Class: MicrosoftGraph::Models::WindowsDeviceMalwareState

Inherits:
Entity
  • Object
show all
Includes:
MicrosoftKiotaAbstractions::Parsable
Defined in:
lib/models/windows_device_malware_state.rb

Overview

Malware detection entity.

Class Method Summary collapse

Instance Method Summary collapse

Methods inherited from Entity

#additional_data, #additional_data=, #id, #id=, #odata_type, #odata_type=

Constructor Details

#initializeObject

Instantiates a new windowsDeviceMalwareState and sets the default values.



76
77
78
# File 'lib/models/windows_device_malware_state.rb', line 76

def initialize()
    super
end

Class Method Details

.create_from_discriminator_value(parse_node) ⇒ Object

Creates a new instance of the appropriate class based on discriminator value

Parameters:

  • parse_node

    The parse node to use to read the discriminator value and create the object

Returns:

  • a windows_device_malware_state

Raises:

  • (StandardError)


84
85
86
87
# File 'lib/models/windows_device_malware_state.rb', line 84

def self.create_from_discriminator_value(parse_node)
    raise StandardError, 'parse_node cannot be null' if parse_node.nil?
    return WindowsDeviceMalwareState.new
end

Instance Method Details

#additional_information_urlObject

Gets the additionalInformationUrl property value. Information URL to learn more about the malware

Returns:

  • a string



46
47
48
# File 'lib/models/windows_device_malware_state.rb', line 46

def additional_information_url
    return @additional_information_url
end

#additional_information_url=(value) ⇒ Object

Sets the additionalInformationUrl property value. Information URL to learn more about the malware

Parameters:

  • value

    Value to set for the additionalInformationUrl property.

Returns:

  • a void



54
55
56
# File 'lib/models/windows_device_malware_state.rb', line 54

def additional_information_url=(value)
    @additional_information_url = value
end

#categoryObject

Gets the category property value. Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.

Returns:

  • a windows_malware_category



61
62
63
# File 'lib/models/windows_device_malware_state.rb', line 61

def category
    return @category
end

#category=(value) ⇒ Object

Sets the category property value. Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.

Parameters:

  • value

    Value to set for the category property.

Returns:

  • a void



69
70
71
# File 'lib/models/windows_device_malware_state.rb', line 69

def category=(value)
    @category = value
end

#detection_countObject

Gets the detectionCount property value. Number of times the malware is detected

Returns:

  • a integer



92
93
94
# File 'lib/models/windows_device_malware_state.rb', line 92

def detection_count
    return @detection_count
end

#detection_count=(value) ⇒ Object

Sets the detectionCount property value. Number of times the malware is detected

Parameters:

  • value

    Value to set for the detectionCount property.

Returns:

  • a void



100
101
102
# File 'lib/models/windows_device_malware_state.rb', line 100

def detection_count=(value)
    @detection_count = value
end

#display_nameObject

Gets the displayName property value. Malware name

Returns:

  • a string



107
108
109
# File 'lib/models/windows_device_malware_state.rb', line 107

def display_name
    return @display_name
end

#display_name=(value) ⇒ Object

Sets the displayName property value. Malware name

Parameters:

  • value

    Value to set for the displayName property.

Returns:

  • a void



115
116
117
# File 'lib/models/windows_device_malware_state.rb', line 115

def display_name=(value)
    @display_name = value
end

#execution_stateObject

Gets the executionState property value. Execution status of the malware like blocked/executing etc. Possible values are: unknown, blocked, allowed, running, notRunning.

Returns:

  • a windows_malware_execution_state



122
123
124
# File 'lib/models/windows_device_malware_state.rb', line 122

def execution_state
    return @execution_state
end

#execution_state=(value) ⇒ Object

Sets the executionState property value. Execution status of the malware like blocked/executing etc. Possible values are: unknown, blocked, allowed, running, notRunning.

Parameters:

  • value

    Value to set for the executionState property.

Returns:

  • a void



130
131
132
# File 'lib/models/windows_device_malware_state.rb', line 130

def execution_state=(value)
    @execution_state = value
end

#get_field_deserializersObject

The deserialization information for the current model

Returns:

  • a i_dictionary



137
138
139
140
141
142
143
144
145
146
147
148
149
150
# File 'lib/models/windows_device_malware_state.rb', line 137

def get_field_deserializers()
    return super.merge({
        "additionalInformationUrl" => lambda {|n| @additional_information_url = n.get_string_value() },
        "category" => lambda {|n| @category = n.get_enum_value(MicrosoftGraph::Models::WindowsMalwareCategory) },
        "detectionCount" => lambda {|n| @detection_count = n.get_number_value() },
        "displayName" => lambda {|n| @display_name = n.get_string_value() },
        "executionState" => lambda {|n| @execution_state = n.get_enum_value(MicrosoftGraph::Models::WindowsMalwareExecutionState) },
        "initialDetectionDateTime" => lambda {|n| @initial_detection_date_time = n.get_date_time_value() },
        "lastStateChangeDateTime" => lambda {|n| @last_state_change_date_time = n.get_date_time_value() },
        "severity" => lambda {|n| @severity = n.get_enum_value(MicrosoftGraph::Models::WindowsMalwareSeverity) },
        "state" => lambda {|n| @state = n.get_enum_value(MicrosoftGraph::Models::WindowsMalwareState) },
        "threatState" => lambda {|n| @threat_state = n.get_enum_value(MicrosoftGraph::Models::WindowsMalwareThreatState) },
    })
end

#initial_detection_date_timeObject

Gets the initialDetectionDateTime property value. Initial detection datetime of the malware

Returns:

  • a date_time



155
156
157
# File 'lib/models/windows_device_malware_state.rb', line 155

def initial_detection_date_time
    return @initial_detection_date_time
end

#initial_detection_date_time=(value) ⇒ Object

Sets the initialDetectionDateTime property value. Initial detection datetime of the malware

Parameters:

  • value

    Value to set for the initialDetectionDateTime property.

