You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/command_line_interface/README.md
+19-6Lines changed: 19 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -952,7 +952,7 @@ imunify360-agent ip-list local [command] <value> [--option]
952
952
|-|-|
953
953
|<spanclass="notranslate">`-h`, `--help`</span>|Show this help message and exit|
954
954
955
-
`value` is an item to manipulate with. It can be IP itself or a country code (find necessary country codes here in [CIDR notation](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing#IPv4_CIDR_blocks) in the column ISO ALPHA-2 CODE).
955
+
`value` is an item to manipulate with. It must be a valid IP address.
956
956
957
957
### List
958
958
@@ -972,8 +972,8 @@ imunify360-agent ip-list local list [--options] <value>
972
972
|<spanclass="notranslate">`--by-comment BY_COMMENT`</span>|Filters output by comment|
973
973
|<spanclass="notranslate">`--limit LIMIT`</span>|Limits the output with specified number of incidents|
974
974
|<spanclass="notranslate">`--offset OFFSET`</span>|Offset for pagination|
975
-
|<spanclass="notranslate">`--order-by [ORDER_BY ...]`</span>|List of fields to sort the results by|
976
-
|<spanclass="notranslate">`--by-type {ip,country}`</span>|Filters output by item tipe [country|ip]|
975
+
|<spanclass="notranslate">`--order-by [ORDER_BY ...]`</span>|List of fields to sort the results by. Each field must be followed by "+" for descending order or "-" for ascending order (e.g., --order-by ip+ or --order-by purpose-)|
976
+
|<spanclass="notranslate">`--by-type {ip,country}`</span>|Filters output by item tipe [country\|ip]|
977
977
|<spanclass="notranslate">`--json`</span>|Returns data in JSON format|
<spanclass="notranslate">`action`</span> is the second positional argument for <spanclass="notranslate">`ignore`</span> and can be one of the following:
@@ -1304,13 +1305,24 @@ where PATHS are the absolute paths to files or folders divided by a whitespace.
1304
1305
|<spanclass="notranslate">`cleanup`</span>|clean up infected ITEMS for a USER|
1305
1306
|<spanclass="notranslate">`cleanup-all`</span>|clean up all files that have been detected as infected for all users|
1306
1307
|<spanclass="notranslate">`restore-original`</span>|restore the original (malicious/infected) file to its original location|
1308
+
|<spanclass="notranslate">`diff`</span>|get difference between infected and cleaned file|
|<spanclass="notranslate">`move-to-ignore`</span>|move a <spanclass="notranslate">Malicious List</span> entry to the (malware) <spanclass="notranslate">Ignore List</span>|
1309
1311
|<spanclass="notranslate">`remove-from-list`</span>|remove malicious/infected files from the <spanclass="notranslate">Malicious List</span>|
1310
1312
|<spanclass="notranslate">`restore-from-backup`</span>|restore a clean version of infected file from backup|
1311
1313
|<spanclass="notranslate">`restore-from-quarantine`</span>|<b>deprecated in ver. 5.9.</b> Restore a quarantined file. The file will be automatically re-scanned|
1312
1314
1313
1315
1316
+
The optional arguments for <spanclass="notranslate">`malicious diff`</span> are:
1317
+
1318
+
|||
1319
+
|-|-|
1320
+
|<spanclass="notranslate">`--id ID`</span>|specific file by ID. IDs be obtained via `malware malicious list`|
1321
+
|<spanclass="notranslate">`--user USER`</span>|admins can filter results by user. Users can only see their own files|
1322
+
|<spanclass="notranslate">`--json`</span>|return data in JSON format. |
<spanclass="notranslate">`action`</span> is the second positional argument for <spanclass="notranslate">`on-demand`</span> and can be one of the following:
1315
1327
1316
1328
|||
@@ -1331,7 +1343,8 @@ The optional arguments for <span class="notranslate">`on-demand start`</span> an
Copy file name to clipboardExpand all lines: docs/dashboard/README.md
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -333,6 +333,19 @@ You will see a notification if an IP has been added successfully.
333
333
334
334

335
335
336
+
Starting with imunify360-firewall-8.2.0, manual addition can be disabled. To disable it, set <spanclass="notranslate">`PERMISSIONS.allow_local_ip_management = false`</span> configuration option from a command line:
Copy file name to clipboardExpand all lines: docs/features/README.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,6 +37,10 @@ imunify360-agent reload-lists
37
37
38
38
Or restart the agent.
39
39
40
+
:::tip Note
41
+
Starting with imunify360-firewall-8.2.0 all IP lists are applied automatically. Manual reloading is no longer required.
42
+
:::
43
+
40
44
:::warning Warning
41
45
Specifying IPs in those files will not prevent Imunify from adding the same IPs to dynamic lists (like Gray list), but all White lists always have the priority over Black lists when it comes to actual filtering of requests/packages.
42
46
:::
@@ -371,7 +375,7 @@ Version Imunify360 6.0 or later supports the use of MDS in UI.
Copy file name to clipboardExpand all lines: docs/ids_integration/README.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,12 @@
2
2
3
3
[[toc]]
4
4
5
-
## IDS Integration
5
+
## IDS Integration
6
+
7
+
:::tip Note
8
+
Please be aware that *firewalld* is not fully compatible with Imunify360.
9
+
While it is possible to use Imunify360 and firewalld on the same server, you may need to duplicate certain rules or permissions and manually implement changes to configure both Imunify360 and firewalld. Therefore, we recommend utilizing either the Imunify360 firewall exclusively or Imunify360 in conjunction with CSF.
10
+
:::
6
11
7
12
### CSF Integration
8
13
@@ -569,7 +574,7 @@ This section includes specific settings for each hosting panel that Imunify360 s
569
574
570
575
* Web application firewall
571
576
* Malware scanning of files uploaded using web
572
-
:::
577
+
:::
573
578
574
579
<span class="notranslate">Mod_security</span> installation process is specific for different panels:
575
580
@@ -595,7 +600,7 @@ If <span class="notranslate">mod_security</span> is installed before Imunify360,
595
600
596
601
::: tip Note
597
602
If Imunify360 installer detects any existing ruleset, it installs only minimal set of its rules. So, you need to disable all third-party rulesets prior to Imunify360 installation to get the full ruleset installed automatically.
You can find instructions on how to apply configuration changes from CLI [here](/cli/#how-to-apply-changes-from-cli) and configuration options can be taken from the `/etc/sysconfig/imunify360/imunify360.config` file.
150
+
You can find instructions on how to apply configuration changes from CLI [here](./#how-to-apply-changes-from-cli) and configuration options can be taken from the `/etc/sysconfig/imunify360/imunify360.config` file.
0 commit comments