{"id":10229,"date":"2025-07-10T10:11:04","date_gmt":"2025-07-10T13:11:04","guid":{"rendered":"https:\/\/www.blog.lineasdns.com\/malware-protection-powered-by-imunify-cloudav\/"},"modified":"2025-07-10T10:11:04","modified_gmt":"2025-07-10T13:11:04","slug":"malware-protection-powered-by-imunify-cloudav","status":"publish","type":"post","link":"https:\/\/www.blog.lineasdns.com\/en\/malware-protection-powered-by-imunify-cloudav\/","title":{"rendered":"Malware Protection Powered by Imunify CloudAV"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"hs_cos_wrapper_post_body\">\n<p><\/p>\n<p style=\"font-size: 16px;\"><span style=\"color: #444444;\">Did you know that ImunifyAV, ImunifyAV+, and Imunify360 come with powerful cloud-based malware detection?<\/span><\/p>\n<p style=\"text-align: justify; line-height: 1.75;\"><span style=\"color: #444444;\">The option allows suspicious files from your server to be automatically uploaded to Imunify\u2019s secure cloud for in-depth analysis. Both automated systems and security experts review these files to quickly discover new malware variants across the entire Imunify network and produce cleanup solutions.<\/span><\/p>\n<p style=\"text-align: justify; line-height: 1.75;\"><span style=\"color: #444444;\">Overall, CloudAV helps to expand malware coverage, especially for cases where the classic signature approach isn\u2019t effective enough. CloudAV can extract heavily packed malware that requires significant CPU\/RAM resources, is capable of doing sandboxing, accessing &amp; analyzing external resources used by hackers to store malware, and even detect backdoors in vulnerabilities hidden to look as unintentional.<\/span><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2><span style=\"font-size: 16px; color: #444444;\">Why Keep It Enabled?<\/span><\/h2>\n<p><span style=\"color: #444444;\">By keeping this feature enabled, you:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"color: #444444;\">Help uncover emerging malware faster<\/span><\/li>\n<li aria-level=\"1\"><span style=\"color: #444444;\">Receive detection updates sooner, reducing the time malware stays hidden on your server<\/span><\/li>\n<li aria-level=\"1\"><span style=\"color: #444444;\">Eliminate threats before they can cause harm<\/span><\/li>\n<li aria-level=\"1\"><span style=\"color: #444444;\">Benefit from global threat intelligence<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"color: #444444;\">At the same time, we care about your privacy. All data is encrypted, securely stored, and handled under strict security protocols. Files containing personal data are deleted as quickly as possible. In the case of concerns, any file containing personal or sensitive information can be <a target=\"_blank\" href=\"https:\/\/cloudlinux.zendesk.com\/hc\/en-us\/requests\/new\" style=\"color: #444444; text-decoration: underline;\">requested<\/a> for removal, with the prevention of any further upload attempts.<\/span><\/p>\n<p>\u00a0<\/p>\n<h3><span style=\"font-size: 16px; color: #444444;\">How to Control The Feature?<\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"color: #444444;\">The feature can be managed via the UI: Imunify360 \u2192 Settings \u2192 Malware<\/span><br \/><span style=\"color: #444444;\">In the General section, locate the option \u201cAutomatically send suspicious and malicious files for analysis\u201d and ensure it is enabled (the checkbox should be ticked). However, disabling it may reduce malware detection speed and weaken your server\u2019s protection.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #444444;\">It is also possible to control it over CLI. By default, this feature is enabled.<\/span><\/p>\n<p><span style=\"color: #444444;\">Command to enable:<\/span><\/p>\n<p style=\"font-size: 16px;\"><span style=\"color: #444444;\">Command to disable (Not Recommended):<\/span><\/p>\n<p style=\"font-size: 16px;\">\u00a0<\/p>\n<\/div>\n<p><br \/>\n<br \/>\n<center><\/p>\n<h2>\ud83d\udcbc Buy Licenses at the Best Price in Argentina! \ud83d\ude80<\/h2>\n<p><\/center> <\/p>\n<p>At <a href=\"https:\/\/www.fulltech.com.ar\" target=\"_blank\" rel=\"noopener\"><strong>Full Tech Solutions<\/strong><\/a>, we offer <strong>Affordable Software Licenses<\/strong> that are 100% genuine, perfect for entrepreneurs, businesses, and developers looking for reliable tools without overspending.<\/p>\n<p>\ud83d\udcb0 <strong>Affordable Prices:<\/strong> Save on licenses without sacrificing quality.<br \/>\n\u2705 <strong>100% Genuine:<\/strong> Authenticity guaranteed with official support.<br \/>\n\u2699\ufe0f <strong>Wide Range of Software:<\/strong> Find everything your business needs.<br \/>\n\ud83d\udcde <strong>24\/7 Assistance:<\/strong> Expert support every step of the installation.<\/p>\n<p>Don\u2019t overpay for your licenses. <strong><a href=\"https:\/\/www.fulltech.com.ar\" target=\"_blank\" rel=\"noopener\">Choose Full Tech Solutions<\/a><\/strong> and get the best software licenses in Argentina.<\/p>\n<p>\ud83c\udf10 Optimize your business with the best digital tools!<\/p>\n<p>\n<a href=\"https:\/\/blog.imunify360.com\/malware-protection-powered-by-imunify-cloudav?rand=1376\">Source Link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Did you know that ImunifyAV, ImunifyAV+, and Imunify360 come with powerful cloud-based malware detection? The option allows suspicious&hellip;","protected":false},"author":1,"featured_media":10230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":"","footnotes":""},"categories":[29],"tags":[40],"class_list":{"0":"post-10229","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-imunify360","8":"tag-advice","9":"cs-entry"},"_links":{"self":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts\/10229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/comments?post=10229"}],"version-history":[{"count":0,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts\/10229\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/media\/10230"}],"wp:attachment":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/media?parent=10229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/categories?post=10229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/tags?post=10229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}