{"id":324,"date":"2021-07-23T12:27:49","date_gmt":"2021-07-23T12:27:49","guid":{"rendered":"https:\/\/ssdsunucum.com\/blog\/additional-security-software\/"},"modified":"2021-07-23T12:27:49","modified_gmt":"2021-07-23T12:27:49","slug":"additional-security-software","status":"publish","type":"post","link":"https:\/\/ssdsunucum.com\/blog\/additional-security-software\/","title":{"rendered":"Additional Security Software"},"content":{"rendered":"<\/p>\n<div class=\"col-md-9\">\n<div class=\"flex-column flex-md-row article-header\"><\/div>\n<hr>\n<h2 id=\"overview\">Overview<\/h2>\n<p>This document lists third-party software and modifications that you can install to help secure your server.<\/p>\n<div class=\"callout callout-danger\">\n<div class=\"callout-heading\">Warning:<\/div>\n<div class=\"callout-content\">\n        Some of these programs have not received updates in a long time and contain out-of-date malware libraries. We <strong>strongly<\/strong> recommend that you check the release date of any solution that you use.\n    <\/div>\n<\/div>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>Among the options that this document lists, cPanel Technical Support can <strong>only<\/strong> provide direct support for CloudLinux\u2122, Imunify360, and KernelCare if you directly license them through cPanel, L.L.C. Otherwise, contact the appropriate software developer or your system administrator for help.<\/p>\n<\/p><\/div>\n<\/div>\n<h2 id=\"apf-firewall\">APF Firewall<\/h2>\n<p>APF Firewall offers an advanced firewall for Linux systems. For more information about APF Firewall, visit the APF Firewall website at r-Fx Networks.<\/p>\n<h2 id=\"atomicorp\">Atomicorp<\/h2>\n<p>Atomicop offers a hardened and secure shell for Linux servers. For more information about Atomicorp, visit the Atomicorp website.<\/p>\n<h2 id=\"bitninja\">BitNinja<\/h2>\n<p>BitNinja offers a security suite that provides protection against multiple forms of attack. For more information about BitNinja, visit the BitNinja website.<\/p>\n<h2 id=\"chkrootkit\">chkrootkit<\/h2>\n<p>The <code>chkrootkit<\/code> shell script examines your system\u2019s binaries for rootkit installations. Rootkits allow a malicious user to gain undetected administrative access to the server.<\/p>\n<p>To install the <code>chkrootkit<\/code> script, perform the following steps:<\/p>\n<ol>\n<li>\n<p>Log in to your server as the <code>root<\/code> user via SSH.<\/p>\n<\/li>\n<li>\n<p>Run the <code>cd \/root<\/code> command to change to the root directory.<\/p>\n<\/li>\n<li>\n<p>Run the following command to download <code>chkrootkit<\/code>:\n<\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-GO\" data-lang=\"GO\"><span style=\"color:#a6e22e\">wget<\/span> <span style=\"color:#a6e22e\">ftp<\/span>:<span style=\"color:#f92672\">\/\/<\/span><span style=\"color:#a6e22e\">ftp<\/span>.<span style=\"color:#a6e22e\">pangeia<\/span>.<span style=\"color:#a6e22e\">com<\/span>.<span style=\"color:#a6e22e\">br<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">pub<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">seg<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">pac<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">chkrootkit<\/span>.<span style=\"color:#a6e22e\">tar<\/span>.<span style=\"color:#a6e22e\">gz<\/span><\/code><\/pre>\n<\/div>\n<\/li>\n<li>\n<p>Run the <code>tar -xvzf chkrootkit.tar.gz<\/code> command to decompress the downloaded file.<\/p>\n<\/li>\n<li>\n<p>Run the <code>cd chkrootkit-0.53<\/code> command to change directories.<\/p>\n<\/li>\n<li>\n<p>To begin the <code>chkrootkit<\/code> installation, run the <code>make sense<\/code> command. The system will install the <code>chkrootkit<\/code> script on your server.