{"id":34315,"date":"2020-10-01T12:27:49","date_gmt":"2020-10-01T17:27:49","guid":{"rendered":"https:\/\/www.rosehosting.com\/blog\/?p=34315"},"modified":"2022-06-03T03:32:39","modified_gmt":"2022-06-03T08:32:39","slug":"improving-server-security-firewall-tools-rules-etc","status":"publish","type":"post","link":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/","title":{"rendered":"Improving Server Security (Firewall, Tools, Rules, and Tips)"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default\"><img decoding=\"async\" width=\"742\" height=\"372\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg\" alt=\"Improving Server Security Firewall Tools Rules and Tips\" class=\"wp-image-34389\" srcset=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg 742w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips-300x150.jpg 300w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips-150x75.jpg 150w\" sizes=\"(max-width: 742px) 100vw, 742px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignright size-large\"><img decoding=\"async\" width=\"82\" height=\"115\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improve-server-security-tips-and-tricks-prevent-attacks.jpg\" alt=\"Linux Security\" class=\"wp-image-34390\"\/><\/figure><\/div>\n\n\n\n<p>Securing your server from any kind of attacks is a key part of any web hosting provider or system administrator. You should implement a strong security policy to minimize risks and keep your data safe. There are several tips and tricks to improve your server&#8217;s security and protect it from malicious attempts to enter.<\/p>\n\n\n\n<p>In this tutorial, we will show you some useful tips and tricks to secure your server.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Improving server security isn&#8217;t complicated &#8211; just following some general guidelines and being smart with your server&#8217;s usage is enough to protect against typical attacks. Here are some guidelines that we recommend following to improve your server&#8217;s security.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69c4b4a965237\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69c4b4a965237\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#Use-Public-Key-Authentication-For-SSH\" >Use Public Key Authentication For SSH<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#Secure-Your-Website-with-HTTPS\" >Secure Your Website with HTTPS<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#Update-Your-Server-Regularly\" >Update Your Server Regularly<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#Disable-Unnecessary-Services\" >Disable Unnecessary Services<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#Establish-a-Secure-Password-Policy\" >Establish a Secure Password Policy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#Install-and-Configure-a-Firewall\" >Install and Configure a Firewall<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#Install-Malware-Scanning-Software\" >Install Malware Scanning Software<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#Avoid-Using-Telnet-FTP-and-Rlogin-Services\" >Avoid Using Telnet, FTP, and Rlogin Services<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-use-public-key-authentication-for-ssh\"><span class=\"ez-toc-section\" id=\"Use-Public-Key-Authentication-For-SSH\"><\/span>Use Public Key Authentication For SSH<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>SSH is the most widely used protocol used to connect to a remote server. Most people use SSH to connect and manage their remote servers through the use of a password. By default, the SSH service uses port 22 &#8211; everyone knows this. Hackers use automated password cracker tools to attempt to crack your password over and over until they&#8217;re successful. <\/p>\n\n\n\n<p>So instead of using a password, it is better to use SSH key-based authentication to connect to a remote server. Each user has a public key and a private key. The private key is kept by the user. The public key is kept on the server. The SSH key has more bits than a password and is not cracked easily by any tools. You should keep the private key secure &#8211; don&#8217;t share it with anyone. By doing this, you get the added bonus of not having to enter a password every time you connect to your remote server using SSH.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-secure-your-website-with-https\"><span class=\"ez-toc-section\" id=\"Secure-Your-Website-with-HTTPS\"><\/span>Secure Your Website with HTTPS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>HTTPS is the secure version of HTTP. It serves as an internet communication protocol for securing the communication between two systems, e.g. the browser and the web server. Any information going to and from your server is automatically encrypted when SSL is present on the web server. <\/p>\n\n\n\n<p>This prevents hackers from sniffing out your visitors\u2019 sensitive information. HTTPS uses the SSL\/TLS protocol for encryption and authentication. It simply encrypts HTTP requests and responses so that attackers will only see random characters instead of credit card details. <\/p>\n\n\n\n<p>You can make your server use SSL for its web server by either purchasing a premium SSL certificate (such as Komodo) and configuring your web server to use it, or use Let&#8217;s Encrypt to apply a free SSL certificate. Their certbot command line tool can help you get SSL working in minutes. Consider checking out our guide on <a href=\"https:\/\/www.rosehosting.com\/blog\/how-to-install-lets-encrypt-on-ubuntu-20-04-with-apache\/\">how to install a Let&#8217;s Encrypt SSL certificate<\/a> if you want to add one to your web server. