{"id":6198,"date":"2021-03-05T09:58:08","date_gmt":"2021-03-05T04:28:08","guid":{"rendered":"https:\/\/www.skynats.com\/?p=6198"},"modified":"2024-12-11T17:46:32","modified_gmt":"2024-12-11T12:16:32","slug":"linux-security-enhancement-with-the-cpanel-whm","status":"publish","type":"post","link":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/","title":{"rendered":"Linux security enhancement with the cPanel &#038; WHM"},"content":{"rendered":"\n<p>The internet is a hostile environment, together with the web hosting face innumerable threats through the bad actors that will steal the data and exploit server resources. Whereas CentOS is secure and a stable foundation that is not invulnerable. The malicious bots and the bad actors will access via software vulnerabilities, configuration mistakes, and poor Linux security practices.<\/p>\n\n\n\n<p>If you need any assistance related to<span style=\"color:#0074a5\" class=\"has-inline-color\"> <\/span><a href=\"https:\/\/www.skynats.com\/linux-server-management\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"color:#016f9f\" class=\"has-inline-color\">Linux server management services<\/span><\/a>, please consult our technical team support for further detail information.<\/p>\n\n\n\n<p>The Cpanel and WHM include many Linux security tools which help server administrators in order to build a secure hosting environment. Let&#8217;s have a peek at<strong>&nbsp;four techniques that leverage&nbsp;<\/strong>Cpanel and WHM that will enhance Linux security.<\/p>\n\n\n\n<p>Hanging the SSH port to confuse bad bots.<\/p>\n\n\n\n<p>Implementing SSH keys to avoid security vulnerabilities caused by weak passwords.<\/p>\n\n\n\n<p>Automatically blocking brute-force attacks with cPHulk.<\/p>\n\n\n\n<p>Leveraging cPanel&nbsp;Security Advisor&nbsp;to mitigate common Linux security problems.<\/p>\n\n\n\n<p><strong>Switch the SSH port in cPanel<\/strong><\/p>\n\n\n\n<p>The SSH (secure shell) is an encrypted network protocol that ensures the authentication credentials and the data safe while connecting to the server&#8217;s shell. The client on your local device connects to the server that runs an SSH service. Whereas communication between them is encrypted so that data will travel securely over the network.<\/p>\n\n\n\n<p>The SSH service traditionally listens for connections on harbour 22, so bots can easily target the port with the brute-force attack that attempts to guess and access valid information such as username and the password. Try to choose a strong password so that it never allows brute force to access the port.<\/p>\n\n\n\n<p>&nbsp;Before you proceed, ensure the change in your firewall to allow the connection on the fresh port. Otherwise, it will block the SSH connection and you will be unable to login into it.<\/p>\n\n\n\n<p>Log in as root by using SSH and open typically the\/etc\/ssh\/sshd_config file in the preferred text editor.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nano\/etc\/ssh\/sshd_config<\/code><\/pre>\n\n\n\n<p>Find the line that scan.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>#port 22<\/code><\/pre>\n\n\n\n<p>Delete the pound indicator at the beginning of the line and then change the 22 to your port.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>port 32356<\/code><\/pre>\n\n\n\n<p>Save and close the SSH configuration and finally restart the SSH service.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\/script\/restart_ssh<\/code><\/pre>\n\n\n\n<p>Ensure to note the port number. Whenever you log into the SSH need to specify the port in your ssh command.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ssh -p 32356 user@example.com<\/code><\/pre>\n\n\n\n<p>Best way to use SSH keys with the root account.<\/p>\n\n\n\n<p>By changing the SSH port will reduce the brute force attempt, but it will not stop motivated attackers. Another way to boost SSH security is to avoid the password in favor of SSH keys.SSH keys are more secure and, if it turns out password logins are disabled, they make successful brute-force attacks impossible.<\/p>\n\n\n\n<p>The SSH points have a public and private component. Whereas the public key stored on the server and a private key stored on the client&#8217;s machine. Only the user with the private keys can be log into the relevant account.<\/p>\n\n\n\n<p>First generating the new SSH keys for the root in WHM. For that, you need to login into the WHM and navigate to Manage root&#8217;s SSH keys.<\/p>\n\n\n\n<p>Click&nbsp;Generate New Key.<\/p>\n\n\n\n<p>Complete form with a robust password. In most situations, the default settings are fine.<\/p>\n\n\n\n<p>Press&nbsp;Generate major<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"602\" height=\"401\" src=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-5.png\" alt=\"\" class=\"wp-image-6200\" srcset=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-5.png 602w, https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-5-300x200.