PATH:
opt
/
imunify360
/
venv
/
lib
/
python3.11
/
site-packages
/
imav
/
malwarelib
/
rpc
/
schema
malware user list: return_type: MalwareUserListAgentResponse help: Show the list of users in the system and their infection status type: dict cli: users: - root schema: search: type: string nullable: true help: Search by user name. limit: type: integer coerce: int default: 100 help: Page size offset: type: integer coerce: int default: 0 help: Page offset order_by: type: list schema: type: order_by coerce: order_by nullable: true help: | List of fields to order by, each followed by a `+` (ascending) or `-` (descending). E.g. `["scan_status+","scan_date-"]` would order by `scan_status` ascending and `scan_date` descending. user: # TODO: remove this field type: string nullable: true ids: type: list schema: type: string nullable: true help: | List exact usernames to return. Incompatible with `search` and ignores `order_by`. malware user scan: return_type: NullAgentResponse help: Queue on-demand scans for each user on the server type: dict cli: users: - root schema: background: type: boolean default: false help: | (internal) Treat it as a "background" scan - lower priority, different cancellation rules, etc. follow_symlinks: type: boolean default: false dependencies: scan_file: true help: If true, the scanner may traverse outside of the users' home directories. detect_elf: type: boolean default: false dependencies: scan_file: true help: Treat ELF binaries in home directories as malware. scan_file: type: boolean default: true help: Whether or not to scan users' files. scan_db: type: boolean default: null coerce: scan_db help: Whether or not to scan users' databases.
[-] on-demand.pickle
[edit]
[-] submit.pickle
[edit]
[-] ignore.pickle
[edit]
[-] on-demand.yaml
[edit]
[+]
..
[-] vulnerabilities.yaml
[edit]
[-] malware-rebuild-patterns.yaml
[edit]
[-] on-demand-user.yaml
[edit]
[-] user.pickle
[edit]
[-] on-demand-queue.yaml
[edit]
[-] history.yaml
[edit]
[-] on-demand-queue.pickle
[edit]
[-] malware-rebuild-patterns.pickle
[edit]
[-] malware-rescan-files.yaml
[edit]
[-] ignore.yaml
[edit]
[-] history.pickle
[edit]
[-] imunify-patch-subscriptions.yaml
[edit]
[-] user.yaml
[edit]
[-] read.yaml
[edit]
[-] imunify-patch-subscriptions.pickle
[edit]
[-] malicious.pickle
[edit]
[-] vulnerabilities.pickle
[edit]
[-] malware-send-files.pickle
[edit]
[-] read.pickle
[edit]
[-] malware-rescan-files.pickle
[edit]
[-] on-demand-user.pickle
[edit]
[-] submit.yaml
[edit]
[-] malware-send-files.yaml
[edit]
[-] malicious.yaml
[edit]