• If you are still using CentOS 7.9, it's time to convert to Alma 8 with the free centos2alma tool by Plesk or Plesk Migrator. Please let us know your experiences or concerns in this thread:
    CentOS2Alma discussion

An introduction to Plesk Security Course: Part 1 [Video]

D

dzammit

Guest
Have you seen our brand-new Plesk Security Course? It’s fresh in our Plesk University catalogue since Sept. 25 – and free for all our users. We figured we’ll help spring you towards your next Plesk University Badge, not to mention make your Plesk server the most secure it can be. So let’s cover the basics. Here’s the first in a series of 3 quick videos that will bring you up to speed and achieve top security status for you and your customers.

The 3 security settings you need to adjust


Video: 1:17 minutes


What’s Going On in this Video


After installing Plesk, you need to do 3 important things:

1. Increase password strength
2. Restrict creation of DNS subzones
3. Enable prohibited domains list.

Increasing password strength

We recommend strong and very strong passwords. In this speedy guide, Plesk will help you and your customers create safer passwords with the right strength.

Restricting DNS subzones

We really believe preventing fraud and phishing should be one of our users’ top priorities. Follow the video to enable the DNS sunbzones restrictions. And this way, your customers won’t be able to create domains that look like subdomains of other customers’ domains. For example, if CustomerA owns example.com, CustomerB won’t be able to create store.example.com.

Enabling prohibited domains list

No matter your business or website ambitions, you will need to protect yourself against mail interception. What is this? Well some unscrupulous customer may be able to create a domain like gmail.com, microsoft.com or even your own domain (your-hosting.com) on Plesk. This sucks because from that point on, mail addressed to these kinds of domains will be delivered to your local domain, and not the real one.

That sums up what you need to do right after installing Plesk. Changing these settings won’t affect objects that already exist on the server, like domains, passwords, and so on. Ready to get started? There’s more in our Plesk Security Course


The post An introduction to Plesk Security Course: Part 1 [Video] appeared first on Plesk.

Continue reading...
 
Back
Top