Page tree
Skip to end of metadata
Go to start of metadata

This document is for a previous release of cPanel & WHM. To view our latest documentation, visit our Home page.

For cPanel & WHM 11.46

(Home >> Security Center)

 

  • Compiler Access — This interface allows you to enable or disable compiler access for unprivileged users. Many common attacks require a functional C or C++ compiler on the server.

    Note:

    $body

  • cPHulk Brute Force Protection — This interface allows you to configure cPHulk. cPHulk helps defend your server against brute force attacks. Brute force is an attack method that involves the use of an automated system to guess your web server's or services' password.
  • Host Access Control — This interface allows you to allow or deny clients' access, based on their IP addresses, to specific services.
  • Manage root's SSH Keys — This interface allows you to add, import, and control SSH keys on your server. The system divides your keys into public and private key sets in two separate lists.
  • Manage Wheel Group Users — This interface allows you to add or remove users from the wheel group. The wheel group contains specific users who can execute the su command, which allows the user to gain root-level access.
  • ModSecurity Tools — This interface allows you install and manage your ModSecurity™ rules.
  • PHP open_basedir Tweak — PHP's open_basedir tweak denies users the ability to use PHP to open files outside of their home directory.
  • Quick Security Scan — This interface disables operating system-level services that are not necessary for your web server.
  • Security Advisor — This interface runs a security scan on your server and advises you about how to resolve any security issues that it finds.
  • Security Questions — This interface allows you to define and manage security questions. The system uses security questions when an unrecognized IP address attempts to log in to your account.
  • Shell Fork Bomb Protection — This interface allows you to prevent the depletion of server resources by users with terminal access (SSH or Telnet). This depletion of resources can crash your server in a malicious attack known as a fork bomb. Fork bombs start a cascade of small processes that duplicate themselves until they deplete the server's resources.
  • SMTP Restrictions — This interface allows you to configure your server so that the mail transport agent (MTA), Mailman mailing list software, and root user are the only accounts that can connect to remote SMTP servers. You may wish to prevent users from bypassing your mail server to send mail, which is a common practice for spammers.
  • SSH Password Authorization Tweak — This interface allows you to enable or disable passwords to tweak your SSH authentication. If you disable passwords, users must use keys when they access your server via SSH.
  • Traceroute Enable Disable — This interface allows you to configure the traceroute utility on your server. The traceroute utility is a network tool that determines the route that information sent across the Internet takes. This tool allows you to pinpoint weaknesses that a malicious attack might use.