Location (by IP address mapping) associated with the source of a network connection. [SourcePort <String>]: Source (i.e. origin) IP port (of the network connection). [Status <String>]: connectionStatus [UrlParameters <String>]: Parameters (suffix) of the destination URL. [Processes <IMicrosoftGraphProcess[]>]: Security-related stateful information generated by the provider about the process or processes related to this alert. [AccountName <String>]: User account identifier (user account context the process ran under) for example, AccountName, SID, and so on. [CommandLine <String>]: The full process invocation commandline including all parameters. [CreatedDateTime <DateTime?>]: Time at which the process was started. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [FileHash <IMicrosoftGraphFileHash>]: fileHash [IntegrityLevel <String>]: processIntegrityLevel [IsElevated <Boolean?>]: True if the process is elevated. [Name <String>]: The name of the process' Image file. [ParentProcessCreatedDateTime <DateTime?>]: DateTime at which the parent process was started. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [ParentProcessId <Int32?>]: The Process ID (PID) of the parent process. [ParentProcessName <String>]: The name of the image file of the parent process. [Path <String>]: Full path, including filename. [ProcessId <Int32?>]: The Process ID (PID) of the process. [RecommendedActions <String[]>]: Vendor/provider recommended action(s) to take as a result of the alert (for example, isolate machine, enforce2FA, reimage host). [RegistryKeyStates <IMicrosoftGraphRegistryKeyState[]>]: Security-related stateful information generated by the provider about the registry keys related to this alert. [Hive <String>]: registryHive [Key <String>]: Current (i.e. changed) registry key (excludes HIVE). [OldKey <String>]: Previous (i.e. before changed) registry key (excludes HIVE). [OldValueData <String>]: Previous (i.e. before changed) registry key value data (contents). [OldValueName <String>]: Previous (i.e. before changed) registry key value name. [Operation <String>]: registryOperation [ProcessId <Int32?>]: Process ID (PID) of the process that modified the registry key (process details will appear in the alert 'processes' collection). [ValueData <String>]: Current (i.e. changed) registry key value data (contents). [ValueName <String>]: Current (i.e. changed) registry key value name [ValueType <String>]: registryValueType [SecurityResources <IMicrosoftGraphSecurityResource[]>]: Resources related to current alert. For example, for some alerts this can have the Azure Resource value. [Resource <String>]: Name of the resource that is related to current alert. Required. [ResourceType <String>]: securityResourceType [Severity <String>]: alertSeverity [SourceMaterials <String[]>]: Hyperlinks (URIs) to the source material related to the alert, for example, provider's user interface for alerts or log search, etc. [Status <String>]: alertStatus [Tags <String[]>]: User-definable labels that can be applied to an alert and can serve as filter conditions (for example 'HVA', 'SAW', etc.) (supports update). [Title <String>]: Alert title. Required. [Triggers <IMicrosoftGraphAlertTrigger[]>]: Security-related information about the specific properties that triggered the alert (properties appearing in the alert). Alerts might contain information about multiple users, hosts, files, ip addresses. This field indicates which properties triggered the alert generation. [Name <String>]: Name of the property serving as a detection trigger. [Type <String>]: Type of the property in the key:value pair for interpretation. For example, String, Boolean, etc. [Value <String>]: Value of the property serving as a detection trigger. [UserStates <IMicrosoftGraphUserSecurityState[]>]: Security-related stateful information generated by the provider about the user accounts related to this alert. [AadUserId <String>]: AAD User object identifier (GUID) - represents the physical/multi-account user entity. [AccountName <String>]: Account name of user account (without Active Directory domain or DNS domain) - (also called mailNickName). [DomainName <String>]: NetBIOS/Active Directory domain of user account (that is, domain/account format). [EmailRole <String>]: emailRole [IsVpn <Boolean?>]: Indicates whether the user logged on through a VPN. [LogonDateTime <DateTime?>]: Time at which the sign-in occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [LogonIP <String>]: IP Address the sign-in request originated from. [LogonId <String>]: User sign-in ID. [LogonLocation <String>]: Location (by IP address mapping) associated with a user sign-in event by this user. [LogonType <String>]: logonType [OnPremisesSecurityIdentifier <String>]: Active Directory (on-premises) Security Identifier (SID) of the user. [RiskScore <String>]: Provider-generated/calculated risk score of the user account. Recommended value range of 0-1, which equates to a percentage. [UserAccountType <String>]: userAccountSecurityType [UserPrincipalName <String>]: User sign-in name - internet format: (user account name)@(user account DNS domain name). [VendorInformation <IMicrosoftGraphSecurityVendorInformation>]: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required [VulnerabilityStates <IMicrosoftGraphVulnerabilityState[]>]: Threat intelligence pertaining to one or more vulnerabilities related to this alert. [Cve <String>]: Common Vulnerabilities and Exposures (CVE) for the vulnerability. [Severity <String>]: Base Common Vulnerability Scoring System (CVSS) severity score for this vulnerability. [WasRunning <Boolean?