<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5HLVVHN" height="0" width="0" style="display:none;visibility:hidden">
Author: Greg Zemskov

How to disable ClamAV in Imunify360

b2ap3_large_IM-Disable-ClamAV

We no longer use ClamAV for malicious files detection, and keep it as a part of Imunify360 only for detecting suspicious files. Starting from Imunify360 v4.3, we're removing it completely.

New Knowledgebase Article: How to Replicate Imunify360 Config

b2ap3_large_20190516124144_IM-how-to-replicate

We have a nice, new, time-saving tip over on the CloudLinux KnowledgeBase.

Web Hosting Made Secure with Plesk and ImunifyAV

b2ap3_large_imunifyAV-plesk

Good news is always worth repeating: Plesk integrates ImunifyAV into its famous WebOps hosting control panel.

It's not even been a year yet but we're already seeing the benefits of integrating Revisium's advanced antivirus and anti-malware scanner into ImunifyAV. In addition to that, discover web hosting security tips in our new post and learn more about Plesk server security best practices.

Imunify360 4.0 Stable Release – It's here

b2ap3_large_20190319061833_version4-stable

A month in development passes so quickly.

We announced in February that we have a new version of Imunify360 coming with some great new features. It’s ready, it’s out of beta and into general availability. Here’s a quick reminder of the new stuff. 

Nicely integrated: cPanel and ImunifyAV

b2ap3_large_imunifyAV-cPanel

The good news just keeps coming: cPanel & WHM integrates ImunifyAV into its hosting automation platform.

cPanel is integrating ImunifyAV, our free linux server antivirus and anti-malware scanner, into its famous web hosting control panel.

In addition to that, discover our new article covering only the best tips on how to take your cPanel security to the next level.

Imunify360 V4.0—New Features Preview

b2ap3_large_version4-beta

I have good news—there are features coming in Imunify360 4.0 that will make your life easier, your servers safer, and your businesses more profitable. 

Attention Imunify360 v3.9.3 Beta Testers–We Need Your Help

b2ap3_large_test

Thank you, beta testers!

We value your dedication to making our product better. Your real-world input helps Imunify360 become the most effective and efficient Linux server security product out there.

WebShield introduction for server administrators

WebShield-introduction-for-server-administrators

WebShield is a component of the Imunify360 security solution. Its primary purpose is to handle HTTP traffic and prevent HTTP attacks.

As a security solution, WebShield is meant to:

  • Block blacklisted traffic
  • Redirect graylisted traffic to CAPTCHA until the CAPTCHA is passed
  • Act as a proxy service, redirecting remaining traffic to backends

It consists of four services:

  • WebShield itself
  • Shared memory daemon
  • SSL-caching daemon
  • Sentrylogs daemon
    Shared memory is the component of WebShield that makes it easier to deal with certain aspects of Nginx configuration without reloading. It does this by modifying its shared memory.

SSL-caching daemon watches changes to host SSL certificate sets (for known hosting panels only: cPanel, Plesk, DirectAdmin) and updates the WebShield SSL cache when a certificate is added, updated or removed.

Sentrylogs daemon watches WebShield log files to detect errors.

The configuration of WebShield is done by an agent, and direct editing of WebShield configuration files is generally not recommended. This is mainly because after the next reconfiguration all custom changes would be lost. However, there are some items a host administrator may want to set.

WebShield: Blocks blacklisted traffic & prevents HTTP attacks

b2ap3_large_WebShieldIntroduction

WebShield is a component of the Imunify360 security solution. Its primary purpose is to handle HTTP traffic and prevent HTTP attacks.

As a security solution, WebShield is meant to:

  • Block blacklisted traffic
  • Redirect graylisted traffic to CAPTCHA until the CAPTCHA is passed
  • Act as a proxy service, redirecting remaining traffic to backends

Why do small sites get hacked?

Why-do-small-sites-get-hacked

If you think your site won't be hacked because it's too small to matter, think again. I'll show why that is a false and dangerous assumption.

Many site owners and webmasters think that hackers only care about popular, highly-ranked websites. They are wrong.

High traffic volume helps boost earnings on partner programs by redirecting visitors to other sites, gets more views of unauthorized advertisements and attracts more clicks on rogue links. But that is not the only way hackers make money.

Unprotected sites with low traffic volume are equally attractive to hackers. It is the way they are used that differs from how hackers monetize more popular websites. Any normal site, with an audience of as little as 30 visitors a day, can still be threatened by hacking and infection. 

Subscribe to Imunify security Newsletter