cPanel is the most important software tool for online web hosting service providers and protecting it is a top priority both for the company’s reputation and customers’ safety.
cPanel is by far the most popular web hosting control panel in the market with over 85% market share. Also, it is safe to say that cPanel is the most important piece of software a hosting provider needs to manage all the customer-related processes.
cPanel’s popularity also attracts hackers who are trying new methods every day to to breach the system, which makes cPanel security is a top priority for every web hosting service provider that uses cPanel. In this article, we will take a closer look at the antivirus solutions for cPanel that can help service providers to protect themselves against attacks and virus/malware.
ClamAV
ClamAV’s security solution within cPanel enables users to scan various directories such as mail folders, the entire home directory, public FTP, and the web directory. Upon detecting a security threat, it prompts users to take action. ClamAV also provides information on the number of scanned files, the remaining files to be scanned, and a list of identified malicious software.
However, when compared to alternative antivirus software, ClamAV may fall short of expectations. Research indicates that its Windows solutions can detect less than 20% of malware, and its Linux solution detects less than 70% of malware. Some third-party companies offer additional malware signatures for ClamAV to enhance its detection rate for PHP files, but these often come at a significant cost.
As a free and open-source antivirus solution, ClamAV lacks professional support, making it challenging to find the necessary online resources from community websites. Primarily focusing on mail gateway protection, ClamAV misses several essential features that users may require. Furthermore, its interface appears outdated and can be confusing at times.
Pros:
- Open Source: ClamAV is an open-source antivirus solution, which means it’s freely available for users and developers to use, modify, and distribute.
- Integration with cPanel: ClamAV integrates well with cPanel, a popular web hosting control panel. This integration allows users to easily scan mail folders, home directories, public FTP, and web directories.
- Cross-Platform Support: ClamAV is available for both Windows and Linux platforms, making it versatile and suitable for different server environments.
- Mail Gateway Protection: It is particularly effective for mail gateway protection, offering robust scanning capabilities for email attachments and content.
- Low Resource Usage: ClamAV is known for being lightweight and using minimal system resources, making it suitable for servers with resource constraints.
Cons:
- Detection Rate: ClamAV’s detection rate, especially on Windows, has been criticized in various research studies. It may not be as effective as some commercial antivirus solutions, detecting less than 20% of malware on Windows and less than 70% on Linux.
- Lack of Professional Support: Being open source, ClamAV lacks dedicated professional support. Users often need to rely on community forums and resources, which may not provide the level of assistance required in critical situations.
- Limited Features: While ClamAV is proficient in mail gateway protection, it lacks many features found in comprehensive commercial antivirus solutions. This limitation might be a drawback for users who require a more extensive range of security features.
- Outdated Interface: Some users find ClamAV’s user interface to be outdated and less intuitive compared to more modern antivirus solutions. This can lead to confusion, especially for users who are accustomed to more user-friendly interfaces.
- Dependency on Third-Party Signatures: To improve detection rates, ClamAV users may need to rely on third-party companies for additional malware signatures. However, these often come at a cost, negating the perceived advantage of a free antivirus solution.
ImunifyAV
ImunifyAV stands as the complimentary version of CloudLinux’s renowned Linux server antivirus, ImunifyAV+. With over a decade of expertise, CloudLinux has gained the trust of numerous organizations globally. The more extensive Imunify360 version offers advanced security solutions for Linux servers.
Recognized as one of the most proficient antivirus scanners available, ImunifyAV can identify various malicious files, including backdoors, web-shells, viruses, hacker tools, ‘blackhat SEO’ scripts, phishing pages, and more. Its hosting panel integration supports both cPanel and Plesk.
Despite being a perpetual free antivirus solution, ImunifyAV provides 24/7 professional technical support and an array of valuable features. CloudLinux’s free cPanel antivirus delivers real-time malware processing, scheduled and on-demand scanning, a database scanner, incident reporting, automation through the command line, and integration with third-party solutions via API.
It is unequivocal that ImunifyAV stands out as the premier free cPanel antivirus in the market. Crafted by a seasoned security team, it undergoes frequent updates, boasts user-friendly functionality, and encompasses all the essential features a web administrator might require.
cPanel users can easily install ImunifyAV by using the preferred SSH console application and with root access. Users can start the installation easily with these commands:
To install ImunifyAV using command line:
wget https://repo.imunify360.cloudlinux.com/defence360/imav-deploy.sh -O imav-deploy.sh bash imav-deploy.sh
Pros:
- Comprehensive Detection: ImunifyAV is known for its robust antivirus scanning capabilities, capable of detecting various types of malicious files, including backdoors, web-shells, viruses, hacker tools, ‘blackhat SEO’ scripts, phishing pages, and more.
