You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/ids_integration/README.md
+46Lines changed: 46 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,6 +39,52 @@ The main setting that defines how Imunify360 works along with CSF is [3-rd Party
39
39
When 3-rd Party Integration mode is **enabled** Imunify360 uses <spanclass="notranslate">Login Failure Daemon (LFD)</span> as source for security events instead of <spanclass="notranslate">[OSSEC](https://www.ossec.net)</span>. To get events from <spanclass="notranslate">Login Failure Daemon (LFD)</span>, Imunify360 automatically replaces <spanclass="notranslate">`BLOCK_REPORT`</span> variable to the file path of Imunify360 script.
40
40
When some IP address is blocked by <spanclass="notranslate">LFD, Imunify360</span> adds this IP address to its <spanclass="notranslate">Graylist</span> and then **removes it from <spanclass="notranslate">CSF deny/tempdeny lists</span>**. The latter is done to unblock IP by passing Anti-Bot Challenge and to store all automatically blocked IP addresses in a single place. Thus, no IP is automatically added to <spanclass="notranslate">CSF deny/tempdeny lists</span>.
41
41
42
+
43
+
#### Migration from CSF to Imunify360
44
+
45
+
The [migration tool](https://blog.imunify360.com/configserver-eol) is included in the latest version of Imunify360. Here’s how to use it in four simple steps.
46
+
47
+
**Step 1: Verify the Tool's Presence**
48
+
49
+
First, ensure your server has the latest version of Imunify360 by checking for the migration tool's directory:
If this directory is missing, your server has not yet updated. You can either force a manual update or wait a couple of days for the regular update cycle to complete.
55
+
56
+
**Step 2: Run the Migration Script**
57
+
58
+
Once you've confirmed the tool is present, navigate to the directory and execute the script.
59
+
60
+
```
61
+
cd /opt/imunify360/venv/share/imunify360/scripts/migrate_csf
62
+
```
63
+
```
64
+
./main.py # executable, no python prefix needed
65
+
```
66
+
67
+
**Step 3: Verify the Migration**
68
+
69
+
The tool will display color coded logs in your console as it runs. For a complete record of all actions taken, you can review the detailed log file located at:
70
+
```
71
+
/var/log/imunify360/migrate_csf.log
72
+
```
73
+
74
+
**Step 4: Disable and Remove CSF**
75
+
76
+
Once you have successfully migrated your configuration, you must disable CSF to allow Imunify360's firewall to take over your protection.
77
+
78
+
```
79
+
csf -x
80
+
```
81
+
```
82
+
systemctl disable csf
83
+
```
84
+
```
85
+
systemctl disable lfd
86
+
```
87
+
42
88
### CXS Integration
43
89
44
90
<spanclass="notranslate">[ConfigServer eXploit Scanner](https://configserver.com/cp/cxs.html) (CXS)</span> has different types of malware scanning, which affects <spanclass="notranslate">Imunify360 Malware Scanner</span> functionality. Below we describe how to make <spanclass="notranslate">Imunify360 Malware Scanner</span> work properly. These functionalities can be configured at <spanclass="notranslate">[Malware Scanner settings](/dashboard/#settings)</span> page, but <spanclass="notranslate">CXS</span> itself must be configured as follows:
0 commit comments