>]: Indicates whether the detected vulnerability (file) was running at the time of detection or was the file detected at rest on the disk. CLOUDAPPSTATES <IMicrosoftGraphCloudAppSecurityState[]>: Security-related stateful information generated by the provider about the cloud application/s related to this alert. [DestinationServiceIP <String>]: Destination IP Address of the connection to the cloud application/service. [DestinationServiceName <String>]: Cloud application/service name (for example 'Salesforce', 'DropBox', etc.). [RiskScore <String>]: Provider-generated/calculated risk score of the Cloud Application/Service. Recommended value range of 0-1, which equates to a percentage. FILESTATES <IMicrosoftGraphFileSecurityState[]>: Security-related stateful information generated by the provider about the file(s) related to this alert. [FileHash <IMicrosoftGraphFileHash>]: fileHash [(Any) <Object>]: This indicates any property can be added to this object. [HashType <String>]: fileHashType [HashValue <String>]: Value of the file hash. [Name <String>]: File name (without path). [Path <String>]: Full file path of the file/imageFile. [RiskScore <String>]: Provider generated/calculated risk score of the alert file. Recommended value range of 0-1, which equates to a percentage. HISTORYSTATES <IMicrosoftGraphAlertHistoryState[]>: . [AppId <String>]: [AssignedTo <String>]: [Comments <String[]>]: [Feedback <String>]: alertFeedback [Status <String>]: alertStatus [UpdatedDateTime <DateTime?>]: [User <String>]: HOSTSTATES <IMicrosoftGraphHostSecurityState[]>: Security-related stateful information generated by the provider about the host(s) related to this alert. [Fqdn <String>]: Host FQDN (Fully Qualified Domain Name) (for example, machine.company.com). [IsAzureAdJoined <Boolean?>]: [IsAzureAdRegistered <Boolean?>]: [IsHybridAzureDomainJoined <Boolean?>]: True if the host is domain joined to an on-premises Active Directory domain. [NetBiosName <String>]: The local host name, without the DNS domain name. [OS <String>]: Host Operating System. (For example, Windows10, MacOS, RHEL, etc.). [PrivateIPAddress <String>]: Private (not routable) IPv4 or IPv6 address (see RFC 1918) at the time of the alert. [PublicIPAddress <String>]: Publicly routable IPv4 or IPv6 address (see RFC 1918) at time of the alert. [RiskScore <String>]: Provider-generated/calculated risk score of the host. Recommended value range of 0-1, which equates to a percentage. INPUTOBJECT <ISecurityIdentity>: Identity Parameter [AlertId <String>]: key: id of alert [CloudAppSecurityProfileId <String>]: key: id of cloudAppSecurityProfile [DomainSecurityProfileId <String>]: key: id of domainSecurityProfile [FileSecurityProfileId <String>]: key: id of fileSecurityProfile [HostSecurityProfileId <String>]: key: id of hostSecurityProfile [IPSecurityProfileId <String>]: key: id of ipSecurityProfile [ProviderTenantSettingId <String>]: key: id of providerTenantSetting [SecureScoreControlProfileId <String>]: key: id of secureScoreControlProfile [SecureScoreId <String>]: key: id of secureScore [SecurityActionId <String>]: key: id of securityAction [TiIndicatorId <String>]: key: id of tiIndicator [UserSecurityProfileId <String>]: key: id of userSecurityProfile MALWARESTATES <IMicrosoftGraphMalwareState[]>: Threat Intelligence pertaining to malware related to this alert. [Category <String>]: Provider-generated malware category (for example, trojan, ransomware, etc.). [Family <String>]: Provider-generated malware family (for example, 'wannacry', 'notpetya', etc.). [Name <String>]: Provider-generated malware variant name (for example, Trojan:Win32/Powessere.H). [Severity <String>]: Provider-determined severity of this malware. [WasRunning <Boolean?>]: Indicates whether the detected file (malware/vulnerability) was running at the time of detection or was detected at rest on the disk. NETWORKCONNECTIONS <IMicrosoftGraphNetworkConnection[]>: Security-related stateful information generated by the provider about the network connection(s) related to this alert. [ApplicationName <String>]: Name of the application managing the network connection (for example, Facebook or SMTP). [DestinationAddress <String>]: Destination IP address (of the network connection). [DestinationDomain <String>]: Destination domain portion of the destination URL. (for example 'www.contoso.com'). [DestinationLocation <String>]: Location (by IP address mapping) associated with the destination of a network connection. [DestinationPort <String>]: Destination port (of the network connection). [DestinationUrl <String>]: Network connection URL/URI string - excluding parameters. (for example 'www.contoso.com/products/default.html') [Direction <String>]: connectionDirection [DomainRegisteredDateTime <DateTime?>]: Date when the destination domain was registered. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z' [LocalDnsName <String>]: The local DNS name resolution as it appears in the host's local DNS cache (for example, in case the 'hosts' file was tampered with). [NatDestinationAddress <String>]: Network Address Translation destination IP address. [NatDestinationPort <String>]: Network Address Translation destination port. [NatSourceAddress <String>]: Network Address Translation source IP address. [NatSourcePort <String>]: Network Address Translation source port. [Protocol <String>]: securityNetworkProtocol [RiskScore <String>]: Provider generated/calculated risk score of the network connection. Recommended value range of 0-1, which equates to a percentage. [SourceAddress <String>]: Source (i.e. origin) IP address (of the network connection). [SourceLocation <String>]: Location (by IP address mapping) associated with the source of a network connection. [SourcePort <String>]: Source (i.e. origin) IP port (of the network connection). [Status <String>]: connectionStatus [UrlParameters <String>]: Parameters (suffix) of the destination URL. PROCESSES <IMicrosoftGraphProcess[]>: Security-related stateful information generated by the provider about the process or processes related to this alert. [AccountName <String>]: User account identifier (user account context the process ran under) for example, AccountName, SID, and so on. [CommandLine <String>]: The full process invocation commandline including all parameters. [CreatedDateTime <DateTime?>]: Time at which the process was started. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [FileHash <IMicrosoftGraphFileHash>]: fileHash [(Any) <Object>]: This indicates any property can be added to this object. [HashType <String>]: fileHashType [HashValue <String>]: Value of the file hash. [IntegrityLevel <String>]: processIntegrityLevel [IsElevated <Boolean?