Vulnerability scanner

The VM is periodically scanned for vulnerabilities by a certified RedCheck scanner.

How the scanner works:

  • The frequency is configurable by agreement.
  • On this stand, the scanning is done via WMI (in "agentless" mode).
  • If necessary and to speed up the process the agent can be configured.
  • If high-priority vulnerabilities are detected, a report is generated containing their description and possible remedies:
  • It is up to the customer to decide whether to fix the vulnerabilities in the infrastructure.
  • Текстовое поле

Linxdatacenter will insist on closing the most critical of them.


How can we help you?
Request Demo Access

BEST, money transfer and payments operator

business challenge

The customer faced a technical issue with a persistent BGP session flag with Linxdatacenter hardware. We examined the problem and found out that one of customer’s hosts was under a DDoS attack.

Because of the distributed nature of the attack, traffic couldn’t be filtered effectively, and disconnecting the host from the external network wasn’t an option. The attack stopped after changes in the server configuration, but resumed the day after. A 5.5 Gbps attack overloaded the junctions with internet providers, affecting other Linx Cloud users. To mitigate the effects of the attack, we employed a dedicated DDoS protection service.


To ensure the continuous availability of resources hosted in Linx Cloud, we rerouted all the customer’s traffic through StormWall Anti-DDoS system. The attack was stopped within half an hour. To prevent future cyberattacks, we organized all connections to the customer’s resources through the StormWall network.

Thank you for your inquiry, we will get back to you shortly!