{"id":14340,"date":"2025-12-30T10:44:11","date_gmt":"2025-12-30T05:14:11","guid":{"rendered":"https:\/\/www.youstable.com\/blog\/?p=14340"},"modified":"2025-12-30T10:44:13","modified_gmt":"2025-12-30T05:14:13","slug":"how-to-monitor-secure-cpanel-on-linux-server","status":"publish","type":"post","link":"https:\/\/www.youstable.com\/blog\/how-to-monitor-secure-cpanel-on-linux-server","title":{"rendered":"How to Monitor &amp; Secure cPanel on Linux Server &#8211; Easy Guide"},"content":{"rendered":"\n<p><strong>To monitor and secure cPanel on a Linux server<\/strong>, enable WHM service monitoring and alerts, review system and cPanel logs, keep OS\/cPanel updated, enforce 2FA and cPHulk, deploy CSF\/LFD firewall, activate ModSecurity with OWASP rules, scan with ImunifyAV or ClamAV, harden SSH, and maintain tested offsite backups.<\/p>\n\n\n\n<p>Managing web servers is rewarding but unforgiving. In this guide, you\u2019ll learn how to monitor and secure cPanel on a Linux server using built-in WHM tools and industry-standard hardening steps. I\u2019ll share practical steps, commands, and settings that I use when hardening client servers, so you can avoid noisy alerts, downtime, and breaches.<\/p>\n\n\n\n<p>Primary keyword focus: how to monitor and secure cPanel on Linux server. Secondary keywords included naturally: cPanel security best practices, cPanel hardening, <a href=\"https:\/\/www.youstable.com\/blog\/install-csf-firewall-on-linux\/\">CSF firewall<\/a> for cPanel, ModSecurity, ClamAV, cPHulk, WHM Security Center, and Imunify360.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"quick-checklist-what-good-looks-like\"><strong>Quick Checklist: What \u201cGood\u201d Looks Like<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>WHM Service Monitoring and Contact Manager alerts enabled<\/li>\n\n\n\n<li>OS\/cPanel fully updated with automatic updates<\/li>\n\n\n\n<li>SSH hardened (keys only, root login disabled, non-default port)<\/li>\n\n\n\n<li>2FA for WHM\/cPanel; cPHulk brute force protection tuned<\/li>\n\n\n\n<li>CSF\/LFD firewall installed and in production mode<\/li>\n\n\n\n<li>ModSecurity with OWASP CRS enabled via EasyApache 4<\/li>\n\n\n\n<li>ImunifyAV\/Imunify360 or ClamAV scanning scheduled<\/li>\n\n\n\n<li>Backups verified and stored offsite (S3\/remote)<\/li>\n\n\n\n<li>Regular log reviews and audit tools (logwatch, rkhunter) running<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"use-whms-built-in-monitoring-first\"><strong>Use WHM\u2019s Built\u2011in Monitoring First<\/strong><\/h2>\n\n\n\n<p>Before adding new tools, turn on cPanel\/WHM\u2019s native monitoring. It\u2019s lightweight, accurate, and supported.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"enable-service-monitoring-chkservd\"><strong>Enable Service Monitoring (chkservd)<\/strong><\/h3>\n\n\n\n<p>WHM &gt; Service Configuration &gt; Service Manager lets you monitor core daemons (Exim, Dovecot, Apache, MySQL\/MariaDB, DNS, cPanel services, etc.). Check \u201cMonitor\u201d and \u201cEnable\u201d for essential services. chkservd will auto-restart failed services and send alerts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"configure-contact-manager-notifications\"><strong>Configure Contact Manager Notifications<\/strong><\/h3>\n\n\n\n<p>WHM &gt; Contact Manager defines who receives alerts and their importance level. Add an email (and a Slack\/Webhook via cPanel\u2019s Notification Providers if available) and enable notifications for service failures, IP blocks, disk quotas, <a href=\"https:\/\/www.youstable.com\/blog\/fix-lets-encrypt-on-linux\/\">SSL renewals<\/a>, and update failures.