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/figure>\n\n\n\n<p>WHM generates the public keys and the private keys, you can see it by clicking Return to help SSH manager. Next, authorize the public key element for authentication. Select the manage Authorization and then click the Authorize.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"602\" height=\"323\" src=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-6.png\" alt=\"\" class=\"wp-image-6201\" srcset=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-6.png 602w, https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-6-300x161.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/figure>\n\n\n\n<p>Download and save the private key on your local computer. Click view\/download key. Copy the text from the upper text box and then use the putty client on the windows.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"602\" height=\"323\" src=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-7.png\" alt=\"\" class=\"wp-image-6202\" srcset=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-7.png 602w, https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-7-300x161.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/figure>\n\n\n\n<p>The upcoming step is differs depending on your operating system and SSH client. If anyone uses the built-in Microsoft windows 10 SSH or open SSH on macOS or Linux, you must create a file known as id_rsa.pub and then stick the private key data into it. If you have a key name, you can use it instead of the id_rsa filename.<\/p>\n\n\n\n<p>To make your default private key.<\/p>\n\n\n\n<p>On Windows, save this in the Usersuser1. ssh directory.<\/p>\n\n\n\n<p>&nbsp;Linux and macOS, help you save it in the \/home\/user1\/. ssh directory.<\/p>\n\n\n\n<p>Replace User1 with your login name. Then try to connect your server over SSH as usual, utilize the authentication kay rather than your password.<\/p>\n\n\n\n<p>If you do not want to make it your arrears private key, save this elsewhere and specify the key when logging in.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ssh -p 32356 -i my_public_key user1@example.com<\/code><\/pre>\n\n\n\n<p>As the things stand, the root user can log in with SSH keys or a password. If you would like to force users to authenticate with keys and want to prevent them from applying a password, try to enable the SSH code authorization tweak in the home security centre.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"379\" src=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-8.png\" alt=\"\" class=\"wp-image-6203\" srcset=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-8.png 602w, https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-8-300x189.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/figure>\n\n\n\n<p><strong>Fighting Brute force attacks with cPHulk<\/strong><\/p>\n\n\n\n<p>If you have locked down the SSH but still there are several other services bots might desire. The cpanel and the WHM include the cpHulk, a brute force protection tools that monitor the Cpanel, WHM, Mail, ssh ports. You can find the cPHulk in the WHM security centre. By default, if it is disabled, click on the switch and enable it and access the configuration interface.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"473\" src=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-9.png\" alt=\"\" class=\"wp-image-6204\" srcset=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-9.png 602w, https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-9-300x236.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/figure>\n\n\n\n<p>We have selected sensible defaults, but you can certainly tweak several settings to the user and IP brute-force monitoring:<\/p>\n\n\n\n<p>Maximum failures&nbsp;determine the number of was not able authentication attempts before the user or IP is blocked.<\/p>\n\n\n\n<p>\u200cBrute Force Protection Period&nbsp;determines how quickly the maximum malfunction rate is reached.<\/p>\n\n\n\n<p>For example, in this image, IPs are blocked if they make a lot more than five failed login attempts in 15 a short time.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"304\" src=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-10.png\" alt=\"\" class=\"wp-image-6205\" srcset=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-10.png 602w, https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-10-300x151.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/figure>\n\n\n\n<p>cPHulk also includes whitelisting for IP addresses and users that might never be blocked and blacklisting for those that will always be plugged. (Note that these terms are likely to switch in the future to make them more comprehensive)<\/p>\n\n\n\n<p>Follow Linux Security Best Practices with cPanel Security Advisor<\/p>\n\n\n\n<p>cPanel&nbsp;Security Advisor&nbsp;will scan the Linux servers and programs for misconfigurations that could cause security vulnerabilities. It generates warnings alongside recommendations with guidance to help administrators to secure his or her server.