Trojan Operation and Handling

Last updated: 2020-03-02 19:27:31

Log in to the CWP Console and select Intrusion Detection > Trojans to view the trojan detection records, as shown below:
1

Dealing with suspicious files

  • Quarantine
    After malicious files are confirmed, you can quarantine a single file or multiple files in batches. After successful quarantine, the original malicious files will be encrypted and quarantined. You can filter quarantined files to recover them in the future if necessary.
  • Trust
    If a file is not malicious, you can trust it. After the file is added to the trust list, CWP will not inspect it again. You can filter the trusted files to manage them.
  • Delete Log
    After a record is deleted, you cannot view related information. You are recommended to quarantine or trust a file before deleting it. You can also go to the file path to manually delete it.

Was this page helpful?

Was this page helpful?

  • Not at all
  • Not very helpful
  • Somewhat helpful
  • Very helpful
  • Extremely helpful
Send Feedback
Help