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"know-your-logs-and-check-them-fast\"><strong>Know Your Logs (and Check Them Fast)<\/strong><\/h3>\n\n\n\n<p>When something breaks, logs tell the truth. Common paths:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>cPanel: \/usr\/local\/cpanel\/logs\/access_log, error_log, login_log, cphulkd.log<\/li>\n\n\n\n<li>Apache: \/usr\/local\/apache\/logs\/access_log, error_log<\/li>\n\n\n\n<li>Mail (Exim): \/var\/log\/exim_mainlog, exim_rejectlog<\/li>\n\n\n\n<li>Auth\/SSH: \/var\/log\/secure (RHEL\/Alma\/Rocky), \/var\/log\/auth.log (Debian\/Ubuntu)<\/li>\n\n\n\n<li>System: \/var\/log\/messages<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># Follow key logs in real time\ntail -f \/usr\/local\/cpanel\/logs\/login_log \/var\/log\/secure \/usr\/local\/apache\/logs\/error_log\n\n# Search for failed logins\ngrep -i \"failed\" \/var\/log\/secure | tail -n 50\n\n# Check Exim queue summary\nexim -bpr | exiqsum<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"add-graphs-with-munin\"><strong>Add Graphs with Munin<\/strong><\/h3>\n\n\n\n<p>In WHM &gt; Plugins &gt; Munin Node, enable graphs for CPU, RAM, load, I\/O, MySQL, and Apache. Graphs help correlate spikes with log events and pinpoint bottlenecks before outages.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"patch-and-update-everything\"><strong>Patch and Update Everything<\/strong><\/h2>\n\n\n\n<p>Unpatched <a href=\"https:\/\/www.youstable.com\/blog\/fix-clamav-on-linux\/\">servers are the top cause<\/a> of compromises. Keep the OS, kernel, cPanel, PHP, and web stack current.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"os-and-kernel-updates\"><strong>OS and Kernel Updates<\/strong><\/h3>\n\n\n\n<p>Use your distro\u2019s <a href=\"https:\/\/www.youstable.com\/blog\/what-is-yum-on-linux-server\/\">package manager<\/a>. On AlmaLinux\/Rocky\/CentOS:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo dnf update -y\n# or on older systems:\nsudo yum update -y<\/code><\/pre>\n\n\n\n<p>Consider KernelCare (commercial) for rebootless kernel updates\u2014popular on production cPanel servers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"auto-update-cpanel-and-easyapache-4\"><strong>Auto\u2011Update cPanel &amp; EasyApache 4<\/strong><\/h3>\n\n\n\n<p>WHM &gt; Server Configuration &gt; Update Preferences: set cPanel Stable and enable automatic updates. In EasyApache 4, keep Apache, PHP, and extensions updated. Review PHP versions per account and set minimum supported versions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"harden-access-ssh-root-and-whm\"><strong>Harden Access: SSH, Root, and WHM<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"secure-ssh-keys-only-no-root-password\"><strong>Secure SSH (Keys Only, No Root Password)<\/strong><\/h3>\n\n\n\n<p>Create a non\u2011root sudo user, use SSH keys, change the default port, and disable direct root login. Test a second session before restarting SSH.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Create a sudo user and copy your public key\nadduser adminuser\nusermod -aG wheel adminuser\nmkdir -p \/home\/adminuser\/.ssh &amp;&amp; chmod 700 \/home\/adminuser\/.ssh\necho \"ssh-ed25519 AAAA... yourkey\" &gt; \/home\/adminuser\/.ssh\/authorized_keys\nchmod 600 \/home\/adminuser\/.ssh\/authorized_keys\nchown -R adminuser:adminuser \/home\/adminuser\/.ssh\n\n# Harden sshd_config (common options)\nsudo cp \/etc\/ssh\/sshd_config \/etc\/ssh\/sshd_config.bak\nsudo sed -i 's\/^#Port 22\/Port 2222\/' \/etc\/ssh\/sshd_config\nsudo sed -i 's\/^#PermitRootLogin yes\/PermitRootLogin no\/' \/etc\/ssh\/sshd_config\nsudo sed -i 's\/^#PasswordAuthentication yes\/PasswordAuthentication no\/' \/etc\/ssh\/sshd_config\n\n# Restart SSH (use your new port)\nsudo systemctl restart sshd<\/code><\/pre>\n\n\n\n<p>Remember to open the new SSH port in your firewall (see CSF section).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"enforce-2fa-for-whm-and-cpanel\"><strong>Enforce 2FA for WHM &amp; cPanel<\/strong><\/h3>\n\n\n\n<p>Enable WHM &gt; Security Center &gt; Two\u2011Factor Authentication. Require it for all resellers and privileged users. 