Plesk windows webmail 404




















RenaudW Guest. How can I do? Thanks for your replies. IgorG Forums Analyst Staff member. Use --remove option first and then --install. Many thanks for your reply. Click to expand Last edited by a moderator: Oct 10, I did not used any name! I removed atmail and install atmail But unfortunatelly, the result is the same : error for all the webmail links in the mail pannel for all domains. Do you think I have to remove atmail and install horde instead of?

Thanks for your help. I faced such kind of issue on many my servers. Thanks for your reply. Could you give me the exact command?

Which file? RenaudW said:. You must log in or register to reply here. Similar threads C. Issue rewrite Wordpress issues - Coopsy Dec 14, Plesk Obsidian for Linux. Replies 5 Views Issue pki-validation folder returns on new server. Replies 6 Views Tuesday at AM plesk0. Pinocchio May 5, Reports. Replies 2 Views May 5, Pinocchio. Resolved Wordpress installation on subdomain on slugs. Markvdberg0 Jul 22, WordPress Toolkit. It contains important security features and bug fixes released on a monthly basis.

The CRS provides generic protection from unknown vulnerabilities often found in web applications. This rule set is shipped for free. It is known as a very restrictive rule set; it requires additional tuning for production use. When this rule set is selected, WordPress partly does not work, webmail and file sharing do not work either. You can use Atomic or Comodo rule sets instead. Advanced ModSecurity Rules by Atomicorp. The latest version of the rules, with all the performance enhancements, new security features and bug fixes released by Atomicorp GotRoot on a daily basis.

This is a commercial rule set that is fully supported and recommended for production use. Plesk provides the Security Core Complete by Atomicorp extra feature that allows you to enable this rule set in Plesk. You can get this extra feature by the following ways:. If you already have an account on the Atomic site, you can provide your username and password to enable this rules set. Note: Atomicorp does not support Ubuntu So, Atomic rule sets both basic and advanced cannot be enabled in ModSecurity on a Plesk server with Ubuntu Caution Linux : If you select the Atomic ruleset, perform the following procedure to ensure that ModSecurity works fine.

Run the aum -u command on the server. The Plesk modsecurity package will be replaced by that from the Atomic repository. Then run the following commands:. This is a simple-to-use, customizable rules-based traffic control system that protects your web-based applications and prevents newly emerging hacking techniques with the use of a frequently updated rules database.

To enable this rule set in Plesk, register on the Comodo site and provide your username and password from this site. You can upload a custom web application firewall rule set, for example, a trial package from Atomic or a free package from Comodo.

Supported formats: zip, tar. To automatically update the selected rule set, select the Update rule set checkbox and select the update period. Select a predefined set of parameters or specify your custom ModSecurity directives. You can select the following predefined sets of parameters:. This mode is the least CPU consuming. This mode is a good balance between quality and performance.

This mode consumes the most CPU resources, but it can be recommended for sites that require special security measures. For example, online shops accepting card payments. Note: For optimal performance, the web application firewall requires a local DNS server with request caching enabled. Otherwise, your websites may load slowly while the web application firewall is turned on.

A website can stop functioning as expected after you change the web application firewall mode to On from Off or Detection only. In the website error log, you can find such error codes as , , or , and they stop appearing after you change the web application firewall mode back to Detection only or Off. In this case, analyze the ModSecurity audit log to find out what is happening.

You can switch off too excessively restrictive security rules or adjust the website. In the three lines above the highlighted entry, find a string like --eeceB Search further for other entries with the same event ID. Look for an entry with the letter H after the event ID in our example, eeceH



0コメント

  • 1000 / 1000