Package com.microsoft.graph.models
Class WindowsMalwareInformation
java.lang.Object
com.microsoft.graph.models.Entity
com.microsoft.graph.models.WindowsMalwareInformation
- All Implemented Interfaces:
com.microsoft.kiota.serialization.AdditionalDataHolder
,com.microsoft.kiota.serialization.Parsable
,com.microsoft.kiota.store.BackedModel
@Generated("com.microsoft.kiota")
public class WindowsMalwareInformation
extends Entity
implements com.microsoft.kiota.serialization.Parsable
Malware information entity.
-
Field Summary
Fields inherited from class com.microsoft.graph.models.Entity
backingStore
-
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionstatic WindowsMalwareInformation
createFromDiscriminatorValue
(com.microsoft.kiota.serialization.ParseNode parseNode) Creates a new instance of the appropriate class based on discriminator valueGets the additionalInformationUrl property value.Gets the category property value.Gets the deviceMalwareStates property value.Gets the displayName property value.The deserialization information for the current modelGets the lastDetectionDateTime property value.Gets the severity property value.void
serialize
(com.microsoft.kiota.serialization.SerializationWriter writer) Serializes information the current objectvoid
Sets the additionalInformationUrl property value.void
Sets the category property value.void
Sets the deviceMalwareStates property value.void
setDisplayName
(String value) Sets the displayName property value.void
Sets the lastDetectionDateTime property value.void
Sets the severity property value.Methods inherited from class com.microsoft.graph.models.Entity
getAdditionalData, getBackingStore, getId, getOdataType, setAdditionalData, setBackingStore, setId, setOdataType
-
Constructor Details
-
WindowsMalwareInformation
public WindowsMalwareInformation()Instantiates a newWindowsMalwareInformation
and sets the default values.
-
-
Method Details
-
createFromDiscriminatorValue
@Nonnull public static WindowsMalwareInformation createFromDiscriminatorValue(@Nonnull com.microsoft.kiota.serialization.ParseNode parseNode) Creates a new instance of the appropriate class based on discriminator value- Parameters:
parseNode
- The parse node to use to read the discriminator value and create the object- Returns:
- a
WindowsMalwareInformation
-
getAdditionalInformationUrl
Gets the additionalInformationUrl property value. Indicates an informational URL to learn more about the malware- Returns:
- a
String
-
getCategory
Gets the category property value. Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule. default value is invalid. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.- Returns:
- a
WindowsMalwareCategory
-
getDeviceMalwareStates
Gets the deviceMalwareStates property value. List of devices affected by current malware with the malware state on each device- Returns:
- a
List<MalwareStateForWindowsDevice>
-
getDisplayName
Gets the displayName property value. Indicates the name of the malware- Returns:
- a
String
-
getFieldDeserializers
@Nonnull public Map<String,Consumer<com.microsoft.kiota.serialization.ParseNode>> getFieldDeserializers()The deserialization information for the current model- Specified by:
getFieldDeserializers
in interfacecom.microsoft.kiota.serialization.Parsable
- Overrides:
getFieldDeserializers
in classEntity
- Returns:
- a
Map<String,
Consumer<com.microsoft.kiota.serialization.ParseNode>>
-
getLastDetectionDateTime
Gets the lastDetectionDateTime property value. Indicates the last time the malware was detected in UTC- Returns:
- a
OffsetDateTime
-
getSeverity
Gets the severity property value. Severity of the malware. Possible values are: unknown, low, moderate, high, severe. default is unknown. Possible values are: unknown, low, moderate, high, severe.- Returns:
- a
WindowsMalwareSeverity
-
serialize
public void serialize(@Nonnull com.microsoft.kiota.serialization.SerializationWriter writer) Serializes information the current object -
setAdditionalInformationUrl
Sets the additionalInformationUrl property value. Indicates an informational URL to learn more about the malware- Parameters:
value
- Value to set for the additionalInformationUrl property.
-
setCategory
Sets the category property value. Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule. default value is invalid. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.- Parameters:
value
- Value to set for the category property.
-
setDeviceMalwareStates
Sets the deviceMalwareStates property value. List of devices affected by current malware with the malware state on each device- Parameters:
value
- Value to set for the deviceMalwareStates property.
-
setDisplayName
Sets the displayName property value. Indicates the name of the malware- Parameters:
value
- Value to set for the displayName property.
-
setLastDetectionDateTime
Sets the lastDetectionDateTime property value. Indicates the last time the malware was detected in UTC- Parameters:
value
- Value to set for the lastDetectionDateTime property.
-
setSeverity
Sets the severity property value. Severity of the malware. Possible values are: unknown, low, moderate, high, severe. default is unknown. Possible values are: unknown, low, moderate, high, severe.- Parameters:
value
- Value to set for the severity property.
-