• If you are still using CentOS 7.9, it's time to convert to Alma 8 with the free centos2alma tool by Plesk or Plesk Migrator. Please let us know your experiences or concerns in this thread:
    CentOS2Alma discussion
  • Inviting everyone to the UX test of a new security feature in the WP Toolkit
    For WordPress site owners, threats posed by hackers are ever-present. Because of this, we are developing a new security feature for the WP Toolkit. If the topic of WordPress website security is relevant to you, we would be grateful if you could share your experience and help us test the usability of this feature. We invite you to join us for a 1-hour online session via Google Meet. Select a convenient meeting time with our friendly UX staff here.

Resolved block / strict access to sensitive files

itexpertnow

New Pleskian
Server operating system version
Ubuntu 22.04
Plesk version and microupdate number
18.0.53
Hi,

how to block access to sensitive files i nthis location?
/var/www/vhosts/domain.com/httpdocs/wp-content/updraft/

I tried this nginx config but it didn't work:
Home > Domains > Apache & nginx Settings > Additional nginx directives

#Deny access to wp-content folders for suspicious files
location ~* "^(?:/)wp-content/updraft/.*\.(zip|gz|tar|bzip2|7z)" { deny all; }


however it worked when I edited this file directly: /etc/nginx/plesk.conf.d/vhosts/domain.com.conf but I don't want to do that due to this notice:
#ATTENTION!
#
#DO NOT MODIFY THIS FILE BECAUSE IT WAS GENERATED AUTOMATICALLY,
#SO ALL YOUR CHANGES WILL BE LOST THE NEXT TIME THE FILE IS GENERATED.
 
Thank you! that worked after I remove the extensions I wanted to block from this list:
1687797393284.png
 

Attachments

  • 1687797344032.png
    1687797344032.png
    62.8 KB · Views: 1
Back
Top