InfectedFile#

class InfectedFile(mount_target_ext_id=None, path=None, threat_description=None, scan_time=None, partner_server=None, is_quarantined=None, ext_id=None, links=None, tenant_id=None, *args, **kwargs)#

Bases: ExternalizableAbstractModel

Infected files model

Parameters:
  • mount_target_ext_id – (mount_target_ext_id) The external identifier of the mount target where infected file belongs to. Example:9c1e537d-6777-4c22-5d41-ddd0c3337aa9.

  • path (max=4095 chars) – (path) Path of infected file

  • threat_description (max=180 chars) – (threat_description) Threat details for infected file

  • scan_time – (scan_time) Scan timestamp of infected file. This is a read-only field.

  • partner_server (max=2048 chars) – (partner_server) Partner server details.

  • is_quarantined – (is_quarantined) Quarantine status of infected files.

property is_quarantined#

Quarantine status of infected files.

Type:

bool

property mount_target_ext_id#

The external identifier of the mount target where infected file belongs to. Example:9c1e537d-6777-4c22-5d41-ddd0c3337aa9.

Type:

str

property partner_server#

Partner server details.

Type:

str

property path#

Path of infected file

Type:

str

property scan_time#

Scan timestamp of infected file. This is a read-only field.

Type:

datetime

property threat_description#

Threat details for infected file

Type:

str

to_dict()#

Returns the model properties as a dictionary

to_str()#

Returns the string representation of the model