Views:

Last Updated: 1/22/2020 12:11:06 AM

Query detail logs.

Request

HTTP Request

GET /SMPI/{version}/service/wfbss/api/customers/logs

Parameters

Name

Type

Description

Validation

Required Parameters

cids

string

Customer ID

One and only one customer id must be specified.

type

string

Log type

virus, spyware, or wtp

Optional Parameters

     

start_time

integer

Start time of the query interval.

UNIX timestamp (seconds since 1970-01-01 00:00:00 UTC). Default is (end_time - 3600).

end_time

integer

End time of the query interval.

UNIX timestamp(seconds since 1970-01-01 00:00:00 UTC). Default is now. end_time - start_time should not greater than 3600. If end_time - start_time > 3600, start_time will be changed to (end_time - 3600)

limit

integer

The limit of returned records.

0 to 100. Default is 100. If exceeding 100, it will be set to 100.

results

string

The list of action results seperated by comma. If set, only the specified results will be returned. Otherwise, all results will be returned. * This parameter is only available for virus and spyware.

- virus: 0 = {"first": {"action": "clean", "result": "clean_success"}} 1 = {"first": {"action": "quarantine", "result": "quarantine_success"}} 2 = {"first": {"action": "delete", "result": "delete_success"}} 3 = {"first": {"action": "rename", "result": "rename_success"}} 4 = {"first": {"action": "pass", "result": "pass_success"}} 5 = {"first": {"action": "clean", "result": "clean_fail"}} 6 = {"first": {"action": "quarantine", "result": "quarantine_fail"}} 7 ={"first": {"action": "delete", "result": "delete_fail"}} 8 = {"first": {"action": "rename", "result": "rename_fail"}} 9 = {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "quarantine", "result": "quarantine_success"}} 10 = {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "delete", "result": "delete_success"}} 11 = {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "rename", "result": "rename_success"}} 12 = {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "pass", "result": "pass_success"}} 13 = {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "quarantine", "result": "quarantine_fail"}} 14 = {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "delete", "result": "delete_fail"}} 15 = {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "rename", "result": "rename_fail"}} 18, 19, 81, 82, 90, 91 = {"first": {"action": "na", "result": "na_success"}} Red-light incidents: 5,6,7,8,14,15 Please refer to customers[].logs[].details[].scan_result in response for detailed description. - spyware: 0 = unknown 1 = na_success 2 = clean_success 4 = reboot_success 8 = unsafe_to_delete_success 16 = block_success 32 = incomplete_scan_success Red-light incidents: 4 Please refer to customers[].logs[].details[].scan_result in response for detailed description.

cursor

integer

The cursor of returned records. Only records which log ID is larger than the specified cursor will be returned. To retrieve first batch of records, you should pass a cursor with a value of 0. If the customers[].cursor is in the response of this request, you can pass a cursor with this value to get the next batch of records.

Cursor is only available for log type virus and spyware. Also, results parameter should be set; otherwise cursor will be ignored. Valid value is from 1 to max. If not set, default is 0.

HTTP Request Example

1. Query virus incidents

   GET /SMPI/{version}/service/wfbss/api/customers/logs?cids=0C7AE057-7B6E-4E9A-AFBA-69904BA1ED06&type=virus&start_time=1412647200&end_time=1412650800&limit=100

2. Query cursored virus red-light incidents

  (1) Get first batch of records

      GET /SMPI/{version}/service/wfbss/api/customers/logs?cids=0C7AE057-7B6E-4E9A-AFBA-69904BA1ED06&type=virus&start_time=1412647200&end_time=1412650800&limit=100&results=5,6,7,8,14,15&cursor=0

  (2) If customers[].cursor in the response is 1122. Get next batch of records.
      GET /SMPI/{version}/service/wfbss/api/customers/logs?cids=0C7AE057-7B6E-4E9A-AFBA-69904BA1ED06&type=virus&start_time=1412647200&end_time=1412650800&limit=100&results=5,6,7,8,14,15&cursor=1122

  (3) Repeat until customers array in the response is empty.

