PATH:
opt
/
imunify360
/
venv
/
lib
/
python3.11
/
site-packages
/
imav
/
malwarelib
/
rpc
/
schema
malware on-demand start-user: return_type: NullAgentResponse help: Scan a user's home directory type: dict schema: user: type: string nullable: false help: Username to scan malware on-demand stop-user: return_type: NullAgentResponse help: Stop a user's on-demand scan type: dict schema: user: type: string nullable: false help: Username malware on-demand status-user: return_type: OnDemandUserScanStatusAgentResponse help: Check the status of the user's on-demand scan type: dict schema: user: type: string nullable: false help: Username malware on-demand list-user: type: dict help: | List scans of a specific user. This request can be performed by any user, not just admins. return_type: OnDemandScanListAgentResponse schema: user: type: string nullable: false help: Username since: type: integer coerce: int default: 0 help: Show scans started after this unix timestamp. to: type: integer coerce: int default_setter: now help: Show scans started before this unix timestamp. limit: type: integer coerce: int default: 50 help: Page size offset: type: integer coerce: int default: 0 help: Page offset order_by: type: list schema: type: order_by coerce: order_by nullable: true help: | List of fields to order by, each followed by a `+` (ascending) or `-` (descending). E.g. `["started-"]` would order by `started` descending.
[-] on-demand.pickle
[edit]
[-] submit.pickle
[edit]
[-] ignore.pickle
[edit]
[-] on-demand.yaml
[edit]
[+]
..
[-] vulnerabilities.yaml
[edit]
[-] malware-rebuild-patterns.yaml
[edit]
[-] on-demand-user.yaml
[edit]
[-] user.pickle
[edit]
[-] on-demand-queue.yaml
[edit]
[-] history.yaml
[edit]
[-] on-demand-queue.pickle
[edit]
[-] malware-rebuild-patterns.pickle
[edit]
[-] malware-rescan-files.yaml
[edit]
[-] ignore.yaml
[edit]
[-] history.pickle
[edit]
[-] imunify-patch-subscriptions.yaml
[edit]
[-] user.yaml
[edit]
[-] read.yaml
[edit]
[-] imunify-patch-subscriptions.pickle
[edit]
[-] malicious.pickle
[edit]
[-] vulnerabilities.pickle
[edit]
[-] malware-send-files.pickle
[edit]
[-] read.pickle
[edit]
[-] malware-rescan-files.pickle
[edit]
[-] on-demand-user.pickle
[edit]
[-] submit.yaml
[edit]
[-] malware-send-files.yaml
[edit]
[-] malicious.yaml
[edit]