>]: True if the process is elevated. [Name <String>]: The name of the process' Image file. [ParentProcessCreatedDateTime <DateTime?>]: DateTime at which the parent process was started. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [ParentProcessId <Int32?>]: The Process ID (PID) of the parent process. [ParentProcessName <String>]: The name of the image file of the parent process. [Path <String>]: Full path, including filename. [ProcessId <Int32?>]: The Process ID (PID) of the process. REGISTRYKEYSTATES <IMicrosoftGraphRegistryKeyState[]>: Security-related stateful information generated by the provider about the registry keys related to this alert. [Hive <String>]: registryHive [Key <String>]: Current (i.e. changed) registry key (excludes HIVE). [OldKey <String>]: Previous (i.e. before changed) registry key (excludes HIVE). [OldValueData <String>]: Previous (i.e. before changed) registry key value data (contents). [OldValueName <String>]: Previous (i.e. before changed) registry key value name. [Operation <String>]: registryOperation [ProcessId <Int32?>]: Process ID (PID) of the process that modified the registry key (process details will appear in the alert 'processes' collection). [ValueData <String>]: Current (i.e. changed) registry key value data (contents). [ValueName <String>]: Current (i.e. changed) registry key value name [ValueType <String>]: registryValueType SECURITYRESOURCES <IMicrosoftGraphSecurityResource[]>: Resources related to current alert. For example, for some alerts this can have the Azure Resource value. [Resource <String>]: Name of the resource that is related to current alert. Required. [ResourceType <String>]: securityResourceType TRIGGERS <IMicrosoftGraphAlertTrigger[]>: Security-related information about the specific properties that triggered the alert (properties appearing in the alert). Alerts might contain information about multiple users, hosts, files, ip addresses. This field indicates which properties triggered the alert generation. [Name <String>]: Name of the property serving as a detection trigger. [Type <String>]: Type of the property in the key:value pair for interpretation. For example, String, Boolean, etc. [Value <String>]: Value of the property serving as a detection trigger. USERSTATES <IMicrosoftGraphUserSecurityState[]>: Security-related stateful information generated by the provider about the user accounts related to this alert. [AadUserId <String>]: AAD User object identifier (GUID) - represents the physical/multi-account user entity. [AccountName <String>]: Account name of user account (without Active Directory domain or DNS domain) - (also called mailNickName). [DomainName <String>]: NetBIOS/Active Directory domain of user account (that is, domain/account format). [EmailRole <String>]: emailRole [IsVpn <Boolean?>]: Indicates whether the user logged on through a VPN. [LogonDateTime <DateTime?>]: Time at which the sign-in occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. [LogonIP <String>]: IP Address the sign-in request originated from. [LogonId <String>]: User sign-in ID. [LogonLocation <String>]: Location (by IP address mapping) associated with a user sign-in event by this user. [LogonType <String>]: logonType [OnPremisesSecurityIdentifier <String>]: Active Directory (on-premises) Security Identifier (SID) of the user. [RiskScore <String>]: Provider-generated/calculated risk score of the user account. Recommended value range of 0-1, which equates to a percentage. [UserAccountType <String>]: userAccountSecurityType [UserPrincipalName <String>]: User sign-in name - internet format: (user account name)@(user account DNS domain name). VENDORINFORMATION <IMicrosoftGraphSecurityVendorInformation>: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required VULNERABILITYSTATES <IMicrosoftGraphVulnerabilityState[]>: Threat intelligence pertaining to one or more vulnerabilities related to this alert. [Cve <String>]: Common Vulnerabilities and Exposures (CVE) for the vulnerability. [Severity <String>]: Base Common Vulnerability Scoring System (CVSS) severity score for this vulnerability. [WasRunning <Boolean?>]: Indicates whether the detected vulnerability (file) was running at the time of detection or was the file detected at rest on the disk. .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/update-mgsecurityalert #> function Update-MgSecurityAlert { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='UpdateExpanded2', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Update2', Mandatory)] [Parameter(ParameterSetName='UpdateExpanded2', Mandatory)] [Microsoft.Graph.PowerShell.Category('Path')] [System.String] # key: id of alert ${AlertId}, [Parameter(ParameterSetName='UpdateViaIdentity1', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Path')] [Microsoft.Graph.PowerShell.Models.ISecurityIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='Update2', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='UpdateViaIdentity1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlert] # alert # To construct, see NOTES section for BODYPARAMETER properties and create a hash table. ${BodyParameter}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Name or alias of the activity group (attacker) this alert is attributed to. ${ActivityGroupName}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Collections.Hashtable] # Additional Parameters ${AdditionalProperties}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Name of the analyst the alert is assigned to for triage, investigation, or remediation (supports update). ${AssignedTo}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Azure subscription ID, present if this alert is related to an Azure resource. ${AzureSubscriptionId}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Azure Active Directory tenant ID. # Required. ${AzureTenantId}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Category of the alert (for example, credentialTheft, ransomware, etc.). ${Category}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # Time at which the alert was closed. # The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. # For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z' (supports