Forum
  1. Forums
  2. Imunify360
  3. Imunify360 and Imunify Sensor
  1. Morten
  2. Tuesday, December 19, 2017
  3.  Subscribe via email
Hello,

I see in the latest update of Imunify customers have access to setup ignore paths themselves in cPanel so that the scanner ignores the paths/files/folders.

What if there is a hacker/fake order done and they login to cPanel and setup ignore paths for their public_html folder?
Then they start uploading files/folders with phising content and misuse the account?

Have you thought of that and the complications that can do to the server?
How can we as admins find these accounts and what should we do in such cases?

I think you need to think trough such cases and find a better way to handle those.
Rate this post:
  1. 21.12.2017 17:12:29
  2. # 1
Posts: 0
Joined: 18.01.2018
0
Votes
Undo
Hello Morten,

This is a really good point, and we will think about how we can adjust our functionality here.
On one hand, we want end user to be able to 'skip' file.
On the other hand, we want admin to prevent the user from doing so.

We will think about how to let Admin be in control, while still proving for such flexibility.

Thanks.
  • Page :
  • 1


There are no replies made for this post yet.
Be one of the first to reply to this post!
Guest
Submit Your Response
Upload files or images for this discussion by clicking on the upload button below. Supports gif,jpg,png,zip,rar,pdf
• Remove Upload Files (Maximum File Size: 2 MB)
You may insert polls into your post. The poll would then appear in the post.
Vote Options
Captcha
To protect the site from bots and unauthorized scripts, we require that you enter the captcha codes below before posting your question.