Imunify360 on Cpanel is an all-in-one server security solution that protects hosting environments from malware, vulnerabilities, brute force attacks, and DDoS attempts. It integrates seamlessly with cPanel to deliver robust protection while maintaining a user-friendly experience for administrators and hosting clients.
This guide explains how Imunify360, ImunifyAV, and ImunifyAV+ work with cPanel, how to install and configure these tools, and where to buy licenses. You can purchase licenses directly from cPanel or our organization, and for technical issues, we offer direct support to save time and hassle.
1. What is Imunify360?
Imunify360 is an advanced security platform for Linux servers. It combines multiple protective tools, such as malware scanners, firewalls, and real-time intrusion prevention systems, into a single package. It monitors server activity, blocks malicious behavior, and provides tools to clean up infected files.
Imunify360 is particularly well-suited for web hosting environments because it automates many security processes, reducing the need for manual intervention.
2. Why should we use Imunify Products with cPanel?
Imunify products—Imunify360, ImunifyAV, and ImunifyAV+—are designed to work seamlessly with cPanel. Here’s why this combination is ideal for server administrators and hosting clients:
Advantages for System Administrators
- Centralized management of security settings via WHM:
With all those control features in a WHM interface, the administrators can easily control and manage all the security settings for the servers and hosting accounts, including those complicated specific management tasks, without allowing the security policies to be implemented in a differentiated way.
- Automated malware detection, patch management, and real-time threat mitigation:
Imunify products continuously scan for vulnerabilities, automatically apply patches, and actively mitigate threats, reducing the need for manual intervention.
- Easy-to-configure firewall rules to block malicious IPs and manage traffic:
Because system administrators can quickly implement firewall policies, access to unusual or prohibited IP addresses can be prevented, traffic can be managed, and overall server security can increase.
Benefits for Hosting Clients
- Protection for individual accounts and hosted websites:
The hosting clients receive better security for their accounts from hackers and malware threats that interrupt and compromise their data and site operation.
- Automated malware cleanup with ImunifyAV+ or Imunify360:
Imunify products automatically detect and remove malware from hosted accounts, providing clients with hassle-free security and reducing potential downtime.
- Transparent reporting and notifications when threats are detected:
Threats are actively reported to clients with complete detailed reports to create trust with the security measures offered.
Customization and Scalability
Imunify’s products are designed to adapt to any hosting environment, whether you’re managing a small shared hosting server or a large-scale enterprise setup. Proprietary security features are accompanied by scalable tools and functional configurations to match variable needs. It establishes versatility to support efficiency in resource use and guarantee total security, regardless of the server’s scale or structure. Imunify allows administrators to configure security settings, automate responses, and adjust resource limits, ensuring seamless scalability as your hosting infrastructure grows and evolves.
3. Imunify360 vs. ImunifyAV vs. ImunifyAV+
Imunify products come in three tiers to suit different needs. Below is a detailed comparison to help you choose:
ImunifyAV
ImunifyAV provides free malware scanning that is elementary but sufficient. It searches your server for malware and potential weaknesses and works to stop them before they occur. Although it doesn’t contain a complex integrated automatic cleaning capability, it is a good choice for basic website security and hosting for cost-sensitive users.
ImunifyAV+
Compared to ImunifyAV, ImunifyAV+ can automatically clean malware and other threats ontosers’ accounts. It features fast one-click removal of all malware and more effective detection of malware, thus saving much time in server maintenance. ImunifyAV+ is recommended to customers who want improved security without extra expensive enterprise solutions.
Imunify360
Imunify360 is the most comprehensive solution, combining malware detection, automated cleanup, and proactive server defense. It Includes a WAF, patch management, and proactive defenses against zero-day vulnerabilities. Its advanced reporting dashboard and centralized management make it a perfect choice for enterprise-grade server security.
Below is the table with differences, which will help you decide which version of Immunity you should get for your servers.
