{"id":8926,"date":"2022-01-26T12:31:17","date_gmt":"2022-01-26T12:31:17","guid":{"rendered":"https:\/\/cpanelplesk.com\/wp62\/?p=8926"},"modified":"2022-02-01T13:38:23","modified_gmt":"2022-02-01T13:38:23","slug":"easy-68-steps-secure-harden-whm-cpanel-checklist","status":"publish","type":"post","link":"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist","title":{"rendered":"Easy 68 step checklist to secure &#038; harden your WHM\/cPanel server"},"content":{"rendered":"<div> I have written this checklist to secure your newly installed cPanel server. We will keep improving it over time, by adding in details for each point.<br \/>\nTo harden your cPanel server can be split into six areas.\n<\/div>\n<p>\nServer security overall (not very much related to cPanel)<\/p>\n<div class=\"toc-sh\">\n<a href=\"#server-check\">Server Check (13 steps)<\/a><br \/>\n<a href=\"#ssh-telnet-check\">SSH\/Telnet Check (7 Steps)<\/a><br \/>\n<a href=\"#mail-check\">Mail Check (4 Steps)<\/a><br \/>\n<a href=\"#apache-check\">Apache Check (9 Steps)<\/a><br \/>\n<a href=\"#apache-check\">PHP Check (4 Steps)<\/a><br \/>\n<a href=\"#WHM-settings-check\">WHM Settings Check (32 Steps)<\/a>\n<\/div>\n<div class=\"space1\"><\/div>\n<div id=\"server-check\">\n<h3>Server Check (13 steps)<\/h3>\n<ol>\n<li><b>Secure temp folder, Check \/tmp permissions<\/b><br \/>\n            \/tmp should be chmod 1777\n        <\/li>\n<li><b>Check \/tmp ownership<br \/>\n        <\/b>\/tmp should be owned by root:root\n        <\/li>\n<li><b>Check the permission of tmp folder in \/var &gt; \/var\/tmp<br \/>\n        <\/b>\/var\/tmp should be chmod 1777\n        <\/li>\n<li><b>Check the ownership of tmp folder in \/var &gt; \/var\/tmp<br \/>\n        <\/b>\/var\/tmp should be owned by root:root\n        <\/li>\n<li><b>Check permission of \/tmp folder within \/user &gt; \/usr\/tmp<br \/>\n        <\/b>\/usr\/tmp should be chmod 1777\n        <\/li>\n<li><b>Check ownership of tmp folder within user folder &gt; \/usr\/tmp<br \/>\n        <\/b>\/usr\/tmp should be owned by root:root\n        <\/li>\n<li><b>Check for DNS random query source port<br \/>\n        <\/b>ISC recommends that you do not configure BIND to use a static query port. You should remove\/disable the<br \/>\n            query-source line that specifies port 53 from the named configuration files\n        <\/li>\n<li><b>Check nobody cron<br \/>\n        <\/b>Check for cron You have a nobody cron log file \u2013 you should check that this has not been created by an<br \/>\n            exploit.\n        <\/li>\n<li><b>Check Perl version<br \/>\n        <\/b>The version of Perl (v5.032000) is out of date, and you should upgrade it.\n        <\/li>\n<li><b>Check SUPERUSER accounts<br \/>\n        <\/b>You have accounts other than root set up with UID 0. This is a considerable security risk. You should use<br \/>\n            su, or best of all, sudo for such access\n        <\/li>\n<li><b>Check for dhclient<br \/>\n        <\/b>In a standard hosting environment, DHCP is no longer needed. Infect it hinders badly with cPanel standard<br \/>\n            hosting operations. In a shared hosting server, this setting poses a security risk. You should configure all<br \/>\n            network cards with static IPs.\n        <\/li>\n<li><b>Check for swap file<br \/>\n        <\/b>Swap files are necessary for any server, as it is used when RAM runs out. Do not have a swap file is a<br \/>\n            performance and stability risk. Make sure your server has a swap file configured, preferably a dedicated<br \/>\n            partition for it. How to create a swap file, we have written a tutorial for it. &lt;&lt; link &gt;&gt;create<br \/>\n            a swap file on the existing partition for the Cpanel server\n        <\/li>\n<li><b>Check server services<br \/>\n        <\/b>The following services come with all cPanel servers by default but are not needed at all by almost all the<br \/>\n            shared hosting servers.