RSS Feed
Knowledgebase : Security
   

A module available within Plesk allows you to run a RKHunter scan to find rootkits and malicious software. Whilst the scan does produce a number of false positives due to the way Plesk is installed it is helpful to identify if the server has been "root...
Install the Plesk Firewall Module STEP 1: Click "_TOOLS AND SETTINGS_" and then "_UPDATES AND UPGRADES_" STEP 2. Click "_ADD COMPONENTS_" STEP 3. Locate the "_PLESK FIREWALL EXTENSION_" under "_ADDITIONAL PLESK EXTENSIONS_" and check the box n...
SSH USING KEYS You can access your Linux server using SSH (Secure SHell). SSH is a text based interface to your server where you can execute commands to perform things like restarting your web server or your email server or to discover how many emails ...
From Plesk 12 the fail2ban package has been available via the Plesk Control Panel. STEP 1: Login to Plesk STEP 2: Click "Tools and Settings" > "IP Address Banning (Fail2Ban)" STEP 3: The first page is the "Blocked IP Addresses" STEP 4: Cli...
Plesk has a feature to restrict access to the administrative control panel, this helps prevent unwanted access to the server and improve security. To enable this feature: STEP 1: Login to Plesk with your administrative account STEP 2: Click "_TO...
WHAT IS PCI COMPLIANCE? PCI stands for Payment Card Industry. PCI Compliance means that your services comply with some generally accepted Payment Card Industry security standards WHY IS IT REQUIRED? Banks and other entities that deal with online a...