| external help file | Microsoft.Online.SharePoint.PowerShell.dll-Help.xml |
|---|---|
| Module Name | Microsoft.Online.SharePoint.PowerShell |
| online version | https://learn.microsoft.com/powershell/module/microsoft.online.sharepoint.powershell/get-spomalwarefile |
| applicable | SharePoint Online |
| title | Get-SPOMalwareFile |
| schema | 2.0.0 |
| author | vinandi |
| ms.author | vinandi |
| ms.reviewer |
Extracts and displays the malware-related information of an infected file stored in SharePoint.
Get-SPOMalwareFile [-FileUri] <Uri> [<CommonParameters>]
The Get-SPOMalwareFile cmdlet runs on a single file. If the file is malware-infected then it returns an object of the type SPOMalwareFile which contains siteURL, filePath, malwareStatus flag, and malwareInfo (if applicable). You must be a SharePoint Online administrator to run the Get-SPOMalwareFile cmdlet. Note that this cmdlet does not work on files that are not malware-infected.
For permissions and the most current information about Windows PowerShell for SharePoint Online, see the online documentation at Intro to SharePoint Online Management Shell.
Get-SPOMalwareFile -FileUri "https://contoso.com/sites/Marketing/Shared Documents/Doc1.docx"Example 1 returns an object of the type SPOMalwareFile which contains siteURL, filePath, malwareStatus flag, and malwareInfo (if applicable).
Applicable: SharePoint Online
Full URL for the file.
Type: System.Uri
Parameter Sets: (All)
Aliases:
Required: True
Position: 0
Default value: None
Accept pipeline input: False
Accept wildcard characters: FalseThis cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.
The Get-SPOMalwareFile cmdlet returns an object of the type SPOMalwareFile. To get the file stream of the infected file, pass this object as a parameter to the Get-SPOMalwareFileContent cmdlet.