Binary Trojan Detection
Table 1. Binary Trojan Detection List Parameters
Parameter | Description |
---|---|
Resource Address | The IP address of the host. If there is no external IP, the internal IP or cloud resource ID is displayed. |
Threat Path | The path where the binary Trojan is located. |
Threat Type | Describes the type of Trojan. |
Handling Advice | Provides suggested solutions for the Trojan risk. |
Discovery Time | The first time the security risk was discovered. |
Update Time | The last time the security risk was discovered. |
Handling Status | Indicates the status of handling, including “Not Handled” and “Ignored.” If the risk has been handled, it will be deleted in the next detection. |
Binary Trojan Details
Displays the description of the Trojan and advice on how to handle it.