Log into WHM and check the server security settings.
1. Check WHM >> Server Configuration >> Tweak Settings and disable the following options :
*Prevent users from parking/adding on common internet domains. (i.e. gmaill.com, hotmail.com)
InetServices offers both Windows and Linux bare metal server hosting, and cloud server hosting for any small to medium size business. We also offer both PCI and HIPAA Compliant servers allowing you to achieve PCI or HIPAA Compliance without all the worries of figuring it out. InetServices offers much more than just dedicated servers and cloud servers, we offer you a complete solution to your hosting needs including Big Data, Disaster Recovery, and High Availability services.
Log into WHM and check the server security settings.
1. Check WHM >> Server Configuration >> Tweak Settings and disable the following options :
*Prevent users from parking/adding on common internet domains. (i.e. gmaill.com, hotmail.com)
This happens when you upgrade the version of Cpanel/WHM.
1. Check the permissions for files as follows:
/usr/local/cpanel/3rdparty/bin/php
/usr/local/cpanel/3rdparty/bin/php-cgi
Create backup of Individual cPanel Account via SSH
1. Log into your dedicated or cloud server as root.
2. Execute the following command:
Please refer the following steps to install CSF firewall on your server:
1. SSH into your dedicated or cloud server
2. Download CSF from “http://www.configserver.com/free/csf.tgz”
# wget http://www.configserver.com/free/csf.tgz
Overview
Plesk 11 incorporates a few different kinds of users. Some are specific to the Plesk control panel suite, while others are used on web servers everywhere. Understanding the kinds of users, and what they do, will help you administer your dedicated / cloud server more efficiently.
Auditd Report is typically installed with most Centos.
Auditd can look at logs to see what system files like /etc/passwd got modified log whom logged in.
chkrootkit is a collection of tools to detect the presence of rootkits. chkrootkit uses C and shell scripts to perform a detailed process check, and scans systems binaries to detect kit signatures. Upon detection, in most cases, it can remove rootkits too.
Log into Plesk control panel in your dedicated or cloud server.
Installing your Plesk Server SSL Certificate
Download the Primary, Intermediate, and Root certificate files from your the trusted CA site you used.
Select ‘Domains’ from the left hand menu.
Log into Plesk control panel on your dedicated or cloud server.
Generating a CSR
In the Plesk Server Administrator, click on Domains & Websites.
Choose the domain you are securing, and then the Certificate button.