Sun

File scanning

  1. Home
  2. Knowledge Base
  3. Hosting
  4. File scanning

All Hostens Shared and Reseller hosting servers are periodically scanned by the ImunifyAV antivirus program running on our servers. If any suspicious files are found, we notify you by contacting you by your contact email on the Hostens account. You will be presented with a list of malicious files.

What to do if such an email is received?

When you receive such an email, first review the list of files. It would be best to evaluate whether these are familiar files and whether you have seen them before.

If the files have not been seen before, they are likely created by malicious code on your site. You will then need to access the server and delete the specified files.

If the files are familiar, you need to review them manually. Part of the potentially malicious code might be inserted into a healthy file used to run the site.

You can connect to the server and view the files:

  1. after connecting to the server via cPanel and viewing the ‘File Manager’ section;
  2. connecting to the server via FTP.

If programmers created the site, be sure to contact them and provide a list of files. To distinguish malicious code from good requires some expertise and programming knowledge.

False-positive cases

Sometimes there are ‘False-positive’ cases where healthy files are treated as harmful. In such cases, please contact us, and we will add the file to the ‘Ignore list’ so that such a file is not scanned in the future.

How to ensure the security of the site?

Whatever content management system you use, there are several ways to make your site more secure. This is:

  • updating the content management system;
  • updating plugins;
  • using only reliable and validated plugins;
  • correct file permissions.

Here are just a few basic tips, but other recommendations can be tailored to your specific content management system. For example, on WordPress sites, you can turn off the ability to adjust file editing through the Admin section. It is also possible to disable the execution of PHP files in certain directories. More information on how to protect your WordPress website can be found here.

Here you will find information on how you can protect your PrestaShop website.

On this page, you will find tips to help protect your Joomla site.

Was this article helpful?

Related Articles