3. Query spyware incidents

   GET /SMPI/{version}/service/wfbss/api/customers/logs?cids=0C7AE057-7B6E-4E9A-AFBA-69904BA1ED06&type=spyware&start_time=1412647200&end_time=1412650800&limit=100

4. Query cursored spyware red-light incidents

  (1) Get first batch of records
      GET /SMPI/{version}/service/wfbss/api/customers/logs?cids=0C7AE057-7B6E-4E9A-AFBA-69904BA1ED06&type=spyware&start_time=1412647200&end_time=1412650800&limit=100&results=4&cursor=0

  (2) If customers[].cursor in the response is 213. Get next batch of records.
      GET /SMPI/{version}/service/wfbss/api/customers/logs?cids=0C7AE057-7B6E-4E9A-AFBA-69904BA1ED06&type=spyware&start_time=1412647200&end_time=1412650800&limit=100&results=4&cursor=213

  (3) Repeat until customers array in the response is empty.

5. Query wtp logs

   GET /SMPI/{version}/service/wfbss/api/customers/logs?cids=0C7AE057-7B6E-4E9A-AFBA-69904BA1ED06&type=wtp&start_time=1412647200&end_time=1412650800&limit=100

Request Body

Do not supply a request body with this method.

Response

Response

If successful, this method returns an HTTP 200 OK status code and a response body with the following structure:

1. Response of querying virus logs
{
  "customers":[
    {
      "cursor":36775,
      "id":"0C7AE057-7B6E-4E9A-AFBA-69904BA1ED06",
      "eid":"35199BC2-C795-48E5-8B25-9439C5493C0A",
      "logs":[
        {
          "scan_result":{
            "first":{
              "action":"clean",
              "result":"clean_fail"
            }
          },
          "virus_name":"123Banners",
          "timestamp":1412649921,
          "computer":{
            "id":"1c28921125682d41b03cb7e80aa0c0be",
            "components":{
              "engine":[
                {
                  "version":"1.234.56",
                  "type":4
                }
              ],
              "pattern":[
                {
                  "version":"1.234.56",
                  "type":1208090624
                }
              ]
            },
            "name":"Computer_1c28921125682d41b03cb7e80aa0c0be"
          },
          "file":"$winnt$.inf",
          "id":36598,
          "dir":"C:\\WINDOWS\\system32"
        },
        {
          "scan_result":{
            "first":{
              "action":"quarantine",
              "result":"quarantine_fail"
            }
          },
          "virus_name":"123Mania",
          "timestamp":1412649921,
          "computer":{
            "id":"1c28921125682d41b03cb7e80aa0c0be",
            "components":{
              "engine":[
                {
                  "version":"1.234.56",
                  "type":4
                }
              ],
              "pattern":[
                {
                  "version":"1.234.56",
                  "type":1208090624
                }
              ]
            },
            "name":"Computer_1c28921125682d41b03cb7e80aa0c0be"
          },
          "file":"dwintl.dll",
          "id":36601,
          "dir":"C:\\WINDOWS\\system32\\1028"
        }
      ]
    }
  ]
}
2. Response of querying spyware logs
{
  "customers":[
    {
      "cursor":51484,
      "id":"0C7AE057-7B6E-4E9A-AFBA-69904BA1ED06",
      "eid":"35199BC2-C795-48E5-8B25-9439C5493C0A",
      "logs":[
        {
          "spyware_name":"Adware_180Solutions.Seekmo",
          "timestamp":1412649922,
          "scan_type":"scan_scheduled",
          "computer":{
            "id":"1c28921125682d41b03cb7e80aa0c0be",
            "name":"Computer_1c28921125682d41b03cb7e80aa0c0be"
          },
          "details":[
            {
              "spyware_type":6,
              "scan_result":"unsafe_to_delete_success",
              "resource_path":"RT_SHELL",
              "risk_level":"low",
              "resource_type":18
            }
          ],
          "id":51202
        },
        {
          "spyware_name":"Adware_180Solutions.Zango",
          "timestamp":1412649922,
          "scan_type":"scan_realtime",
          "computer":{
            "id":"1c28921125682d41b03cb7e80aa0c0be",
            "name":"Computer_1c28921125682d41b03cb7e80aa0c0be"
          },
          "details":[
            {
              "spyware_type":7,
              "scan_result":"block_success",
              "resource_path":"RT_COOKIE",
              "risk_level":"high",
              "resource_type":19
            }
          ],
          "id":51205
        }
      ]
    }
  ]
}
3. Response of querying wtp logs
{
  "customers":[
    {
      "cursor":86449,
      "id":"0C7AE057-7B6E-4E9A-AFBA-69904BA1ED06",
      "eid":"35199BC2-C795-48E5-8B25-9439C5493C0A",
      "logs":[
        {
          "risk_level":"low",
          "url":"http://dl.google.com/update2/1.2.145.5/GoogleInstaller_en.application?appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B406246FB-03ED-2320-6C12-07795259D522%7D%26lang%3Den%26browser%3D2%26usagestats%3D0%26appname%3DGoogle%2520Chrome%26needsadmin%3Dfalse",
          "timestamp":1412649926,
          "computer":{
            "client_ip":"1.0.168.192",
            "id":"1c28921125682d41b03cb7e80aa0c0be",
            "name":"Computer_1c28921125682d41b03cb7e80aa0c0be"
          },
          "action":"block",
          "id":86152
        },
        {
          "risk_level":"medium",
          "url":"http://dotnet.sys-con.com/index.rss",
          "timestamp":1412649926,
          "computer":{
            "client_ip":"1.0.168.192",
            "id":"1c28921125682d41b03cb7e80aa0c0be",
            "name":"Computer_1c28921125682d41b03cb7e80aa0c0be"
          },
          "action":"block",
          "id":86155
        }
      ]
    }
  ]
}