Feature | ImunifyAV | ImunifyAV+ | Imunify360 |
Malware Detection | ✔ | ✔ | ✔ |
Automated Cleanup | ✖ | ✔ | ✔ |
Web Application Firewall (WAF) | ✖ | ✖ | ✔ |
Proactive Defense | ✖ | ✖ | ✔ |
Patch Management | ✖ | ✖ | ✔ |
Reporting Dashboard | Basic | Advanced | Advanced |
Cost | Free | Paid | Paid |
4. How to Purchase Licenses
ImunifyAV+ and Imunify360 licenses and upgrades can be purchased easily by following links in the cPanel or by going to the Imunify website. Follow the steps below for a seamless purchase:
- Through Imunify’s Website: Visit the official Imunify website. Select your desired product—Imunify360, ImunifyAV+, or others—and click on the relevant button such as “Try Now,” “Buy Now,” or “Get Free.”
This page allows you to explore options like free trials for Imunify360 and ImunifyAV.
- Explore Features and Pricing: On the product page, you will find a comparison of different versions like Imunify360 and ImunifyAV+ to meet your needs. You make an informed decision.Â
These tables highlight each product’s features, including malware detection, automated cleanup, and advanced defenses.
- Trial Sign-Up: If you’re new to Imunify, use the free trial option provided for Imunify360. Navigate to the trial sign-up page, fill in your details (name, company, location), and click “Get Trial.“
- Purchasing via cPanel: Log in to your WHM/cPanel. Navigate to the Software or Security section and look for Imunify licenses. Choose a product and buy a license. This integration simplifies buying or upgrading licenses directly from your server control panel.
With these options you need not worry if your server protection lies in order with your precise demands and cost constraints.
5. How to Install Imunify360
Requirements
- Root Access to the Server:
A prerequisite for Imunify360 installation is administrative or root access to your server. This access level allows you to run commands and programs to change the system according to its needs. This installation cannot be done without root privileges, as it involves changes to system parameters and basic system settings.
- A Supported OS:
Imunify360 supports CentOS, CloudLinux, or Ubuntu operating systems. Before proceeding, verify that your server uses one of these operating systems to confirm compatibility. Running on unsupported OS versions can cause issues during installation or when using the Imunify360 interface.
- cPanel and WHM Installed:
Imunify360 fits perfectly into cPanel and WHM, which are prerequisites before installing Imunify360. It means less confusion and complexity in managing server security as these tools enable Imunify360’s features, which allow easy monitoring, configuration, and control straight from WHM.
6. How to Install ImunifyAV?
If you’re starting with basic security, ImunifyAV is an excellent choice.
Steps to Install
Run the Installation Commands: To begin installing Imunify360 on your server, you must execute two critical commands via SSH. Open your terminal and log in to your server as the root user. Once logged in, start by downloading the deployment script using the wget command:
wget https://repo.imunify360.cloudlinux.com/defence360/i360deploy.sh
This command helps you get the deployment script from the official Imunify360 repository so you can use the installation script of the latest version for security. The script is then to be stored in the local server and, once done, is ready for the execution process.
After downloading, the next step is to execute the deployment script using the following command:
bash i360deploy.sh
This command executes the downloaded script and starts the preconfigured installation of the Imunify360 system. You need to know that the script manages all the dependence, setting and everything that is needed for the software to be up and running on your server. For smooth installation of all the files and the script make sure the script runs through without interruption.
Additional settings or configurations might be executed, and you might be required to clear certain settings or configurations during the installation. It is designed to follow on-screen instructions to be installed on the server as required. Once the process is complete, Imunify360 will be installed and ready for use on your server, providing robust security against malware, resource misuse, and other server threats.
7. How to Upgrade from ImunifyAV to ImunifyAV+ or Imunify360
Upgrade Process
- Purchase a license from cPanel or us by clicking here.
- Login to WHM and navigate to Plugins > ImunifyAV.
