Get Web Hosting

Web Hosting

Leech Protection is a valuable feature in cPanel that helps secure restricted areas of your website by preventing users from publicly sharing their passwords. This feature automatically redirects compromised accounts to a specified URL and can suspend them if necessary. This tutorial will guide you through the steps to enable and configure Leech Protection in cPanel.

Understanding Leech Protection

Leech Protection is designed to prevent users from giving out their passwords to restricted areas of your website, whether intentionally or accidentally. When enabled, this feature monitors user accounts and takes action if it detects multiple failed login attempts or if the same password is used multiple times from different IP addresses. By redirecting compromised accounts to a specific URL and suspending them, Leech Protection helps maintain the security of your website.

Benefits of Using Leech Protection

  • Prevents unauthorized access to restricted areas of your website.
  • Reduces the risk of compromised accounts being used for malicious activities.
  • Enhances overall security by automatically redirecting and suspending compromised accounts.
  • Customizable options allow you to specify the action taken when an account is compromised.

How to Enable and Configure Leech Protection in cPanel

Follow these steps to enable and configure Leech Protection for your website in cPanel:

Step 1: Log in to cPanel

First, log in to your cPanel account using your credentials. Once logged in, navigate to the Security section and click on Leech Protection.

Step 2: Select the Folder to Protect

In the Leech Protection interface, you will see a list of directories on your website:

  • Click on the folder’s icon or name to navigate through your file system.
  • To select a folder to protect, click Edit next to the folder you want to secure.

Step 3: Enable Leech Protection

Once you have selected the folder you want to protect:

  • Check the box to enable Leech Protection for the selected directory.
  • Specify the maximum number of logins per user within a 2-hour period to prevent leeching.

Step 4: Configure Redirection and Suspension Options

Next, you can configure what happens if an account is compromised:

  • In the Redirection URL field, enter the URL where you want to redirect compromised accounts.
  • If you want to suspend compromised accounts automatically, check the box for Suspend Compromised Accounts.

Step 5: Save Your Changes

After configuring your settings, click the Enable button to activate Leech Protection for the selected directory.

Managing and Updating Leech Protection

If you need to update your Leech Protection settings or disable the feature:

  • Return to the Leech Protection interface in cPanel.
  • Select the directory you want to manage, and make the necessary changes to the settings.
  • Click Update to save your changes.

Best Practices for Using Leech Protection

To maximize the effectiveness of Leech Protection, follow these best practices:

  • Regularly monitor your site's login activity to detect potential leeching attempts early.
  • Set a reasonable limit for the number of logins per user within a specific period to balance security and usability.
  • Keep the Redirection URL updated to ensure compromised users are directed to a relevant page.

Troubleshooting Common Issues with Leech Protection

If you encounter issues with Leech Protection, consider the following solutions:

Compromised Accounts Not Redirecting

Ensure that the Redirection URL is correctly entered and accessible. Check for any typos or broken links.

Legitimate Users Being Blocked

If legitimate users are being blocked, consider increasing the login limit or adjusting the settings to allow more flexibility.

By following this guide, you can effectively use Leech Protection in cPanel to secure your website's restricted areas and protect against unauthorized access. Regular monitoring and management of Leech Protection settings will help maintain your site's security and user trust.

Was this answer helpful? 0 Users Found This Useful (0 Votes)

Search the Knowledge Base

Share