InfectedFile#
- class InfectedFile(mount_target_ext_id=None, path=None, threat_description=None, scan_time=None, partner_server=None, is_quarantined=None, ext_id=None, links=None, tenant_id=None, *args, **kwargs)#
Bases:
ExternalizableAbstractModel
Infected files model
- Parameters:
mount_target_ext_id – (
mount_target_ext_id
) The external identifier of the mount target where infected file belongs to. Example:9c1e537d-6777-4c22-5d41-ddd0c3337aa9.path (max=4095 chars) – (
path
) Path of infected filethreat_description (max=180 chars) – (
threat_description
) Threat details for infected filescan_time – (
scan_time
) Scan timestamp of infected file. This is a read-only field.partner_server (max=2048 chars) – (
partner_server
) Partner server details.is_quarantined – (
is_quarantined
) Quarantine status of infected files.
- property is_quarantined#
Quarantine status of infected files.
- Type:
bool
- property mount_target_ext_id#
The external identifier of the mount target where infected file belongs to. Example:9c1e537d-6777-4c22-5d41-ddd0c3337aa9.
- Type:
str
- property partner_server#
Partner server details.
- Type:
str
- property path#
Path of infected file
- Type:
str
- property scan_time#
Scan timestamp of infected file. This is a read-only field.
- Type:
datetime
- property threat_description#
Threat details for infected file
- Type:
str
- to_dict()#
Returns the model properties as a dictionary
- to_str()#
Returns the string representation of the model