Class WindowsMalwareInformation

java.lang.Object
com.microsoft.graph.models.Entity
com.microsoft.graph.models.WindowsMalwareInformation
All Implemented Interfaces:
com.microsoft.kiota.serialization.AdditionalDataHolder, com.microsoft.kiota.serialization.Parsable, com.microsoft.kiota.store.BackedModel

@Generated("com.microsoft.kiota") public class WindowsMalwareInformation extends Entity implements com.microsoft.kiota.serialization.Parsable
Malware information entity.
  • Constructor Details

    • WindowsMalwareInformation

      public WindowsMalwareInformation()
      Instantiates a new WindowsMalwareInformation and sets the default values.
  • Method Details

    • createFromDiscriminatorValue

      @Nonnull public static WindowsMalwareInformation createFromDiscriminatorValue(@Nonnull com.microsoft.kiota.serialization.ParseNode parseNode)
      Creates a new instance of the appropriate class based on discriminator value
      Parameters:
      parseNode - The parse node to use to read the discriminator value and create the object
      Returns:
      a WindowsMalwareInformation
    • getAdditionalInformationUrl

      @Nullable public String getAdditionalInformationUrl()
      Gets the additionalInformationUrl property value. Indicates an informational URL to learn more about the malware
      Returns:
      a String
    • getCategory

      @Nullable public WindowsMalwareCategory getCategory()
      Gets the category property value. Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule. default value is invalid. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.
      Returns:
      a WindowsMalwareCategory
    • getDeviceMalwareStates

      @Nullable public List<MalwareStateForWindowsDevice> getDeviceMalwareStates()
      Gets the deviceMalwareStates property value. List of devices affected by current malware with the malware state on each device
      Returns:
      a List<MalwareStateForWindowsDevice>
    • getDisplayName

      @Nullable public String getDisplayName()
      Gets the displayName property value. Indicates the name of the malware
      Returns:
      a String
    • getFieldDeserializers

      @Nonnull public Map<String,Consumer<com.microsoft.kiota.serialization.ParseNode>> getFieldDeserializers()
      The deserialization information for the current model
      Specified by:
      getFieldDeserializers in interface com.microsoft.kiota.serialization.Parsable
      Overrides:
      getFieldDeserializers in class Entity
      Returns:
      a Map<String,Consumer<com.microsoft.kiota.serialization.ParseNode>>
    • getLastDetectionDateTime

      @Nullable public OffsetDateTime getLastDetectionDateTime()
      Gets the lastDetectionDateTime property value. Indicates the last time the malware was detected in UTC
      Returns:
      a OffsetDateTime
    • getSeverity

      @Nullable public WindowsMalwareSeverity getSeverity()
      Gets the severity property value. Severity of the malware. Possible values are: unknown, low, moderate, high, severe. default is unknown. Possible values are: unknown, low, moderate, high, severe.
      Returns:
      a WindowsMalwareSeverity
    • serialize

      public void serialize(@Nonnull com.microsoft.kiota.serialization.SerializationWriter writer)
      Serializes information the current object
      Specified by:
      serialize in interface com.microsoft.kiota.serialization.Parsable
      Overrides:
      serialize in class Entity
      Parameters:
      writer - Serialization writer to use to serialize this model
    • setAdditionalInformationUrl

      public void setAdditionalInformationUrl(@Nullable String value)
      Sets the additionalInformationUrl property value. Indicates an informational URL to learn more about the malware
      Parameters:
      value - Value to set for the additionalInformationUrl property.
    • setCategory

      public void setCategory(@Nullable WindowsMalwareCategory value)
      Sets the category property value. Category of the malware. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule. default value is invalid. Possible values are: invalid, adware, spyware, passwordStealer, trojanDownloader, worm, backdoor, remoteAccessTrojan, trojan, emailFlooder, keylogger, dialer, monitoringSoftware, browserModifier, cookie, browserPlugin, aolExploit, nuker, securityDisabler, jokeProgram, hostileActiveXControl, softwareBundler, stealthNotifier, settingsModifier, toolBar, remoteControlSoftware, trojanFtp, potentialUnwantedSoftware, icqExploit, trojanTelnet, exploit, filesharingProgram, malwareCreationTool, remoteControlSoftware, tool, trojanDenialOfService, trojanDropper, trojanMassMailer, trojanMonitoringSoftware, trojanProxyServer, virus, known, unknown, spp, behavior, vulnerability, policy, enterpriseUnwantedSoftware, ransom, hipsRule.
      Parameters:
      value - Value to set for the category property.
    • setDeviceMalwareStates

      public void setDeviceMalwareStates(@Nullable List<MalwareStateForWindowsDevice> value)
      Sets the deviceMalwareStates property value. List of devices affected by current malware with the malware state on each device
      Parameters:
      value - Value to set for the deviceMalwareStates property.
    • setDisplayName

      public void setDisplayName(@Nullable String value)
      Sets the displayName property value. Indicates the name of the malware
      Parameters:
      value - Value to set for the displayName property.
    • setLastDetectionDateTime

      public void setLastDetectionDateTime(@Nullable OffsetDateTime value)
      Sets the lastDetectionDateTime property value. Indicates the last time the malware was detected in UTC
      Parameters:
      value - Value to set for the lastDetectionDateTime property.
    • setSeverity

      public void setSeverity(@Nullable WindowsMalwareSeverity value)
      Sets the severity property value. Severity of the malware. Possible values are: unknown, low, moderate, high, severe. default is unknown. Possible values are: unknown, low, moderate, high, severe.
      Parameters:
      value - Value to set for the severity property.