Trojan Detection
Table 1. Parameters of the Trojan Detection List
| Parameter | Description |
|---|---|
| Host ip | The IP address of the host, if there is no external network IP, it will be displayed as the internal network IP |
| Trojan path | The file path of the Trojan, crontab Trojan is displayed as a log record |
| Type of Trojan | Description of the type of Trojan, like webshell |
| Risk description | Chinese explanation of this risk |
| Suggested solutions | The suggested solutions to the Trojan risk |
| Processing status | Represents the processing status, including “unprocessed” and “ignored”. If the risk has been dealt with, the risk information will be deleted during the next detection. |
Trojan Details
Displays details such as the description of the Trojan and suggestions on how to handle it.