Name

Type

Description

Length

Virus

     

customers[].cursor

integer

The cursor that you should send to receive the next batch of records.

customers[].logs[].scan_result.first.action

string

First action taken

{"first": {"action": "clean", "result": "clean_success"}} = Cleaned successfully; {"first": {"action": "quarantine", "result": "quarantine_success"}} = Infected file was successfully quarantined; {"first": {"action": "delete", "result": "delete_success"}} = Infected file was successfully deleted; {"first": {"action": "rename", "result": "rename_success"}} = Infected file was successfully renamed; {"first": {"action": "pass", "result": "pass_success"}} = Infected file was successfully passed; {"first": {"action": "clean", "result": "clean_fail"}} = Virus successfully detected but failed to clean; {"first": {"action": "quarantine", "result": "quarantine_fail"}} = Virus successfully detected, but infected file cannot be quarantined; {"first": {"action": "delete", "result": "delete_fail"}} = Virus successfully detected, but infected file cannot be deleted; {"first": {"action": "rename", "result": "rename_fail"}} = Virus successfully detected, but infected file cannot be renamed; {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "quarantine", "result": "quarantine_success"}} = Virus successfully detected, but infected file cannot be cleaned. File was quarantined.; {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "delete", "result": "delete_success"}} = Virus successfully detected, but infected file cannot be cleaned. File was deleted.; {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "rename", "result": "rename_success"}} = Virus successfully detected, but infected file cannot be cleaned. File was renamed.; {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "pass", "result": "pass_success"}} = Virus successfully detected, but infected file cannot be cleaned. File was passed.; {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "quarantine", "result": "quarantine_fail"}} = Virus successfully detected, but infected file can neither be cleaned nor quarantined; {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "delete", "result": "delete_fail"}} = Virus successfully detected, but infected file can neither be cleaned nor deleted; {"first": {"action": "clean", "result": "clean_fail"}, "second": {"action": "rename", "result": "rename_fail"}} = Virus successfully detected, but infected file can neither be cleaned nor renamed; {"first": {"action": "na", "result": "na_success"}} = Infected file was successfully detected, no action taken on probable virus/malware OR See scan result in compressed file OR Action Index Value Product Encrypt Success OR Action Index Value Product Encrypt Fail OR Action Index Value Rootkit Detect Success OR Action Index Value Rootkit Need FullScan Success

customers[].logs[].scan_result.first.result

string

Result of the first action

Please refer to customers[].logs[].scan_result.first.action for the possible values.

customers[].logs[].scan_result.second.action

string

Second action taken

Optional. Please refer to customers[].logs[].scan_result.first.action for the possible values.

customers[].logs[].scan_result.second.result

string

Result of the second action

Optional. Please refer to customers[].logs[].scan_result.first.action for the possible values..

