Class: MicrosoftGraph::Models::WindowsDeviceMalwareState
- Includes:
- MicrosoftKiotaAbstractions::Parsable
- Defined in:
- lib/models/windows_device_malware_state.rb
Overview
Malware detection entity.
Class Method Summary collapse
-
.create_from_discriminator_value(parse_node) ⇒ Object
Creates a new instance of the appropriate class based on discriminator value.
Instance Method Summary collapse
-
#additional_information_url ⇒ Object
Gets the additionalInformationUrl property value.
-
#additional_information_url=(value) ⇒ Object
Sets the additionalInformationUrl property value.
-
#category ⇒ Object
Gets the category property value.
-
#category=(value) ⇒ Object
Sets the category property value.
-
#detection_count ⇒ Object
Gets the detectionCount property value.
-
#detection_count=(value) ⇒ Object
Sets the detectionCount property value.
-
#display_name ⇒ Object
Gets the displayName property value.
-
#display_name=(value) ⇒ Object
Sets the displayName property value.
-
#execution_state ⇒ Object
Gets the executionState property value.
-
#execution_state=(value) ⇒ Object
Sets the executionState property value.
-
#get_field_deserializers ⇒ Object
The deserialization information for the current model.
-
#initial_detection_date_time ⇒ Object
Gets the initialDetectionDateTime property value.
-
#initial_detection_date_time=(value) ⇒ Object
Sets the initialDetectionDateTime property value.
-
#initialize ⇒ Object
constructor
Instantiates a new windowsDeviceMalwareState and sets the default values.
-
#last_state_change_date_time ⇒ Object
Gets the lastStateChangeDateTime property value.
-
#last_state_change_date_time=(value) ⇒ Object
Sets the lastStateChangeDateTime property value.
-
#serialize(writer) ⇒ Object
Serializes information the current object.
-
#severity ⇒ Object
Gets the severity property value.
-
#severity=(value) ⇒ Object
Sets the severity property value.
-
#state ⇒ Object
Gets the state property value.
-
#state=(value) ⇒ Object
Sets the state property value.
-
#threat_state ⇒ Object
Gets the threatState property value.
-
#threat_state=(value) ⇒ Object
Sets the threatState property value.
Methods inherited from Entity
#additional_data, #additional_data=, #id, #id=, #odata_type, #odata_type=
Constructor Details
#initialize ⇒ Object
Instantiates a new windowsDeviceMalwareState and sets the default values.
76 77 78 |
# File 'lib/models/windows_device_malware_state.rb', line 76 def initialize() super end |
Class Method Details
.create_from_discriminator_value(parse_node) ⇒ Object
Creates a new instance of the appropriate class based on discriminator value
84 85 86 87 |
# File 'lib/models/windows_device_malware_state.rb', line 84 def self.create_from_discriminator_value(parse_node) raise StandardError, 'parse_node cannot be null' if parse_node.nil? return WindowsDeviceMalwareState.new end |
Instance Method Details
#additional_information_url ⇒ Object
Gets the additionalInformationUrl property value. Information URL to learn more about the malware
46 47 48 |
# File 'lib/models/windows_device_malware_state.rb', line 46 def additional_information_url return @additional_information_url end |
#additional_information_url=(value) ⇒ Object
Sets the additionalInformationUrl property value. Information URL to learn more about the malware
54 55 56 |
# File 'lib/models/windows_device_malware_state.rb', line 54 def additional_information_url=(value) @additional_information_url = value end |
#category ⇒ Object
Gets the category property value. Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.
61 62 63 |
# File 'lib/models/windows_device_malware_state.rb', line 61 def category return @category end |
#category=(value) ⇒ Object
Sets the category property value. Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.
69 70 71 |
# File 'lib/models/windows_device_malware_state.rb', line 69 def category=(value) @category = value end |
#detection_count ⇒ Object
Gets the detectionCount property value. Number of times the malware is detected
92 93 94 |
# File 'lib/models/windows_device_malware_state.rb', line 92 def detection_count return @detection_count end |
#detection_count=(value) ⇒ Object
Sets the detectionCount property value. Number of times the malware is detected
100 101 102 |
# File 'lib/models/windows_device_malware_state.rb', line 100 def detection_count=(value) @detection_count = value end |
#display_name ⇒ Object
Gets the displayName property value. Malware name
107 108 109 |
# File 'lib/models/windows_device_malware_state.rb', line 107 def display_name return @display_name end |
#display_name=(value) ⇒ Object
Sets the displayName property value. Malware name
115 116 117 |
# File 'lib/models/windows_device_malware_state.rb', line 115 def display_name=(value) @display_name = value end |
#execution_state ⇒ Object
Gets the executionState property value. Execution status of the malware like blocked/executing etc. Possible values are: unknown, blocked, allowed, running, notRunning.
122 123 124 |
# File 'lib/models/windows_device_malware_state.rb', line 122 def execution_state return @execution_state end |
#execution_state=(value) ⇒ Object
Sets the executionState property value. Execution status of the malware like blocked/executing etc. Possible values are: unknown, blocked, allowed, running, notRunning.