- Integration Support: It seamlessly integrates with popular hosting panels, including cPanel and Plesk, making it user-friendly for administrators familiar with these environments.
- Professional Technical Support: Despite being a free antivirus solution, ImunifyAV offers 24/7 professional technical support, providing assistance when needed.
- Real-Time Malware Processing: It provides real-time malware processing, enhancing the security of the server by swiftly identifying and addressing potential threats.
- Scheduled and On-Demand Scanning: ImunifyAV allows for both scheduled and on-demand scanning, offering flexibility in managing security checks based on user preferences and requirements.
- Database Scanner: The inclusion of a database scanner adds an extra layer of security by checking databases for potential vulnerabilities or malicious entries.
- Incident Reporting: ImunifyAV offers incident reporting, allowing administrators to stay informed about security events and take necessary actions promptly.
- Automation and API Integration: The antivirus solution supports automation through the command line and can be integrated with third-party solutions via API, contributing to a more streamlined security management process.
Cons:
- Limited Advanced Features: While ImunifyAV is a robust antivirus solution, its free version may lack some of the advanced features available in premium security solutions.
- Dependency on Hosting Panels: Integration with hosting panels like cPanel and Plesk is a strength, but it might be a limitation for users who operate on different hosting environments.
- Potential for False Positives: Like many antivirus programs, ImunifyAV may occasionally generate false positives, flagging legitimate files or activities as suspicious or malicious.
Maldet (Linux Malware Detect)
Maldet, short for Linux Malware Detect, is a robust open-source malware detection tool designed specifically for Linux-based servers. Its primary purpose is to scan server environments for malicious software, backdoors, and other security threats that may compromise the integrity and functionality of the system. Developed with a focus on efficiency and lightweight operation, Maldet is a valuable addition to the security toolkit for Linux server administrators.
How to Use Maldet:
Using Maldet involves several key steps, from installation to regular scanning and response to detected threats. Here’s a basic guide on how to use Maldet:
- Installation:
- Install Maldet on your Linux server. This typically involves downloading the latest version from the official website or using package management tools like APT or YUM.
- Configuration:
- Once installed, you may need to configure Maldet to suit your server environment. Configuration options can be set in the Maldet configuration file, which is often located at
/usr/local/maldetect/conf.maldet
.
- Once installed, you may need to configure Maldet to suit your server environment. Configuration options can be set in the Maldet configuration file, which is often located at
- Scanning:
- Initiate a scan using the command-line interface. The basic syntax is:
maldet -a /path/to/scan
- Replace
/path/to/scan
with the directory or file you want to scan.
- Initiate a scan using the command-line interface. The basic syntax is:
- Quarantine and Cleanup:
- If Maldet detects any threats, it will provide a report on the identified malicious files. Depending on your configuration, Maldet can quarantine or move these files to a secure location.
- Update Signatures:
- Regularly update Maldet’s malware signatures to ensure it can recognize the latest threats. Use the following command to update signatures:Copy code
maldet -u
- Regularly update Maldet’s malware signatures to ensure it can recognize the latest threats. Use the following command to update signatures:Copy code
- Monitoring:
- Periodically monitor Maldet logs and reports for any suspicious activity. Logs are usually located in
/usr/local/maldetect/event_log
.
- Periodically monitor Maldet logs and reports for any suspicious activity. Logs are usually located in
- Scheduled Scans:
- For ongoing security, consider scheduling regular scans using cron jobs. This helps automate the scanning process, ensuring continuous protection against malware.
- Command-Line Options:
- Explore various command-line options and parameters to customize Maldet’s behavior based on your specific requirements. Refer to the Maldet documentation for a comprehensive list of available options.
Remember that the specific steps and commands may vary based on your Linux distribution and the version of Maldet you have installed. Always refer to the official documentation and man pages for the most accurate and up-to-date information on using Maldet. Regularly updating both the tool and its signatures is crucial to maintaining an effective defense against evolving malware threats.
Pros:
- Malware Detection: Maldet is specifically designed to detect malware on Linux servers. It scans for various types of malicious software, backdoors, and other security threats.
