Webshell Audit

The Webshell Audit module is to manually detect and eliminate webshells. In future updates, additional features such as "illegal content scanning, blacklink detection, and malicious code (backdoor/drive-by download) scanning" will be incorporated.


9.png


Scan Path:

All Websites: The system automatically analyzes and scans each website on the server, currently supporting Apache, Nginx, and IIS.

Specified Path: Scan a designated path, such as the main directory where websites are stored. Note: Do not scan system directories to prevent accidental deletion that could lead to system crashes, e.g., C:\windows, \usr.


Extreme Mode:

Utilizes a stricter scanning approach. This mode can detect more Webshells (especially one-liner Trojans and their variants). However, it also comes with significant side effects. All results from this mode must be manually reviewed before taking any action.


Scan All File Types:

By default, the Webshell Audit module only scans file types specified in "Webshell Protection - Protection Settings". To scan all file types, please check this option.


Scan Whitelist:

By default, the Webshell Audit module does not scan files listed in the "Webshell Protection - Protection Settings" whitelist. To scan these files, please check this option.


Handling of Scanning Results:

Detected Webshells can be "quarantined, deleted, or whitelisted".

Friendly Reminder: Processing may fail because the Webshell Protection module may automatically scan and handle these files.


Quarantine: Move Webshells to a quarantine directory. This is the recommended option.

Delete: Delete Webshells. This option has significant side effects and is not recommended.

Whitelist: Add Webshells to the "Path Whitelist" so they will not be scanned in the future.


<< Patch Updates