Westek XKI Malicious Code Auxiliary Detection System
I.Primary Functions
4.1 StandardMalwareInspection
The scanning engine processes the selected files and their operations.MalwareTesting: All files detected with infections will be reported and actions will be executed according to the policy.
4.2 Trojan Detection
Trojans are typically defined as malicious software that often collects sensitive data from users' computers without their knowledge. The scanning engine will detect and identify the Trojan programs or files among them.
4.3 Establish testing tasks
The software offers a simple and convenient task creation feature, allowing users to customize their own scanning tasks as needed, such as recursive scanning or ignoring certain scans.
4.4 Support for multiple testing objects
In addition to file inspection, it supports process, compressed file, and script file inspections, etc.
4.5 Offer auxiliary testing tools
Users can analyze suspicious files, programs, or network activities themselves using the auxiliary detection tools provided by the system to check for potential dangers. For instance, inspecting system processes, services, startup items, etc.



