2FA blocks most credential stuffing attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"enable-and-tune-cphulk-brute-force-protection\"><strong>Enable and Tune cPHulk Brute Force Protection<\/strong><\/h3>\n\n\n\n<p>WHM &gt; Security Center &gt; cPHulk defends SSH, WHM, and cPanel against brute force. Suggested starting point (adjust to your environment):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Max failures by account: 10 within 900 seconds<\/li>\n\n\n\n<li>Max failures by IP: 20 within 3600 seconds<\/li>\n\n\n\n<li>Block duration: 3600\u20137200 seconds<\/li>\n\n\n\n<li>Use whitelist for your office\/static IPs<\/li>\n<\/ul>\n\n\n\n<p>Monitor \/usr\/local\/cpanel\/logs\/cphulkd.log and WHM &gt; cPHulk History Reports for false positives.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"network-and-firewall-controls-csf-plus-lfd\"><strong>Network and Firewall Controls (CSF + LFD)<\/strong><\/h2>\n\n\n\n<p>CSF (ConfigServer Security &amp; Firewall) with LFD (Login Failure Daemon) is the de\u2011facto firewall on cPanel servers and integrates with WHM.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Install CSF on RHEL\/Alma\/Rocky-based systems\ncd \/usr\/src\ncurl -O https:\/\/download.configserver.com\/csf.tgz\ntar -xzf csf.tgz &amp;&amp; cd csf\nsh install.sh\nperl \/usr\/local\/csf\/bin\/csftest.pl   # ensure required iptables modules exist\n\n# Put CSF into production mode\nsed -i 's\/^TESTING = \"1\"\/TESTING = \"0\"\/' \/etc\/csf\/csf.conf\nsed -i 's\/^RESTRICT_SYSLOG = .*\/RESTRICT_SYSLOG = \"3\"\/' \/etc\/csf\/csf.conf\n\n# Allow essential cPanel ports (example; adjust as needed)\ncsf --add &amp;&amp; csf -r\nsystemctl enable --now csf lfd<\/code><\/pre>\n\n\n\n<p>Open only required ports (e.g., 22\/2222, 80, 443, 2083, 2087, 2096, mail\/DNS ports). Use LFD alerts to catch login abuse. Country blocking can cause false positives; prefer IP reputation lists or rate limits.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"web-application-and-malware-defense\"><strong>Web Application and Malware Defense<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"enable-modsecurity-with-owasp-crs\"><strong>Enable ModSecurity with OWASP CRS<\/strong><\/h3>\n\n\n\n<p>In WHM &gt; EasyApache 4 &gt; ModSecurity, enable the module and install vendor rules (OWASP Core Rule Set). Start in Detection Only to review logs, then switch to \u201cOn\u201d and exclude rules per site if needed to prevent false positives.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"install-malware-scanning-imunifyav-imunify360-or-clamav\"><strong>Install Malware Scanning (ImunifyAV\/Imunify360 or ClamAV)<\/strong><\/h3>\n\n\n\n<p>ImunifyAV (free) or Imunify360 (paid) integrates with cPanel for proactive malware defense. Alternatively, ClamAV provides on\u2011demand scans.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># <a href=\"https:\/\/www.youstable.com\/blog\/install-clamav-on-linux\/\">ClamAV installation<\/a> on Alma\/Rocky\nsudo dnf install -y epel-release clamav clamav-update\nsudo freshclam\nsudo clamscan -r \/home --infected --remove=no<\/code><\/pre>\n\n\n\n<p>Schedule scans during off\u2011peak hours and alert on detections. For PHP-based sites, enable open_basedir and use PHP\u2011FPM per\u2011user pools to reduce cross\u2011account impact.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"file-permissions-and-php-hardening\"><strong>File Permissions and PHP Hardening<\/strong><\/h3>\n\n\n\n<p>Use sensible defaults: files 640\/644, directories 750\/755, and avoid 777. In WHM &gt; MultiPHP INI Editor, disable dangerous functions only if applications allow (e.g., exec, system). Keep each account\u2019s software up to date (WordPress themes\/plugins, etc.).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"account-isolation-and-email-abuse-controls\"><strong>Account Isolation and Email Abuse Controls<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"cloudlinux-and-cagefs-optional-highly-recommended\"><strong>CloudLinux and CageFS (Optional, Highly Recommended)<\/strong><\/h3>\n\n\n\n<p>On shared\/agency servers, CloudLinux LVE, CageFS, and PHP Selector isolate accounts and cap abusive processes. This dramatically improves stability and security posture across tenants.