{"id":493,"date":"2012-12-05T21:04:42","date_gmt":"2012-12-06T02:04:42","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/support\/2012\/12\/05\/server-security-best-practices\/"},"modified":"2023-10-19T13:35:36","modified_gmt":"2023-10-19T17:35:36","slug":"server-security-best-practices","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/","title":{"rendered":"Server security best practices"},"content":{"rendered":"\n<p>A server is connected to the outside world and is open to a variety of attacks and exploits due to this. Some server security best practices can go a long way in ensuring your server does not fall victim to an attack.<\/p>\n\n\n\n<p>A new server comes with the latest versions of software. This can help with previously found security risks. Security is an evolving process and you&#8217;ll want to follow these best practices to make sure your server is secure.<\/p>\n\n\n\n<p>Although some of the information applies to shared, <a href=\"https:\/\/www.inmotionhosting.com\/reseller-hosting\">Reseller hosting<\/a>, VPS, and Dedicaed plans. In order to follow some of these guidelines you would need to have <a href=\"\/support\/server\/ssh\/standard-vs-root-access\/\" target=\"_blank\" rel=\"noopener\">root access<\/a> first on your server.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Strong passwords<\/h2>\n\n\n\n<p>The first line of defense for most services that run on your server will be the <a href=\"\/support\/security\/password-strength\/\" target=\"_blank\" rel=\"noopener\">password strength<\/a> of your passwords.<\/p>\n\n\n\n<p>Ensure that you are always using a strong password for anything that accesses your server. Don&#8217;t let these important credentials just lay around for anyone to see.<\/p>\n\n\n\n<p>If you have <a href=\"\/support\/server\/ssh\/root-access-faq\/\">root access<\/a> on your server, if an unauthorized user logs into your server via the root user, this can be very bad. Sometimes this requires an evacuation to a new server to ensure nothing malicious was left behind.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Limit server access<\/h2>\n\n\n\n<p>Limit server access to only those that need it with the iptables firewall available on most Linux servers.<\/p>\n\n\n\n<p>The default <a href=\"\/support\/website\/security\/password-strength\/#apf\">APF (Advanced Policy Firewall)<\/a> allows easy management of your iptables rules. There is also the more advanced <a href=\"\/support\/website\/security\/password-strength\/#csf\">CSF (ConfigServer Firewall)<\/a> that also controls your iptables but has a more robust feature set.<\/p>\n\n\n\n<p>One common thing to do is <a href=\"\/support\/security\/close-open-ports-for-pci-compliance\/\" target=\"_blank\" rel=\"noopener\">close open ports in your server firewall<\/a>. That way only the ports your server need to communicate to the outside world on will be accessible.<\/p>\n\n\n\n<p>You can also <a href=\"\/support\/edu\/whm\/enable-cphulk-brute-force-protection\/\" target=\"_blank\" rel=\"noopener\">enable cPHulk brute force protection<\/a> on your server to automatically block users that repeatedly try to login with invalid credentials to various services.<\/p>\n\n\n\n<p><a name=\"apf\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">APF &#8211; Advanced Policy Firewall<\/h3>\n\n\n\n<p>APF or Advanced Policy Firewall should be installed on your server by default. APF allows for easy management of your iptables firewall rules for things such as <a href=\"\/support\/server\/ssh\/how-to-open-a-port-in-your-firewall\/\" target=\"_blank\" rel=\"noopener\">opening ports in your firewall<\/a>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Example commands:<\/h4>\n\n\n\n<p>Add IP to allowed hosts:<\/p>\n\n\n\n<pre>apf -a 123.123.123.123 \"Home IP\"<\/pre>\n\n\n\n<p>Block IP from server:<\/p>\n\n\n\n<pre>apf -d 123.123.123.123 \"Hitting login.php again and again\"<\/pre>\n\n\n\n<p>Unblock a blocked IP:<\/p>\n\n\n\n<pre>apf -u 123.123.123.123<\/pre>\n\n\n\n<p>Block IP ranges:<\/p>\n\n\n\n<p>Note recommended:<\/p>\n\n\n\n<pre>apf -d 123.123.123.123\/24<\/pre>\n\n\n\n<p>Recommended way to block IP range from accessing port 80:<\/p>\n\n\n\n<pre>vi \/etc\/apf\/deny_hosts.rules d=80:s=123.123.123.123\/24<\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">APF File Locations:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\/etc\/apf &#8211; Location of APF core files<\/li>\n\n\n\n<li>\/etc\/apf\/conf.apf &#8211; Main APF config file, contains options and allowed port definitions<\/li>\n\n\n\n<li>\/etc\/apf\/allow_hosts.rules &#8211; List of allowed IP addresses and ranges<\/li>\n\n\n\n<li>\/etc\/apf\/deny_hosts.rules &#8211; List of denies (blocked) IP addresses and ranges<\/li>\n\n\n\n<li>\/etc\/apf\/bt.rules &#8211; Rules based on conditions set in conf.apf, should not be edited manually unless required<\/li>\n\n\n\n<li>\/var\/log\/apf_log &#8211; Logs the output of APF start\/stop\/restart processes only<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">CSF &#8211; ConfigServer Firewall<\/h3>\n\n\n\n<p>CSF or ConfigServer Firewall is also allows for easy iptables management. CSF is more recent and a bit more robust than APF. It allows for temporary blocking of IPs, and has both SYN flood protection to help against SYN flood DDoS attacks, as well as LFD which is the built-in module that deals with brute-force login protection.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Example commands:<\/h4>\n\n\n\n<p>Allow an IP:<\/p>\n\n\n\n<pre>csf -a 123.123.123.123<\/pre>\n\n\n\n<p>Temp allow an IP:<\/p>\n\n\n\n<pre>csf -ta 123.123.123.123 15s (s - seconds \/ h - hours \/ m - minutes \/ d - day)<\/pre>\n\n\n\n<p>Block an IP:<\/p>\n\n\n\n<pre>csf -d 123.123.123.123<\/pre>\n\n\n\n<p>Temp block an IP<\/p>\n\n\n\n<pre>csf -td 123.123.123.123 15s (s - seconds \/ h - hours \/ m - minutes \/ d - day)<\/pre>\n\n\n\n<p>Unblock a permanent blocked IP:<\/p>\n\n\n\n<pre>csf -dr 123.123.123.123<\/pre>\n\n\n\n<p>Unblock a temporary blocked IP:<\/p>\n\n\n\n<pre>csf -tr 123.123.123.123<\/pre>\n\n\n\n<p>List temporary blocked IPs and durations:<\/p>\n\n\n\n<pre>csf -t<\/pre>\n\n\n\n<p>Remove all temporary IP blocks:<\/p>\n\n\n\n<pre>csf -tf<\/pre>\n\n\n\n<p>Log all SYN packets from an IP:<\/p>\n\n\n\n<pre>csf -w 123.123.123.123<\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">SYN flood protection<\/h4>\n\n\n\n<p>CSF&#8217;s SYN flood protection counts the number of SYN packets of each TCP connection, if it hits the default limit of 10 per second it will close the connection. This should free the network tables on the server from maintaining a bunch of half-open connections which could lead to additional connections to the server being denied.<\/p>\n\n\n\n<p>To enable CSF SYN flood protection while a suspected attack is going on:<\/p>\n\n\n\n<pre>vi \/etc\/csf\/csf.conf<\/pre>\n\n\n\n<p>Then add this:<\/p>\n\n\n\n<pre>SYNFLOOD=1<\/pre>\n\n\n\n<p>Run this command to restart CSF:<\/p>\n\n\n\n<pre>service csf restart<\/pre>\n\n\n\n<p>When the attack stops, disable the SYN flood protection so you don&#8217;t accidentally block legitimate connections.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Opening Ports<\/h4>\n\n\n\n<p>By default all outbound ports are blocked. To disable this you can open the range [1:65535] in the following file:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\/etc\/csf\/csf.conf<\/li>\n<\/ul>\n\n\n\n<p>Port ranges are separated by colons <strong>1:100<\/strong> in the following areas: <strong>TCP_IN<\/strong>, <strong>UDP_IN<\/strong>, <strong>UDP_OUT<\/strong>, and <strong>TCP_OUT<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Enable LFD Brute Force protection<\/h4>\n\n\n\n<p>You can enable the LFD brute force protection by editing:<\/p>\n\n\n\n<pre>vi \/etc\/csf\/csf.conf<\/pre>\n\n\n\n<p>Then adding this:<\/p>\n\n\n\n<pre>LF_DAEMON=1<\/pre>\n\n\n\n<p>You can use the<strong> LF_*<\/strong> settings down further in the file to set the login limits for each service on the server.