1. Home
  2. Security
  3. Imunify360 Status and Settings

Imunify360 Status and Settings

What is Imunify360?

Imunify360 is a powerful and intelligent tool for maintaining the security of hosting accounts. The protection works on several levels and protects the account and the sites in it from malware, hacker attacks and vulnerabilities.

Imunify360 is activated on all hosting servers at SuperHosting.BG.

You can see the current status of the protection for your hosting account through the Imunify360 panel in cPanel.

cPanel menu Imunify360

Malware Scanner

Imunify360’s scanner scans the files in your hosting account in real time, checking for threats and vulnerabilities in their code. Infected files are cleaned automatically. Even if there is code injected into a legitimate file on the site, if it is detected, it will be promptly removed, leaving the file clean.

Malware scanner

In three separate tabs, you can see the detected malicious code (Malicious), scan status (Scan), and history of actions taken by the tool (History).

Proactive Defense

Proactive protection is a unique feature of Imunify360 that can prevent malicious activity in the account by executing PHP scripts.

The protection analyzes the activity of the scripts, detecting known patterns of “behavior” – hidden command injection, malicious code insertion, sending spam, SQL injection, etc.

Proactive defense

Proactive protection has three modes:

  • Disabled: Proactive protection is disabled and will not be used for your account.
  • Log only: Proactive protection will detect/identify malicious PHP scripts, code, etc., but will not take any action, only logging the events.
  • Kill Mode: Proactive protection will immediately stop the execution of the PHP script performing malicious activity in the account. In this mode, the events are also logged.

When Kill Mode is enabled, all detected malicious PHP scripts and their actions will be displayed in the Detected events tab.

When an event is detected, you will have action options on how to handle it. Options include:

  • View file content: You can view the content (code) of the malicious PHP script.
  • Move IP to the Black List: Block the IP address that called the script and prevent it from executing the same request in the future.
  • Move file to Ignore List (ignore detected rule): Allows you to exclude the file from proactive protection analysis for a specific rule.
  • Move file to Ignore List (ignore all rules): Allows you to exclude the file from proactive protection for all rules.
  • Remove file from Ignore List: Removes the file from your ignore list and will re-enable its detection by protection.

“Please wait while your request is being verified…”

Access (loading) of sites from the hosting account is protected by Imunify360 WAF (Web Application Firewall). This protection is enabled by default and includes numerous features designed to protect your website from malware, malicious traffic, malicious hackers, and much more.

If an IP address is detected as potentially malicious or is found to be performing activity that triggers Imunify360 WAF, the following message will be temporarily displayed before being redirected to your website:

“Please wait while your request is being verified…”

This message indicates that Imunify360 WAF ensures that the traffic and request are legitimate before allowing them to reach your website.

Updated on 26.03.2025
Was this article helpful?

Related Articles