Class WindowsMalwareInformation

java.lang.Object
com.microsoft.graph.models.Entity
com.microsoft.graph.models.WindowsMalwareInformation
All Implemented Interfaces:
com.microsoft.graph.serializer.IJsonBackedObject

public class WindowsMalwareInformation extends Entity implements com.microsoft.graph.serializer.IJsonBackedObject
The class for the Windows Malware Information.
  • Field Details

    • additionalInformationUrl

      @SerializedName(value="additionalInformationUrl", alternate="AdditionalInformationUrl") @Expose @Nullable public String additionalInformationUrl
      The Additional Information Url. Indicates an informational URL to learn more about the malware
    • category

      @SerializedName(value="category", alternate="Category") @Expose @Nullable public WindowsMalwareCategory category
      The Category. Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remote_Control_Software, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule. default value is invalid. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remote_Control_Software, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.
    • displayName

      @SerializedName(value="displayName", alternate="DisplayName") @Expose @Nullable public String displayName
      The Display Name. Indicates the name of the malware
    • lastDetectionDateTime

      @SerializedName(value="lastDetectionDateTime", alternate="LastDetectionDateTime") @Expose @Nullable public OffsetDateTime lastDetectionDateTime
      The Last Detection Date Time. Indicates the last time the malware was detected in UTC
    • severity

      @SerializedName(value="severity", alternate="Severity") @Expose @Nullable public WindowsMalwareSeverity severity
      The Severity. Severity of the malware. Possible values are: unknown, low, moderate, high, severe. default is unknown. Possible values are: unknown, low, moderate, high, severe.
    • deviceMalwareStates

      @SerializedName(value="deviceMalwareStates", alternate="DeviceMalwareStates") @Expose @Nullable public MalwareStateForWindowsDeviceCollectionPage deviceMalwareStates
      The Device Malware States. List of devices affected by current malware with the malware state on each device
  • Constructor Details

    • WindowsMalwareInformation

      public WindowsMalwareInformation()
  • Method Details

    • setRawObject

      public void setRawObject(@Nonnull com.microsoft.graph.serializer.ISerializer serializer, @Nonnull com.google.gson.JsonObject json)
      Sets the raw JSON object
      Specified by:
      setRawObject in interface com.microsoft.graph.serializer.IJsonBackedObject
      Overrides:
      setRawObject in class Entity
      Parameters:
      serializer - the serializer
      json - the JSON object to set this object to