You can find our user documentation at

Check out our new API beta site!

Page tree
Skip to end of metadata
Go to start of metadata

For cPanel & WHM version 58

(Home >> Security Center)

This section of WHM allows you to improve the security on your server.

  • Apache mod_userdir Tweak — This interface allows you to configure Apache's mod_userdir module. This module enables access to a website through a URL that uses the  http://hostname/~username  format.



  • Compiler Access — This interface allows you to enable or disable compiler access for unprivileged users. Many common attacks require a functional C or C++ compiler on the server.



  • cPHulk Brute Force Protection — This interface allows you to configure cPHulk. cPHulk helps defend your server against brute force attacks. Brute force attack methods involve the use of an automated system to guess your web server's or services' password.
  • Host Access Control — This interface allows you to allow or deny clients' access, based on their IP addresses, to specific services.
  • Manage External Authentications — This interface allows you to manage the OpenID-compliant authentication providers that your server's users can use to log in to cPanel.
  • Manage root's SSH Keys — This interface allows you to add, import, and control SSH keys on your server. The system divides your keys into public and private key sets in two separate lists.
  • Manage Wheel Group Users — This interface allows you to add or remove users from the wheel group. The wheel group contains specific users who can execute the su command, which allows the user to gain root-level access.
  • ModSecurity™ Tools — This interface allows you to install and manage your ModSecurity™ rules.
  • Password Strength Configuration — This interface allows you to define the minimum password strength for all of cPanel & WHM’s authenticated features.
  • PHP open_basedir Tweak — This interface allows you to configure PHP's open_basedir directive. This tweak denies users the ability to use PHP to open files outside of their home directory.
  • Security Advisor — This interface runs a security scan on your server and advises you about how to resolve any security issues that it finds.
  • Security Questions — This interface allows you to define and manage security questions. The system uses security questions when an unrecognized IP address attempts to log in to your account.
  • Shell Fork Bomb Protection — This interface allows you to prevent the depletion of server resources by users with terminal access (SSH or Telnet). This depletion of resources can crash your server in a malicious attack known as a fork bomb. Fork bombs start a cascade of small processes that duplicate themselves until they deplete the server's resources.
  • SMTP Restrictions — This interface allows you to configure your server so that the mail transport agent (MTA), Mailman mailing list software, and root user are the only accounts that can connect to remote SMTP servers. You may want to deny users the ability to bypass your mail server to send mail. This is common practice for spammers.
  • SSH Password Authorization Tweak — This interface allows you to enable or disable passwords for SSH authentication. 


    If you disable passwords, users must use keys when they access your server via SSH.

  • Traceroute Enable Disable — This interface allows you to configure the traceroute utility on your server. The traceroute utility is a network tool that determines the route that your network traffic uses to reach its destination.
  • Two-Factor Authentication — This interface allows you to configure an improved security measure that requires two forms of identification to log in.