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"502\" src=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-11.png\" alt=\"\" class=\"wp-image-6206\" srcset=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-11.png 602w, https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-11-300x250.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/figure>\n\n\n\n<p><strong>Linux Server Security with cPanel &amp; WHM<\/strong><\/p>\n\n\n\n<p>There are a lot of security features that available in the Linux security features which will empower hosting providers and server administrators to protect data, limit the impact of malicious users and defeat brute-force and many other bad bot attackers.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>In short, The Linux security enhancement with Cpanel &amp; WHM help server administrators to build a secure hosting environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet is a hostile environment, together with the web hosting face innumerable threats through the bad actors that will steal the data and exploit server resources. Whereas CentOS is secure and a stable foundation that is not invulnerable. The malicious bots and the bad actors will access via software vulnerabilities, configuration mistakes, and poor [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,103,239,68,258],"tags":[548],"class_list":["post-6198","post","type-post","status-publish","format-standard","hentry","category-blog","category-cpanel-server-support","category-linux","category-server-management","category-unix","tag-linux-server-security-with-cpanel-whm"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Linux security enhancement with the cPanel &amp; WHM<\/title>\n<meta name=\"description\" content=\"The internet is a hostile environment, together with the web hosting face innumerable threats through the bad actors that will steal the data\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux security enhancement with the cPanel &amp; WHM\" \/>\n<meta property=\"og:description\" content=\"The internet is a hostile environment, together with the web hosting face innumerable threats through the bad actors that will steal the data\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/\" \/>\n<meta property=\"og:site_name\" content=\"Server Management Services | Cloud Management | Skynats\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/skynats\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-05T04:28:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T12:16:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-5.png\" \/>\n<meta name=\"author\" content=\"Nabeela\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skynatstech\" \/>\n<meta name=\"twitter:site\" content=\"@skynatstech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nabeela\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/\"},\"author\":{\"name\":\"Nabeela\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/person\\\/2968118a72bea0868796abf1237ab3e0\"},\"headline\":\"Linux security enhancement with the cPanel &#038; WHM\",\"datePublished\":\"2021-03-05T04:28:08+00:00\",\"dateModified\":\"2024-12-11T12:16:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/\"},\"wordCount\":1095,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/image-5.png\",\"keywords\":[\"linux server security with cPanel &amp; Whm\"],\"articleSection\":[\"Blog\",\"cpanel server support\",\"Linux\",\"server management\",\"Unix\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/\",\"name\":\"Linux security enhancement with the cPanel & WHM\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/image-5.png\",\"datePublished\":\"2021-03-05T04:28:08+00:00\",\"dateModified\":\"2024-12-11T12:16:32+00:00\",\"description\":\"The internet is a hostile environment, together with the web hosting face innumerable threats through the bad actors that will steal the data\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/image-5.png\",\"contentUrl\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/image-5.png\",\"width\":602,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/linux-security-enhancement-with-the-cpanel-whm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux security enhancement with the cPanel &#038; WHM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/\",\"name\":\"Server Management Services | Cloud Management | Skynats\",\"description\":\"Server Management and Cloud Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#organization\",\"name\":\"Skynats Technologies\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Sknats-Logo-New-whole.png\",\"contentUrl\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Sknats-Logo-New-whole.png\",\"width\":989,\"height\":367,\"caption\":\"Skynats Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/skynats\",\"https:\\\/\\\/x.com\\\/skynatstech\",\"https:\\\/\\\/www.instagram.com\\\/skynatstech\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/skynats-technologies\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCvTAjrFJ4_E2MJKwlDHomlg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/person\\\/2968118a72bea0868796abf1237ab3e0\",\"name\":\"Nabeela\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g\",\"caption\":\"Nabeela\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Linux