<\/p>\n<\/li>\n<\/ol>\n<p>To run the <code>chkrootkit<\/code> script, run the following command:<\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-GO\" data-lang=\"GO\"><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">root<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">chkrootkit<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#ae81ff\">0.53<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">chkrootkit<\/span><\/code><\/pre>\n<\/div>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>We <strong>strongly<\/strong> recommend that you run the <code>chkrootkit<\/code> script often and add a cron job that runs the above command.<\/p>\n<\/p><\/div>\n<\/div>\n<p>For more information about the <code>chkrootkit<\/code> script, visit the <code>chkrootkit<\/code> website.<\/p>\n<h2 id=\"cloudlinux\">CloudLinux<\/h2>\n<p>CloudLinux offers a secure version of Linux that provides advanced functionality for shared hosting environments. CloudLinux integrates with cPanel &#038; WHM, and it provides detailed resource management tools and other improvements to system management and stability.<\/p>\n<p>You can purchase CloudLinux from the cPanel store. For more information about CloudLinux, visit the CloudLinux website.<\/p>\n<h2 id=\"configserver-software\">ConfigServer software<\/h2>\n<p>Many of our Technical Support Analysts recommend that you use CSF (ConfigServer Firewall), a free product that ConfigServer provides. CSF contains a stateful packet inspection (SPI) firewall, a login and intrusion detection mechanism, and a general security application for Linux servers.<\/p>\n<p>To install CSF, perform the following steps:<\/p>\n<ol>\n<li>\n<p>Log in to your server as the <code>root<\/code> user via SSH.<\/p>\n<\/li>\n<li>\n<p>Run the <code>cd \/root<\/code> command to change to the root directory.<\/p>\n<\/li>\n<li>\n<p>Run the following command to download CSF:\n<\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-GO\" data-lang=\"GO\"><span style=\"color:#a6e22e\">wget<\/span> <span style=\"color:#a6e22e\">https<\/span>:<span style=\"color:#f92672\">\/\/<\/span><span style=\"color:#a6e22e\">download<\/span>.<span style=\"color:#a6e22e\">configserver<\/span>.<span style=\"color:#a6e22e\">com<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">csf<\/span>.<span style=\"color:#a6e22e\">tgz<\/span><\/code><\/pre>\n<\/div>\n<\/li>\n<li>\n<p>Run the <code>tar -xzf csf.tgz<\/code> command to decompress the downloaded file.<\/p>\n<\/li>\n<li>\n<p>Run the <code>cd csf<\/code> command to change directories.<\/p>\n<\/li>\n<li>\n<p>To begin the CSF installation, run the <code>.\/install.cpanel.sh<\/code> command.<\/p>\n<\/li>\n<\/ol>\n<p>To configure CSF, use WHM\u2019s <em>ConfigServer Security &#038; Firewall<\/em> interface (<em>WHM<\/em> &gt;&gt; <em>Home<\/em> &gt;&gt; <em>Plugins<\/em> &gt;&gt; <em>ConfigServer Security &#038; Firewall<\/em>). The installation script should enable the correct ports in CSF, but we recommend that you confirm this on your server.<\/p>\n<p>After you configure CSF, you <strong>must<\/strong> disable testing mode. To take CSF out of testing mode, perform the following steps:<\/p>\n<ol>\n<li>\n<p>Click <em>Firewall<\/em>.<\/p>\n<\/li>\n<li>\n<p>Change the value of <em>Testing<\/em> from <code>1<\/code> to <code>0<\/code>.<\/p>\n<\/li>\n<li>\n<p>Click <em>Change<\/em>.<\/p>\n<\/li>\n<\/ol>\n<p>For more information about how to use CSF, visit the CSF website.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>ConfigServer also provides ConfigServer Mail Queues (CMQ), a free add-on product for cPanel &#038; WHM. The product provides a full-featured interface to cPanel\u2019s Exim mail queues from within WHM. For more information about how to install and use CMQ, visit the CMQ website.<\/p>\n<\/p><\/div>\n<\/div>\n<h2 id=\"configserver-exploit-scanner\">ConfigServer eXploit Scanner<\/h2>\n<p>ConfigServer eXploit Scanner (CXS) scans all uploads to a server for malware, and it quarantines any suspicious files. It integrates with cPanel &#038; WHM. For more information about CXS, visit the CXS website at ConfigServer Services.