- To enable ImunifyAV+, Imunify360, or some of the additional features, you’d need to input your new key into the Text field that appears in the WHM panel. It turns on the paid features that are capable of scanning and mitigating threats before they become a menace and cleaning other threats on your behalf. Make sure the license is good and associated with your server IP for the activation and full functionality.
- To work with Imunify360, you need to view and agree with the license agreement shown in WHM. This agreement sets out how, when, and for what purpose we grant you limited rights to use it. To enable Imunify360 on your server, click accept on this window. If not, then click “Decline” to dismiss the pop-up without launching the software.
8. Exploring the Imunify360 Dashboard
Imunify360 utilizes a dashboard approach to managing server security features built into the software. It gives comprehensive protection status with incident notices and suggested systems. This process makes it easy for the administrators to go through the features such as the scan for malware and proactive firewalls, among others. It ensures that it is easy to manage the health status of servers.
Important Sections
- Firewall:
The Firewall section in Imunify360 allows administrators to manage IP access. You can blocklist an IP to avoid possible attacks or allowlist an IP so that communication can proceed smoothly. The interface includes sophisticated filtering that allows or prevents specific traffic so as to protect your server from vandalism or trial-and-error attempts.
- Malware Scanner:
Imunify360’s Malware Scanner provides real-time and scheduled scans to identify and handle malicious files. Incidents are isolated to prevent harm to systems while ensuring system integrity is kept secure. As for the tool mentioned above, it provides options for malware prevention in an active manner, as well as for cleaning the infected files and keeping the hosting safe.
- Proactive Defense:
Proactive Defense in Imunify360 actively scans and halts malicious scripts as they run. Incidents are isolated to prevent harm to systems while ensuring system integrity is kept secure. As for the tool mentioned above, it provides options for malware prevention in an active manner, as well as for cleaning the files infected and keeping the hosting safe.
- Reports:
The Reports feature is a summary of all incidents with servers and analytics of the possible threats. When the administrators monitor the server performance, they can check the event by type, severity, and location. Having central data about the various threats aids in fine-tuning threat control measures so that servers can be well protected.
9. Advanced Features of Imunify360
Proactive Defense
Proactive Defense is an advanced feature in Imunify360 that identifies and blocks suspicious activities in real time.
imunify360-agent config update '{"PROACTIVE_DEFENSE": "on"}'
By enabling it with the provided command, it monitors and stops malicious scripts or processes from running on your server, providing increased security and proactive protection against threats.
10. Customizing Security Settings
Managing Firewall Rules
Imunify360 allows you to customize your firewall rules easily.
imunify360-agent blacklist add <IP>
Adding an IP to the blocklist blocks access from malicious sources. Similarly, you can remove IPs from the blocklist if they are incorrectly flagged. These rules provide greater control over who can access your server and help maintain secure operations.
- Remove an IP:
To remove an IP from the Imunify360 blocklist, use the command
imunify360-agent blacklist delete <IP>
Replace <IP> with the target IP address. This action ensures that the IP is no longer blocked. Note that outdated commands might return a deprecated message; follow updated syntax if required.
Configuring Email Alerts
Imunify360 lets you set up email notifications to stay informed about detected malware or security incidents. Through the WHM interface, navigate to the “Notifications” tab in Imunify360 settings and specify the email addresses for alerts. This feature ensures proactive monitoring and swift action against potential security threats.
Problems and Challenges with Imunify360 Installation and Configuration
Installing and configuring Imunify360 is essential for robust server security. However, it comes with specific challenges that administrators may face. Below is a detailed breakdown of these challenges, formatted for clarity and readability.
1. Compatibility Issues
Operating System Restrictions
- Imunify360 supports only specific operating systems: CentOS, CloudLinux, and Ubuntu.
- Installing it on unsupported systems can result in failed installations and wasted time troubleshooting.
Version Conflicts
- Even on supported operating systems, outdated versions may lead to incompatibilities.
- Administrators must ensure the OS is updated to the recommended version before installing.
