Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
We value your experience with Plesk during 2025 Plesk strives to perform even better in 2026. To help us improve further, please answer a few questions about your experience with Plesk Obsidian 2025. Please take this short survey: https://survey.webpros.com/
On Plesk for Linux mod_status is disabled on upgrades to improve Apache security. This is a one-time operation that occurs during an upgrade. You can manually enable mod_status later if needed.
Hello,
I'm running Plesk 10.3/ Centos 5.8 and one of the sites hosted on this server is being scanned for PCI compliance by Trustwave. I've followed all the PCI compliance stuff in the guide but it's still getting the threat below on port 8443.
BEAST (Browser Exploit Against SSL/TLS)...
Still seeing this issue.
I'm still seeing this issue, we use the band-aid and disable milter in main.cf but when ever a change is made on the server, those settings get over written. We are using the latest version of Plesk10.4.4
<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>...
Thanks, I've seen some CVE referenced in them, but there doesn't seem to be a good way to find them , searching for the specific CVE doesn't seem to bring up anything.
Hello,
I'm trying to give my clients a chroot scponly shell for sftp access, the only way I found to do this in plesk currently isn't very clean and was wondering if there was a better way.
The way I'm currently doing it.
1) Adding scponlyc to /etc/shells.
2) Setting the user's shell...