<\/p>\n<h2 id=\"imunifyav\">ImunifyAV<\/h2>\n<p>ImunifyAV is free antivirus software that protects your server from malicious code. For more information about ImunifyAV, visit the ImunifyAV website.<\/p>\n<p>ImunifyAV+ builds on ImunifyAV\u2019s antivirus protection. ImunifyAV+ not only detects threats but automatically cleans up infected files. It also includes email notifications.<\/p>\n<p>You can purchase ImunifyAV+ from the cPanel store. For more information about ImunifyAV+, read the cPanel blog.<\/p>\n<h2 id=\"imunify360\">Imunify360<\/h2>\n<p>Imunify360 offers a security suite that protects servers against a wide range of attacks. It integrates with cPanel &#038; WHM, and it provides reports to the system administrator on the server\u2019s status.<\/p>\n<p>You can purchase Imunify360 from the cPanel store. For more information about Imunify360, visit the Imunify360 website.<\/p>\n<h2 id=\"kernelcare\">KernelCare<\/h2>\n<p>KernelCare automatically updates your system\u2019s Linux kernel without the need for a reboot. It also provides patches that secure vulnerabilities, such as the symlink race condition.<\/p>\n<p>You can purchase KernelCare from the cPanel store. For more information about KernelCare, visit the KernelCare website.<\/p>\n<div class=\"callout callout-warning\">\n<div class=\"callout-heading\">Important:<\/div>\n<div class=\"callout-content\">\n<p>You can <strong>only<\/strong> install KernelCare on systems that run CentOS 6, 7, and 8.<\/p>\n<\/p><\/div>\n<\/div>\n<h2 id=\"linux-malware-detect\">Linux Malware Detect<\/h2>\n<p>Linux Malware Detect (LMD) offers a shareware malware protection scanner. For more information about LMD, visit the LMD website at r-Fx Networks.<\/p>\n<h2 id=\"modify-the-logwatch-configuration-file\">Modify the Logwatch configuration file<\/h2>\n<p>The Logwatch customizable log analysis system parses your system\u2019s log files for a given period of time. In addition, it creates a report that analyzes specified data. If your server does not include Logwatch, run the <code>yum -y install logwatch<\/code> command to install it and any dependences that Logwatch requires. The Logwatch configuration file exists in the <code>\/usr\/share\/logwatch\/default.conf\/logwatch.conf<\/code> location.<\/p>\n<p>We recommend that you use a text editor to change the following parameters:<\/p>\n<ul>\n<li>\n<p><code>MailTo = user@example.com<\/code> \u2014 Change the <code>user@example.com<\/code> address to the email address that you wish to receive Logwatch notifications.<\/p>\n<\/li>\n<li>\n<p><code>Detail = 5<\/code> or <code>Detail = 10<\/code> \u2014 Change this parameter to set the detail in the log files.<\/p>\n<ul>\n<li><code>5<\/code> represents a medium level of detail.<\/li>\n<li><code>10<\/code> represents a high level of detail.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2 id=\"patchman\">Patchman<\/h2>\n<p>Patchman detects vulnerabilities in software and sends notices to customers to teach them how to resolve the issue. If the customer does not resolve the vulnerability, Patchman can fix it automatically. Patchman integrates with cPanel &#038; WHM, and it provides reports to the system administrator on the server\u2019s status.<\/p>\n<p>For more information about Patchman, visit the Patchman website.<\/p>\n<h2 id=\"rootkit-hunter\">RootKit Hunter<\/h2>\n<p>The <code>rkhunter<\/code> script scans for rootkits and other exploits.<\/p>\n<div class=\"callout callout-warning\">\n<div class=\"callout-heading\">Important:<\/div>\n<div class=\"callout-content\">\n<ul>\n<li>cPanel, L.L.C. does not provide RootKit Hunter (rkhunter).<\/li>\n<li>The Rootkit Hunter project team has not updated rkhunter in over one year.<\/li>\n<li>You may experience false positives if you use rkhunter. If you need assistance with rkhunter, contact your system administrator.