You always use cpanel recommended Security Settings to avoid hacking and other suspicious activity. These cPanel Server Hardening & Security tips will help prevent from hacking.
cPanel security checklist
This checklist pertains to the Tweak Settings interface of WHM. You can access the Tweak Settings interface at WHM >> Server Configuration >> Tweak Settings.
|Enable HTTP Authentication
Leaving this option disabled enables cookie authentication, helping to prevent certain types of XSRF attacks.
|Cookie IP Validation
Enabling this option limits the ability of attackers who capture cPanel session cookies and attempt to access the cPanel and WHM interfaces. For this setting to work best, you should also disable proxy domains.
|Proxy Subdomain Creation
Disabling this option prevents cPanel, webmail, webdisk, and WHM proxy subdomain DNS entries from being added to new accounts.
Enabling this option requires logins from remote locations to use SSL.
Enabling this option requires that security tokens be used to access any interface associated with cPanel & WHM. This helps to prevent XSRF attacks.
|Block Common Domains Usage
Enabling this option prevents users from adding or parking common Internet domains, such as
|Initial default/catch-all forwarder destination
Selecting Bounce for this option causes the server to automatically discard unroutable email sent to your server’s new accounts. This option is the best at protecting your server against mail attacks.
cPanel server security best practices
You can access WHM’s Security Center features at WHM >> Security Center. Many of these features will help to secure your server.
|Password Strength Configuration
This feature allows you to specify a minimum password strength for accounts hosted by your server.
|A value of 50 or greater.|
|PHP open_basedir Tweak
Enabling this option requires users to manually specify the
|Apache mod_userdir Tweak
Enabling this option prevents users from bypassing bandwidth limits by accessing their sites using a tilde (~), username, and hostname (e.g.
Disabling compiler access for unspecified users will help prevent attacks on your server.
|Manage Wheel Group Users
This feature allows you to define users who can use the
|Remove all users except for root and your main account.|
|Shell Fork Bomb Protection
Enabling this option prevents users with terminal access from using all of the resources on the server.
Note: Enabling this option may cause resource shortage problems as this setting heavily limits various resources.
|FTP Configuration||Disable Anonymous FTP|
|Manage Shell Access||Disable shell access for all other users.|
|cPHulk Brute Force Protection
If you enable this option, you should add trusted IPs using the White/Black List Management tab. This will prevent you from being locked out if someone attempts to brute force your server.
Disable Identification Output for Apache
Log into WHM and access the Apache Global Configuration feature (located at WHM>> Service Configuration >> Apache Configuration >> Global Configuration).
Select Off (PCI Recommended) from the ServerSignature pull-down menu.
Install mod_security — This module is an open-source web application firewall.
Install CSF firewall – Recommended firewall for cpanel servers.
suPHP — This module causes PHP scripts to run as the owner of the script versus the nobody user.
Suhosin — This module is an advanced protection system for PHP installations. For more information, read the Suhosin website.
You can verify this important php security settings.