diff options
author | Wim <wim@42.be> | 2019-12-26 23:12:28 +0100 |
---|---|---|
committer | Wim <wim@42.be> | 2020-03-01 22:19:33 +0100 |
commit | 795a8705c3fdc5bf55e83d382e7d3ff233896a0b (patch) | |
tree | 46ac43e487102de7ea21a823a7a7902ae9493f88 /vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go | |
parent | 3af0dc3b3a5bfaffe37770c437427f1e99402405 (diff) | |
download | matterbridge-msglm-795a8705c3fdc5bf55e83d382e7d3ff233896a0b.tar.gz matterbridge-msglm-795a8705c3fdc5bf55e83d382e7d3ff233896a0b.tar.bz2 matterbridge-msglm-795a8705c3fdc5bf55e83d382e7d3ff233896a0b.zip |
Add initial Microsoft Teams support
Documentation on https://github.com/42wim/matterbridge/wiki/MS-Teams-setup
Diffstat (limited to 'vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go')
-rw-r--r-- | vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go b/vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go new file mode 100644 index 00000000..ec8b2dbd --- /dev/null +++ b/vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go @@ -0,0 +1,33 @@ +// Code generated by msgraph-generate.go DO NOT EDIT. + +package msgraph + +import "time" + +// WindowsDeviceMalwareState Malware detection entity. +type WindowsDeviceMalwareState struct { + // Entity is the base model of WindowsDeviceMalwareState + Entity + // DisplayName Malware name + DisplayName *string `json:"displayName,omitempty"` + // AdditionalInformationURL Information URL to learn more about the malware + AdditionalInformationURL *string `json:"additionalInformationUrl,omitempty"` + // Severity Severity of the malware + Severity *WindowsMalwareSeverity `json:"severity,omitempty"` + // Catetgory Category of the malware + Catetgory *WindowsMalwareCategory `json:"catetgory,omitempty"` + // ExecutionState Execution status of the malware like blocked/executing etc + ExecutionState *WindowsMalwareExecutionState `json:"executionState,omitempty"` + // State Current status of the malware like cleaned/quarantined/allowed etc + State *WindowsMalwareState `json:"state,omitempty"` + // ThreatState Current status of the malware like cleaned/quarantined/allowed etc + ThreatState *WindowsMalwareThreatState `json:"threatState,omitempty"` + // InitialDetectionDateTime Initial detection datetime of the malware + InitialDetectionDateTime *time.Time `json:"initialDetectionDateTime,omitempty"` + // LastStateChangeDateTime The last time this particular threat was changed + LastStateChangeDateTime *time.Time `json:"lastStateChangeDateTime,omitempty"` + // DetectionCount Number of times the malware is detected + DetectionCount *int `json:"detectionCount,omitempty"` + // Category Category of the malware + Category *WindowsMalwareCategory `json:"category,omitempty"` +} |