<\/li>\n<\/ul><\/div>\n<\/div>\n<p>To install the <code>rkhunter<\/code> script, perform the following steps:<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>In this section, <code>version<\/code> represents the Rootkit Hunter script\u2019s version. You can download the latest version from Rootkit Hunter project\u2019s website.<\/p>\n<\/p><\/div>\n<\/div>\n<ol>\n<li>\n<p>Log in to your server as the <code>root<\/code> user via SSH.<\/p>\n<\/li>\n<li>\n<p>Run the <code>cd \/root<\/code> command to change to the root directory.<\/p>\n<\/li>\n<li>\n<p>Run the following command to download the rkhunter script:\n<\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-GO\" data-lang=\"GO\"><span style=\"color:#a6e22e\">wget<\/span> <span style=\"color:#a6e22e\">https<\/span>:<span style=\"color:#f92672\">\/\/<\/span><span style=\"color:#a6e22e\">sourceforge<\/span>.<span style=\"color:#a6e22e\">net<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">projects<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">rkhunter<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">files<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">rkhunter<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">version<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">rkhunter<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#a6e22e\">version<\/span>.<span style=\"color:#a6e22e\">tar<\/span>.<span style=\"color:#a6e22e\">gz<\/span>.<span style=\"color:#a6e22e\">asc<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">download<\/span><\/code><\/pre>\n<\/div>\n<\/li>\n<li>\n<p>Run the <code>tar -xvzf rkhunter-version.tar.gz<\/code> command to decompress the downloaded file.<\/p>\n<\/li>\n<li>\n<p>Run the <code>cd rkhunter-1version<\/code> command to change directories.<\/p>\n<\/li>\n<li>\n<p>To begin the <code>rkhunter<\/code> script installation, run the <code>.\/installer.sh --layout default --install<\/code> command. The system will install the rkhunter script on your server.<\/p>\n<\/li>\n<\/ol>\n<p>To run the <code>rkhunter<\/code> script, run the following command:<\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-GO\" data-lang=\"GO\"><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">root<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">rkhunter<\/span><span style=\"color:#f92672\">-<\/span><span style=\"color:#a6e22e\">version<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">files<\/span><span style=\"color:#f92672\">\/<\/span><span style=\"color:#a6e22e\">rkhunter<\/span> <span style=\"color:#f92672\">-<\/span><span style=\"color:#a6e22e\">c<\/span><\/code><\/pre>\n<\/div>\n<p>For information about how to configure the <code>rkhunter<\/code> script, read the rkhunter FAQ.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>We <strong>strongly<\/strong> recommend that you run the <code>rkhunter<\/code> script often and add a cron job that runs the above command.<\/p>\n<\/p><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Overview This document lists third-party software and modifications that you can install to help secure your server. Warning: Some of these programs have not received updates in a long time and contain out-of-date malware libraries. We strongly recommend that you check the release date of any solution that you use. Note: Among the options that &hellip;<\/p>\n","protected":false},"author":1,"featured_media":325,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts\/324"}],"collection":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/comments?post=324"}],"version-history":[{"count":0,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts\/324\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/media\/325"}],"wp:attachment":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/media?parent=324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/categories?post=324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/tags?post=324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}