- Active Development: Maldet is actively developed and maintained, with updates released regularly to ensure it stays effective against new and emerging threats.
- Lightweight: Maldet is known for its lightweight nature, meaning it doesn’t consume excessive system resources during scans, making it suitable for servers with resource constraints.
- Inotify Support: Maldet supports inotify, a Linux kernel subsystem that provides a way to monitor file system events. This allows for real-time detection of changes in files and directories.
- Quarantine Functionality: When a threat is detected, Maldet has the ability to quarantine or move the infected files to a separate location, helping to prevent further damage.
- Command-Line Interface: Maldet can be operated through the command line, offering flexibility and automation options for users who prefer to manage security tasks through scripts or scheduled tasks.
- Regular Signature Updates: Maldet relies on signature-based detection, and it regularly updates its malware signatures to improve detection accuracy and keep up with the evolving threat landscape.
Cons:
- False Positives: Like any malware detection tool, Maldet may occasionally produce false positives, flagging legitimate files or activities as potentially malicious.
- Limited to Linux: Maldet is specifically designed for Linux servers, so it may not be suitable for users operating on different platforms.
- Interface Complexity: For users who prefer graphical interfaces, Maldet’s command-line interface may be perceived as less user-friendly compared to solutions with dedicated graphical interfaces.
- May Require Configuration: Proper configuration may be necessary for Maldet to work optimally, and users may need to adjust settings based on their specific server environment and requirements.
CXS (ConfigServer eXploit Scanner)
ConfigServer eXploit Scanner (CXS) is a powerful and versatile security tool designed to scan and identify potential security threats, exploits, and malware on Linux servers. Developed by ConfigServer Services, CXS provides comprehensive server security by focusing on the detection and removal of malicious files and suspicious patterns. It is commonly used in web hosting environments to enhance the overall security posture of Linux-based servers.
Installation of CXS:
The installation process for CXS involves several steps:
- Download the Installation Script:
- Obtain the installation script from the ConfigServer website or repository. The script is typically named
install.sh
.
- Obtain the installation script from the ConfigServer website or repository. The script is typically named
- Run the Installation Script:
- Execute the installation script using the following command:Copy code
sh install.sh
- The script will guide you through the installation process, including prompts for configuration options.
- Execute the installation script using the following command:Copy code
- Configuration:
- After installation, you may need to configure CXS based on your server environment. Configuration options are often available in the
/etc/cxs/cxs.conf
file.
- After installation, you may need to configure CXS based on your server environment. Configuration options are often available in the
- Start CXS:
- Start CXS with the following command:arduinoCopy code
/usr/sbin/cxs --background
- This initiates a background scan for potential exploits.
- Start CXS with the following command:arduinoCopy code
- Customization:
- Explore and customize additional options and settings according to your specific security requirements. CXS offers a range of configuration options to tailor its behavior.
Pros:
- Comprehensive Exploit Scanning: CXS excels in the detection of various exploits, malware, and suspicious files, providing a thorough examination of server files and directories.
- User-Friendly Interface: CXS typically comes with a user-friendly interface that simplifies the configuration and monitoring process, making it accessible to both novice and experienced users.
- Customizable Configuration: Users have the flexibility to customize CXS configurations to meet the specific needs of their server environment. This includes defining scanning rules, exclusion lists, and other parameters.
- Regular Updates: ConfigServer Services actively maintains and updates CXS, ensuring that the tool stays current with emerging threats and vulnerabilities.
- Automation and Scheduled Scans: CXS supports automation and allows users to schedule regular scans, enabling continuous monitoring and protection against potential security threats.
Cons:
- Cost for Some Features: While CXS offers a free version, some advanced features may require a license or subscription, and these often come at a cost.
- Resource Usage: CXS, when actively scanning, may consume system resources, and users should consider the impact on server performance, especially on systems with limited resources.
- Linux Environment Dependency: CXS is primarily designed for Linux servers, and its features may not be applicable or accessible on other operating systems.
- Learning Curve: For users new to server security, there might be a learning curve associated with understanding and configuring the various features and options provided by CXS.
In conclusion, CXS is a robust and feature-rich security tool that contributes to the overall security of Linux servers. Its comprehensive scanning capabilities, user-friendly interface, and customization options make it a valuable asset for server administrators. However, users should be aware of the potential costs associated with certain features and consider the learning curve involved in configuring and utilizing its capabilities effectively.