Take a look at our Juggernaut Security and Firewall protect (The link is in the Parallels 3rd party solutions and extensions folder). Its based off of CSF but now has deep integration with Plesk. We have done all the hard work for you! PM me if you are on a budget and I'll save you some money with a coupon code.A better solution for brute-force attacks in every service, is CSF+LFD. You can define custom logs and it's not that difficult to create your own regexp. Also for roundcube(i prefer it to horde) i use rcguard(captcha plugin) to prevent automated scripts who try to find password/or usernames using webmail.
Take a look at our Juggernaut Security and Firewall protect (The link is in the Parallels 3rd party solutions and extensions folder). Its based off of CSF but now has deep integration with Plesk. We have done all the hard work for you! PM me if you are on a budget and I'll save you some money with a coupon code.
Double check your LFD mail/courier regex because the defaults don't work with Plesk. PM me if you want and I'll give you the fixes for CSF.And why would i want that, when i can use it without paying?
Double check your LFD mail/courier regex because the defaults don't work with Plesk. PM me if you want and I'll give you the fixes for CSF.
Here are some of the regex for the plesk 12 panel, horde and Roundecube. The fixes for postfix, qmail, and courer-imap should make their way into the next version of CSF:(if you have the regular expressions and you want to share them, paste them here)
Here are some of the regex for the plesk 12 panel, horde and Roundecube. The fixes for postfix, qmail, and courer-imap should make their way into the next version of CSF:
http://docs.danami.com/article/AA-0.../15.-Login-Failure-Blocking-Custom-Regex.html
Here are some of the regex for the plesk 12 panel, horde and Roundecube. The fixes for postfix, qmail, and courer-imap should make their way into the next version of CSF:
http://docs.danami.com/article/AA-0.../15.-Login-Failure-Blocking-Custom-Regex.html
Please be informed, now it is possible to BAN a client IP IF Plesk detects authentication failures in admin CP.
Thanks to newly integrated third-party, Fail2Ban. It has set of jails that cover both Plesk hosting services and Plesk core: ssh, mail, web, ftp, Plesk CP, etc.