2. Dependency Requirements
Mandatory cPanel and WHM
- Imunify360 integrates with cPanel and WHM for optimal functionality.
- Missing these control panels will prevent installation, and misconfigurations within cPanel or WHM may hinder operations.
Complexity of Dependency Setup
- Installing necessary modules and ensuring all dependencies are correctly configured can be overwhelming for beginners.
- Missing any critical dependency can lead to installation errors and delays.
3. License Management
Transitioning to Paid Versions
- Moving from ImunifyAV (free) to ImunifyAV+ or Imunify360 (paid) requires license activation.
- Linking the license key to the correct server IP is crucial. Mismatches can cause activation failures.
Validation Errors
- Incorrect or expired license keys may lead to delays, requiring support for resolution.
- Administrators may also face challenges navigating through the license upgrade process.
Cost Considerations
- The free version provides basic security, but advanced features in paid versions come at a cost that may only suit some budgets.
4. System Resource Utilization
High Resource Demand
- Features like real-time malware scanning and proactive defenses consume significant server resources.
- On low-resource servers, this can result in slower performance or even downtime.
Balancing Security with Performance
- Administrators need to configure features carefully to prevent overloading servers.
- Advanced knowledge of both hosting environments and Imunify360 is necessary for optimization.
5. Firewall Rule Configuration
Risks of Misconfiguration
- Incorrect firewall rules may block legitimate traffic or fail to stop malicious activity.
- It can lead to poor server accessibility or security vulnerabilities.
Complexity of Advanced Rules
- Customizing rules to handle diverse traffic scenarios requires expertise.
- Beginners may struggle to balance security with accessibility, risking overly strict or lenient configurations.
6. Complexity for Beginners
Feature Overload
- Imunify360 offers extensive features like malware scanning, proactive defense, and reporting dashboards.
- It can overwhelm beginners, making configuration challenging.
Command-Line Challenges
- While the dashboard simplifies many tasks, some actions still require command-line operations.
- Commands like imunify360-agent or bash i360deploy.sh can be intimidating for those unfamiliar with Linux environments.
Time-Intensive Setup
- Setting up Imunify360 can take longer than expected for those new to server security.
7. Email Alert Configuration
Manual Setup Requirements
- Configuring email notifications involves manual entry of recipient details and alert thresholds.
- Mistakes during setup can prevent critical notifications from being sent.
Risk of Missed Alerts
- Administrators may miss essential alerts without proper configuration, delaying responses to security threats.
8. Script Errors During Installation
Environment Preparation
- Running installation scripts like bash i360deploy.sh requires the server environment to meet specific conditions.
- Missing dependencies or incorrect permissions can cause the script to fail.
Error Handling
- Administrators need to troubleshoot errors manually, which can be complex and time-consuming.
- It is incredibly challenging for those unfamiliar with Linux server management.
Internet Dependency
- The installation script relies on fetching resources from the Imunify360 repository.
- Servers with reliable internet access may avoid additional hurdles.
Suggestions for Overcoming Challenges
To mitigate these challenges effectively:
- Pre-Installation Checks: Ensure the server meets all system requirements, including supported OS versions, pre-installed dependencies, and sufficient resources.
- License Management: Familiarize administrators with the licensing process and maintain active support contacts to resolve issues quickly.
- Optimize Configurations: Adjust resource-heavy features to match server capacity, avoiding system overload.
- Provide training or detailed guides for administrators to handle Imunify360’s features and configurations confidently.
By addressing these challenges with preparation and training, administrators can maximize the benefits of Imunify360 while minimizing disruptions.
Conclusion
Imunify360, along with ImunifyAV and ImunifyAV+, is a comprehensive and efficient service that helps you protect the server. You can access better support and advice when you buy licenses directly from us. Use this guide to secure your hosting environment, and contact our team for assistance with any step of the process.
About the writer
Vinayak Baranwal wrote this article. Use the provided link to connect with Vinayak on LinkedIn for more insightful content or collaboration opportunities.