update). ${ClosedDateTime}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphCloudAppSecurityState[]] # Security-related stateful information generated by the provider about the cloud application/s related to this alert. # To construct, see NOTES section for CLOUDAPPSTATES properties and create a hash table. ${CloudAppStates}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # Customer-provided comments on alert (for customer alert management) (supports update). ${Comments}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Int32] # Confidence of the detection logic (percentage between 1-100). ${Confidence}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # Time at which the alert was created by the alert provider. # The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. # For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. # Required. ${CreatedDateTime}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Alert description. ${Description}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # Set of alerts related to this alert entity (each alert is pushed to the SIEM as a separate record). ${DetectionIds}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # Time at which the event(s) that served as the trigger(s) to generate the alert occurred. # The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. # For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. # Required. ${EventDateTime}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # alertFeedback ${Feedback}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphFileSecurityState[]] # Security-related stateful information generated by the provider about the file(s) related to this alert. # To construct, see NOTES section for FILESTATES properties and create a hash table. ${FileStates}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlertHistoryState[]] # . # To construct, see NOTES section for HISTORYSTATES properties and create a hash table. ${HistoryStates}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphHostSecurityState[]] # Security-related stateful information generated by the provider about the host(s) related to this alert. # To construct, see NOTES section for HOSTSTATES properties and create a hash table. ${HostStates}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Read-only. ${Id}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # IDs of incidents related to current alert. ${IncidentIds}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # Time at which the alert entity was last modified. # The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. # For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. ${LastModifiedDateTime}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphMalwareState[]] # Threat Intelligence pertaining to malware related to this alert. # To construct, see NOTES section for MALWARESTATES properties and create a hash table. ${MalwareStates}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphNetworkConnection[]] # Security-related stateful information generated by the provider about the network connection(s) related to this alert. # To construct, see NOTES section for NETWORKCONNECTIONS properties and create a hash table. ${NetworkConnections}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphProcess[]] # Security-related stateful information generated by the provider about the process or processes related to this alert. # To construct, see NOTES section for PROCESSES properties and create a hash table. ${Processes}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # Vendor/provider recommended action(s) to take as a result of the alert (for example, isolate machine, enforce2FA, reimage host). ${RecommendedActions}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphRegistryKeyState[]] # Security-related stateful information generated by the provider about the registry keys related to this alert. # To construct, see NOTES section for REGISTRYKEYSTATES properties and create a hash table. ${RegistryKeyStates}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecurityResource[]] # Resources related to current alert. # For example, for some alerts this can have the Azure Resource value. # To construct, see NOTES section for SECURITYRESOURCES properties and create a hash table. ${SecurityResources}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # alertSeverity ${Severity}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # Hyperlinks (URIs) to the source material related to the alert, for example, provider's user interface for alerts or log search, etc. ${SourceMaterials}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # alertStatus ${Status}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # User-definable labels that can be applied to an alert and can serve as filter conditions (for example 'HVA', 'SAW', etc.) (supports update). ${Tags}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Alert title. # Required. ${Title}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAlertTrigger[]] # Security-related information about the specific properties that triggered the alert (properties appearing in the alert). # Alerts might contain information about multiple users, hosts, files, ip addresses. # This field indicates which properties triggered the alert generation. # To construct, see NOTES section for TRIGGERS properties and create a hash table. ${Triggers}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphUserSecurityState[]] # Security-related stateful information generated by the provider about the user accounts related to this alert. # To construct, see NOTES section for USERSTATES properties and create a hash table. ${UserStates}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecurityVendorInformation] # securityVendorInformation # To construct, see NOTES section for VENDORINFORMATION properties and create a hash table. ${VendorInformation}, [Parameter(ParameterSetName='UpdateExpanded2')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphVulnerabilityState[]] # Threat intelligence pertaining to one or more vulnerabilities related to this alert. # To construct, see NOTES section for VULNERABILITYSTATES properties and