Set up Imunify360 on DirectAdmin

Estimated reading time: 4 min


The purpose of this article is to show you how to install and configure Imunify360 on your server. After you have purchased the license for your server, which is an easy proces, add to your server as Extra Software > Licenses and after you have purchased it, install the agent on your server.


Step 1: Log in using SSH

You must be logged in via SSH as root user. Please read this article for instructions if you don’t know how to connect.

Step 2: Prepare server

DirectAdmin comes with CSF (Config Server Firewall is a free and advanced firewall for most Linux distributions and Linux based VPS) and LFD. It is important to disable LFD, otherwise you will get false positives. To disable LFD give the following commands:

sed -i 's|^LF_DAEMON = "1"|LF_DAEMON = "0"|g' /etc/csf/csf.conf
sed -i '/^lfd=/d' /usr/local/directadmin/data/admin/services.status
service directadmin restart
csf -tf
csf -df
csf -ra

This will make sure that LFD is disabled and will not be checked by DirectAdmin service checking. It will also empty the current IP bans of LFD.

Step 3: Installing the Imunify360 agent

After you have accessed your server run the following command from the command line to register the Imunify360 agent.

wget -O

Wait for the script to finish the installation before proceeding with the next step. Note: After the installation it is advisable to clean up the installation file in this case by running the command:

rm -rf

Step 4. Login to Direct Admin

directadmin setup screen

There are several important configurations needed in Direct Admin in order for Imunify360 to work properly. The first one would be to turn off the brute force parsing option in Direct Admin under the Settings>Server Setting

directadmin screen


Locate the Imunify360 shortcut to the plugin which can be found in Extra features within the Direct Admin. The first time when using Imunify360 you will be presented with the pop-up message with EULA Agreement to accept.

imunify 360 licence agreement screen

Step 5: Configure Imunify360

Imunify360 has its own built-in firewall which we need to configure properly in order to avoid the issues. So let’s started with the third party integrations. When CSF is used you need to enable the “3-rd Party Integration” which can be enabled through “Imunify360 -> Settings -> General

set up imunify 360 screen


Step 7. Whitelist IP in Imunify360

Imunify360 has its own IP firewall in which it is important to add your own IP address(es). You should consider adding your own IP address to the whitelist to prevent locking yourself out. You can read more about this in this article.

imunify 360 screen

Step 6: Kernelcare

Imunify360 comes with the Kernelcare integration. You can install Kernelcare without any extra cost. It is located under: “Imunify360 -> Settings> KernelCare

kernelcare in imunify 360 screen



When Kernelcare is installed, check if it’s working. Navigate to “Imunify360 -> Kernelcare”.

Step 7: CMS and WordPress settings

In following steps we advise you to go through the settings on each service within the Imunify360 and set up the correct values. Navigate to “Imunify360 -> Settings -> General”. Check the following options:

Hardened PHP

WordPress recommends everyone update their PHP versions, but this is often not possible. HardenedPHP keeps your customers and servers safe by patching all PHP versions against known vulnerabilities. HardenedPHP secures old and unsupported versions of PHP. If you want total control over hardening your PHP (and total control over the security of your web platform), it’s not a bad idea to move to Dedicated or VPSs as soon as possible.

NOTE: Activating this feature may cause your application not to function properly so be advised to consider all the aspects before applying these settings into your production environment.

WAF Settings

Apply CMS-specific WAF Rules = Enabled
Minimized ModSec Ruleset = Disabled
WordPress Account Compromise Prevention = Enabled

DoS Protection

When CSF is enabled, this feature is disabled and managed by CSF.
SMTP Traffic Management
We keep this feature disabled since we provide smarthost which prevents SPAM.
Incidents logging
Log level = 4
Keep incidents for the last days = 100
Keep maximum incidents count = 100000
Auto-refresh time for Incidents page = 10
Send additional data = deselected


Enable WebShield = Enabled
Detect IPs behind CDN = Enabled
Anti-bot protection = Enabled
Google reCAPTCHA service  = Disabled


Active response = Enabled


PAM brute-force attack protection = Enabled

Error reporting

We disable error reporting to Imunify360.

Contact details

Here you can enter an email address to receive security notifications about your server.

Step 9: Configure Imunify360 Malware

Navigate to “Imunify360 -> Settings -> Malware

Resource consumption

We keep the default values low to prevent the server from causing load during scans.

General settings

Automatically scan all modified files = Enabled
Optimize real-time scan = Enabled
Automatically scan any file uploaded using web = Enabled
Automatically scan any file uploaded using FTP = Enabled
Automatically send suspicious and malicious files for analysis = Enabled
Try to restore from backup first = Disabled 
Use backups not older than (days)  = 90
Default action on detect = Cleanup
Enable RapidScan = Enabled
Binary (ELF) malware detection = Enabled
Malware Database Scanner = Enabled
  • Background Scanning
Run scanning = Weekly
Run on = Sunday
Run at = 3:00 AM
  • Cleanup
Trim file instead of remove = Enabled
Keep original files for =  14 days
  • Proactive Defense
Enable blamer = Enabled
PHP Immunity = Enabled

Step 10: Disabled Rules

Navigate to “Imunify360″->”Settings”->”Disabled Rules”

We disable the following rules in Imunify360. You can add the exemption by clicking the “Add” button in settings.

214920 modsec " IM360 WAF: Inbound Points|Total Incoming Points; Known for creating lot of False Positives" all
77316844 modsec "Blocks Post SMTP" all

Step 11: Features Management

In this section, you can enable “Proactive Defense” and “Malware Cleanup” for your users, navigate to “Imunify360 -> Settings -> Features Management”. We activate both features for our own users in order to protect their websites and give them the ability to clean up their website if it’s infected.

Step 12: Notifications

By default, no notification is sent. In this section, you can configure the notifications based on your needs, navigate to “Imunify360 -> Settings -> Notifications”. We have entered a “Default admin emails” and enabled the following notifications “Real-Time scan: malware detected” and “Script blocked”.


In this article we have covered the essential set up steps for Imunify360 in DirectAdmin to provide the optimal security and at the same time lower CPU resource usage on your server. If you have any other questions or specific requests regarding Imunify360 visit the following link.


Was this article helpful?
Dislike 0
Views: 1996

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *