Deep Security Manager REST API

Name: antiMalwareEvent

 

XML Example:
<antiMalwareEvent>
  <antiMalwareConfigID>xsd:int</antiMalwareConfigID>
  <antiMalwareEventID>xsd:long</antiMalwareEventID>
  <errorCode>xsd:int</errorCode>
  <hostID>xsd:int</hostID>
  <hostName>xsd:string</hostName>
  <infectedFilePath>xsd:string</infectedFilePath>
  <infectionSource>xsd:string</infectionSource>
  <logTime>xsd:datetime</logTime>
  <malwareName>xsd:string</malwareName>
  <malwareType>GENERAL | SPYWARE</malwareType>
  <origin>UNKNOWN | AGENT | GUESTAGENT | APPLIANCEAGENT | MANAGER</origin>
  <protocol>xsd:int</protocol>
  <quarantineRecordID>xsd:int</quarantineRecordID>
  <scanAction1>xsd:int</scanAction1>
  <scanAction2>xsd:int</scanAction2>
  <scanResultAction1>xsd:int</scanResultAction1>
  <scanResultAction2>xsd:int</scanResultAction2>
  <scanType>REALTIME | MANUAL | SCHEDULED | QUICK</scanType>
  zero or N[<spywareItems>antiMalwareSpywareItem</spywareItems>]
  <summaryScanResult>xsd:string</summaryScanResult>
  <tags>xsd:string</tags>
</antiMalwareEvent>
JSON Example:
{"antiMalwareEvent":
 {
   "antiMalwareConfigID": Number,
   "antiMalwareEventID": Number,
   "errorCode": Number,
   "hostID": Number,
   "hostName": String,
   "infectedFilePath": String,
   "infectionSource": String,
   "logTime": Date,
   "malwareName": String,
   "malwareType": 'GENERAL' | 'SPYWARE',
   "origin": 'UNKNOWN' | 'AGENT' | 'GUESTAGENT' | 'APPLIANCEAGENT' | 'MANAGER',
   "protocol": Number,
   "quarantineRecordID": Number,
   "scanAction1": Number,
   "scanAction2": Number,
   "scanResultAction1": Number,
   "scanResultAction2": Number,
   "scanType": 'REALTIME' | 'MANUAL' | 'SCHEDULED' | 'QUICK',
   "spywareItems": [antiMalwareSpywareItem],
   "summaryScanResult": String,
   "tags": String,
 }
}

Elements
NameTypeRequiredNillableDefault ValueDescription
antiMalwareConfigIDxsd:intfalsefalseThe primary key of AntiMalwareID.

antiMalwareEventIDxsd:longfalsefalseThe primary key of the event entry.

errorCodexsd:intfalsefalseThe VSAPI error code indicates the reason of the actions of failure.

hostIDxsd:intfalsefalseThe id of the host the event was recorded on

hostNamexsd:stringfalsefalseThe host name of the event was recorded on

infectedFilePathxsd:stringfalsefalseThe infected file full path

infectionSourcexsd:stringfalsefalseThe source computer of the infection

logTimexsd:datetimefalsefalseThe time of the event as recorded by the agent.

malwareNamexsd:stringfalsefalseThe name of the malware

malwareTypeGENERAL | SPYWAREfalsefalseThe Malware Type of Event

originUNKNOWN | AGENT | GUESTAGENT | APPLIANCEAGENT | MANAGERfalsefalsethe location where the event originated

protocolxsd:intfalsefalseThe protocols: Local Files(0), Network shared folder(1), etc. However, currently Agent only support local files.

quarantineRecordIDxsd:intfalsefalseThe Record ID referring to the record in QuarantineFile Table

scanAction1xsd:intfalsefalseThe actual first scan action being taken: e.g. Pass, Delete, Quarantined...etc

scanAction2xsd:intfalsefalseThe actual second scan action being taken: e.g. Pass, Delete, Quarantined...etc

scanResultAction1xsd:intfalsefalseThe result of the first scan action: represent whether the action is successful (0) or failed (Error Code)

scanResultAction2xsd:intfalsefalseThe result of the second scan action: represent whether the action is successful (0) or failed (Error Code)

scanTypeREALTIME | MANUAL | SCHEDULED | QUICKfalsefalseThe scan types include Real time, Manual, Scheduled, Quick etc.

spywareItemszero or N[antiMalwareSpywareItem]falsefalseLists of spyware items if this is a spyware event.

summaryScanResultxsd:stringfalsefalseScan result description.

tagsxsd:stringfalsefalsethe event's tags.


Copyright © 2015 Trend Micro Inc. All Rights Reserved.