PATH:
opt
/
imunify360
/
venv
/
lib
/
python3.11
/
site-packages
/
im360
/
simple_rpc
/
schema
��� }�(� rules disable�}�(�help��)Add a new rule to the disabled rules list��return_type��NullAgentResponse��cli�}��users�]��root�as�type��dict��schema�}�(�id�}�(�help��6ID number of the rule provided by the firewall plugin.��type��string��required��u�plugin�}�(�help��HFirewall plugin name. Can be one of the following [modsec | ossec | lfd]��type��string��required���allowed�]�(�ossec��modsec��lfd��cphulk�eu�domains�}�(�help��IList of domains to disable a rule for. Can only be used with modsec type.��type��list��schema�}��type��string�su�name�}�(�help��HName of the added rule or details of the rule from ModSecurity or OSSEC.��type��string��required��uuu�rules enable�}�(�help��*Remove a rule from the disabled rules list��return_type��NullAgentResponse��cli�}��users�]��root�as�type��dict��schema�}�(�id�}�(�help��6ID number of the rule provided by the firewall plugin.��type��string��required��u�plugin�}�(�help��HFirewall plugin name. Can be one of the following [modsec | ossec | lfd]��type��string��required���allowed�]�(�ossec��modsec��lfd��cphulk�euuu�rules list-disabled�}�(�help��&Display the list of the disabled rules��cli�}��users�]��root�as�type��dict��return_type��BlockedRulesAgentResponse��schema�}�(�limit�}�(�type��integer��default�Kdu�offset�}�(�type��integer��default�K u�order_by�}�(�type��list��schema�}�(�type��order_by��coerce��order_by�u�nullable��uuu�rules update-app-specific-rules�}�(�help��SAllows to update WAF ruleset configurator immediately (generally, executed by cron)��cli�}�(�users�]��root�a�require_rpc��any�uu�"rules update-shared-disabled-rules�}�(�help��)Force reload modsec disabled rules config��cli�}��users�]��root�asuu.
[-] myimunify.yaml
[edit]
[-] uninstall-cleanup.pickle
[edit]
[-] incidents.yaml
[edit]
[-] configuration_management.pickle
[edit]
[-] custom-lists.pickle
[edit]
[-] control-panel.pickle
[edit]
[-] smtp-blocking.pickle
[edit]
[-] conflicts.pickle
[edit]
[-] whitelist_rbl.pickle
[edit]
[-] control-panel.yaml
[edit]
[-] configuration_management.yaml
[edit]
[-] malware-generic-event.yaml
[edit]
[-] hosting-panel.pickle
[edit]
[-] proactive.pickle
[edit]
[-] myimunify.pickle
[edit]
[-] whitelist_rbl.yaml
[edit]
[-] whitelisted-crawlers.pickle
[edit]
[-] kcarectl.pickle
[edit]
[-] ignored-rules.pickle
[edit]
[-] incidents.pickle
[edit]
[-] remote_proxy.pickle
[edit]
[-] ignored-rules.yaml
[edit]
[-] malware-generic-event.pickle
[edit]
[-] conflicts.yaml
[edit]
[-] remote_proxy.yaml
[edit]
[-] smtp-blocking.yaml
[edit]
[-] smart_advice.yaml
[edit]
[-] proactive.yaml
[edit]
[-] features.pickle
[edit]
[-] import.pickle
[edit]
[-] uninstall-cleanup.yaml
[edit]
[-] import.yaml
[edit]
[-] smart_advice.pickle
[edit]
[-] features.yaml
[edit]
[-] hosting-panel.yaml
[edit]
[-] whitelist-domain.pickle
[edit]
[-] kcarectl.yaml
[edit]
[-] health.yaml
[edit]
[-] whitelisted-crawlers.yaml
[edit]
[+]
..
[+]
lists
[-] whitelist-domain.yaml
[edit]
[-] custom-lists.yaml
[edit]
[-] health.pickle
[edit]