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Reading the CSF log<\/h4>\n\n\n\n<p>When an IP has a packet dropped, it should be logged to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\/var\/log\/messages<\/li>\n<\/ul>\n\n\n\n<p>Example dropped packet message:<\/p>\n\n\n\n<code>Aug 15 07:14:39 server kernel: Firewall: <em>TCP_IN Blocked<\/em> <strong>IN<\/strong>=eth0 OUT= MAC=78:2b:cb:1c:00:1d:00:02:17:2c:6c:00:08:00 <strong>SRC<\/strong>=190.86.203.61 <strong>DST<\/strong>=173.247.251.145 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=1155 DF <strong>PROTO<\/strong>=TCP <strong>SPT<\/strong>=49528 DPT=2525 WINDOW=8192 RES=0x00 SYN URGP=0<\/code>\n\n\n\n<p>Log key:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IN &#8211; The interface<\/li>\n\n\n\n<li>SRC &#8211; The IP attempting to connect<\/li>\n\n\n\n<li>DST &#8211; The IP being connected to (the local server)<\/li>\n\n\n\n<li>PROTO &#8211; Protocol used (TCP\/UDP)<\/li>\n\n\n\n<li>SPT &#8211; Source port DPT : Destination port<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Install CSF<\/h3>\n\n\n\n<p>In order to install CSF, the first thing you&#8217;d want to do is remove the APF installation on your server first:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Remove APF<\/h4>\n\n\n\n<pre>service apf stop chkconfig --del apf rm -f \/etc\/init.d\/apf rm -f \/usr\/local\/sbin\/apf rm -rf \/etc\/apf<\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Remove WHM Add IP to firewall feature<\/h4>\n\n\n\n<pre>rm -rf \/usr\/local\/cpanel\/whostmgr\/cgi\/apfadd rm -f \/usr\/local\/cpanel\/whostmgr\/cgi\/addon_add2apf.cgi<\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Install CSF<\/h4>\n\n\n\n<p>InMotion Hosting customers:<\/p>\n\n\n\n<pre>yum install -y csf-ded<\/pre>\n\n\n\n<p>On any server:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Download CSF source from <a href=\"https:\/\/configserver.com\/cp\/csf.html\" target=\"_blank\" rel=\"noopener\">ConfigServer CSF<\/a>.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Lost server access<\/h4>\n\n\n\n<p>In some cases CSF might lock out your access to the server. If this happens, you should be able to log into WHM and navigate to <strong>ConfigServer Security &amp; Firewall<\/strong>, and temporarily disable CSF\/LFD so you can log back in.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">CSF File Locations:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\/etc\/csf &#8211; Location of CSF core files<\/li>\n\n\n\n<li>\/etc\/csf\/csf.conf &#8211; Main CSF config file, contains options and allowed port definitions<\/li>\n\n\n\n<li>\/etc\/csf\/csf.allow &#8211; List of allowed IP addresses and ranges<\/li>\n\n\n\n<li>\/etc\/csf\/csf.deny &#8211; List of denies (blocked) IP addresses and ranges<\/li>\n\n\n\n<li>\/etc\/csf\/csf.tempban &#8211; Dynamically-updated list of temporarily-blocked IPs<\/li>\n\n\n\n<li>\/var\/log\/messages &#8211; Where CSF logs its actions<\/li>\n\n\n\n<li>\/etc\/csf\/csf.gallow &#8211; Global allow list (is generated automatically)<\/li>\n\n\n\n<li>\/etc\/csf\/csf.gdeny &#8211; Global deny list (is generated automatically)<\/li>\n\n\n\n<li>\/etc\/csf\/csf.gignore &#8211; Global ignore list (is generated automatically)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Limit website access<\/h2>\n\n\n\n<p>You should review website access logs for unwanted activity and to <a href=\"\/support\/website\/block-unwanted-users-from-your-site-using-htaccess\/\" target=\"_blank\" rel=\"noopener\">block unwanted users from your website<\/a> if you find any. Blocking bad users at the website level is a good step before blocking them in your server&#8217;s firewall.<\/p>\n\n\n\n<p>We have an entire section dedicated to keeping tabs on <a href=\"https:\/\/www.inmotionhosting.com\/support\/server\/server-usage\/\" target=\"_blank\" rel=\"noopener\">server usage<\/a> and for ways of finding and taking care of malicious activity that you will probably want to review and bookmark.<\/p>\n\n\n\n<p>If you are using a CMS such as WordPress to run your website, make sure you&#8217;re protected from things like a <a href=\"\/support\/edu\/wordpress\/wp-login-brute-force-attack\/\" target=\"_blank\" rel=\"noopener\">WordPress Brute Force attack<\/a> so you admin dashboard is safe as well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Login to your server securely<\/h2>\n\n\n\n<p>To securely connect to your server directly, you can use <a href=\"\/support\/server\/ssh\/how-to-login-ssh\/\" target=\"_blank\" rel=\"noopener\">SSH<\/a> (Secure Shell) which encrypts your data.