• Hi, Pleskians! We are running a UX testing of our upcoming product intended for server management and monitoring.
    We would like to invite you to have a call with us and have some fun checking our prototype. The agenda is pretty simple - we bring new design and some scenarios that you need to walk through and succeed. We will be watching and taking insights for further development of the design.
    If you would like to participate, please use this link to book a meeting. We will sent the link to the clickable prototype at the meeting.
  • Our UX team believes in the in the power of direct feedback and would like to invite you to participate in interviews, tests, and surveys.
    To stay in the loop and never miss an opportunity to share your thoughts, please subscribe to our UX research program. If you were previously part of the Plesk UX research program, please re-subscribe to continue receiving our invitations.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.

Recent content by Jürgen_T

  1. Jürgen_T

    Question Safe to enable postgrey with free Plesk Email Security (Amavis + SpamAssassin + ClamAV)?

    Hi everyone, I'm running a Plesk server using the free Plesk Email Security extension, which includes Amavis and SpamAssassin. I’ve also installed ClamAV manually, and it's working perfectly within the current mail pipeline. To further reduce spam and bot traffic, I now plan to add Greylisting...
  2. Jürgen_T

    Question Modsecurity - Apache or Nginx

    Thank you, then I will also apply the Apache variant.
  3. Jürgen_T

    Question Modsecurity - Apache or Nginx

    I’m planning to make a third attempt next week to install ModSecurity under Plesk. During the setup, there’s an option to choose whether ModSecurity should be applied to Nginx or Apache. Since I’m using Nginx as a reverse proxy in front of Apache, it’s unclear which option I should select.
  4. Jürgen_T

    Issue How to properly configure Fail2Ban for ModSecurity in Plesk with NGINX?

    Unfortunately, not yet. The first time I tried it, it worked for a short time, but then ModSecurity stopped logging, and after uninstalling it, NGINX also stopped working, so I had to run my websites on Apache for a while. The second time I tried it, a month ago, it worked better, and...
  5. Jürgen_T

    Question Massive Brute-Force Attacks on Plesk Panel – Looking for Additional Protection Measures

    I have now blocked CN, RU, ID, PH, KR, TH, VN, MY, IN . This has helped. Recently, however, I've also noticed a sharp increase in attacks on my server from the US. I hope I can continue to manage this with fail2ban so I don't have to add US to the list.
  6. Jürgen_T

    Question Massive Brute-Force Attacks on Plesk Panel – Looking for Additional Protection Measures

    I also changed port 22, which helps against targeted 22 attacks but not against port scans looking for SSH access. I also blocked SSH access using a user/password combination. You can only log in to my server with keys!
  7. Jürgen_T

    Question Massive Brute-Force Attacks on Plesk Panel – Looking for Additional Protection Measures

    Thanks for your good recommendation from Danami Juggernaut. But at the moment, it seems to be taking too much time for me to get it working. I'm about to go on a long trip and can only work on this solution more intensively after I return. In the meantime, I'm blocking all countries from which...
  8. Jürgen_T

    Question Massive Brute-Force Attacks on Plesk Panel – Looking for Additional Protection Measures

    Thank you for all your valuable advice! Fail2Ban has now banned 1600 IPs and as I blocked countries with the most attackers now the attacks are slowing down to two to four each hour. I will test danami, as @learning_curve recommended. I am not sure, whether I could follow the recommendation by...
  9. Jürgen_T

    Question Massive Brute-Force Attacks on Plesk Panel – Looking for Additional Protection Measures

    Hello everyone, I’m running a Plesk panel that has been under a massive brute-force attack for some time. The login attempts are happening non-stop from globally distributed IPs, targeting users like admin, root, and even custom usernames. I have already implemented the following security...
  10. Jürgen_T

    Issue How to properly configure Fail2Ban for ModSecurity in Plesk with NGINX?

    Thank you for your quick response! Unfortunately, Fail2Ban didn’t work because it couldn’t find any IPs in the ModSecurity audit log files, and ModSecurity itself stopped logging unexpectedly. As a result, I had to remove it again. Additionally, switching from the selected Apache rule set (2.9)...
  11. Jürgen_T

    Issue How to properly configure Fail2Ban for ModSecurity in Plesk with NGINX?

    Hello everyone, I have successfully installed ModSecurity with NGINX on my Plesk server. Now, I want to use Fail2Ban to permanently block IPs of attackers that ModSecurity identifies. However, after installation, I noticed that the configuration files for ModSecurity were missing in Fail2Ban...
  12. Jürgen_T

    Issue Modsecurity works with Apache but error with nginx

    I repaired it now by myself. To help others here is a step-by-step-approach: 1. ls -alh /etc/nginx/modsecurity.d/rules/owasp_modsecurity_crs_4-plesk/ => No rules have been installed. 2. nginx -V 2>&1 | grep -o with-http_modsecurity_module => no module installed also available 3...
  13. Jürgen_T

    Issue Plesk extension/email-security

    So, i tried to solve it by myself. The plesk db contains the table MariaDB [emailsecurity]> DESCRIBE stats_accounts; +-----------------+--------------+------+-----+---------+-------+ | Field | Type | Null | Key | Default | Extra |...
  14. Jürgen_T

    Issue Plesk extension/email-security

    Up to now every hour the corresponding cron-task for Plesk Email Security extension stops with the error as mentioned above. Please advice a.s.a.p
  15. Jürgen_T

    Issue Plesk extension/email-security

    It started on 31st of December at 11 o'clock when this cronjob is performed: Die Aufgabe "/opt/psa/admin/bin/php -dauto_prepend_file=sdk.php '/opt/psa/admin/plib/modules/email-security/scripts/update-stats.php'" wurde in 1 Sekunden abgeschlossen, jedoch traten Fehler auf [2025-01-03...
Back
Top