Package com.microsoft.graph.models
Class WindowsDeviceMalwareState
java.lang.Object
com.microsoft.graph.models.Entity
com.microsoft.graph.models.WindowsDeviceMalwareState
- All Implemented Interfaces:
com.microsoft.graph.serializer.IJsonBackedObject
public class WindowsDeviceMalwareState
extends Entity
implements com.microsoft.graph.serializer.IJsonBackedObject
The class for the Windows Device Malware State.
-
Field Summary
FieldsModifier and TypeFieldDescriptionThe Additional Information Url.The Category.The Detection Count.The Display Name.The Execution State.The Initial Detection Date Time.The Last State Change Date Time.The Severity.The State.The Threat State. -
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionvoidsetRawObject(com.microsoft.graph.serializer.ISerializer serializer, com.google.gson.JsonObject json) Sets the raw JSON objectMethods inherited from class com.microsoft.graph.models.Entity
additionalDataManagerMethods inherited from class java.lang.Object
clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, waitMethods inherited from interface com.microsoft.graph.serializer.IJsonBackedObject
additionalDataManager
-
Field Details
-
additionalInformationUrl
@SerializedName(value="additionalInformationUrl", alternate="AdditionalInformationUrl") @Expose @Nullable public String additionalInformationUrlThe Additional Information Url. Information URL to learn more about the malware -
category
@SerializedName(value="category", alternate="Category") @Expose @Nullable public WindowsMalwareCategory categoryThe Category. Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remote_Control_Software, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule. -
detectionCount
@SerializedName(value="detectionCount", alternate="DetectionCount") @Expose @Nullable public Integer detectionCountThe Detection Count. Number of times the malware is detected -
displayName
@SerializedName(value="displayName", alternate="DisplayName") @Expose @Nullable public String displayNameThe Display Name. Malware name -
executionState
@SerializedName(value="executionState", alternate="ExecutionState") @Expose @Nullable public WindowsMalwareExecutionState executionStateThe Execution State. Execution status of the malware like blocked/executing etc. Possible values are: unknown, blocked, allowed, running, notRunning. -
initialDetectionDateTime
@SerializedName(value="initialDetectionDateTime", alternate="InitialDetectionDateTime") @Expose @Nullable public OffsetDateTime initialDetectionDateTimeThe Initial Detection Date Time. Initial detection datetime of the malware -
lastStateChangeDateTime
@SerializedName(value="lastStateChangeDateTime", alternate="LastStateChangeDateTime") @Expose @Nullable public OffsetDateTime lastStateChangeDateTimeThe Last State Change Date Time. The last time this particular threat was changed -
severity
@SerializedName(value="severity", alternate="Severity") @Expose @Nullable public WindowsMalwareSeverity severityThe Severity. Severity of the malware. Possible values are: unknown, low, moderate, high, severe. -
state
@SerializedName(value="state", alternate="State") @Expose @Nullable public WindowsMalwareState stateThe State. Current status of the malware like cleaned/quarantined/allowed etc. Possible values are: unknown, detected, cleaned, quarantined, removed, allowed, blocked, cleanFailed, quarantineFailed, removeFailed, allowFailed, abandoned, blockFailed. -
threatState
@SerializedName(value="threatState", alternate="ThreatState") @Expose @Nullable public WindowsMalwareThreatState threatStateThe Threat State. Current status of the malware like cleaned/quarantined/allowed etc. Possible values are: active, actionFailed, manualStepsRequired, fullScanRequired, rebootRequired, remediatedWithNonCriticalFailures, quarantined, removed, cleaned, allowed, noStatusCleared.
-
-
Constructor Details
-
WindowsDeviceMalwareState
public WindowsDeviceMalwareState()
-
-
Method Details
-
setRawObject
public void setRawObject(@Nonnull com.microsoft.graph.serializer.ISerializer serializer, @Nonnull com.google.gson.JsonObject json) Sets the raw JSON object- Specified by:
setRawObjectin interfacecom.microsoft.graph.serializer.IJsonBackedObject- Overrides:
setRawObjectin classEntity- Parameters:
serializer- the serializerjson- the JSON object to set this object to
-