<\/p>\n\n\n\n<p>By default, no outside IP addresses will be allowed to connect via SSH to your server for better security. So you will first want to <a href=\"\/support\/website\/add-ip-to-firewall\/\" target=\"_blank\" rel=\"noopener\">add your IP to the server firewall<\/a> so that you are able to connect.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secure file management<\/h3>\n\n\n\n<p>When working with files on your server especially from a shared network, it&#8217;s important to encrypt your login credentials so they are not passed in clear-text. You can also always <a href=\"\/support\/website\/ftp\/disable-ftp-clear-plain-text-authentication\/\" target=\"_blank\" rel=\"noopener\">disable FTP clear\/plain-text authentication<\/a> server-wide to force everyone connecting to your server to use a secure protocol.<\/p>\n\n\n\n<p>You can use the underlying SSH technology to securely connect over port 22 on the server with <a href=\"\/support\/website\/ftp\/connecting-scp-sftp\/\" target=\"_blank\" rel=\"noopener\">SCP and SFTP<\/a>.<\/p>\n\n\n\n<p>You can also securely use FTP over SSL with the <a href=\"https:\/\/www.inmotionhosting.com\/support\/website\/ftp\/shared-sftp-setup\/\" target=\"_blank\" rel=\"noopener\">FTPS<\/a> protocol.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secure application logins<\/h3>\n\n\n\n<p>On a server some common applications you might access would be <strong>cPanel<\/strong>, <strong>WHM<\/strong>, and <strong>webmail<\/strong>. Each service can be connected to securely so you&#8217;re not transmitting any plain-text data between your computer and the server.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Insecure cPanel application logins<\/h4>\n\n\n\n<p>These default server application&#8217;s can be accessed from any web-browser and pass credential data in plan-text when accessed from one of these insecure URLs:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https:\/\/example.com\/cpanel &#8211; cPanel<\/li>\n\n\n\n<li>https:\/\/cpanel.example.com &#8211; cPanel<\/li>\n\n\n\n<li>https:\/\/example.com\/whm &#8211; WHM<\/li>\n\n\n\n<li>https:\/\/whm.example.com &#8211; WHM<\/li>\n\n\n\n<li>https:\/\/example.com\/webmail &#8211; Webmail<\/li>\n\n\n\n<li>https:\/\/webmail.example.com &#8211; Webmail<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Secure cPanel application logins<\/h4>\n\n\n\n<p>To access these same services on your server over <strong>https<\/strong>, so that your credentials are encrypted and transmitted securely you would use these URLs:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https:\/\/example.com:2083 &#8211; cPanel<\/li>\n\n\n\n<li>https:\/\/example.com:2087 &#8211; WHM<\/li>\n\n\n\n<li>https:\/\/example.com:2096 &#8211; Webmail<\/li>\n<\/ul>\n\n\n\n<p>You can <a href=\"\/support\/edu\/whm\/log-into-whm\/\" target=\"_blank\" rel=\"noopener\">login to WHM<\/a> and then navigate to <strong>Tweak Settings &gt; Redirection<\/strong> and turn on <strong>Always redirect to SSL<\/strong> to force all cPanel applications to use <strong>https<\/strong> by default.<\/p>\n\n\n\n<p>If you didn&#8217;t buy a SSL certificate for your server, you might get a <a href=\"\/support\/website\/ssl\/self-signed-ssl-certificate-warning\/\" target=\"_blank\" rel=\"noopener\">self-signed SSL certificate warning<\/a> which is fine, your connection is still encrypted.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Other server application logins<\/h4>\n\n\n\n<p>Anytime you install another application on your server, which could be as simple as a PHP script you&#8217;ve uploaded. You could possibly be opening up a way for attackers to get into your server.<\/p>\n\n\n\n<p>Always make sure that any application you&#8217;re using on your server is locked down with at least a username and password, and if possible try to access those applications via a secure login form over <strong>https<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Make your server secure enough to handle credit card data<\/h2>\n\n\n\n<p>It&#8217;s recommended to follow the PCI DSS (Payment Card Industry Data Security Standard) guidelines for server security as well. These are the requirements that your server must meet security wise in order to pass a PCI scan, which allows you to accept credit cards and store that information directly on your server securely.