1. /
  2. Security Response/
  3. Glossary/
  4. Trojan, Trojan horse

Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | _1234567890

Trojan, Trojan horse

An application that carries out an unauthorized function covertly while running an authorized application. It is designed to do something other than what it claims to and frequently is destructive in its actions. Trojan detection is a type of Intrusion Prevention that is included in firewall policies and OS Protection. If these features are enabled, Agents can automatically detect and terminate known Trojan horse applications before the Trojan attempts to communicate.