OperateTrojan
Description
processes detected website backdoor (webshell) files.
Request Method
POST
Request Path
/apsara/route/aegis/OperateTrojan
Request Parameters Common Parameters
Name | Location | Type | Required | Sample value | Description |
---|---|---|---|---|---|
Type | BODY | integer | No | No sample value for this parameter. | Trojan type, system specified parameters. Value: 1 |
regionId | BODY | string | Yes | No sample value for this parameter. | region id |
Info | BODY | string | No | No sample value for this parameter. | Webshell event information, described in JSON format, see the request example for details. |
version | BODY | string | No | 2016-01-01 | version of api |
OperateType | BODY | string | No | No sample value for this parameter. | processing operation type, value range: isolate: indicates quarantined file trust: indicates that the file is trusted untrust: indicates cancellation of trust file restore: indicates recovery of files |
Return data
Name | Type | Sample value | Description |
---|---|---|---|
RequestId | string | no demo value | request ID. |
FailedCount | integer | no demo value | number of operation failure records. |
SuccessCount | integer | no demo value | number of successful operation records. |
Example
Successful Response example
{
"RequestId":"no demo value",
"FailedCount":"no demo value",
"SuccessCount":"no demo value"
}
Failed Response example
{
"errorSample":
{
"resultCode":-1,
"resultMsg":"system error",
"result":null
}
}