create a hash table. ${VulnerabilityStates}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Update2 = 'Microsoft.Graph.Security.private\Update-MgSecurityAlert_Update2'; UpdateExpanded2 = 'Microsoft.Graph.Security.private\Update-MgSecurityAlert_UpdateExpanded2'; UpdateViaIdentity1 = 'Microsoft.Graph.Security.private\Update-MgSecurityAlert_UpdateViaIdentity1'; UpdateViaIdentityExpanded1 = 'Microsoft.Graph.Security.private\Update-MgSecurityAlert_UpdateViaIdentityExpanded1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Update the navigation property secureScoreControlProfiles in Security .Description Update the navigation property secureScoreControlProfiles in Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScoreControlProfile .Inputs Microsoft.Graph.PowerShell.Models.ISecurityIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. BODYPARAMETER <IMicrosoftGraphSecureScoreControlProfile>: secureScoreControlProfile [(Any) <Object>]: This indicates any property can be added to this object. [Id <String>]: Read-only. [ActionType <String>]: Control action type (Config, Review, Behavior). [ActionUrl <String>]: URL to where the control can be actioned. [AzureTenantId <String>]: GUID string for tenant ID. [ComplianceInformation <IMicrosoftGraphComplianceInformation[]>]: [CertificationControls <IMicrosoftGraphCertificationControl[]>]: Collection of the certification controls associated with certification [Name <String>]: Certification control name [Url <String>]: URL for the Microsoft Service Trust Portal [CertificationName <String>]: Compliance certification name (for example, ISO 27018:2014, GDPR, FedRAMP, NIST 800-171) [ControlCategory <String>]: Control action category (Identity, Data, Device, Apps, Infrastructure). [ControlStateUpdates <IMicrosoftGraphSecureScoreControlStateUpdate[]>]: [AssignedTo <String>]: Assigns the control to the user who will take the action. [Comment <String>]: Provides optional comment about the control. [State <String>]: State of the control, which can be modified via a PATCH command (for example, ignored, thirdParty). [UpdatedBy <String>]: ID of the user who updated tenant state. [UpdatedDateTime <DateTime?>]: Time at which the control state was updated. [Deprecated <Boolean?>]: Flag to indicate if a control is depreciated. [ImplementationCost <String>]: Resource cost of implemmentating control (low, moderate, high). [LastModifiedDateTime <DateTime?>]: Time at which the control profile entity was last modified. The Timestamp type represents date and time [MaxScore <Double?>]: max attainable score for the control. [Rank <Int32?>]: Microsoft's stack ranking of control. [Remediation <String>]: Description of what the control will help remediate. [RemediationImpact <String>]: Description of the impact on users of the remediation. [Service <String>]: Service that owns the control (Exchange, Sharepoint, Azure AD). [Threats <String[]>]: List of threats the control mitigates (accountBreach,dataDeletion,dataExfiltration,dataSpillage, [Tier <String>]: [Title <String>]: Title of the control. [UserImpact <String>]: [VendorInformation <IMicrosoftGraphSecurityVendorInformation>]: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required COMPLIANCEINFORMATION <IMicrosoftGraphComplianceInformation[]>: . [CertificationControls <IMicrosoftGraphCertificationControl[]>]: Collection of the certification controls associated with certification [Name <String>]: Certification control name [Url <String>]: URL for the Microsoft Service Trust Portal [CertificationName <String>]: Compliance certification name (for example, ISO 27018:2014, GDPR, FedRAMP, NIST 800-171) CONTROLSTATEUPDATES <IMicrosoftGraphSecureScoreControlStateUpdate[]>: . [AssignedTo <String>]: Assigns the control to the user who will take the action. [Comment <String>]: Provides optional comment about the control. [State <String>]: State of the control, which can be modified via a PATCH command (for example, ignored, thirdParty). [UpdatedBy <String>]: ID of the user who updated tenant state. [UpdatedDateTime <DateTime?>]: Time at which the control state was updated. INPUTOBJECT <ISecurityIdentity>: Identity Parameter [AlertId <String>]: key: id of alert [CloudAppSecurityProfileId <String>]: key: id of cloudAppSecurityProfile [DomainSecurityProfileId <String>]: key: id of domainSecurityProfile [FileSecurityProfileId <String>]: key: id of fileSecurityProfile [HostSecurityProfileId <String>]: key: id of hostSecurityProfile [IPSecurityProfileId <String>]: key: id of ipSecurityProfile [ProviderTenantSettingId <String>]: key: id of providerTenantSetting [SecureScoreControlProfileId <String>]: key: id of secureScoreControlProfile [SecureScoreId <String>]: key: id of secureScore [SecurityActionId <String>]: key: id of securityAction [TiIndicatorId <String>]: key: id of tiIndicator [UserSecurityProfileId <String>]: key: id of userSecurityProfile VENDORINFORMATION <IMicrosoftGraphSecurityVendorInformation>: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/update-mgsecuritysecurescorecontrolprofile #> function Update-MgSecuritySecureScoreControlProfile { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='UpdateExpanded1', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Update1', Mandatory)] [Parameter(ParameterSetName='UpdateExpanded1', Mandatory)] [Microsoft.Graph.PowerShell.Category('Path')] [System.String] # key: id of secureScoreControlProfile ${SecureScoreControlProfileId}, [Parameter(ParameterSetName='UpdateViaIdentity1', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Path')] [Microsoft.Graph.PowerShell.Models.ISecurityIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='Update1', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='UpdateViaIdentity1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScoreControlProfile] # secureScoreControlProfile # To construct, see NOTES section for BODYPARAMETER properties and create a hash table. ${BodyParameter}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Control action type (Config, Review, Behavior). ${ActionType}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # URL to where the control can be