<br \/>\n            Each service can usually be disabled using:<br \/>\n            \/bin\/systemctl stop [service]<br \/>\n            \/bin\/systemctl disable [service]\n        <\/li>\n<\/ol>\n<\/div>\n<div class=\"space1\"><\/div>\n<div id=\"ssh-telnet-check\" class=\"\">\n<h3>SSH\/Telnet Check (7 Steps)<\/h3>\n<ol>\n<li><b>Check if SSHv1 is disabled<\/b><br \/>\n            SSHv1 is long gone, make sure it is disabled from \/etc\/ssh\/sshd_config and setting:Protocol 2\n        <\/li>\n<li><b>Move SSH on a non-standard port (other than 22)<\/b><br \/>\n            Almost all password brute force attacks are made on a standard ssh port. You should consider moving SSH<br \/>\n            to a non-standard port. If you are using a firewall, open your new port in the firewall to avoid locking<br \/>\n            yourself out. Here is in detail how to change your SSH port.\n        <\/li>\n<li><b>Check SSH PasswordAuthentication<\/b><br \/>\n            This is recommended but could be hard to practice if you do not use a password manager. By using this<br \/>\n            option, chances to get nailed by a brute force attack reach zero. To do it, disable<br \/>\n            PasswordAuthentication and only allow access with PubkeyAuthentication\n        <\/li>\n<li><b>Check SSH UseDNS<\/b><br \/>\n            You need to disable UseDNS by editing \/etc\/ssh\/sshd_config and setting: UseDNS no. With this enabled,<br \/>\n            lfd will be unable to track SSHD login failures, successfully as the log files will not report IP<br \/>\n            addresses\n        <\/li>\n<li><b>Disable telnet, make sure port 23 is not in use<\/b><br \/>\n            Telnet is an insecure protocol, and it is not needed by most shared hosting servers. You should disable<br \/>\n            the telnet daemon if it is running.\n        <\/li>\n<li><b>Check shell limits\/ enable Shell Fork Bomb Protection<\/b><br \/>\n            DOS exploits often can very easily take of server resources with shell access is not well configured.<br \/>\n            cPanel has given a very good way to mitigate such problems. Use WHM options to enable &#8220;Shell Fork Bomb<br \/>\n            Protection&#8221;\n        <\/li>\n<li><b>Enable Background Process Killer<\/b><br \/>\n            Another good tool provided by cPanel, All options You should be enabled in WHM &gt; &#8220;Background Process<br \/>\n            Killer&#8221;\n        <\/li>\n<\/ol>\n<\/div>\n<div class=\"space1\"><\/div>\n<div id=\"mail-check\">\n<h3>Mail Check (4 Steps)<\/h3>\n<ol>\n<li><b>Check root email forwarder<\/b><br \/>\n            The root email must have a forwarder, so you, as the server admin, receive all critical server emails.\n        <\/li>\n<li><b>Exim for extended logging for tracking SPAM (log_selector)<\/b><br \/>\n            If you want to track and catch spam, you must enable exim extend logging. to do that, in &#8220;Exim Configuration<br \/>\n            Manger&#8221; &gt; &#8220;Advanced Editor&#8221; &gt; log_selector add log_selector = +arguments +subject +received_recipients\n        <\/li>\n<li><b>Check weak SSL\/TLS Ciphers in exim config (tls_require_ciphers)<\/b><br \/>\n            Cipher list<br \/>\n            [ECDHE-ECDSA-AES128-GCM-SHA256<br \/>\n            ECDHE-RSA-AES128-GCM-SHA256<br \/>\n            ECDHE-ECDSA-AES256-GCM-SHA384<br \/>\n            ECDHE-RSA-AES256-GCM-SHA384<br \/>\n            ECDHE-ECDSA-CHACHA20-POLY1305<br \/>\n            ECDHE-RSA-CHACHA20-POLY1305<br \/>\n            DHE-RSA-AES128-GCM-SHA256<br \/>\n            DHE-RSA-AES256-GCM-SHA384]<br \/>\n            Due to weaknesses in the SSLv2 cipher, you should disable WHM &gt; Exim Configuration Manager &gt; Allow<br \/>\n            weak SSL\/TLS ciphers to be used, and also ensure tls_require_ciphers in \/etc\/exim.conf does not allow SSLv2<br \/>\n            as OpenSSL currently shows that it does\n        <\/li>\n<li><b> Check exim for secure authentication<\/b><br \/>\n            You should require clients to connect with SSL or issue the STARTTLS command before they are allowed to<br \/>\n            authenticate with the server otherwise, passwords may be sent in plain text in WHM &gt; Exim Configuration<br \/>\n            Manager Check dovecot weak SSL\/TLS Ciphers (ssl_cipher_list)<\/p>\n<p>Cipher list <\/p>\n<p>            [ ECDHE-ECDSA-AES128-GCM-SHA256<br \/>\n            ECDHE-RSA-AES128-GCM-SHA256<br \/>\n            ECDHE-ECDSA-AES256-GCM-SHA384<br \/>\n            ECDHE-RSA-AES256-GCM-SHA384<br \/>\n            ECDHE-ECDSA-CHACHA20-POLY1305<br \/>\n            ECDHE-RSA-CHACHA20-POLY1305<br \/>\n            DHE-RSA-AES128-GCM-SHA256<br \/>\n            DHE-RSA-AES256-GCM-SHA384 ].