Returns:

  • a void



163
164
165
# File 'lib/models/windows_device_malware_state.rb', line 163

def initial_detection_date_time=(value)
    @initial_detection_date_time = value
end

#last_state_change_date_timeObject

Gets the lastStateChangeDateTime property value. The last time this particular threat was changed

Returns:

  • a date_time



170
171
172
# File 'lib/models/windows_device_malware_state.rb', line 170

def last_state_change_date_time
    return @last_state_change_date_time
end

#last_state_change_date_time=(value) ⇒ Object

Sets the lastStateChangeDateTime property value. The last time this particular threat was changed

Parameters:

  • value

    Value to set for the lastStateChangeDateTime property.

Returns:

  • a void



178
179
180
# File 'lib/models/windows_device_malware_state.rb', line 178

def last_state_change_date_time=(value)
    @last_state_change_date_time = value
end

#serialize(writer) ⇒ Object

Serializes information the current object

Parameters:

  • writer

    Serialization writer to use to serialize this model

Returns:

  • a void

Raises:

  • (StandardError)


186
187
188
189
190
191
192
193
194
195
196
197
198
199
# File 'lib/models/windows_device_malware_state.rb', line 186

def serialize(writer)
    raise StandardError, 'writer cannot be null' if writer.nil?
    super
    writer.write_string_value("additionalInformationUrl", @additional_information_url)
    writer.write_enum_value("category", @category)
    writer.write_number_value("detectionCount", @detection_count)
    writer.write_string_value("displayName", @display_name)
    writer.write_enum_value("executionState", @execution_state)
    writer.write_date_time_value("initialDetectionDateTime", @initial_detection_date_time)
    writer.write_date_time_value("lastStateChangeDateTime", @last_state_change_date_time)
    writer.write_enum_value("severity", @severity)
    writer.write_enum_value("state", @state)
    writer.write_enum_value("threatState", @threat_state)
end

#severityObject

Gets the severity property value. Severity of the malware. Possible values are: unknown, low, moderate, high, severe.

Returns:

  • a windows_malware_severity



204
205
206
# File 'lib/models/windows_device_malware_state.rb', line 204

def severity
    return @severity
end

#severity=(value) ⇒ Object

Sets the severity property value. Severity of the malware. Possible values are: unknown, low, moderate, high, severe.

Parameters:

  • value

    Value to set for the severity property.

Returns:

  • a void



212
213
214
# File 'lib/models/windows_device_malware_state.rb', line 212

def severity=(value)
    @severity = value
end

#stateObject

Gets the state property value. Current status of the malware like cleaned/quarantined/allowed etc. Possible values are: unknown, detected, cleaned, quarantined, removed, allowed, blocked, cleanFailed, quarantineFailed, removeFailed, allowFailed, abandoned, blockFailed.

Returns:

  • a windows_malware_state



219
220
221
# File 'lib/models/windows_device_malware_state.rb', line 219

def state
    return @state
end

#state=(value) ⇒ Object

Sets the state property value. Current status of the malware like cleaned/quarantined/allowed etc. Possible values are: unknown, detected, cleaned, quarantined, removed, allowed, blocked, cleanFailed, quarantineFailed, removeFailed, allowFailed, abandoned, blockFailed.

Parameters:

  • value

    Value to set for the state property.

Returns:

  • a void



227
228
229
# File 'lib/models/windows_device_malware_state.rb', line 227

def state=(value)
    @state = value
end

#threat_stateObject

Gets the threatState property value. Current status of the malware like cleaned/quarantined/allowed etc. Possible values are: active, actionFailed, manualStepsRequired, fullScanRequired, rebootRequired, remediatedWithNonCriticalFailures, quarantined, removed, cleaned, allowed, noStatusCleared.

Returns:

  • a windows_malware_threat_state



234
235
236
# File 'lib/models/windows_device_malware_state.rb', line 234

def threat_state
    return @threat_state
end

#threat_state=(value) ⇒ Object

Sets the threatState property value. Current status of the malware like cleaned/quarantined/allowed etc. Possible values are: active, actionFailed, manualStepsRequired, fullScanRequired, rebootRequired, remediatedWithNonCriticalFailures, quarantined, removed, cleaned, allowed, noStatusCleared.

Parameters:

  • value

    Value to set for the threatState property.

Returns:

  • a void



242
243
244
# File 'lib/models/windows_device_malware_state.rb', line 242

def threat_state=(value)
    @threat_state = value
end