<\/p>\n\n\n\n<p>In some cases the security recommendations could be overkill for general purpose websites. But when it comes to the security of your server it&#8217;s always better to be safe than sorry. You can look at our article on <a href=\"\/support\/security\/how-to-pass-pci-scans\/\" target=\"_blank\" rel=\"noopener\">how to pass PCI compliance scans<\/a> for more information on the common things you can do to help further secure your server.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">General application security and updates<\/h2>\n\n\n\n<p>The most common way that a server&#8217;s security is compromised is actually by the 3rd party applications that you load onto your server having an exploit in them. It&#8217;s important to stay very vigilant in keeping up with your application&#8217;s security updates, as well as any plugins, themes, or other add-on updates that you&#8217;re using for that application.<\/p>\n\n\n\n<p>Because these applications are on the Internet and accessible from anywhere, they typically are targeted again and again by hackers until they&#8217;re able to find an exploit that allows them access. Once this information is known to the public the application&#8217;s developer will typically patch the exploit with a newer version, when you don&#8217;t upgrade to the latest version provided by your application you run the risk of being hacked.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A server is connected to the outside world and is open to a variety of attacks and exploits due to this. Some server security best practices can go a long way in ensuring your server does not fall victim to an attack. A new server comes with the latest versions of software. This can help<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/\"> Read More ><\/a><\/p>\n","protected":false},"author":57014,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4299],"tags":[],"class_list":["post-493","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Server security best practices | InMotion Hosting<\/title>\n<meta name=\"description\" content=\"In this article we&#039;ll discuss some basic server security best practices you&#039;ll want to follow, to help ensure that your server and users remains secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Server security best practices | InMotion Hosting\" \/>\n<meta property=\"og:description\" content=\"In this article we&#039;ll discuss some basic server security best practices you&#039;ll want to follow, to help ensure that your server and users remains secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Support Center\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-06T02:04:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-19T17:35:36+00:00\" \/>\n<meta name=\"author\" content=\"InMotion Hosting Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/InMotionHosting\" \/>\n<meta name=\"twitter:site\" content=\"@InMotionHosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/\"},\"author\":{\"name\":\"InMotion Hosting Contributor\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\"},\"headline\":\"Server security best practices\",\"datePublished\":\"2012-12-06T02:04:42+00:00\",\"dateModified\":\"2023-10-19T17:35:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/\"},\"wordCount\":1814,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/\",\"name\":\"Server security best practices | InMotion Hosting\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\"},\"datePublished\":\"2012-12-06T02:04:42+00:00\",\"dateModified\":\"2023-10-19T17:35:36+00:00\",\"description\":\"In this article we'll discuss some basic server security best practices you'll want to follow, to help ensure that your server and users remains secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inmotionhosting.com\/support\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Server security best practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"name\":\"InMotion Hosting Support Center\",\"description\":\"Web Hosting Support &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\",\"name\":\"InMotion Hosting\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"contentUrl\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"width\":696,\"height\":696,\"caption\":\"InMotion Hosting\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/inmotionhosting\/\",\"https:\/\/x.com\/InMotionHosting\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\",\"name\":\"InMotion Hosting Contributor\",\"description\":\"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/inmotion-hosting\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting\"],\"url\":\"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Server security best practices | InMotion Hosting","description":"In this article we'll discuss some basic server security best practices you'll want to follow, to help ensure that your server and users remains secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Server security best practices | InMotion Hosting","og_description":"In this article we'll discuss some basic server security best practices you'll want to follow, to help ensure that your server and users remains secure.","og_url":"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/","og_site_name":"InMotion Hosting Support Center","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting\/","article_published_time":"2012-12-06T02:04:42+00:00","article_modified_time":"2023-10-19T17:35:36+00:00","author":"InMotion Hosting Contributor","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/InMotionHosting","twitter_site":"@InMotionHosting","twitter_misc":{"Written by":"InMotion Hosting Contributor","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/"},"author":{"name":"InMotion Hosting Contributor","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644"},"headline":"Server security best practices","datePublished":"2012-12-06T02:04:42+00:00","dateModified":"2023-10-19T17:35:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/"},"wordCount":1814,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/","url":"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/","name":"Server security best practices | InMotion Hosting","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#website"},"datePublished":"2012-12-06T02:04:42+00:00","dateModified":"2023-10-19T17:35:36+00:00","description":"In this article we'll discuss some basic server security best practices you'll want to follow, to help ensure that your server and users remains secure.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/support\/"},{"@type":"ListItem","position":2,"name":"Server security best practices"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/support\/#website","url":"https:\/\/www.inmotionhosting.com\/support\/","name":"InMotion Hosting Support Center","description":"Web Hosting Support &amp; Tutorials","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/support\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/support\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","width":696,"height":696,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting\/","https:\/\/x.com\/InMotionHosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644","name":"InMotion Hosting Contributor","description":"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!","sameAs":["https:\/\/www.linkedin.com\/company\/inmotion-hosting\/","https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting"],"url":"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":4299,"name":"Security","slug":"security","link":"https:\/\/www.inmotionhosting.com\/support\/security\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/users\/57014"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/comments?post=493"}],"version-history":[{"count":7,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/493\/revisions"}],"predecessor-version":[{"id":107371,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/493\/revisions\/107371"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/media?parent=493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/categories?post=493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/tags?post=493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}