summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go
diff options
context:
space:
mode:
authorWim <wim@42.be>2020-03-08 17:08:18 +0100
committerGitHub <noreply@github.com>2020-03-08 17:08:18 +0100
commit9785edd26366be8eb11c2435f50f90a5c8eea7fc (patch)
treee8e236b5b273e7535c607507cc059f3b957068a1 /vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go
parent2a0bc11b684f63305258e338c5f1d0e91eb24414 (diff)
downloadmatterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.gz
matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.bz2
matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.zip
Remove replace directives and use own fork to make go get work again (#1028)
See https://github.com/golang/go/issues/30354 go get doesn't honor the go.mod replace options.
Diffstat (limited to 'vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go')
-rw-r--r--vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go33
1 files changed, 33 insertions, 0 deletions
diff --git a/vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go b/vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go
new file mode 100644
index 00000000..ec8b2dbd
--- /dev/null
+++ b/vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go
@@ -0,0 +1,33 @@
+// Code generated by msgraph-generate.go DO NOT EDIT.
+
+package msgraph
+
+import "time"
+
+// WindowsDeviceMalwareState Malware detection entity.
+type WindowsDeviceMalwareState struct {
+ // Entity is the base model of WindowsDeviceMalwareState
+ Entity
+ // DisplayName Malware name
+ DisplayName *string `json:"displayName,omitempty"`
+ // AdditionalInformationURL Information URL to learn more about the malware
+ AdditionalInformationURL *string `json:"additionalInformationUrl,omitempty"`
+ // Severity Severity of the malware
+ Severity *WindowsMalwareSeverity `json:"severity,omitempty"`
+ // Catetgory Category of the malware
+ Catetgory *WindowsMalwareCategory `json:"catetgory,omitempty"`
+ // ExecutionState Execution status of the malware like blocked/executing etc
+ ExecutionState *WindowsMalwareExecutionState `json:"executionState,omitempty"`
+ // State Current status of the malware like cleaned/quarantined/allowed etc
+ State *WindowsMalwareState `json:"state,omitempty"`
+ // ThreatState Current status of the malware like cleaned/quarantined/allowed etc
+ ThreatState *WindowsMalwareThreatState `json:"threatState,omitempty"`
+ // InitialDetectionDateTime Initial detection datetime of the malware
+ InitialDetectionDateTime *time.Time `json:"initialDetectionDateTime,omitempty"`
+ // LastStateChangeDateTime The last time this particular threat was changed
+ LastStateChangeDateTime *time.Time `json:"lastStateChangeDateTime,omitempty"`
+ // DetectionCount Number of times the malware is detected
+ DetectionCount *int `json:"detectionCount,omitempty"`
+ // Category Category of the malware
+ Category *WindowsMalwareCategory `json:"category,omitempty"`
+}