<br \/>\n            Due to weaknesses in the SSLv2 cipher, you should disable SSLv2 in WHM &gt; Mailserver Configuration &gt;<br \/>\n            SSL Cipher List &gt; Remove +SSLv2 or Add -SSLv2\n        <\/li>\n<\/ol>\n<\/div>\n<div class=\"space1\"><\/div>\n<div id=\"apache-check\">\n<h3>Apache Check (9 Steps)<\/h3>\n<ol>\n<li><b>Check apache version<\/b><br \/>\n            The minimum apache version you should be using is v2.2*, which is the minimum recommended by the apache<br \/>\n            organization.\n        <\/li>\n<li><b>Check Apache for ModSecurity<\/b><br \/>\n            If you are running a shared hosting server, ModSecurity is a must-have. If you have not compiled Apache with<br \/>\n            it, recompile it with the ModSecurity option. It prevents the exploitation of vulnerable web scripts.\n        <\/li>\n<li><b>Check Apache for mod_cloudflare\u00a0<\/b><br \/>\n            This module logs the real user&#8217;s IP address to Apache. A must-have as more and more users are moving to<br \/>\n            Cloudflare.\n        <\/li>\n<li><b>Check Apache for FrontPage\u00a0<\/b><br \/>\n            Microsoft Frontpage Extensions were EOL in 2006, and there is no support for bugs or security issues. It is<br \/>\n            a huge security risk, and nobody uses it nowadays.\n        <\/li>\n<li><b>Check Apache weak SSL\/TLS Ciphers (SSLCipherSuite)\u00a0<\/b><br \/>\n            Cipher list<br \/>\n            [ ECDHE-ECDSA-AES128-GCM-SHA256<br \/>\n            ECDHE-RSA-AES128-GCM-SHA256<br \/>\n            ECDHE-ECDSA-AES256-GCM-SHA384<br \/>\n            ECDHE-RSA-AES256-GCM-SHA384<br \/>\n            ECDHE-ECDSA-CHACHA20-POLY1305<br \/>\n            ECDHE-RSA-CHACHA20-POLY1305<br \/>\n            DHE-RSA-AES128-GCM-SHA256<br \/>\n            DHE-RSA-AES256-GCM-SHA384<br \/>\n            TLS_AES_256_GCM_SHA384<br \/>\n            TLS_CHACHA20_POLY1305_SHA256<br \/>\n            TLS_AES_128_GCM_SHA256 ].\u00a0<br \/>\n            Due to known and well-exploited weaknesses in the SSLv2 cipher, you as a server admin should avoid using it. to do that disable SSLv2 in WHM &gt; Apache Configuration &gt; Global Configuration &gt; SSLCipherSuite &gt; and then Add -SSLv2 to SSLCipherSuite and\/or remove +SSLv2.\u00a0After it, you need to save and rebuild the configuration and then restart Apache.\n        <\/li>\n<li><b>Disable Apache for TraceEnable\u00a0<\/b><br \/>\n            You should disable TraceEnable in:<\/p>\n<p>            WHM > Apache Configuration > Global Configuration > Trace Enable > Off<br \/>\n            Again to make these changes take effect, click rebuild apache configuration and then restart it. As any changes made to httpd.conf will not take effect with doing this.<\/p>\n<\/li>\n<li><b>Disable apache ServerSignature\u00a0<\/b><br \/>\n            You should set apache ServerSignature to Off in:<\/p>\n<p>            WHM > Apache Configuration > Global Configuration > Server Signature > Off<br \/>\n            As usual, save, rebuild configuration, and restart Apache.<\/p>\n<\/li>\n<li><b>Set Apache for ServerTokens appropriately\u00a0<\/b><br \/>\n            Set Apache ServerTokens to ProductOnly, to do that:<\/p>\n<p>            WHM > Apache Configuration > Global Configuration > Server Tokens > Product Only.<br \/>\n            Save, rebuild configuration, and restart Apache.<\/p>\n<\/li>\n<li><b>Check Apache for FileETag\u00a0<\/b><br \/>\n            FileETag should always be set to None for shared hosting servers. to do that<br \/>\n            WHM > Apache Configuration > Global Configuration > File ETag > None. and then save, rebuild configuration and restart apache.\n        <\/li>\n<\/ol>\n<\/div>\n<div class=\"space1\"><\/div>\n<div id=\"PHP-check\">\n<h3>PHP Check (4 Steps)<\/h3>\n<ol>\n<li><b>Check PHP version<\/b><br \/>\n            Any version of PHP older than v7.2.