actioned. ${ActionUrl}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Collections.Hashtable] # Additional Parameters ${AdditionalProperties}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # GUID string for tenant ID. ${AzureTenantId}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphComplianceInformation[]] # . # To construct, see NOTES section for COMPLIANCEINFORMATION properties and create a hash table. ${ComplianceInformation}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Control action category (Identity, Data, Device, Apps, Infrastructure). ${ControlCategory}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScoreControlStateUpdate[]] # . # To construct, see NOTES section for CONTROLSTATEUPDATES properties and create a hash table. ${ControlStateUpdates}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Management.Automation.SwitchParameter] # Flag to indicate if a control is depreciated. ${Deprecated}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Read-only. ${Id}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Resource cost of implemmentating control (low, moderate, high). ${ImplementationCost}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # Time at which the control profile entity was last modified. # The Timestamp type represents date and time ${LastModifiedDateTime}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Double] # max attainable score for the control. ${MaxScore}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Int32] # Microsoft's stack ranking of control. ${Rank}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Description of what the control will help remediate. ${Remediation}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Description of the impact on users of the remediation. ${RemediationImpact}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Service that owns the control (Exchange, Sharepoint, Azure AD). ${Service}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # List of threats the control mitigates (accountBreach,dataDeletion,dataExfiltration,dataSpillage, ${Threats}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # . ${Tier}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Title of the control. ${Title}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # . ${UserImpact}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecurityVendorInformation] # securityVendorInformation # To construct, see NOTES section for VENDORINFORMATION properties and create a hash table. ${VendorInformation}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Update1 = 'Microsoft.Graph.Security.private\Update-MgSecuritySecureScoreControlProfile_Update1'; UpdateExpanded1 = 'Microsoft.Graph.Security.private\Update-MgSecuritySecureScoreControlProfile_UpdateExpanded1'; UpdateViaIdentity1 = 'Microsoft.Graph.Security.private\Update-MgSecuritySecureScoreControlProfile_UpdateViaIdentity1'; UpdateViaIdentityExpanded1 = 'Microsoft.Graph.Security.private\Update-MgSecuritySecureScoreControlProfile_UpdateViaIdentityExpanded1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Update the navigation property secureScores in Security .Description Update the navigation property secureScores in Security .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScore .Inputs Microsoft.Graph.PowerShell.Models.ISecurityIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. AVERAGECOMPARATIVESCORES <IMicrosoftGraphAverageComparativeScore[]>: Average score by different scopes (for example, average by industry, average by seating) and control category (Identity, Data, Device, Apps, Infrastructure) within the scope. [AverageScore <Double?>]: Average score within specified basis. [Basis <String>]: Scope type. The possible values are: AllTenants, TotalSeats, IndustryTypes. BODYPARAMETER <IMicrosoftGraphSecureScore>: secureScore [(Any) <Object>]: This indicates any property can be added to this object. [Id <String>]: Read-only. [ActiveUserCount <Int32?>]: Active user count of the given tenant. [AverageComparativeScores <IMicrosoftGraphAverageComparativeScore[]>]: Average score by different scopes (for example, average by industry, average by seating) and control category (Identity, Data, Device, Apps, Infrastructure) within the scope. [AverageScore <Double?>]: Average score within specified basis. [Basis <String>]: Scope type. The possible values are: AllTenants, TotalSeats, IndustryTypes. [AzureTenantId <String>]: GUID string for tenant ID. [ControlScores <IMicrosoftGraphControlScore[]>]: Contains tenant scores for a set of controls. [ControlCategory <String>]: Control action category (Identity, Data, Device, Apps, Infrastructure). [ControlName <String>]: Control unique name. [Description <String>]: Description of the control. [Score <Double?>]: Tenant achieved score for the control (it varies day by day depending on tenant operations on the control). [CreatedDateTime <DateTime?>]: The date when the entity is created. [CurrentScore <Double?>]: Tenant current attained score on specified date. [EnabledServices <String[]>]: Microsoft-provided services for the tenant (for example, Exchange online, Skype, Sharepoint). [LicensedUserCount <Int32?>]: Licensed user count of the given tenant. [MaxScore <Double?>]: Tenant maximum possible score on specified date. [VendorInformation <IMicrosoftGraphSecurityVendorInformation>]: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required CONTROLSCORES <IMicrosoftGraphControlScore[]>: Contains tenant scores for a set of controls. [ControlCategory <String>]: Control action category (Identity, Data, Device, Apps, Infrastructure). [ControlName <String>]: Control unique name. [Description <String>]: Description of the control. [Score <Double?