Imunify360 on Cpanel is an all-in-one server security solution that protects hosting environments from malware, vulnerabilities, brute force attacks, and DDoS attempts. It integrates seamlessly with cPanel to deliver robust protection while maintaining a user-friendly experience for administrators and hosting clients.
This guide explains how Imunify360, ImunifyAV, and ImunifyAV+ work with cPanel, how to install and configure these tools, and where to buy licenses. You can purchase licenses directly from cPanel or our organization, and for technical issues, we offer direct support to save time and hassle.
Imunify360 is an advanced security platform for Linux servers. It combines multiple protective tools, such as malware scanners, firewalls, and real-time intrusion prevention systems, into a single package. It monitors server activity, blocks malicious behavior, and provides tools to clean up infected files.
Imunify360 is particularly well-suited for web hosting environments because it automates many security processes, reducing the need for manual intervention.
Imunify products—Imunify360, ImunifyAV, and ImunifyAV+—are designed to work seamlessly with cPanel. Here’s why this combination is ideal for server administrators and hosting clients:
With all those control features in a WHM interface, the administrators can easily control and manage all the security settings for the servers and hosting accounts, including those complicated specific management tasks, without allowing the security policies to be implemented in a differentiated way.
Imunify products continuously scan for vulnerabilities, automatically apply patches, and actively mitigate threats, reducing the need for manual intervention.
Because system administrators can quickly implement firewall policies, access to unusual or prohibited IP addresses can be prevented, traffic can be managed, and overall server security can increase.
The hosting clients receive better security for their accounts from hackers and malware threats that interrupt and compromise their data and site operation.
Imunify products automatically detect and remove malware from hosted accounts, providing clients with hassle-free security and reducing potential downtime.
Threats are actively reported to clients with complete detailed reports to create trust with the security measures offered.
Imunify’s products are designed to adapt to any hosting environment, whether you’re managing a small shared hosting server or a large-scale enterprise setup. Proprietary security features are accompanied by scalable tools and functional configurations to match variable needs. It establishes versatility to support efficiency in resource use and guarantee total security, regardless of the server’s scale or structure. Imunify allows administrators to configure security settings, automate responses, and adjust resource limits, ensuring seamless scalability as your hosting infrastructure grows and evolves.
Imunify products come in three tiers to suit different needs. Below is a detailed comparison to help you choose:
ImunifyAV provides free malware scanning that is elementary but sufficient. It searches your server for malware and potential weaknesses and works to stop them before they occur. Although it doesn’t contain a complex integrated automatic cleaning capability, it is a good choice for basic website security and hosting for cost-sensitive users.
Compared to ImunifyAV, ImunifyAV+ can automatically clean malware and other threats ontosers’ accounts. It features fast one-click removal of all malware and more effective detection of malware, thus saving much time in server maintenance. ImunifyAV+ is recommended to customers who want improved security without extra expensive enterprise solutions.
Imunify360 is the most comprehensive solution, combining malware detection, automated cleanup, and proactive server defense. It Includes a WAF, patch management, and proactive defenses against zero-day vulnerabilities. Its advanced reporting dashboard and centralized management make it a perfect choice for enterprise-grade server security.
Below is the table with differences, which will help you decide which version of Immunity you should get for your servers.
| Feature | ImunifyAV | ImunifyAV+ | Imunify360 |
| Malware Detection | ✔ | ✔ | ✔ |
| Automated Cleanup | ✖ | ✔ | ✔ |
| Web Application Firewall (WAF) | ✖ | ✖ | ✔ |
| Proactive Defense | ✖ | ✖ | ✔ |
| Patch Management | ✖ | ✖ | ✔ |
| Reporting Dashboard | Basic | Advanced | Advanced |
| Cost | Free | Paid | Paid |
ImunifyAV+ and Imunify360 licenses and upgrades can be purchased easily by following links in the cPanel or by going to the Imunify website. Follow the steps below for a seamless purchase:

This page allows you to explore options like free trials for Imunify360 and ImunifyAV.

These tables highlight each product’s features, including malware detection, automated cleanup, and advanced defenses.