* is now obsolete and should be considered a security threat. You should upgrade exclusively to PHP v7.3+:\n        <\/li>\n<li><b>Check php for enable_dl or disabled dl()<\/b><br \/>\n            To prevent your users from loading PHP modules that would affect all other users, you need to set:<br \/>\n            enable_dl = Off<\/p>\n<p>            All necessary dynamic libraries should be loaded directly in the PHP configuration.\n        <\/li>\n<li><b>Disable dangerous PHP functions<\/b><br \/>\n            There are PHP functions that are rarely used by the common application, wordpress, Joomla, Moodle, etc., but often exploited by hackers. The most common of these functions are as listed below. Disable them in php.ini file<br \/>\n            disable_functions = show_source, system, shell_exec, passthru, exec, popen, proc_open\n        <\/li>\n<li><b>Check PHP for register_globals<\/b><br \/>\n            You should set:register_globals = Off<br \/>\n            It is not needed nowadays and should only be enabled until it is absolutely necessary. It is such a significant security risk that it should be evaluated carefully against benefits.\n        <\/li>\n<\/ol>\n<\/div>\n<div class=\"space1\"><\/div>\n<div id=\"WHM-settings-check\">\n<h3>WHM Settings Check (32 Steps)<\/h3>\n<ol>\n<li><b>Check cPanel login is SSL only (Must have)<\/b><br \/>\n            In tweak settings, choose the option<br \/>\n            WHM > Tweak Settings > &#8220;Choose the closest matched domain for which the system has a valid certificate when redirecting from non-SSL to SSL URLs&#8221;\n        <\/li>\n<li><b>Check boxtrapper is disabled<\/b><br \/>\n            Boxtrapper is a good feature, and in the past, it has been used very well, but with the emergence of new spam avoiding techniques, it is no longer relevant. It can lead to your server being listed in common RBLs. The ultimate effect of it can be an increase in overall spam load instead of decreasing it. In my opinion, it will soon be removed from future WHM\/cPanel versions. You should disable it without a thought.<br \/>\n            to do that, in WHM > Tweak Settings > BoxTrapper Spam Trap\n        <\/li>\n<li><b>Disable GreyListing <\/b><br \/>\n            Gray listing will delay necessary emails to be delayed for hours, at least when your server receives from a certain domain\/ server for the first time. This results in increased support load and often leads to lost legitimate emails.<br \/>\n            Other than the above problems, it also, at times, cause problems with &#8220;password verification&#8221; systems.\n        <\/li>\n<li><b>Check if popbeforesmtp is disabled<\/b><br \/>\n            Many server admins will not agree to it, as if enabled, it offers smooth email connections for outlook users of all versions. For other admins and for me too, using &#8220;pop before SMTP&#8221; is a security risk. SMTP AUTH option should be used in lieu of it.<br \/>\n            You should disable it in WHM > Tweak Settings > &#8220;Allow users to relay mail if they use an IP address through which someone has validated an IMAP or POP3 login&#8221;\n        <\/li>\n<li><b>Check max emails per hour is set<\/b><br \/>\n            This is the ultimate solution to not get your IPs listed in RBLs. By limiting maximum emails a Cpanel account can send in one hour, you certainly limit the damage by potential spammers on the server,<br \/>\n            To set a value, goto WHM > Tweak Settings > Max hourly emails per domain\n        <\/li>\n<li><b>Check Reset Password for cPanel accounts<\/b><br \/>\n            I believe this cannot be implemented for a shared environment, as end-users will need it. But with some users who cannot protect their accounts, this poses a potential security risk and should be disabled unless necessary in<br \/>\n            WHM > Tweak Settings > Reset Password for cPanel accounts.\n        <\/li>\n<li><b>Check Reset Password for Subaccounts<\/b><br \/>\n            This poses a potential security risk and should be disabled unless necessary in WHM > Tweak Settings > Reset Password for Subaccounts.