Categories: General

Secure Your Website with Imunify360 and VPS Malaysia Hosting

1. What is Imunify360?

Imunify360 is an AI security system made for Linux web servers. It provides several layers of protection to block malware and brute-force attacks. Its advanced features include a real-time firewall, systems to detect and prevent intrusions, and proactive defense for PHP applications. It centralizes security management through a dashboard and blocks malicious IPs.

It protects your Web hosting through:

  • Scans files for malware and automatically cleans infected code.
  • Filters HTTP traffic and blocks SQL injection, XSS, and other attacks.
  • Monitors logs and blocks suspicious activities.
  • Analyzes PHP script behavior and stops zero-day attacks.
  • Monitor balcklists for your domains/IPs.
  • Provides rebootless kernel patching.

It means Imunify360 is a powerful security tool available at VPS Malaysia Web Hosting and WordPress Hosting servers.

In this guide, we will learn how Imunify360 works and protects your hosting.

2. 🛡️ Running a Malware Scan with Imunify360

Imunify360 automatically blocks threats and malware. But if you want, you can run a manual scan to see reports. Here is the detailed guide on how to manage your web security through your cPanel.

A. Starting a Scan

First, log in to cPanel and navigate to the Security section. Here, you will find Imunify360 options mostly at the bottom. (cPanel ➡️ Security ➡️Imunify360).

Imunify360 option inside cPanel
  • Inside the Imunify360 dashboard, click on the Malicious tab.
  • To scan your files immediately, just click the Start Scanning button.
Manually scan files in Imunify360

B. Automatic Cleanup

The best part? Imunify360 doesn’t just find problems; it fixes them automatically!

During a scan, Imunify360 works to protect your site. It will safely remove only the malicious parts of an infected file, leaving your own content intact. If a file is completely dangerous, it will be deleted from your account to keep everything secure.

C. 🚨 Dealing with Threats: Actions You Can Take

When Imunify360 finds a suspicious or malicious file that it couldn’t automatically fix, it lists the item under the Malicious tab and gives you several options in the Actions column:

  • Clean up: Select this option to try and have Imunify360 remove only the malicious code from the file, leaving the rest of your original content safe.
  • View: You can look at the file’s content to check the code yourself, which is useful if you are an advanced user or developer.
  • Add to Ignore List: If you are sure the file is safe (a false alarm), you can choose this to stop Imunify360 from flagging it in the future.
  • Restore: This option is usually available if a file has been quarantined, allowing you to restore the file’s original version.

D. Manually Deleting an Infected File

If you find a threat and want to remove it right away, you can use the built-in action to delete the file permanently:

  1. Go to the Malware Scanner tab in the Imunify360 dashboard.
  2. Find the specific infected file in the list.
  3. In the Actions column next to the file, click the broom icon (this is the shortcut for deletion).
Manually Deleting an Infected File in Imunify360

This action will permanently delete the file from your hosting account.

⚠️ Important Notes on Cleanup and Restore

  • Manual File Removal: Do not rely on the “Clean up all” button at the top of the Imunify360 screen for severely infected files. For critical removal, it is sometimes safer to use the standard File Manager tool in your cPanel.
  • Restoring Files: The Restore button within the Imunify360 interface usually refers to restoring a quarantined file. To restore a clean version of a file from an old backup, you must use your hosting provider’s dedicated backup tool.
Clean up all buttons while manually scanning Imunify360

Pro Tip: Scheduled Scanning

You don’t always need to run a manual scan! Imunify360 is smart and runs scheduled automatic scans every week to keep your website monitored without you having to lift a finger.

3. 📊 How to View and Check Scan Results

Imunify360 keeps a detailed record of every security action it takes. This information is split into two easy-to-read areas: the Scan tab and the History tab.

A. The Scan Tab: Understanding Your Security Status

The Scan tab gives you a clear summary of every check that has been performed on your website files. This is where you quickly see if any threats were found.

Scan tab under Malware scanner in Imunify360

For each scan, you will see important details, including:

  • Scan Date: When the check was performed.
  • Folder Path: Which part of your server was scanned?
  • Scanned Files: The total number of files that Imunify360 looked at.
  • Threats Found: The number of files that were actually infected with malicious code.
  • Suspicious Files: Files that looked questionable but were not definitely malware.
  • Actions Taken: What Imunify360 did to handle the problem (e.g., cleaned up, deleted, or quarantined).

B. The History Tab: Tracking Every Action

The History tab is like a complete logbook of every single security event that happened on your account.

History tab under Malware scanner in Imunify360

This tab shows a detailed timeline of actions, which is helpful for tracking your security efforts:

  • Scans: When automatic or manual scans were run.
  • Cleanups: Every time a malicious script was cleaned from a file.
  • File Restores: If you restored any files using a backup.
  • Ignore List Updates: When you manually told Imunify360 to ignore a specific file.

