We’re pleased to announce that a new beta version of Imunify360, version 4.10, is now available. The following features are new in the v4.10 beta release:
Fixed issue with Imunify service restart after an update
Let’s review the changes:
The Imunify team has made a huge leap in stopping new instances of malware and preventing the exploitation of “zero-day” vulnerabilities. We are thrilled to announce the release of PHP Immunity, a fully-automated way to virtually patch PHP scripts.
Here’s how it works: Once a vulnerable script or unknown malware executes malicious code, which in turn leads to a malware drop, PHP Immunity automatically generates a rule for Proactive Defense and that stops any further attempts to exploit the vulnerability or drop malware.
Any dropped malware will be also auto-cleaned by the real-time malware scanner, keeping the system clean and protected. So, PHP Immunity functions in a way very similar to the human immune system: each attack by an unknown infection trains the immune system to prevent further infections or re-infections.
This feature is experimental at the moment, so it’s shipped disabled. To enable PHP Immunity, just go to the Malware tab and check “PHP Immunity.”
Or, just execute this CLI command:
# imunify360-agent config update '{"PROACTIVE_DEFENCE": {"php_immunity": true}}'
Starting from version 4.10, Imunify360 provides a completely new Hooks system configuration. Hooks can be configured via the separate UI “Notifications” tab in the Settings, or via the command-line interface (CLI).
It provides an intuitive way to configure hooks (different asynchronous system events): the administrator can configure email addresses to send reports and execute custom scripts (“hook handler”). Also, new hooks support a new set of events and notification types:
In the very first version of the Hooks, Imunify supported email notifications to the administrator upon malware detection, cleanup, or malicious script execution. Later, Hooks will extend the number of notification channels to instant messengers such as Slack/Viber.
Each hook can be configured from the UI and the CLI. Depending on the type, a hook can have email notification settings, a notification interval, and some others. Itmight even be extended with an event handler script. For example, the notification interval could be configured to avoid excessive reporting for “Real-time scan” and “Script blocked” events that occur frequently.
Imunify also allows hooks to be managed through the CLI. Here are some examples:
imunify360-agent notifications-config update '{"admin": {"default_emails": ["admin@example.org", "security@example.org"]}}'
imunify360-agent notifications-config update '{"rules": {"REALTIME_MALWARE_FOUND": {"ADMIN": {"enabled": false}}}}'
imunify360-agent notifications-config update '{"rules": {"REALTIME_MALWARE_FOUND": {"/scripts/suspend-website.py": {"period": 60}}}}'
We’ve frequently been asked for a way to look up Web Application Firewall incidents related to particular domains. So, we’ve added an ability to filter incidents not only by abuser IP or event description, but by domain as well.
Imunify360 supports disabled, permissive, and enforcing-mode Security-Enhanced Linux (SELinux) policy configurations. You can install Imunify360 on SELinux enabled environments without a need of additional configuration. CentOS with Plesk systems are supported at the moment.
The PAM (“Pluggable Authentication Module”) plugin for Imunify360 now provides protection for the ftpd server against FTP brute-force attacks.
It counts the number of unsuccessful attempts, identifies the targets as single- or multiple-user accounts, and considers the source of attacks, blocking attackers in a more intelligent way than regular IP-based blocking. It employs a time-proven algorithm that has been used in the SSH PAM extension since version 4.6. We recommend enabling it by default to protect the FTP accounts of your users.
The feature is experimental at the moment, so it’s shipped disabled. To enable it, , go to Settings page, and on the General tab check “FTP brute-force attack prevention”.
Or, execute the following CLI command:
imunify360-agent config update '{"PAM": {"ftp_protection": true}}'
In Imunify360 version 4.10, FTP backup integration was reworked. Compared to the previous version, two significant improvements were made:
Now Imunify360 services are unconditionally enabled and started during package updates.
Note: if you need to disable Imunify360, then you need to disable updates as well by editing the cron file and commenting out the update command.:
CentOS and CloudLinux OS | Ubuntu |
/etc/cron.daily/imunify360.cron | /etc/cron.daily/imunify360-firewall |
Imunify360 v4.10 includes 110 tasks and 19 bug fixes.
Important tasks and issues linked to support tickets:
UI enhancements
Please give our product team feedback on this version 4.10 release, or share your ideas and feature requests via feedback@cloudlinux.com.
If you encounter any problems with this beta release, please send a comment or request to our Imunify support team via cloudlinux.zendesk.com.
To install the new Imunify360 v.4.10 beta, please follow the installation instructions.
CentOS/CloudLinux systems:
yum update imunify360-firewall --enablerepo=imunify360-testing
Ubuntu 16.04 systems:
echo 'deb https://repo.imunify360.cloudlinux.com/imunify360/ubuntu-testing/16.04/ xenial main' > /etc/apt/sources.list.d/imunify360-testing.list
apt-get update
apt-get install --only-upgrade imunify360-firewall
Ubuntu 18.04 systems:
echo 'deb https://repo.imunify360.cloudlinux.com/imunify360/ubuntu-testing/18.04/ bionic main' > /etc/apt/sources.list.d/imunify360-testing.list
apt-get update
apt-get install --only-upgrade imunify360-firewall