\n        <\/li>\n<li><b>Check compilers<\/b><br \/>\n            Compilers are a known security risk since the early days of cPanel; You should disable compilers WHM > Security Center > Compilers Access\n        <\/li>\n<li><b>Check to allow remote domains<\/b><br \/>\n            Users can park domains that resolve to other servers on this server. Only domains that resolve to your server should be parked.<br \/>\n            This can be disabled in WHM > Tweak Settings > Allow Remote Domain\n        <\/li>\n<li><b>Check block common domains<\/b><br \/>\n            Users can park common domain names on this server. This can easily aid in phishing attacks.<br \/>\n            Disable it in WHM > Tweak Settings > Prevent cPanel users from creating specific domains\n        <\/li>\n<li><b>Check allow park domains<\/b><br \/>\n            Users can park\/addon domains that belong to other users on this server. Again there is no practical use of this functionality for server admins who manage shared servers.<br \/>\n            Disable this option in<br \/>\n            WHM > Tweak Settings > &#8220;Allow cPanel users to create subdomains across accounts&#8221;\n        <\/li>\n<li><b>Check proxy subdomains<\/b><br \/>\n            This option can mask a user&#8217;s real IP address and hinder security. You should disable<br \/>\n            WHM > Tweak Settings > Service subdomains\n        <\/li>\n<li><b>Check cPAddons update email to resellers<\/b><br \/>\n            You should have cPAddons email users if cPAddon installations require updating WHM > Tweak Settings > &#8220;Notify reseller of cPAddons Site Software installations&#8221;\n        <\/li>\n<li><b>Check cPAddons update email to root<\/b><br \/>\n            You should have cPAddons email root if cPAddon installations require updating WHM > Tweak Settings > Notify root of cPAddons Site Software installations\n        <\/li>\n<li><b>Check cPanel tree<\/b><br \/>\n            Running EDGE\/BETA on a production server could lead to server instability. Only run stable cPanel releases\n        <\/li>\n<li><b>Check accounts that can access a cPanel user<\/b><br \/>\n            You should consider setting this option to &#8220;user&#8221; after use. WHM > Tweak Settings > Accounts that can access a cPanel user account.\n        <\/li>\n<li><b>Check cPanel passwords in email<\/b><br \/>\n            You should not send passwords out in plain text emails. You should disable WHM > Tweak Settings > Send passwords when creating a new account\n        <\/li>\n<li><b>Check core dumps<\/b><br \/>\n            You should disable WHM > Tweak Settings > Allow WHM\/Webmail\/cPanel services to create core dumps for debugging purposes\n        <\/li>\n<li><b>Check Cookie IP Validation<\/b><br \/>\n            You should enable strict Cookie IP validation in WHM > Tweak Settings > Cookie IP validation\n        <\/li>\n<li><b>Check MD5 passwords with Apache<\/b><br \/>\n            You should enable WHM > Tweak Settings > Use MD5 passwords with Apache\n        <\/li>\n<li><b>Check Referrer Blank Security<\/b><br \/>\n            Blank referrer security check must be enabled to enable it go to<br \/>\n            WHM > Tweak Settings > Blank referrer safety check\n        <\/li>\n<li><b>Check Referrer Security<\/b><br \/>\n            Again like blank referrer security, it is a must-have.<br \/>\n            Enable it in WHM > Tweak Settings > Referrer safety check\n        <\/li>\n<li><b>Check HTTP Authentication<\/b><br \/>\n            You should disable skiphttpauth in \/var\/cpanel\/cpanel.config\n        <\/li>\n<li><b>Check Parent Security<\/b><br \/>\n            There is no need to allow other applications to run cPanel binaries unless you are doing some custom cPanel stuff for auto-deployment within your own applications.