Android/Generic.Z.399DCD!tr is classified as a trojan.
A trojan is a type of malware that performs activites without the user’s knowledge. These activities commonly include establishing remote access connections, capturing keyboard input, collecting system information, downloading/uploading files, dropping other malware into the infected system, performing denial-of-service (DoS) attacks, and running/terminating processes.
The Fortinet Antivirus Analyst Team is constantly updating our descriptions. Please check the FortiGuard Encyclopedia regularly for updates.

Recommended Action

Make sure that your FortiGate/FortiClient system is using the latest AV database.
Quarantine/delete files that are detected and replace infected files with clean backup copies.

See Also: Task.Scheduler

Are you presently interested in stepping into computer system safety work? If so then below you will find out almost everything you have to know regarding the position description and whatever you may well find yourself accomplishing too as being the qualifications essential. What does Computer Protection Contain?

Computer system security can be a branch of knowledge technological know-how that relates especially to steps taken to protect the data on personal computers from being corrupted or misused. Computer safety will come in the myriad of various types relying on what stage of defense is necessary.

It truly is incredibly essential for persons working with pcs to guard their personal computer from knowledge loss, misuse, and abuse. One example is, it's important for enterprises to keep details they may have protected to make sure that hackers are not able to entry the knowledge. Home people also will need to just take means to be sure that their charge card figures are secure when they're collaborating in on the web transactions. Examine the threats and how to protect against them below.

Phyllis Buckles
I'm an Information Security Engineers, also called Information Security Analysts, help to safeguard organization's computer networks and systems. Planning and carrying out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks.