€•… }”(Œmalware on-demand list”}”(Œ return_type”ŒOnDemandScanListAgentResponse”Œhelp”Œ Show the list of on-demand scans”Œtype”Œdict”Œcli”}”Œusers”]”Œroot”asŒschema”}”(Œsince”}”(Œtype”Œinteger”Œcoerce”Œint”Œdefault”KŒhelp”Œ-Show scans started after this unix timestamp.”uŒto”}”(Œtype”Œinteger”Œcoerce”Œint”Œdefault_setter”Œnow”Œhelp”Œ.Show scans started before this unix timestamp.”uŒlimit”}”(Œtype”Œinteger”Œcoerce”Œint”Œdefault”K2Œhelp”Œ Page size”uŒoffset”}”(Œtype”Œinteger”Œcoerce”Œint”Œdefault”KŒhelp”Œ Page offset”uŒorder_by”}”(Œtype”Œlist”Œschema”}”(Œtype”Œorder_by”Œcoerce”Œorder_by”uŒnullable”ˆŒhelp”Œ¶List of fields to order by, each followed by a `+` (ascending) or `-` (descending). E.g. `["total_malicious-","started-"]` would order by `total_malicious` and `started` descending. ”uuuŒmalware on-demand start”}”(Œ return_type”ŒNullAgentResponse”Œhelp”ŒQDEPRECATED - use `malware on-demand queue put` instead. Start an on-demand scan. ”Œtype”Œdict”Œcli”}”Œusers”]”Œroot”asŒschema”}”(Œpath”}”(Œtype”Œstring”Œrequired”ˆŒhelp”Œ Path to scan”uŒ file_mask”}”(Œtype”Œstring”Œnullable”ˆŒ dependencies”}”Œ scan_file”ˆsŒhelp”ŒJSeveral patterns can be added with ", " delimiter. Example: `*.js, *.php` ”uŒ ignore_mask”}”(Œtype”Œstring”Œnullable”ˆŒ dependencies”}”Œ scan_file”ˆsŒhelp”ŒKSeveral patterns can be added with ", " delimiter. Example: `*.log, *.tmp` ”uŒ intensity”}”(Œtype”Œstring”Œnullable”ˆŒallowed”]”(Œlow”Œmoderate”Œhigh”eŒhelp”Œ[Scan intensity, simplified. Overrides `intensity_cpu`, `intensity_io` and `intensity_ram`. ”uŒ intensity_cpu”}”(Œtype”Œinteger”Œcoerce”Œint”Œnullable”ˆŒmin”KŒmax”KŒhelp”ŒÇCPU usage allowed for the scan - from minimal, to 1 cpu core. The method depends on the system: lve, cgroups, nice. The default value can be configured in `MALWARE_SCAN_INTENSITY.cpu` config option. ”uŒ intensity_io”}”(Œtype”Œinteger”Œcoerce”Œint”Œnullable”ˆŒmin”KŒmax”KŒhelp”ŒsDisk usage allowed for the scan. The default value can be configured in `MALWARE_SCAN_INTENSITY.io` config option. ”uŒ intensity_ram”}”(Œtype”Œinteger”Œcoerce”Œint”Œnullable”ˆŒmin”MŒhelp”ŒzRAM usage allowed for the scan, in MB. The default value can be configured in `MALWARE_SCAN_INTENSITY.ram` config option. ”uŒfollow_symlinks”}”(Œtype”Œboolean”Œ dependencies”}”Œ scan_file”ˆsŒhelp”ŒCIf true, the scanner may traverse outside of the initial directory.”uŒ scan_file”}”(Œtype”Œboolean”Œdefault”ˆŒhelp”ŒScan files in set path.”uŒscan_db”}”(Œtype”Œboolean”Œdefault”NŒcoerce”Œscan_db”Œhelp”Œ1Scan databases of applications found in set path.”uuuŒmalware on-demand stop”}”(Œ return_type”ŒNullAgentResponse”Œhelp”ŒStop the last on-demand scan”Œcli”}”Œusers”]”Œroot”asŒschema”}”Œall”}”(Œtype”Œboolean”Œdefault”‰Œhelp”ŒStop all the scans”usuŒmalware on-demand status”}”(Œ return_type”ŒOnDemandScanStatusAgentResponse”Œhelp”Œ-Show the status of the running on-demand scan”Œcli”}”Œusers”]”Œroot”asuŒ malware on-demand check-detached”}”(Œ return_type”ŒNullAgentResponse”Œhelp”Œ+(internal) Check for failed on-demand scans”Œcli”}”(Œusers”]”Œroot”aŒ require_rpc”Œstopped”uuu.