<br \/>\n            You should disable<br \/>\n            WHM > Tweak Settings > Allow other applications to run the cPanel and admin binaries\n        <\/li>\n<li><b>Check Domain Lookup Security<\/b><br \/>\n            You should disable WHM > Tweak Settings > cpsrvd username domain lookup\n        <\/li>\n<li><b>Check Password ENV variable<\/b><br \/>\n            You should enable WHM > Tweak Settings > Hide login password from cgi scripts\n        <\/li>\n<li><b>Check SMTP Restrictions<\/b><br \/>\n            You should enable WHM > Security Center > SMTP Restrictions. If you are using CSF firewall, then it can be disabled safely as it is replaced with csf configuration option SMTP_BLOCK instead\n        <\/li>\n<li><b>Check AppConfig Required<\/b><br \/>\n            You should disable WHM > Tweak Settings > &#8220;Allow apps that have not registered with AppConfig to be run when logged in as a reseller in WHM&#8221;\n        <\/li>\n<li><b>Check AppConfig as root<\/b><br \/>\n            You should disable WHM > Tweak Settings > &#8220;Allow apps that have not registered with AppConfig to be run when logged in as root or a reseller with the &#8220;all&#8221; ACL in WHM&#8221;\n        <\/li>\n<li><b>Check AppConfig ACLs<\/b><br \/>\n            You should disable WHM > Tweak Settings > &#8220;Allow apps that have not registered with AppConfig to be run when logged in as root or a reseller with the &#8220;all&#8221; ACL in WHM&#8221;\n        <\/li>\n<li><b>Check AppConfig Feature List<\/b><br \/>\n            You should disable WHM > Tweak Settings > &#8220;Allow cPanel and Webmail apps registered with AppConfig to be executed even if a Required Features list has not been defined&#8221;\n        <\/li>\n<li><b>Check Security Tokens<\/b><br \/>\n            Security Tokens should not be disabled as, without them, the security of WHM\/cPanel is compromised. The setting disable-security-tokens=0 should be set in \/var\/cpanel\/cpanel.config\n        <\/li>\n<\/ol>\n<\/div>\n<div class=\"space1\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>I have written this checklist to secure your newly installed cPanel server. We will keep improving it over time, by adding in details for each point. To harden your cPanel server can be split into six areas. Server security overall (not very much related to cPanel) Server Check (13 steps) SSH\/Telnet Check (7 Steps) Mail [&#8230;]<\/p>\n<p><a class=\"understrap-read-more-link\" href=\"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\">Continue Reading&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8926","post","type-post","status-publish","format-standard","hentry","category-cpanel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Easy 68 step checklist to secure &amp; harden your WHM\/cPanel server - cPanel Plesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Easy 68 step checklist to secure &amp; harden your WHM\/cPanel server - cPanel Plesk\" \/>\n<meta name=\"twitter:description\" content=\"I have written this checklist to secure your newly installed cPanel server. We will keep improving it over time, by adding in details for each point. To harden your cPanel server can be split into six areas. Server security overall (not very much related to cPanel) Server Check (13 steps) SSH\/Telnet Check (7 Steps) Mail [...]Continue Reading...\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Farooq Omer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/\"},\"author\":{\"name\":\"Farooq Omer\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13\"},\"headline\":\"Easy 68 step checklist to secure &#038; harden your WHM\/cPanel server\",\"datePublished\":\"2022-01-26T12:31:17+00:00\",\"dateModified\":\"2022-02-01T13:38:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/\"},\"wordCount\":2536,\"publisher\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13\"},\"articleSection\":[\"Cpanel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/\",\"url\":\"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/\",\"name\":\"Easy 68 step checklist to secure & harden your WHM\/cPanel server - cPanel Plesk\",\"isPartOf\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#website\"},\"datePublished\":\"2022-01-26T12:31:17+00:00\",\"dateModified\":\"2022-02-01T13:38:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cpanelplesk.com\/wp62\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Easy 68 step checklist to secure &#038; harden your WHM\/cPanel server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#website\",\"url\":\"https:\/\/cpanelplesk.com\/wp62\/\",\"name\":\"cPanel Plesk\",\"description\":\"Blog on famous hosting control panels\",\"publisher\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cpanelplesk.com\/wp62\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13\",\"name\":\"Farooq Omer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cpanelplesk.com\/wp62\/wp-content\/uploads\/2020\/11\/cpanelplesk.png\",\"contentUrl\":\"https:\/\/cpanelplesk.com\/wp62\/wp-content\/uploads\/2020\/11\/cpanelplesk.png\",\"width\":300,\"height\":44,\"caption\":\"Farooq Omer\"},\"logo\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/image\/\"},\"url\":\"https:\/\/cpanelplesk.com\/wp62\/author\/fokado\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Easy 68 step checklist to secure & harden your WHM\/cPanel server - cPanel Plesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/","twitter_card":"summary_large_image","twitter_title":"Easy 68 step checklist to secure & harden your WHM\/cPanel server - cPanel Plesk","twitter_description":"I have written this checklist to secure your newly installed cPanel server. We will keep improving it over time, by adding in details for each point. To harden your cPanel server can be split into six areas. Server security overall (not very much related to cPanel) Server Check (13 steps) SSH\/Telnet Check (7 Steps) Mail [...]Continue Reading...","twitter_misc":{"Written by":"Farooq Omer","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/#article","isPartOf":{"@id":"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/"},"author":{"name":"Farooq Omer","@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13"},"headline":"Easy 68 step checklist to secure &#038; harden your WHM\/cPanel server","datePublished":"2022-01-26T12:31:17+00:00","dateModified":"2022-02-01T13:38:23+00:00","mainEntityOfPage":{"@id":"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/"},"wordCount":2536,"publisher":{"@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13"},"articleSection":["Cpanel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/","url":"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/","name":"Easy 68 step checklist to secure & harden your WHM\/cPanel server - cPanel Plesk","isPartOf":{"@id":"https:\/\/cpanelplesk.com\/wp62\/#website"},"datePublished":"2022-01-26T12:31:17+00:00","dateModified":"2022-02-01T13:38:23+00:00","breadcrumb":{"@id":"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cpanelplesk.com\/wp62\/easy-68-steps-secure-harden-whm-cpanel-checklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cpanelplesk.com\/wp62\/"},{"@type":"ListItem","position":2,"name":"Easy 68 step checklist to secure &#038; harden your WHM\/cPanel server"}]},{"@type":"WebSite","@id":"https:\/\/cpanelplesk.com\/wp62\/#website","url":"https:\/\/cpanelplesk.com\/wp62\/","name":"cPanel Plesk","description":"Blog on famous hosting control panels","publisher":{"@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cpanelplesk.com\/wp62\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13","name":"Farooq Omer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/image\/","url":"https:\/\/cpanelplesk.com\/wp62\/wp-content\/uploads\/2020\/11\/cpanelplesk.png","contentUrl":"https:\/\/cpanelplesk.com\/wp62\/wp-content\/uploads\/2020\/11\/cpanelplesk.png","width":300,"height":44,"caption":"Farooq Omer"},"logo":{"@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/image\/"},"url":"https:\/\/cpanelplesk.com\/wp62\/author\/fokado\/"}]}},"_links":{"self":[{"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/posts\/8926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/comments?post=8926"}],"version-history":[{"count":0,"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/posts\/8926\/revisions"}],"wp:attachment":[{"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/media?parent=8926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/categories?post=8926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/tags?post=8926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}