customers[].logs[].virus_name

string

Virus/malware Name

customers[].logs[].timestamp

integer

Date/time

Unix timestamp (seconds since 1970-01-01 00:00:00 UTC)

customers[].logs[].computer.id

string

Device ID

customers[].logs[].computer.name

string

Device name

customers[].logs[].computer.components.engine[].version

string

Virus engine

customers[].logs[].computer.components.engine[].type

integer

Engine type

0x00000004 (4) = TM_AU_ENGINE_VSAPI32_NT_I386; 0x20000100 (536871168) = TM_AU_ENGINE_VSAPI_X64_DLL; 0x24000040 (603979840) = TM_AU_ENGINE_VSAPI_MACOS_X_UNIVERSAL; 0x00000011 (11) = the type has no definition in AU. Using self defined value.

customers[].logs[].computer.components.pattern[].version

string

Virus pattern

customers[].logs[].computer.components.pattern[].type

integer

Pattern type

0x00000004 (4) = TM_AU_PATTERN_VSAPI; 0x48020000 (1208090624) = TM_AU_PATTERN_ICRC_NONCRC; 0x48040072 (1208221810) = TM_AU_PATTERN_ANDROID_V2

customers[].logs[].file

string

File name

customers[].logs[].id

integer

Log ID

customers[].logs[].dir

string

Path

customers[].id

string

Customer ID

customers[].eid

string

For internal use only.

Spyware

     

customers[].cursor

integer

The cursor that you should send to receive the next batch of records.

customers[].logs[].spyware_name

string

Spyware/grayware name

customers[].logs[].timestamp

integer

Date/time

Unix timestamp (seconds since 1970-01-01 00:00:00 UTC)

customers[].logs[].scan_type

string

Scan type

scan_realtime, scan_manual, scan_scheduled, or unknown

customers[].logs[].computer.id

string

Device ID

customers[].logs[].computer.name

string

Device name

customers[].logs[].details[].spyware_type

integer

Spyware/grayware type

1 = Trackware, 2 = Adware, 3 = Cookie, 4 = Dialer, 5 = Security Weakness, 6 = General, 7 = Keylogger, 8 = Trojan, 9 = Suspect, 10 = Hijack, 11 = Parasite, 12 = Internet Explorer Plugins, 13 = Layered Service Providers, 15 = Shortcut Link, 16 = P2P, 17 = Worm, 19 = Downloader, 20 = Virus, 21 = EULA Software, 25 = Variant, and 0 = Others

customers[].logs[].details[].scan_result

string

Scan result

unknown = Unknown Result, na_success = Spyware/Grayware was detected but no action taken, clean_success = Spyware/Grayware was cleaned successfully, reboot_success = System restart required to finish cleaning, unsafe_to_delete_success = Spyware/Grayware is considered unsafe to clean, block_success = Spyware/Grayware was access denied, and incomplete_scan_success = Spyware/Grayware scan was stopped prematurely

customers[].logs[].details[].resource_path

string

Infected resource

customers[].logs[].details[].risk_level

string

Risk level

high, medium, or low

customers[].logs[].details[].resource_type

integer

Resource type

14 = Process, 15 = Startup Area, 16 = Internet Explorer Plugins, 17 = Layered Service Providers, 18 = Hosts, 19 = Policy, 20 = Browser, 23 = Shell, 24 = ActiveX, 26 = Services, 10 = File System, 11 = System Registry, 12 = Cookies, 13 = Shortcut Link, and -1 = Others

customers[].logs[].id

integer

Log ID

customers[].id

string

Customer ID

GUID

customers[].eid

string

For internal use only.

GUID

WTP

     

customers[].cursor

integer

For internal use only.

customers[].logs[].risk_level

string

Risk level

high, medium, or low

customers[].logs[].url

string

URL

customers[].logs[].timestamp

integer

Date/time

Unix timestamp (seconds since 1970-01-01 00:00:00 UTC)

customers[].logs[].computer.client_ip

string

Device IP

customers[].logs[].computer.id

string

Device ID

customers[].logs[].computer.name

string

Device name

customers[].logs[].action

string

Action taken

pass or block

customers[].logs[].id

integer

Log ID

customers[].id

string

Customer ID

customers[].eid

string

For internal use only.