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"outbound-email-controls\"><strong>Outbound Email Controls<\/strong><\/h3>\n\n\n\n<p>In WHM &gt; Tweak Settings: restrict outgoing SMTP to prevent bypassing Exim; set per\u2011domain\/per\u2011hour rate limits. Enable SPF, DKIM, and DMARC to improve deliverability and reduce spoofing. Watch the Exim queue and block compromised accounts quickly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"backups-recovery-and-testing\"><strong>Backups, Recovery, and Testing<\/strong><\/h2>\n\n\n\n<p>Security without recovery is incomplete. If ransomware or human error strikes, backups are your lifeline.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"configure-offsite-backups\"><strong>Configure Offsite Backups<\/strong><\/h3>\n\n\n\n<p>WHM &gt; Backup Configuration: enable compressed or incremental backups, choose retention, and ship to S3, Backblaze B2, or another remote destination. Exclude heavy cache directories to save space.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"test-restores-regularly\"><strong>Test Restores Regularly<\/strong><\/h3>\n\n\n\n<p>Use WHM &gt; Restore a Full Backup\/cpmove File to test on a staging server. Verify permissions, SSL, cron, and email. A backup you haven\u2019t tested is a backup you can\u2019t trust.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"continuous-monitoring-with-audit-tools\"><strong>Continuous Monitoring with Audit Tools<\/strong><\/h2>\n\n\n\n<p>Augment WHM monitoring with lightweight auditors to catch anomalies early.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"auditd-track-sensitive-changes\"><strong>auditd: Track Sensitive Changes<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo dnf install -y audit\nsudo systemctl enable --now auditd\n\n# Example: watch \/etc\/passwd and \/etc\/shadow changes\necho \"-w \/etc\/passwd -p wa -k identity\" | sudo tee -a \/etc\/audit\/rules.d\/hardening.rules\necho \"-w \/etc\/shadow -p wa -k identity\" | sudo tee -a \/etc\/audit\/rules.d\/hardening.rules\nsudo augenrules --load\nsudo ausearch -k identity --format text<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"rkhunter-and-chkrootkit\"><strong>rkhunter and chkrootkit<\/strong><\/h3>\n\n\n\n<p>Run rootkit scanners weekly and alert on findings.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo dnf install -y rkhunter chkrootkit\nsudo rkhunter --update\nsudo rkhunter --check --sk\nsudo chkrootkit<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"logwatch-human-readable-daily-reports\"><strong>Logwatch: Human\u2011Readable Daily Reports<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo dnf install -y logwatch\nsudo logwatch --detail Med --mailto you@example.com --service all --range yesterday<\/code><\/pre>\n\n\n\n<p>These reports summarize auth attempts, service errors, and anomalies in a single email you\u2019ll actually read.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"weekly-and-monthly-security-routines\"><strong>Weekly and Monthly Security Routines<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Weekly: review WHM \u201cSecurity Advisor\u201d recommendations; clear orphaned accounts, rotate API tokens; check ModSecurity hits and tune exclusions.<\/li>\n\n\n\n<li>Weekly: scan \/home with ImunifyAV\/ClamAV; review Exim queue for spam bursts.<\/li>\n\n\n\n<li>Monthly: verify backups restore; update PHP versions; audit SSH keys and reseller access.<\/li>\n\n\n\n<li>Quarterly: penetration test key sites, rotate all privileged passwords, and review firewall rules.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"common-mistakes-to-avoid\"><strong>Common Mistakes to Avoid<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Leaving CSF in TESTING mode: switch TESTING = \u201c0\u201d.<\/li>\n\n\n\n<li>Relying on passwords for SSH: use keys and disable PasswordAuthentication.<\/li>\n\n\n\n<li>Not enabling 2FA: credential leaks happen; 2FA blocks most attacks.<\/li>\n\n\n\n<li>No offsite backups: local backups won\u2019t help after disk failure or ransomware.<\/li>\n\n\n\n<li>Ignoring alerts: tune false positives; don\u2019t disable critical notifications.