<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5HLVVHN" height="0" width="0" style="display:none;visibility:hidden">

Beta: Imunify360 4.7 released

Mar 30, 2020 6:39:47 PM / by Inessa Atmachian



We’re pleased to announce that a new beta version of Imunify360 is now available. This new Imunify360 v.4.7 beta release features several performance improvements:

  • New Default Settings for Malware Scanner
    The new default settings for Imunify360’s Malware Scanner component set it to scan faster and use fewer resources.
  • Advanced Management of Scan Intensity
    Malware Scanner can be configured to use either LVE (limits resource usage and server load) or nice/ionice (employs CFQ I/O scheduler).
  • More protection against brute-force attacks
    Imunify360 employs a new approach to protecting WordPress admin accounts, which keeps WordPress safe from most common brute-force attacks. 

Let’s examine these changes and additions in detail.

New Default Settings for Malware Scanner

Malware Scanner now has Rapid Scan enabled by default. This setting produces faster scans while using fewer server resources. This new default setting is applied to all new installations of Imunify360.


Other default Malware Scanner settings were also changed in this Imunify360 v.4.7 beta release:

  • Intensity level for CPU usage and I/O usage: Minimized
  • Background scan: Monthly
  • Trim instead of removal: On
  • Default action: Cleanup

Note: No current Imunify360 installations are affected by these changes.

Advanced Management of Scan Intensity

To help users avoid scans that might be resource-intensive, the new Imunify360 v.4.7 beta release provides additional configuration options. 

On the CloudLinux OS, it uses LVE to manage scan intensity. On other operating systems, users can opt to use nice to control the CPU, and ionic when the I/O scheduler is CFQ.

Advanced Management of Scan Intensity

These settings are available in both the global settings of the Malware Scanner, and the On-Demand scan.

More Protection Against Brute-force Attacks

It’s a well-known fact that a significant number of WordPress hacks happen through compromised admin accounts. Usually, a bot guesses a trivial password through a series of brute-force requests, and once it guesses the password, it automatically logs on to the admin account. Then it uploads/installs a backdoor that provides the hacker with an interface to take over the web site or hosting account. 

In this v.4.7 beta, Imunify360 provides more protection against those sorts of brute-force attacks. Server admins can now enable the WordPress Account Compromise Prevention option to prevent access to WordPress accounts with weak (trivial) passwords: 


When this option is enabled, all end users trying to log into the admin account with weak, trivial, or well-known password are diverted to an alert page on a separate domain. There, they’re given the option to change their current password: 


(The alert page supports localization: it’s displayed in the language of the browser.)

Once the user clicks the “Reset Password” button, he’s taken to a common WordPress password reset page on the original domain. The rest flow is driven by WordPress itself.

To enable this setting via the command-line interface, use this command:

imunify360-agent config update '{"MOD_SEC": {"cms_account_compromise_prevention": true}}'

Note: This feature is implemented via ModSec rule, and can be partially disabled on a per-domain basis. To disable it for specific domains, run this command: 

imunify360-agent rules disable --id 33355 --plugin modsec --name 'WordPress Anti-bruteforce' --domains mydomain1.com mydomain2.com

How To Install

To install the new Imunify360 v.4.7, please follow the installation instructions.

How To Upgrade

CentOS/CloudLinux systems:

yum update imunify360-firewall --enablerepo=imunify360-testing

Ubuntu 16.04 systems:

echo 'deb https://repo.imunify360.cloudlinux.com/imunify360/ubuntu-testing/16.04/ xenial main'  > /etc/apt/sources.list.d/imunify360-testing.list
apt-get update
apt-get install --only-upgrade imunify360-firewall

Ubuntu 18.04 systems:

echo 'deb https://repo.imunify360.cloudlinux.com/imunify360/ubuntu-testing/18.04/ bionic main'  > /etc/apt/sources.list.d/imunify360-testing.list
apt-get update
apt-get install --only-upgrade imunify360-firewall

Stay In Touch

Please give our product team feedback on this Imunify360 v.4.7 beta release, or share your ideas and feature requests via feedback@imunify360.com.

If you encounter any problems with this beta release, please send a comment or request to our Imunify support team via https://cloudlinux.zendesk.com.


Topics: Imunify360, beta, Release

Inessa Atmachian

Written by Inessa Atmachian

Inessa Atmachian is a Technical Writer. She is responsible for developing technical product documentation for CloudLinux OS, KernelCare, and Imunify360 products. She provides customers with release notes and information on product updates.