Greetings All,

Our hosting services now offers the next level of security using Imunify360! Imunify360 offers multiple levels of protection for you and our services through an advanced firewall, malware detection, PHP patch management, reputation management, and much more. No action is required on your part, but please read through this info if you are interested in knowing more about Imunify360 and how it helps keep our services reliable, fast, and secure.

What is Imunify360?

Imunify360 is a total security solution for our servers that constantly collects and processes public information regarding new attacks, malware, and current intrusions from services all over the world. Using this information we are able to analyze incoming web traffic that accesses our services. Imunify360’s database constantly updates, making it capable of creating custom rules that prevent new malicious attacks before they can cause issues with our services.


What does Imunify360 provide to you, the customer?

Advanced Firewall defends against all sorts of attacks, including brute force, port scans, DoS attacks, etc. It also works to prevent any unauthorized users from accessing our web server and your site.

Intrusion Detection and Protection System provides a comprehensive set of rules to quickly block known attacks in real-time. Server logs are reviewed and log files scanned, allowing us to ban IPs that show signs of attempting to execute malicious activities like password failures and potential exploits.

Proactive Defense allows us to stop malware before it can even hit your website. Today, PHP is the most popular web development language, as CMS Applications such as WordPress, Joomla and Drupal require it. Most of these content management services have security flaws through the use of insecure plugins and custom scripts, or a dashboard that is not kept updated to the latest version. Hackers mainly focus on attacking those applications. If an insecure plugin or the dashboard version is out of date, skilled bad actors can add only a few lines of code and completely take over your site. Imunify360 scans all activity in real-time and analyzes the PHP code. Within milliseconds it is able to stop malicious code from being executed, thereby keeping your site, and our servers, secure.

Malware Detection scans for malware injections and automatically quarantines infected files and Patch Management and Hardened PHP will keep your server secure by patching all PHP versions against known vulnerabilities. This helps keep PHP running without updating programs that are no longed supported.

Reputation Management analyzes your website daily to determine if your site had been blocked by Google or a number of other services. We do this to help prevent your business from losing valuable time online. We will be able to notify you if you are added to the Google blocklist as a site that distributes malware. Once you have been notified or you visit your site and see the above image, you will want to follow Google Safe Browsing documentation.


How do you access Imunify360?

All of the major features are enabled by default and require no interaction from you. However, from the Imunify360 application in the cPanel interface, you can view any reported Malicious Files, the Scanning History, and Proactive Defense reports. If Imunify360 has found malicious files you’ll be able to view the compromise, quarantine or delete the file, or you can ignore the report.

Clicking on the “View” icon will pull a snippet of the file and show you the malicious PHP code that is being reported as Malware. This is a read only file view so you are unable to edit or remove any content from this option.

The “Quarantine” icon will place the entire file into a private directory and store it for 14 days. During this time frame, you are able to restore, review or attempt to repair any file that has been quarantined.

Using the “Gear” or “Cog” icon you will be able to remove files from the server and from the list of Malicious files. You can also add files to the Ignore List and remove them from the Malicious files list. We recommend using caution when ignoring a file, as it could cause future compromises.

We hope that after reading this you are as excited about this new feature to our hosting services as we are. We are always striving to bring you the best experience available for your hosting needs and we ask if you have any questions or concerns please contact our support group by email or open a ticket if you have any questions.

Wednesday, August 26, 2020

« Back