W32/Generic.AC.3BC232!tr is classified as a trojan.
A trojan is a type of malware that performs activites without the user’s knowledge. These activities commonly include establishing remote access connections, capturing keyboard input, collecting system information, downloading/uploading files, dropping other malware into the infected system, performing denial-of-service (DoS) attacks, and running/terminating processes.
The Fortinet Antivirus Analyst Team is constantly updating our descriptions. Please check the FortiGuard Encyclopedia regularly for updates.

Recommended Action

Make sure that your FortiGate/FortiClient system is using the latest AV database.
Quarantine/delete files that are detected and replace infected files with clean backup copies.

See Also: Zoho_Reports

Have you been interested in getting into computer system protection work opportunities? If that is so then in this article you might determine almost everything you need to know in regards to the occupation description and anything you may finish up executing too as the qualifications required. Exactly what does Laptop or computer Protection Include?

Personal computer security is really a branch of knowledge technological know-how that relates especially to steps taken to shield the info on pcs from currently being corrupted or misused. Computer system stability will come in a myriad of different forms based on what degree of defense is needed.

It is actually particularly important for folks applying computers to guard their computer from details reduction, misuse, and abuse. For instance, it is critical for enterprises to help keep information and facts they may have protected in order that hackers cannot obtain the information. House users also have to have to consider suggests to ensure that their credit card quantities are safe when they are taking part in online transactions. Examine the threats and how to reduce them in this article.

Phyllis Buckles
I'm an Information Security Engineers, also called Information Security Analysts, help to safeguard organization's computer networks and systems. Planning and carrying out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks.