Skip to Content

Binary Trojan Detection

Table 1. Binary Trojan Detection List Parameters

ParameterDescription
Resource AddressThe IP address of the host. If there is no external IP, the internal IP or cloud resource ID is displayed.
Threat PathThe path where the binary Trojan is located.
Threat TypeDescribes the type of Trojan.
Handling AdviceProvides suggested solutions for the Trojan risk.
Discovery TimeThe first time the security risk was discovered.
Update TimeThe last time the security risk was discovered.
Handling StatusIndicates the status of handling, including “Not Handled” and “Ignored.” If the risk has been handled, it will be deleted in the next detection.

Binary Trojan Details

Displays the description of the Trojan and advice on how to handle it.