tencent cloud

Cloud Workload Protection Platform

Release Notes and Announcements
Release Notes
Announcements
Getting Started
Product Introduction
Overview
Advantages
Basic Concepts
Scenarios
Associated Products
Features in Different Editions
Purchase Guide
Purchase Security Protection Licenses
Purchasing Log Analysis Service
Quick Start
Operation Guide
Security Dashboard
Asset Overview
Server List
Asset Fingerprint
Vulnerability Management
Baseline Management
Malicious File Scan
Unusual Login
Password Cracking
Malicious Requests
High-risk Commands
Local Privilege Escalation
Reverse Shell
Java Webshell
Critical File Monitor
Network Attack
A Ransomware Defense
Log Analysis
License Management
Alarm Setting
Cloud Access Management
Hybrid Cloud Installation Guide
FAQs for Beginners
Cloud Workload Protection Description
Feature Description
Agent Process Description
A Security Baseline Detection List
Parsing of JSON Format Alarm Data
Log Field Data Parsing
Agent Installation Guide
Security Score Overview
Practical Tutorial
Auto Fix of Vulnerabilities
Malicious File Processing
Troubleshooting
Intrusions on Linux
Intrusions on Windows
Offline Agent on Linux
Offline Agent on Windows
An Abnormal Log-in Notification
API Documentation
History
Introduction
API Category
Asset Management APIs
Virus Scanning APIs
Abnormal Log-in APIs
Password Cracking APIs
Malicious Request APIs
High-Risk Command APIs
Local Privilege Escalation APIs
Reverse Shell APIs
Vulnerability Management APIs
New Baseline Management APIs
Baseline Management APIs
Advanced Defense APIs
Security Operation APIs
Expert Service APIs
Other APIs
Overview Statistics APIs
Settings Center APIs
Making API Requests
Intrusion Detection APIs
Data Types
Error Codes
FAQs
Agreements
Terms of Service
Service Level Agreement
Data Processing And Security Agreement
Contact Us
Glossary

Malicious File Processing

PDF
Focus Mode
Font Size
Last updated: 2025-10-29 14:44:00
When malicious files are detected on the server under a user's Tencent Cloud account, if the file is not hit in the file allowlist, real-time alerts will be triggered by host security.

Processing Steps

Upon receiving a malicious file Alarm, please follow the steps below:
1. Log in to the CWPP Console. In the left sidebar, select Intrusion Detection >Virus Scanning.
2. On the virus scanning page, search by Instance ID, locate the specific alarm and click details.



3. After checking alarm details, please confirm whether this malicious file is a false alarm. If it is a false alarm, please perform step 4. If it is not a false alarm, please perform step 5.
Note:
Whether this malicious file is a false alarm can be determined by several ways.
Contact the business team to judge whether the file is a required file for normal business operation.
Query threat intelligence and judge whether the file is marked as a malicious sample by the public network.
Whether this file behavior causes further triggering of more Alarms.
4. Clearly a false alarm. Please add this file to the allowlist. Subsequently, if this file is detected again, it will be ignored and no alarm will be generated. And contact us to report the false alarm.



5. Clearly not a false alarm. Please refer to the recovery suggestions in the alarm details for handling.



- Click Quarantine to quarantine this file and end related processes. The alarm handling status will become "Quarantined".
- Log in to the host, find the corresponding file, manually delete or quarantine it and end related processes. Then mark the alarm as processed on the console. The alarm handling status will become "Resolved".
6. On the virus scanning page, click Detection Settings in the upper right corner. It is recommended to enable the auto-isolation switch. If a malicious file is detected, it will be automatically isolate immediately.




Note:
Not all detected malicious files can be automatically quarantined. Manual confirmation of quarantine for some malicious files is still required. It is recommended to check the alarm list in the file detection and elimination and ensure all resolved.
If a file is falsely quarantined, please restore it from the quarantined list.
To turn on or off auto isolation, configuration is required. There is several minutes delay before taking effect.

FAQs

Where to Configure Alarms for Malicious Files?

On the Alarm Settings Page, configure the alarm time, alarm host range, and alarm items for file killing - malicious files.




How to Set Up Regular Inspection for Malicious Files?

On the virus scanning Page, click Detection Settings in the upper right corner. Open the Detection Settings popup and perform scheduled scan settings.




If a File Has Been Deleted and a Malicious File Scan Is Performed Again, What Will the Original Alarm Handling Status Become?

The original alarm handling status will become "cleaned".


Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback