Trojan Detection
Table 1. Parameters of the Trojan Detection List
Parameter | Description |
---|---|
Host ip | The IP address of the host, if there is no external network IP, it will be displayed as the internal network IP |
Trojan path | The file path of the Trojan, crontab Trojan is displayed as a log record |
Type of Trojan | Description of the type of Trojan, like webshell |
Risk description | Chinese explanation of this risk |
Suggested solutions | The suggested solutions to the Trojan risk |
Processing status | Represents the processing status, including “unprocessed” and “ignored”. If the risk has been dealt with, the risk information will be deleted during the next detection. |
Trojan Details
Displays details such as the description of the Trojan and suggestions on how to handle it.
Detection Principle and Cycle of Trojans