1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84
//! [`EventXpMalwareRemediated`]
use std::ffi::OsStr;
use endpoint_sec_sys::es_event_xp_malware_remediated_t;
use crate::AuditToken;
/// XProtect remediated malware.
#[doc(alias = "es_event_xp_malware_remediated_t")]
pub struct EventXpMalwareRemediated<'a> {
/// Raw event
pub(crate) raw: &'a es_event_xp_malware_remediated_t,
}
impl<'a> EventXpMalwareRemediated<'a> {
/// Version of the signatures used for detection. Currently corresponds to XProtect version.
#[inline(always)]
pub fn signature_version(&self) -> &'a OsStr {
// Safety: 'a tied to self, object obtained through ES
unsafe { self.raw.signature_version.as_os_str() }
}
/// String identifying the malware that was remediated.
#[inline(always)]
pub fn malware_identifier(&self) -> &'a OsStr {
// Safety: 'a tied to self, object obtained through ES
unsafe { self.raw.malware_identifier.as_os_str() }
}
/// String identifying the incident, intended for linking multiple malware remediated and
/// remediated events.
#[inline(always)]
pub fn incident_identifier(&self) -> &'a OsStr {
// Safety: 'a tied to self, object obtained through ES
unsafe { self.raw.incident_identifier.as_os_str() }
}
/// String indicating the type of action that was taken, e.g. "path_delete".
#[inline(always)]
pub fn action_type(&self) -> &'a OsStr {
// Safety: 'a tied to self, object obtained through ES
unsafe { self.raw.action_type.as_os_str() }
}
/// True only if remediation was successful.
#[inline(always)]
pub fn success(&self) -> bool {
self.raw.success
}
/// String describing specific reasons for failure or success.
#[inline(always)]
pub fn result_description(&self) -> &'a OsStr {
// Safety: 'a tied to self, object obtained through ES
unsafe { self.raw.result_description.as_os_str() }
}
/// Optional. Path that was subject to remediation, if any. This path is not necessarily
/// a malicious binary, it can also be a legitimate file containing a malicious portion.
/// Specifically, the file at this path may still exist after successful remediation.
#[inline(always)]
pub fn remediated_path(&self) -> &'a OsStr {
// Safety: 'a tied to self, object obtained through ES
unsafe { self.raw.remediated_path.as_os_str() }
}
/// Audit token of process that was subject to remediation, if any.
#[inline(always)]
pub fn remediated_process_audit_token(&self) -> Option<AuditToken> {
// Safety: 'a tied to self, object obtained through ES
let at = unsafe { self.raw.remediated_process_audit_token()? };
Some(AuditToken::new(*at))
}
}
// Safety: safe to send across threads: does not contain any interior mutability nor depend on current thread state
unsafe impl Send for EventXpMalwareRemediated<'_> {}
impl_debug_eq_hash_with_functions!(
EventXpMalwareRemediated<'a>;
signature_version, malware_identifier, incident_identifier, action_type,
success, result_description, remediated_path, remediated_process_audit_token,
);