Knowledgebase

Portal Home > Knowledgebase > Articles Database > ConfigServer eXploit Scanner - cxs


ConfigServer eXploit Scanner - cxs




Posted by ttgt, 01-13-2016, 11:48 AM
Hi, csx has alot options to check/un-check, may i ask what options do you think those are necessary to run ?

Posted by Srv24x7, 01-15-2016, 10:30 AM
Hi, The most common options are already been tick marked if you check the CXS through WHM if you have one. You can go through the description given in it and make a choice of yours, but I think you can keep it to default scan.

Posted by Bbnuse, 01-16-2016, 02:10 AM
I like this setup: report=/var/log/cxs.scan logfile=/var/log/cxs.log mail=youremailaccount@domain.com exploitscan=1 virusscan=1 ignore=/etc/cxs/cxs.ignore xtra=/etc/cxs/cxs.xtra options=mMOLfSGhednD voptions=mfheT www=1 summary=1 sizemax=5000000 filemax=100000 deep=1 You just have to put it on /etc/cxs/cxs.defaults (create the file if it doesn't exist). Then run cxs from WHM

Posted by ttgt, 01-18-2016, 12:08 PM
Hi, i try to click "Start the Watch" and i check the log file /var/log/cxswatch.log , for instance,i find the line, Jan 10 03:54:20 server cxswatch[391453]: Child 1: (Hits:1) (Viruses:1) (Fingerprints:0) '/home/site1/public_html/wp-blog-header.php' does it mean the file /home/site1/public_html/wp-blog-header.php has issue ? or ? if yes,i try to download the wordpress file and compnare them, their contect/codes are the same, im not sure if im wrong ?



Was this answer helpful?

Add to Favourites Add to Favourites    Print this Article Print this Article

Also Read
Cpanel Demo? (Views: 530)


Language:

Contact us