With these options you need not worry if your server protection lies in order with your precise demands and cost constraints.
A prerequisite for Imunify360 installation is administrative or root access to your server. This access level allows you to run commands and programs to change the system according to its needs. This installation cannot be done without root privileges, as it involves changes to system parameters and basic system settings.
Imunify360 supports CentOS, CloudLinux, or Ubuntu operating systems. Before proceeding, verify that your server uses one of these operating systems to confirm compatibility. Running on unsupported OS versions can cause issues during installation or when using the Imunify360 interface.
Imunify360 fits perfectly into cPanel and WHM, which are prerequisites before installing Imunify360. It means less confusion and complexity in managing server security as these tools enable Imunify360’s features, which allow easy monitoring, configuration, and control straight from WHM.
If you’re starting with basic security, ImunifyAV is an excellent choice.
Run the Installation Commands: To begin installing Imunify360 on your server, you must execute two critical commands via SSH. Open your terminal and log in to your server as the root user. Once logged in, start by downloading the deployment script using the wget command:
wget https://repo.imunify360.cloudlinux.com/defence360/i360deploy.sh
This command helps you get the deployment script from the official Imunify360 repository so you can use the installation script of the latest version for security. The script is then to be stored in the local server and, once done, is ready for the execution process.
After downloading, the next step is to execute the deployment script using the following command:

bash i360deploy.sh
This command executes the downloaded script and starts the preconfigured installation of the Imunify360 system. You need to know that the script manages all the dependence, setting and everything that is needed for the software to be up and running on your server. For smooth installation of all the files and the script make sure the script runs through without interruption.
Additional settings or configurations might be executed, and you might be required to clear certain settings or configurations during the installation. It is designed to follow on-screen instructions to be installed on the server as required. Once the process is complete, Imunify360 will be installed and ready for use on your server, providing robust security against malware, resource misuse, and other server threats.




Imunify360 utilizes a dashboard approach to managing server security features built into the software. It gives comprehensive protection status with incident notices and suggested systems. This process makes it easy for the administrators to go through the features such as the scan for malware and proactive firewalls, among others. It ensures that it is easy to manage the health status of servers.

The Firewall section in Imunify360 allows administrators to manage IP access. You can blocklist an IP to avoid possible attacks or allowlist an IP so that communication can proceed smoothly. The interface includes sophisticated filtering that allows or prevents specific traffic so as to protect your server from vandalism or trial-and-error attempts.

Imunify360’s Malware Scanner provides real-time and scheduled scans to identify and handle malicious files. Incidents are isolated to prevent harm to systems while ensuring system integrity is kept secure. As for the tool mentioned above, it provides options for malware prevention in an active manner, as well as for cleaning the infected files and keeping the hosting safe.

Proactive Defense in Imunify360 actively scans and halts malicious scripts as they run. Incidents are isolated to prevent harm to systems while ensuring system integrity is kept secure. As for the tool mentioned above, it provides options for malware prevention in an active manner, as well as for cleaning the files infected and keeping the hosting safe.

The Reports feature is a summary of all incidents with servers and analytics of the possible threats. When the administrators monitor the server performance, they can check the event by type, severity, and location. Having central data about the various threats aids in fine-tuning threat control measures so that servers can be well protected.

Proactive Defense is an advanced feature in Imunify360 that identifies and blocks suspicious activities in real time.
imunify360-agent config update '{"PROACTIVE_DEFENSE": "on"}'

By enabling it with the provided command, it monitors and stops malicious scripts or processes from running on your server, providing increased security and proactive protection against threats.
Imunify360 allows you to customize your firewall rules easily.
imunify360-agent blacklist add <IP>

Adding an IP to the blocklist blocks access from malicious sources. Similarly, you can remove IPs from the blocklist if they are incorrectly flagged. These rules provide greater control over who can access your server and help maintain secure operations.
To remove an IP from the Imunify360 blocklist, use the command
imunify360-agent blacklist delete <IP>

Imunify360 lets you set up email notifications to stay informed about detected malware or security incidents. Through the WHM interface, navigate to the “Notifications” tab in Imunify360 settings and specify the email addresses for alerts. This feature ensures proactive monitoring and swift action against potential security threats.

Installing and configuring Imunify360 is essential for robust server security. However, it comes with specific challenges that administrators may face. Below is a detailed breakdown of these challenges, formatted for clarity and readability.

To mitigate these challenges effectively:
By addressing these challenges with preparation and training, administrators can maximize the benefits of Imunify360 while minimizing disruptions.
Imunify360, along with ImunifyAV and ImunifyAV+, is a comprehensive and efficient service that helps you protect the server. You can access better support and advice when you buy licenses directly from us. Use this guide to secure your hosting environment, and contact our team for assistance with any step of the process.

Vinayak Baranwal wrote this article. Use the provided link to connect with Vinayak on LinkedIn for more insightful content or collaboration opportunities.