>]: Tenant achieved score for the control (it varies day by day depending on tenant operations on the control). INPUTOBJECT <ISecurityIdentity>: Identity Parameter [AlertId <String>]: key: id of alert [CloudAppSecurityProfileId <String>]: key: id of cloudAppSecurityProfile [DomainSecurityProfileId <String>]: key: id of domainSecurityProfile [FileSecurityProfileId <String>]: key: id of fileSecurityProfile [HostSecurityProfileId <String>]: key: id of hostSecurityProfile [IPSecurityProfileId <String>]: key: id of ipSecurityProfile [ProviderTenantSettingId <String>]: key: id of providerTenantSetting [SecureScoreControlProfileId <String>]: key: id of secureScoreControlProfile [SecureScoreId <String>]: key: id of secureScore [SecurityActionId <String>]: key: id of securityAction [TiIndicatorId <String>]: key: id of tiIndicator [UserSecurityProfileId <String>]: key: id of userSecurityProfile VENDORINFORMATION <IMicrosoftGraphSecurityVendorInformation>: securityVendorInformation [(Any) <Object>]: This indicates any property can be added to this object. [Provider <String>]: Specific provider (product/service - not vendor company); for example, WindowsDefenderATP. [ProviderVersion <String>]: Version of the provider or subprovider, if it exists, that generated the alert. Required [SubProvider <String>]: Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen. [Vendor <String>]: Name of the alert vendor (for example, Microsoft, Dell, FireEye). Required .Link https://docs.microsoft.com/en-us/powershell/module/microsoft.graph.security/update-mgsecuritysecurescore #> function Update-MgSecuritySecureScore { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='UpdateExpanded1', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Microsoft.Graph.PowerShell.Profile('v1.0')] param( [Parameter(ParameterSetName='Update1', Mandatory)] [Parameter(ParameterSetName='UpdateExpanded1', Mandatory)] [Microsoft.Graph.PowerShell.Category('Path')] [System.String] # key: id of secureScore ${SecureScoreId}, [Parameter(ParameterSetName='UpdateViaIdentity1', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Path')] [Microsoft.Graph.PowerShell.Models.ISecurityIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='Update1', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='UpdateViaIdentity1', Mandatory, ValueFromPipeline)] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecureScore] # secureScore # To construct, see NOTES section for BODYPARAMETER properties and create a hash table. ${BodyParameter}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Int32] # Active user count of the given tenant. ${ActiveUserCount}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Collections.Hashtable] # Additional Parameters ${AdditionalProperties}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAverageComparativeScore[]] # Average score by different scopes (for example, average by industry, average by seating) and control category (Identity, Data, Device, Apps, Infrastructure) within the scope. # To construct, see NOTES section for AVERAGECOMPARATIVESCORES properties and create a hash table. ${AverageComparativeScores}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # GUID string for tenant ID. ${AzureTenantId}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphControlScore[]] # Contains tenant scores for a set of controls. # To construct, see NOTES section for CONTROLSCORES properties and create a hash table. ${ControlScores}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.DateTime] # The date when the entity is created. ${CreatedDateTime}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Double] # Tenant current attained score on specified date. ${CurrentScore}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String[]] # Microsoft-provided services for the tenant (for example, Exchange online, Skype, Sharepoint). ${EnabledServices}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.String] # Read-only. ${Id}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Int32] # Licensed user count of the given tenant. ${LicensedUserCount}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [System.Double] # Tenant maximum possible score on specified date. ${MaxScore}, [Parameter(ParameterSetName='UpdateExpanded1')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded1')] [Microsoft.Graph.PowerShell.Category('Body')] [Microsoft.Graph.PowerShell.Models.IMicrosoftGraphSecurityVendorInformation] # securityVendorInformation # To construct, see NOTES section for VENDORINFORMATION properties and create a hash table. ${VendorInformation}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [Microsoft.Graph.PowerShell.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Graph.PowerShell.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Update1 = 'Microsoft.Graph.Security.private\Update-MgSecuritySecureScore_Update1'; UpdateExpanded1 = 'Microsoft.Graph.Security.private\Update-MgSecuritySecureScore_UpdateExpanded1'; UpdateViaIdentity1 = 'Microsoft.Graph.Security.private\Update-MgSecuritySecureScore_UpdateViaIdentity1'; UpdateViaIdentityExpanded1 = 'Microsoft.Graph.Security.private\Update-MgSecuritySecureScore_UpdateViaIdentityExpanded1'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # SIG # Begin signature block # MIIjigYJKoZIhvcNAQcCoIIjezCCI3cCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDnOb83hIeHDPeZ # 1WZzli4HisVwAG2Fy+xCJAuYFK/czaCCDYUwggYDMIID66ADAgECAhMzAAABiK9S # 1rmSbej5AAAAAAGIMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjAwMzA0MTgzOTQ4WhcNMjEwMzAzMTgzOTQ4WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCSCNryE+Cewy2m4t/a74wZ7C9YTwv1PyC4BvM/kSWPNs8n0RTe+FvYfU+E9uf0 # t7nYlAzHjK+plif2BhD+NgdhIUQ8sVwWO39tjvQRHjP2//vSvIfmmkRoML1Ihnjs # 9kQiZQzYRDYYRp9xSQYmRwQjk5hl8/U7RgOiQDitVHaU7BT1MI92lfZRuIIDDYBd # vXtbclYJMVOwqZtv0O9zQCret6R+fRSGaDNfEEpcILL+D7RV3M4uaJE4Ta6KAOdv # V+MVaJp1YXFTZPKtpjHO6d9pHQPZiG7NdC6QbnRGmsa48uNQrb6AfmLKDI1Lp31W # MogTaX5tZf+CZT9PSuvjOCLNAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUj9RJL9zNrPcL10RZdMQIXZN7MG8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzQ1ODM4NjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # ACnXo8hjp7FeT+H6iQlV3CcGnkSbFvIpKYafgzYCFo3UHY1VHYJVb5jHEO8oG26Q # qBELmak6MTI+ra3WKMTGhE1sEIlowTcp4IAs8a5wpCh6Vf4Z/bAtIppP3p3gXk2X # 8UXTc+WxjQYsDkFiSzo/OBa5hkdW1g4EpO43l9mjToBdqEPtIXsZ7Hi1/6y4gK0P # mMiwG8LMpSn0n/oSHGjrUNBgHJPxgs63Slf58QGBznuXiRaXmfTUDdrvhRocdxIM # i8nXQwWACMiQzJSRzBP5S2wUq7nMAqjaTbeXhJqD2SFVHdUYlKruvtPSwbnqSRWT # GI8s4FEXt+TL3w5JnwVZmZkUFoioQDMMjFyaKurdJ6pnzbr1h6QW0R97fWc8xEIz # LIOiU2rjwWAtlQqFO8KNiykjYGyEf5LyAJKAO+rJd9fsYR+VBauIEQoYmjnUbTXM # SY2Lf5KMluWlDOGVh8q6XjmBccpaT+8tCfxpaVYPi1ncnwTwaPQvVq8RjWDRB7Pa # 8ruHgj2HJFi69+hcq7mWx5nTUtzzFa7RSZfE5a1a5AuBmGNRr7f8cNfa01+tiWjV # Kk1a+gJUBSP0sIxecFbVSXTZ7bqeal45XSDIisZBkWb+83TbXdTGMDSUFKTAdtC+ # r35GfsN8QVy59Hb5ZYzAXczhgRmk7NyE6jD0Ym5TKiW5MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCFVswghVXAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAGIr1LWuZJt6PkAAAAA # AYgwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPh2 # n6WPOHruHtbP+P4XX4ireCskouv25W1x9ianYnogMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAD5PUYkCz52hO3W9leD6BN25T8NNLfM2WtLjT # 30OEyzSA5AxYLBm3bNLSNMvJzVvAm2MKMgrfCpAZpP0Outxrlj7TaWOPFP4nxxFd # Bf0FL/1gMgzgWJqSUX6K91KglJyYgQZJ/fXzUtMkayvp+8e/xkkktd0HYSNc7Dqi # 98TVrmFMtWQPQlZwM11am5NLLT8KML0loSYgsjTrT7YtTgxiHwKhuGakpuo0NVNL # k2ym2ipv9sD4n0mJK3XlDoLs6de4a1h5Szaakg1xRNIaMQf5JFmcrjER48z+OF1n # 3WEwpimVlMtQtKT53CGM2ADXjHUXDMOe3dQLqoWgJct1DZl5O6GCEuUwghLhBgor # BgEEAYI3AwMBMYIS0TCCEs0GCSqGSIb3DQEHAqCCEr4wghK6AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCXyNN9prtO7WCvMVfHlZFc/dczxzjEjjXU # nTpr6tTt/AIGXxZVhsrxGBMyMDIwMDgxNDAyMzEzNi41NzJaMASAAgH0oIHQpIHN # MIHKMQswCQYDVQQGEwJVUzELMAkGA1UECBMCV0ExEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZaCCDjwwggTxMIID2aADAgECAhMzAAABE7Nwhz368MgkAAAA # AAETMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MB4XDTE5MTAyMzIzMTkyMVoXDTIxMDEyMTIzMTkyMVowgcoxCzAJBgNVBAYTAlVT # MQswCQYDVQQIEwJXQTEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQwODItNEJG # RC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIB # IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvK3EHQFc+nmZhgumEk3M6BIC # 6KA1DIPU67YgRc9DGFNGcbflRToaMivPV2DUC60DTAOI51VHCLWJStGFsRLDOjA3 # IWsBYFajR7magbYUT87TEeZGHGvPYFQjejk+qe5CBKstqgGNlnEPyRXlusIk7246 # W9tebdCwzg0jW9oMaMPP1reyEaNSj4sxKrEFxQAiCaO1z7rR9q8o+RakCRqmfud8 # KSzNw8osURkwIz2ophQCHtj7qVmY7nUUlTyxg3bM5Son1JMIBtyQx6ddggl3G0zJ # gJWhDbphOAWHo6owgi+P7XoTlgjDnzPWCOuu3eVUvKzYOjlDLkxgkdSfbF3GEQID # AQABo4IBGzCCARcwHQYDVR0OBBYEFNqZhHIbL+4XCO+SkRQfPCOAzp1SMB8GA1Ud # IwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeGRWh0 # dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1RpbVN0 # YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKG # Pmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3RhUENB # XzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYBBQUH # AwgwDQYJKoZIhvcNAQELBQADggEBAA95zLCAr5HfZIiuz/1ndGtbYVx3z0umO4o6 # JMe7mCSPywti1yNp6vBTf2gDwKQ+l2caenAm03IwAAWxVd3oL6zRl16b6aDPXx4X # t9HTdVzp6IbBm10jDZfMaHYudjsUfRgzOI55qmPIpPfKLo8YWKoXKfaYnC+Ax7XZ # kWrClaCTrvqkitfAaB4/Q2lH1lWygCtD3a118MfmXUTB11X4o57VRr5nnoK4oH94 # NWaz+OMeOlRqI1LcLXDv6yuPu44lG0N0UElPLPCHELtyFYRVUvyFHer5CorLU4uH # zAEUFureCGOzB8wwbLdGq//jyVHjPt3/fkDlSuxhR3iPBbpNXSgwggZxMIIEWaAD # AgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBD # ZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0yNTA3 # MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjANBgkq # hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RUENWl # CgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBED/Fg # iIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50YWeR # X4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd/Xcf # PfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaRtogI # Neh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQABo4IB # 5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8RhvF # M2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAP # BgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjE # MFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kv # Y3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEF # BQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w # a2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSABAf8E # gZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3dy5t # aWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEFBQcC # AjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBtAGUA # bgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Ehb7Pr # psz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7uVOM # zPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqRUgCv # OA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9Va8v # /rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8+n99 # lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+Y1kl # D3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh2rBQ # Hm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRyzR30 # uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoouLGp # 25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx16HS # xVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341Hgi6 # 2jbb01+P3nSISRKhggLOMIICNwIBATCB+KGB0KSBzTCByjELMAkGA1UEBhMCVVMx # CzAJBgNVBAgTAldBMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046RDA4Mi00QkZE # LUVFQkExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB # ATAHBgUrDgMCGgMVAD1XVpFg052IY9KYOAmyEwqXuO6VoIGDMIGApH4wfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQACBQDi386bMCIY # DzIwMjAwODEzMjIzNzE1WhgPMjAyMDA4MTQyMjM3MTVaMHcwPQYKKwYBBAGEWQoE # ATEvMC0wCgIFAOLfzpsCAQAwCgIBAAICHL8CAf8wBwIBAAICEdEwCgIFAOLhIBsC # AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEK # MAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAwDv8fje7b4rRXv29HBOuAH2n9 # HZ1uFuNJtM3ncFE8jsIzdL0xMej0C20hxq5g5LhqV7wfBYNZo/wIw9kkn2y5shpj # 280yMIu5UipUtw9Fmf1f3jkQMR+5rexz+8CGGaT3znT4D9Oz0UQLS0Uab+m3Ftyy # 13KTi/euw7YO+F4D8DGCAw0wggMJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwAhMzAAABE7Nwhz368MgkAAAAAAETMA0GCWCGSAFlAwQCAQUAoIIB # SjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIOoY # 2gFj4hjk63TnvzK4gtsc8TmGwW908F9f6dhVteRRMIH6BgsqhkiG9w0BCRACLzGB # 6jCB5zCB5DCBvQQgp9oXxI97H6tU5Vd6qSp0UoHPjJClGZQbMZrwv2uAW60wgZgw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAROzcIc9+vDI # JAAAAAABEzAiBCB3ClSHq/ZOa8E/Y/LN3YRCsipPtXVME5EOFsDwiz7Z4zANBgkq # hkiG9w0BAQsFAASCAQBTkxFBQTVP8AXUaYww1F7gdyXyUoiGCxIa8RP9QJZbUAiC # ZsRC9et33QHKUrldxilcUmNHCvrbmPVIJzeT4aktnWogDrWWeYiymjjqA00ropSz # muS0jEiDZLyIBjSK55rGXqWmt0FZAr7MrfxZW0+/s/V/h35Po7G3iIMPEqsnNNy9 # a5iNObGb4zE5hjJijYtUmFD/AViq6LsMtDMcQA3fk3QFsbkeEK+Vmt2L/D/JZbWF # VbMPGeHbCAKAWKvyc1B7n5+/tI2LM7PKvM06GCjSgIj2mkfp64AzouOepgdHlqEx # 21HiGHO9X1iemaeaRCcr8rGTWR5ZREJbbrNdG2iE # SIG # End signature block |