Instructions to scan website malicious code with cPGuard on cPanel of WordPress Hosting service.
Recently, our WordPress Hosting service (server Singapore) has integrated security application cPGuard instead of ImunifyAV / Imunify360 with a lot of extremely useful features. With this change, the protection for your website will be raised to a new level. What features does cPGuard have and how to use it? Let’s take a few minutes to learn together with WP Basic. Because who knows, your WordPress website’s source code is not as “clean” as you think.
What features does cPGuard have?
cPGuard on our WordPress Hosting (Singapore server) is equipped with the following features:
- Automatically scan and block malware in real time.
- Manually scan malware (according to user needs).
- Prevent brute force attack (protect website login page).
- Web Application Firewall (WAF).
- Warning about security risks on content management systems (CMS) such as WordPress, Drupal, Joomla…
Scan website malicious code with cPGuard
1. First, you need to log in to cPanel, find the section cPGuard.
2. After clicking, you will see an interface that looks like the image below.
3. To see a list of malicious files that the system has automatically scanned and detected, hover your mouse over the item. Virus Scanner => choose Scanner Logs.
If there are malicious files listed, they are quarantined from the source code by default:
- Click on the file icon in the last column to view detailed information.
- Click on the 3-dot icon in the last column to edit, delete or restore the quarantined file.
4. To manually scan the entire hosting or each website according to your needs, hover over the item Virus Scanner => choose Manual Scan.
- Full Scan: click the button Run Scan if you want to scan the entire hosting.
- Quick Scan: select the directory of the website you want to scan in the Choose a directory then click the button Run Scan.
- Path Scan: enter the path to the folder you want to scan and then click the . button Run Scan.
Wait for a while for the scanning process to complete and you will receive the results right below. Fast or slow time completely depends on the total amount of space to be scanned.
In addition, when you click on the gear-shaped button in the upper right corner of the screen, you will see several options related to manual scanning:
- What to do with: select the action that will apply to infected files detected during manual scanning (No Action – list only infected files, Quarantine – isolating infected files, Disable File – disable infected files).
- Whitelist Files and Blacklist Files: exclude (whitelist) or add certain files to the blacklist (blacklist) during manual scanning.
5. Section CMS Threats will display a warning about a security risk for content management systems (CMS) like WordPress, Drupal, and Joomla.
6. Section BruteForce will show the brute force attacks that cPGuard has helped you prevent.
7. Section WAF will show the attacks that cPGuard’s web application firewall has helped you prevent.
In addition to scanning malicious code with cPGuard, to know for sure if your WordPress website is infected with malicious code, combine the use of additional security plugins (Defender Security, Sucuri Security…) to scan the source code.
If you liked this article, follow my blog to regularly update the best and latest articles. Thanks very much. 🙂