Management
Task |
cPanel
|
PLESK
|
Control
Panel Installation and update to the most recent version of the control
panel which has been released as a stable version. |
YES
|
YES
|
Server Kernel is
updated to the most recent version which has been released by the
particular operating system vendor in an RPM package. |
YES
|
YES
|
Advanced
Policy Firewall (APF) is installed and configured for best results with
that particular control panel for general use. Standard service ports
are left open and it can then be configured depending on what customer
chooses to run on server. |
YES
|
YES
|
YUM Configuration
Updated and then a general Operating system software update is done
while ensuring nothing is installed which causes problems with the
installed control panel. |
YES
|
YES
|
Additional
IP Addresses that come with the server are assigned and setup so that
domains can easily be assigned to them. |
YES
|
YES
|
Nameservers for your
primary domain are setup and configured to allow you to use them for
any domain hosted on the system, all you have to do is register them at
your domain registrar and they will work. |
YES
|
YES
|
Server
Hostname and Server Password set to what is requested on server setup. |
YES
|
YES
|
NAMED Fixes to avoid
DNS problems and Open DNS Server Disabled |
YES
|
N/A
|
/tmp
Hardened to ensure security of the system by preventing scripts
executing anything that is stored here. |
YES
|
YES
|
Apache is
re-compiled to provide support for additional modules including curl,
curlssl, mcrypt, openssl, gd, freetype, xml, zip |
YES
|
N/A
|
ZEND
Optimizer is installed to ensure maximum page loading efficiency and
minimum bandwidth usage through apache. |
YES
|
N/A
|
Control panel is
configured to ensure maximum security and operating efficiency. Certain
features and modules are disabled or re-configured to ensure server
remains as stable as possible. |
YES
|
YES
|
Brute
Force Detection (BFD) software installed to provide basic mitigation
and analysis of brute force attempts on the server from various
services. |
YES
|
YES
|
CHKRootkit installed
to provide for trojan and rootkit exploits within critical files and
services on the server. |
YES
|
YES
|
RKHunter
installed to provide for trojan and rootkit exploits within critical
files and services on the server, between CHKRootkit and RKHunter the
server should be well protected. |
YES
|
YES
|
Mount Secondary Hard
Drive if it exists and either configure them for backups or as
additional domain storage depending on what customer wishes to use it
for. |
YES
|
YES
|
Reverse
DNS (Pointer) records automatically added by us for the primary server
IP address to the servers hostname to ensure services requiring this
will function as expected from the moment you receive the server
details. |
YES
|
YES
|