Golden Laos

Installation and configuration

ConfigServer eXploit Scanner (cxs) is a server malware, exploit and antivirus scanner that performs active scanning of files as they are uploaded to the server. Initial installation with recommended configuration options is included with the license.

  • For dedicated or virtual servers – protects all domains, IP addresses and users on the server
  • Active (realtime), manual, and scheduled scanning can be performed
  • Scans for suspected exploits, viruses, suspicious resources
  • Quarantine or delete suspicious files

Who can use ConfigServer eXploit Scanner?

  • Web hosting companies
  • Small/medium businesses managing their own dedicated or virtual servers
  • Server management companies wanting to offer value added services
  • Anyone running a cPanel or DirectAdmin dedicated server or virtual server, who wants protection from server exploits and malware

Benefits of ConfigServer eXploit Scanner

  • Provides an easy to use interface within the root or admin control panel. 
  • Licensed on a per server basis, no limit on users or accounts. 
  • One time purchase price, includes software updates for the life of the product. No monthly fees.

Exploit Detection

  • Over 4000 known current exploit script fingerprint matches (in addition to standard ClamAV detection)
  • Antivirus scanning using ClamAV
  • Regular expression pattern matching to help identify known/unknown exploits
  • Filename matching
  • Suspicious file names
  • Suspicious file types
  • Binary executables
  • Some illegal web software installations
  • Custom user specified regular expression patterns
  • Comprehensive constant scanning of all user data using the cxs Watch daemon – scans all user files as soon as they are modified
  • Daily check for new exploit fingerprints
  • Check for out-dated versions of popular web scripts (e.g. WordPress, Joomla, osCommerce)
  • Bayes probability scanning – scans scripts and passes the contents through an algorithm which produces a probability as to whether it is an exploit

Leave a Reply

Your email address will not be published. Required fields are marked *