Note on Logs: The logs displayed in the History tab are stored on the server for 30 days. This gives you plenty of time to review all activity.

C. How to Use the Ignore List

The Ignore List is a useful tool that tells Imunify360 to skip specific files, folders, or databases during future malware scans. You generally only use this if Imunify360 is mistakenly flagging a safe file as suspicious (a “false positive“).

Here is how you can exclude an item from future checks:

  • Go to the Malware Scanner section and click on the Ignore List tab.
  • Click the Add new entry button.
Adding a new file to the ignore list in Imunify360
  • Enter the full path to the file or directory you want to exclude (e.g., /home/username/public_html/safe-script.php).
  • Imunify360 will now completely skip these items during all future scans.
Adding a file path to the ignore list of Imunify360

You can always remove items from this list if you want Imunify360 to start checking them again.

Important: When adding a path, you must use the complete, exact path. Wildcards (like using an asterisk “*” to mean “any folder”) are not supported.

4. 🛑 What is Proactive Defense?

This is one of Imunify360’s most advanced security features. Unlike a traditional scanner that only looks for known malware signatures, Proactive Defense watches the behavior of every script on your website.

  • How it Works: It actively monitors scripts for suspicious actions, such as trying to secretly inject harmful code, modify important system files, or open unauthorized connections.
  • Kill Mode: On most secure hosting setups, Proactive Defense runs in Kill Mode. This is the highest level of protection: as soon as the script tries to perform a dangerous action, the system instantly terminates the script before any damage can be done.
Kill Mode under the Proactive Defense tab in Imunify360

A. 🗑️ Manually Deleting a Suspicious File

Sometimes, Imunify360 finds a malicious file but doesn’t delete it automatically, perhaps because it’s a new kind of threat or it was only marked as suspicious. If you need to remove the file yourself:

  1. Go to the Malware Scanner tab in your Imunify360 dashboard.
  2. Find the file you want to remove in the list of detected threats.
  3. In the Actions column next to that file, click the broom icon (this represents the “Delete” action).

This action will permanently delete the malicious file from your hosting account.

B. Reviewing and Managing Blocked Actions

You can view every action blocked by this defense under the Proactive Defense tab.

Proactive Defense tab in Imunify360

If you are 100% sure that a blocked script action was safe (for example, a legitimate tool was incorrectly flagged):

  1. Click the settings (gear) icon next to the blocked event.
  2. You can choose to ignore the detected rule or ignore all rules for the file.

Use with Caution: Only ignore a rule if you are certain that the script and its action are safe. Ignoring a rule tells Imunify360 to allow that specific behavior in the future, which can be risky if you are wrong.

5. Conclusion

In today’s digital age, robust security is a non-negotiable foundation for any online venture. Imunify360 provides that essential peace of mind by actively defending your infrastructure against the most sophisticated modern threats in real-time.

As a comprehensive security suite, Imunify360 is an invaluable asset for enterprises and developers who prioritize server integrity. It excels at neutralizing common web application attacks, preventing unauthorized access, and safeguarding critical server resources from malicious activity before it can impact your performance.

Experience elite-level security with VPS Malaysia’s high-performance hosting solutions. We understand that your data is your most valuable asset, which is why we integrate Imunify360 as a core component of our hosting packages. Whether you are managing a high-traffic e-commerce platform, a complex corporate database, or a growing application, you can rely on VPS Malaysia to provide a fortified environment.

Your security is our priority. With Imunify360 protecting your server, you are free to focus on scaling your business and innovation while we maintain a proactive, automated shield around your digital presence.

Kaif

Recent Posts

Future of GPU Servers in Malaysia: Trends, Cost Savings, and Scalability

1. đź’» What is a GPU Server? A GPU server is a special server. It…

2 hours ago

Why NVIDIA H200 GPUs Are the Game Changer for AI Workloads in 2025

1. NVIDIA H200 GPU NVIDIA H200 is a strong accelerator that uses Hopper architecture. It…

6 hours ago

8 Essential Linux Security Best Practices

When managing your website or online business, choosing the best WordPress hosting is only part…

4 weeks ago

10 Essential Tips for Linux VPS Hosting That Will Boost Your Performance

When setting up your website, choosing the best WordPress hosting is one of the most…

4 weeks ago

How to Install and Set Up CoSchedule for WordPress Hosting

When managing your website or blog, choosing the best WordPress hosting is the first and…

1 month ago

How to Choose the Best WordPress Hosting

Choosing the best WordPress Hosting is one of the most important decisions for any website…

1 month ago