security enhancement with the cPanel & WHM","description":"The internet is a hostile environment, together with the web hosting face innumerable threats through the bad actors that will steal the data","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/","og_locale":"en_US","og_type":"article","og_title":"Linux security enhancement with the cPanel & WHM","og_description":"The internet is a hostile environment, together with the web hosting face innumerable threats through the bad actors that will steal the data","og_url":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/","og_site_name":"Server Management Services | Cloud Management | Skynats","article_publisher":"https:\/\/www.facebook.com\/skynats","article_published_time":"2021-03-05T04:28:08+00:00","article_modified_time":"2024-12-11T12:16:32+00:00","og_image":[{"url":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-5.png","type":"","width":"","height":""}],"author":"Nabeela","twitter_card":"summary_large_image","twitter_creator":"@skynatstech","twitter_site":"@skynatstech","twitter_misc":{"Written by":"Nabeela","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/#article","isPartOf":{"@id":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/"},"author":{"name":"Nabeela","@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/person\/2968118a72bea0868796abf1237ab3e0"},"headline":"Linux security enhancement with the cPanel &#038; WHM","datePublished":"2021-03-05T04:28:08+00:00","dateModified":"2024-12-11T12:16:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/"},"wordCount":1095,"commentCount":0,"publisher":{"@id":"https:\/\/www.skynats.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-5.png","keywords":["linux server security with cPanel &amp; Whm"],"articleSection":["Blog","cpanel server support","Linux","server management","Unix"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/","url":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/","name":"Linux security enhancement with the cPanel & WHM","isPartOf":{"@id":"https:\/\/www.skynats.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/#primaryimage"},"image":{"@id":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-5.png","datePublished":"2021-03-05T04:28:08+00:00","dateModified":"2024-12-11T12:16:32+00:00","description":"The internet is a hostile environment, together with the web hosting face innumerable threats through the bad actors that will steal the data","breadcrumb":{"@id":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/#primaryimage","url":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-5.png","contentUrl":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/03\/image-5.png","width":602,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.skynats.com\/blog\/linux-security-enhancement-with-the-cpanel-whm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.skynats.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux security enhancement with the cPanel &#038; WHM"}]},{"@type":"WebSite","@id":"https:\/\/www.skynats.com\/blog\/#website","url":"https:\/\/www.skynats.com\/blog\/","name":"Server Management Services | Cloud Management | Skynats","description":"Server Management and Cloud Management","publisher":{"@id":"https:\/\/www.skynats.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.skynats.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.skynats.com\/blog\/#organization","name":"Skynats Technologies","url":"https:\/\/www.skynats.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/08\/Sknats-Logo-New-whole.png","contentUrl":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/08\/Sknats-Logo-New-whole.png","width":989,"height":367,"caption":"Skynats Technologies"},"image":{"@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/skynats","https:\/\/x.com\/skynatstech","https:\/\/www.instagram.com\/skynatstech\/","https:\/\/www.linkedin.com\/company\/skynats-technologies","https:\/\/www.youtube.com\/channel\/UCvTAjrFJ4_E2MJKwlDHomlg"]},{"@type":"Person","@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/person\/2968118a72bea0868796abf1237ab3e0","name":"Nabeela","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g","caption":"Nabeela"}}]}},"_links":{"self":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/posts\/6198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/comments?post=6198"}],"version-history":[{"count":0,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/posts\/6198\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/media?parent=6198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/categories?post=6198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/tags?post=6198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}