# 랜섬웨어 방지 > 실행 차단 내역

<mark style="background-color:green;">GET</mark> `https://openapi.exosp.com/logs/v1/ransomware-prevention/process-execution-block`

랜섬웨어 방지 > 실행 차단 내역을 조회하는 API 입니다.

### Query Parameters

<table><thead><tr><th width="167">항목</th><th width="112">타입</th><th>설명</th></tr></thead><tbody><tr><td>offset<mark style="color:red;">*</mark></td><td>int</td><td><strong>((현재 페이지 번호 -1)*tableSize)</strong><br>현재 페이지의 첫 번째 데이터가 위치한 인덱스를 나타냅니다.</td></tr><tr><td>tableSize<mark style="color:red;">*</mark></td><td>int</td><td><strong>페이지 사이즈</strong></td></tr><tr><td>startTimeUTC<mark style="color:red;">*</mark></td><td>string</td><td><p><strong>응답 데이터 시작 시각</strong></p><p>UTC 기준, ISO 8601포맷<br><span data-gb-custom-inline data-tag="emoji" data-code="2705">✅</span> 최신 3개월 이내의 시각만 입력해주세요.</p></td></tr><tr><td>endTimeUTC<mark style="color:red;">*</mark></td><td>string</td><td><strong>응답 데이터 종료 시각</strong><br>UTC 기준, ISO 8601포맷</td></tr><tr><td>sortType<mark style="color:red;">*</mark></td><td>string</td><td><strong>응답 데이터 정렬 유형 (차단 시각 기준)</strong><br>ASC : 오름차순, DESC : 내림차순</td></tr><tr><td>timezone</td><td>string</td><td><p><strong>응답 데이터 타임존</strong><a href="https://en.wikipedia.org/wiki/List_of_tz_database_time_zones">https://en.wikipedia.org/wiki/List_of_tz_database_time_zones</a> 에서 TZ identifier 참고</p><p>기본값 : UTC</p></td></tr><tr><td>search</td><td>string</td><td><p><strong>검색어</strong></p><p>검색 대상 : 사용자 이름, 그룹 이름, 컴퓨터 이름</p><p>기본값 : 빈값</p></td></tr></tbody></table>

### Response Schema

<table><thead><tr><th width="162">항목</th><th width="115">타입</th><th>설명</th></tr></thead><tbody><tr><td>code</td><td>int</td><td><p><strong>응답 처리 결과 코드</strong> </p><p>0 : 성공, 1 : 실패</p></td></tr><tr><td>message</td><td>string</td><td><p><strong>응답 처리 결과 메세지</strong></p><p>success : 성공, 그 외 : 실패</p></td></tr><tr><td>body</td><td>object</td><td><a data-mention href="#body">#body</a></td></tr></tbody></table>

#### **body 상세**

<table><thead><tr><th width="164">항목</th><th width="115">타입</th><th>설명</th></tr></thead><tbody><tr><td>total</td><td>int</td><td><strong>전체 레코드 수</strong></td></tr><tr><td>data</td><td>array</td><td><a data-mention href="#data">#data</a></td></tr></tbody></table>

#### data **상세**

<table><thead><tr><th width="181">항목</th><th width="110">타입</th><th>설명</th></tr></thead><tbody><tr><td>name</td><td>string</td><td><strong>사용자 이름</strong></td></tr><tr><td>departmentName</td><td>string</td><td><strong>그룹 이름</strong></td></tr><tr><td>departmentFull</td><td>string</td><td><strong>그룹 전체 경로</strong></td></tr><tr><td>computerName</td><td>string</td><td><strong>컴퓨터 이름</strong></td></tr><tr><td>osType</td><td>string</td><td><strong>os 유형</strong><br>windows : 윈도우 , macos : 맥</td></tr><tr><td>osUserName</td><td>string</td><td><strong>os 계정</strong></td></tr><tr><td>productName</td><td>string</td><td><strong>제품 이름</strong></td></tr><tr><td>processName</td><td>string</td><td><strong>프로세스 이름</strong></td></tr><tr><td>processPath</td><td>string</td><td><strong>프로그램 경로</strong></td></tr><tr><td>companyName</td><td>string</td><td><strong>공급자</strong></td></tr><tr><td>processHash</td><td>string</td><td><strong>프로세스 해시(SHA256)</strong></td></tr><tr><td>certificate</td><td>string</td><td><strong>서명</strong></td></tr><tr><td>dateOfEntryUTC</td><td>string</td><td><p><strong>차단 시각</strong></p><p>UTC 기준,  ISO 8601포맷</p></td></tr><tr><td>dateOfEntry</td><td>string</td><td><p><strong>차단 시각</strong></p><p>요청 타임존 기준,  ISO 8601포맷</p></td></tr></tbody></table>

### Example

{% tabs %}
{% tab title="200 Success" %}

```javascript
curl -X 'GET' \
  'https://openapi.exosp.com/logs/v1/ransomware-prevention/process-execution-block?offset=0&tableSize=1&startTimeUTC=2024-04-17T15%3A00%3A00%2B00%3A00&endTimeUTC=2024-08-01T15%3A00%3A00%2B00%3A00&timezone=Asia%2FSeoul&sortType=DESC' \
  -H 'accept: application/json' \
  -H 'x-exosp-access: YOUR_ACCESS_KEY' \
  -H 'x-exosp-secret: YOUR_ACCESS_SECRET' 

{
  "code": 0,
  "message": "success",
  "body": {
    "total": 2,
    "data": [
      {
        "name": "권종훈",
        "departmentName": "웹서비스",
        "departmentFull": "어벤져스 > 제품 > 개발 > 웹서비스",
        "computerName": "DESKTOP-OSN2GPA",
        "osType": "windows",
        "osUserName": "KJH",
        "productName": "-",
        "processName": "clang++.exe",
        "processPath": "C:\\clang++.exe",
        "companyName": "-",
        "processHash": "9fb6a9df6206c9372241bb56577b108491cd0744e213d56c5040dabd9c9b8520",
        "certificate": "-",
        "dateOfEntryUTC": "2024-06-07T08:32:19+00:00",
        "dateOfEntry": "2024-06-07T17:32:19+09:00"
      }
    ]
  }
}
```

{% endtab %}
{% endtabs %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://openapi-docs.exosp.com/guide/logs/ransomware-prevention-process-execution-block.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
