Binary Trojan Detection
Table 1. Binary Trojan Detection List Parameters
| Parameter | Description |
|---|---|
| Resource Address | The IP address of the host. If there is no external IP, the internal IP or cloud resource ID is displayed. |
| Threat Path | The path where the binary Trojan is located. |
| Threat Type | Describes the type of Trojan. |
| Handling Advice | Provides suggested solutions for the Trojan risk. |
| Discovery Time | The first time the security risk was discovered. |
| Update Time | The last time the security risk was discovered. |
| Handling Status | Indicates the status of handling, including “Not Handled” and “Ignored.” If the risk has been handled, it will be deleted in the next detection. |
Binary Trojan Details
Displays the description of the Trojan and advice on how to handle it.