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"faqs\"><strong>FAQ&#8217;s<\/strong><\/h2>\n\n\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1765953919380\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"1-what-is-the-best-firewall-for-cpanel\">1. <strong>What is the best firewall for cPanel?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p><a href=\"https:\/\/www.youstable.com\/blog\/configure-csf-firewall-on-linux\/\">CSF with LFD is the most widely used firewall<\/a> stack for cPanel\/WHM thanks to its WHM integration, sane defaults, and robust alerting. It complements cPHulk (for brute force) and works well with ModSecurity at the application layer.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765953929656\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"2-how-do-i-monitor-cpanel-services-automatically\">2. <strong>How do I monitor cPanel services automatically?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Enable WHM &gt; Service Manager to monitor and auto\u2011restart services via chkservd, configure alert recipients in WHM &gt; Contact Manager, and add Munin for graphs. LFD alerts from CSF also report repeated login failures and suspicious activity.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765953947997\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"3-should-i-use-cphulk-or-fail2ban-on-cpanel\">3. <strong>Should I use cPHulk or Fail2ban on cPanel?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Use cPHulk on cPanel servers. It\u2019s built\u2011in, supported, and protects SSH\/WHM\/cPanel logins. Mixing Fail2ban with cPHulk can cause conflicts and is rarely necessary when cPHulk and CSF\/LFD are properly configured.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765953959209\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"4-what-malware-scanner-works-best-with-cpanel\">4. <strong>What malware scanner works best with cPanel?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>ImunifyAV (free) and Imunify360 (paid) offer deep integration, real\u2011time protection, and automated cleanup. ClamAV is a solid free alternative for scheduled scans but is less proactive than Imunify360.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765953969321\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"5-how-often-should-i-run-server-updates-and-backups\">5. <strong>How often should I run server updates and backups?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Enable automatic cPanel updates and apply OS updates weekly (or sooner for critical patches). Run daily incremental backups with at least 7\u201314 days of retention, replicate offsite, and test a restore monthly.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>To monitor and secure cPanel on a Linux server, enable WHM service monitoring and alerts, review system and cPanel logs, [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":16663,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[350],"tags":[],"class_list":["post-14340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"acf":[],"featured_image_src":"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/How-to-Monitor-Secure-cPanel-on-Linux-Server.jpg","author_info":{"display_name":"Prahlad Prajapati","author_link":"https:\/\/www.youstable.com\/blog\/author\/prahladblog"},"_links":{"self":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/14340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/comments?post=14340"}],"version-history":[{"count":4,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/14340\/revisions"}],"predecessor-version":[{"id":16665,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/14340\/revisions\/16665"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media\/16663"}],"wp:attachment":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media?parent=14340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/categories?post=14340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/tags?post=14340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}