130 131 132 |
# File 'lib/models/windows_device_malware_state.rb', line 130 def execution_state=(value) @execution_state = value end |
#get_field_deserializers ⇒ Object
The deserialization information for the current model
137 138 139 140 141 142 143 144 145 146 147 148 149 150 |
# File 'lib/models/windows_device_malware_state.rb', line 137 def get_field_deserializers() return super.merge({ "additionalInformationUrl" => lambda {|n| @additional_information_url = n.get_string_value() }, "category" => lambda {|n| @category = n.get_enum_value(MicrosoftGraph::Models::WindowsMalwareCategory) }, "detectionCount" => lambda {|n| @detection_count = n.get_number_value() }, "displayName" => lambda {|n| @display_name = n.get_string_value() }, "executionState" => lambda {|n| @execution_state = n.get_enum_value(MicrosoftGraph::Models::WindowsMalwareExecutionState) }, "initialDetectionDateTime" => lambda {|n| @initial_detection_date_time = n.get_date_time_value() }, "lastStateChangeDateTime" => lambda {|n| @last_state_change_date_time = n.get_date_time_value() }, "severity" => lambda {|n| @severity = n.get_enum_value(MicrosoftGraph::Models::WindowsMalwareSeverity) }, "state" => lambda {|n| @state = n.get_enum_value(MicrosoftGraph::Models::WindowsMalwareState) }, "threatState" => lambda {|n| @threat_state = n.get_enum_value(MicrosoftGraph::Models::WindowsMalwareThreatState) }, }) end |
#initial_detection_date_time ⇒ Object
Gets the initialDetectionDateTime property value. Initial detection datetime of the malware
155 156 157 |
# File 'lib/models/windows_device_malware_state.rb', line 155 def initial_detection_date_time return @initial_detection_date_time end |
#initial_detection_date_time=(value) ⇒ Object
Sets the initialDetectionDateTime property value. Initial detection datetime of the malware
163 164 165 |
# File 'lib/models/windows_device_malware_state.rb', line 163 def initial_detection_date_time=(value) @initial_detection_date_time = value end |
#last_state_change_date_time ⇒ Object
Gets the lastStateChangeDateTime property value. The last time this particular threat was changed
170 171 172 |
# File 'lib/models/windows_device_malware_state.rb', line 170 def last_state_change_date_time return @last_state_change_date_time end |
#last_state_change_date_time=(value) ⇒ Object
Sets the lastStateChangeDateTime property value. The last time this particular threat was changed
178 179 180 |
# File 'lib/models/windows_device_malware_state.rb', line 178 def last_state_change_date_time=(value) @last_state_change_date_time = value end |
#serialize(writer) ⇒ Object
Serializes information the current object
186 187 188 189 190 191 192 193 194 195 196 197 198 199 |
# File 'lib/models/windows_device_malware_state.rb', line 186 def serialize(writer) raise StandardError, 'writer cannot be null' if writer.nil? super writer.write_string_value("additionalInformationUrl", @additional_information_url) writer.write_enum_value("category", @category) writer.write_number_value("detectionCount", @detection_count) writer.write_string_value("displayName", @display_name) writer.write_enum_value("executionState", @execution_state) writer.write_date_time_value("initialDetectionDateTime", @initial_detection_date_time) writer.write_date_time_value("lastStateChangeDateTime", @last_state_change_date_time) writer.write_enum_value("severity", @severity) writer.write_enum_value("state", @state) writer.write_enum_value("threatState", @threat_state) end |
#severity ⇒ Object
Gets the severity property value. Severity of the malware. Possible values are: unknown, low, moderate, high, severe.
204 205 206 |
# File 'lib/models/windows_device_malware_state.rb', line 204 def severity return @severity end |
#severity=(value) ⇒ Object
Sets the severity property value. Severity of the malware. Possible values are: unknown, low, moderate, high, severe.
212 213 214 |
# File 'lib/models/windows_device_malware_state.rb', line 212 def severity=(value) @severity = value end |
#state ⇒ Object
Gets the state property value. Current status of the malware like cleaned/quarantined/allowed etc. Possible values are: unknown, detected, cleaned, quarantined, removed, allowed, blocked, cleanFailed, quarantineFailed, removeFailed, allowFailed, abandoned, blockFailed.
219 220 221 |
# File 'lib/models/windows_device_malware_state.rb', line 219 def state return @state end |
#state=(value) ⇒ Object
Sets the state property value. Current status of the malware like cleaned/quarantined/allowed etc. Possible values are: unknown, detected, cleaned, quarantined, removed, allowed, blocked, cleanFailed, quarantineFailed, removeFailed, allowFailed, abandoned, blockFailed.
227 228 229 |
# File 'lib/models/windows_device_malware_state.rb', line 227 def state=(value) @state = value end |
#threat_state ⇒ Object
Gets the threatState property value. Current status of the malware like cleaned/quarantined/allowed etc. Possible values are: active, actionFailed, manualStepsRequired, fullScanRequired, rebootRequired, remediatedWithNonCriticalFailures, quarantined, removed, cleaned, allowed, noStatusCleared.
234 235 236 |
# File 'lib/models/windows_device_malware_state.rb', line 234 def threat_state return @threat_state end |
#threat_state=(value) ⇒ Object
Sets the threatState property value. Current status of the malware like cleaned/quarantined/allowed etc. Possible values are: active, actionFailed, manualStepsRequired, fullScanRequired, rebootRequired, remediatedWithNonCriticalFailures, quarantined, removed, cleaned, allowed, noStatusCleared.
242 243 244 |
# File 'lib/models/windows_device_malware_state.rb', line 242 def threat_state=(value) @threat_state = value end |