ImunifySecurity declared that the latest beta version of Imunify360 version 4.9 consists of several new features. Beginning from version 4.9, Imunify360 presently supports CentOS 8 with DirectAdmin, CentOS 8 as stand-alone, CentOS 8 with Plesk, CloudLinux OS 8 with DirectAdmin, and CloudLinux OS 8 as stand-alone. However, the process of installation is similar in all the above versions. ImunifySecurity team additionally declared that captcha and greylisting are accessible. In version 4.9 the company has introduced WebShield that serves accurate SSL certificates for hosted domains and blocks HTTPS attacks.
Table of Contents
File Change Service/API support
Another change in the newest release is that the file watcher for real-time scanning has been extended to support File Change API on CloudLInux OS 7. It enhances the discovery rate for the systems with restricted monitoring capabilities. CloudLinux File Change API is a kernel-level technology that buffers the file of altered files in the kernel, then presents the file to the daemon or outside application. Real-Time Scan can be allowed by examining the Optimize real-time scan checkbox in the settings.
Customizable Google reCAPTCHA
Begining from Imunify360 version 4.9, Imunify360 lets an admin define reCAPTCHA keys for the server. The team of Imunify360 further declared that in future releases, the team intents to fully eradicate embedded keys, and substitute Google reCAPTCHA with Splash Screen for the installation without defined custom keys.
The organization additionally replied that in version 4.9, Malware Scanner and Proactive Defense are more tightly integrated. It restricts stand-alone malicious executables from running, which will eventually decrease the volume of reinfections and new malware drops like phishing pages, stand-alone backdoors, and web-shells. By default the protection is enabled hence it does not need any of the manual settings.
With the bulk processing of IP addresses included in version 4.9, it decreases the time needed to execute mass IP actions like
- Shifting IPs to the Black List/ White list
- Transferring IPs to a group
- Deleting IPs from a list