PATH:
opt
/
imunify360
/
venv
/
lib
/
python3.11
/
site-packages
/
imav
/
malwarelib
/
rpc
/
schema
��, }��malware history list�}�(�help��<Show the log of Malware Scanner events and performed actions��return_type��MalwareHistoryListAgentResponse��type��dict��cli�}��users�]��root�as�schema�}�(�since�}�(�type��integer��coerce��int��default�K �help��&Show events after this unix timestamp.�u�to�}�(�type��integer��coerce��int��default_setter��now��help��'Show events before this unix timestamp.�u�limit�}�(�type��integer��default�K2�coerce��int��help�� Page size�u�offset�}�(�type��integer��default�K �coerce��int��help��Page offset�u�search�}�(�type��string��nullable���help��Search by file path.�u�user�}�(�type��string��nullable���help��SAdmins can filter results by user. Users can only see the events relevant to them. �u�order_by�}�(�type��list��schema�}�(�type��order_by��coerce��order_by�u�nullable���help���List of fields to order by, each followed by a `+` (ascending) or `-` (descending). E.g. `["ctime-","initiator+"]` would order by event timestamp descending and event `initiator` ascending. �uuus.
[+]
..
[-] on-demand-queue.yaml
[open]
[-] submit.yaml
[open]
[-] user.yaml
[open]
[-] read.pickle
[open]
[-] imunify-patch-subscriptions.yaml
[open]
[-] history.pickle
[open]
[-] on-demand.pickle
[open]
[-] read.yaml
[open]
[-] vulnerabilities.pickle
[open]
[-] malware-rescan-files.pickle
[open]
[-] on-demand-user.pickle
[open]
[-] user.pickle
[open]
[-] vulnerabilities.yaml
[open]
[-] submit.pickle
[open]
[-] on-demand-user.yaml
[open]
[-] malware-send-files.yaml
[open]
[-] on-demand.yaml
[open]
[-] ignore.yaml
[open]
[-] malicious.yaml
[open]
[-] malware-rebuild-patterns.pickle
[open]
[-] imunify-patch-subscriptions.pickle
[open]
[-] ignore.pickle
[open]
[-] malware-send-files.pickle
[open]
[-] malware-rebuild-patterns.yaml
[open]
[-] malicious.pickle
[open]
[-] history.yaml
[open]
[-] malware-rescan-files.yaml
[open]
[-] on-demand-queue.pickle
[open]