PATH:
opt
/
imunify360
/
venv
/
lib
/
python3.11
/
site-packages
/
imav
/
malwarelib
/
rpc
/
schema
��� }�(�malware on-demand start-user�}�(�return_type��NullAgentResponse��help��Scan a user's home directory��type��dict��schema�}��user�}�(�type��string��nullable���help��Username to scan�usu�malware on-demand stop-user�}�(�return_type��NullAgentResponse��help��Stop a user's on-demand scan��type��dict��schema�}��user�}�(�type��string��nullable���help��Username�usu�malware on-demand status-user�}�(�return_type��#OnDemandUserScanStatusAgentResponse��help��-Check the status of the user's on-demand scan��type��dict��schema�}��user�}�(�type��string��nullable���help��Username�usu�malware on-demand list-user�}�(�type��dict��help��[List scans of a specific user. This request can be performed by any user, not just admins. ��return_type��OnDemandScanListAgentResponse��schema�}�(�user�}�(�type��string��nullable���help��Username�u�since�}�(�type��integer��coerce��int��default�K �help��-Show scans started after this unix timestamp.�u�to�}�(�type��integer��coerce��int��default_setter��now��help��.Show scans started before this unix timestamp.�u�limit�}�(�type��integer��coerce��int��default�K2�help�� Page size�u�offset�}�(�type��integer��coerce��int��default�K �help��Page offset�u�order_by�}�(�type��list��schema�}�(�type��order_by��coerce��order_by�u�nullable���help���List of fields to order by, each followed by a `+` (ascending) or `-` (descending). E.g. `["started-"]` would order by `started` descending. �uuuu.
[+]
..
[-] on-demand-queue.yaml
[open]
[-] submit.yaml
[open]
[-] user.yaml
[open]
[-] read.pickle
[open]
[-] imunify-patch-subscriptions.yaml
[open]
[-] history.pickle
[open]
[-] on-demand.pickle
[open]
[-] read.yaml
[open]
[-] vulnerabilities.pickle
[open]
[-] malware-rescan-files.pickle
[open]
[-] on-demand-user.pickle
[open]
[-] user.pickle
[open]
[-] vulnerabilities.yaml
[open]
[-] submit.pickle
[open]
[-] on-demand-user.yaml
[open]
[-] malware-send-files.yaml
[open]
[-] on-demand.yaml
[open]
[-] ignore.yaml
[open]
[-] malicious.yaml
[open]
[-] malware-rebuild-patterns.pickle
[open]
[-] imunify-patch-subscriptions.pickle
[open]
[-] ignore.pickle
[open]
[-] malware-send-files.pickle
[open]
[-] malware-rebuild-patterns.yaml
[open]
[-] malicious.pickle
[open]
[-] history.yaml
[open]
[-] malware-rescan-files.yaml
[open]
[-] on-demand-queue.pickle
[open]