Skip to Content

Trojan Detection

Table 1. Parameters of the Trojan Detection List

ParameterDescription
Host ipThe IP address of the host, if there is no external network IP, it will be displayed as the internal network IP
Trojan pathThe file path of the Trojan, crontab Trojan is displayed as a log record
Type of TrojanDescription of the type of Trojan, like webshell
Risk descriptionChinese explanation of this risk
Suggested solutionsThe suggested solutions to the Trojan risk
Processing statusRepresents the processing status, including “unprocessed” and “ignored”. If the risk has been dealt with, the risk information will be deleted during the next detection.

Trojan Details

Displays details such as the description of the Trojan and suggestions on how to handle it.

Detection Principle and Cycle of Trojans

Detection Principle and Cycle of Trojans