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-update-your-server-regularly\"><span class=\"ez-toc-section\" id=\"Update-Your-Server-Regularly\"><\/span>Update Your Server Regularly<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It is always a good idea to update your server packages regularly to keep your operating system safe from hackers. You should also update your content management system, such as WordPress, Odoo, and Magento, as well as their themes, plugins, modules, and extensions regularly. Outdated software or plugins can contain security vulnerabilities that are known to malicious users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-disable-unnecessary-services\"><span class=\"ez-toc-section\" id=\"Disable-Unnecessary-Services\"><\/span>Disable Unnecessary Services<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It is also recommended to disable and remove any unnecessary services that aren\u2019t essential to your server&#8217;s functionality. By default, most Linux-based operating systems come with a tool for managing services. You can use it to disable and remove the services.<\/p>\n\n\n\n<p>If your website is built with WordPress, then you should remove any unwanted plugins and themes to protect it from attacks. The less information you provide about your underlying infrastructure, the smaller the footprint becomes to base attacks on you with.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-establish-a-secure-password-policy\"><span class=\"ez-toc-section\" id=\"Establish-a-Secure-Password-Policy\"><\/span>Establish a Secure Password Policy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>You should set a password policy that must be followed by all members on the server. Some of the recommended password policies are listed below:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Enable two-factor authentication.<\/li><li>Use passwords with at least 10 characters.<\/li><li>Do not use dictionary words or personal information in passwords.<\/li><li>Use complex passwords that include numbers, symbols, and punctuation.<\/li><li>Do not store passwords on laptops, smartphones, or tablets.<\/li><li>Use a secure password generator to generate the password.<\/li><li>Setting an expiration date for a password.<\/li><li>Do not use the same password for multiple accounts.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-install-and-configure-a-firewall\"><span class=\"ez-toc-section\" id=\"Install-and-Configure-a-Firewall\"><\/span>Install and Configure a Firewall<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>You should set up a Firewall to prevent any unauthorized connections to\/from your server. Almost all Linux distributions either come with firewall software built in, or they can easily be added after the fact. You could use one of the built in utilities (such as UFW on Ubuntu), or you can install a firewall.<\/p>\n\n\n\n<p>CSF, also known as ConfigServer Security &amp; Firewall, is a free and web-based firewall tool that can be used to protect your server from different kinds of attacks. It checks for login authentication failures on your SSH server, Mail server, FTP server, cPanel, DirectAdmin, and Webmin and can block them immediately. CSF is also able to detect many attacks, such as port scan, SYN floods, and login brute force attacks on many services.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-install-malware-scanning-software\"><span class=\"ez-toc-section\" id=\"Install-Malware-Scanning-Software\"><\/span>Install Malware Scanning Software<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It is also recommended to scan your server for any malicious software and remove them immediately before it breaching your server security. While malware is rare on Linux distributions, it&#8217;s not nonexistent. ClamAV is one of the best malware scanning tools for Linux. It scans your server for malicious software or files and removes them automatically.<\/p>\n\n\n\n<p>It has an ability to detect viruses, trojans, malware and other threats. It supports multiple file-formats including, documents, executables or archives.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-avoid-using-telnet-ftp-and-rlogin-services\"><span class=\"ez-toc-section\" id=\"Avoid-Using-Telnet-FTP-and-Rlogin-Services\"><\/span>Avoid Using Telnet, FTP, and Rlogin Services<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Anyone on the same network can breach FTP, telnet, or rsh commands, usernames and passwords by using a packet sniffer. So you should always avoid using those services and use more secure services instead. You should use OpenSSH, FTPS, and SFTP to avoid compromising your Linux server&#8217;s security.<\/p>\n\n\n\n<p>These are just some precautions that you can take, but following all of these should keep you safe from all of the common security vulnerabilities.<\/p>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignleft size-large\"><img decoding=\"async\" width=\"82\" height=\"115\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/managed-server-security-by-experts-maintenance-optimization-for-linux.jpg\" alt=\"Managed VPS\" class=\"wp-image-34391\"\/><\/figure><\/div>\n\n\n\n<p>Keeping your server safe is easy if you&#8217;re one of our <a href=\"https:\/\/www.rosehosting.com\/linux-vps-hosting\/\">Managed Linux VPS Hosting<\/a> users. Our expert admin team will harden your server&#8217;s security to keep you safe from external threats. They can also maintain your server to keep everything running smoothly, or they can handle any requests that you have. <\/p>\n\n\n\n<p>If this guide gave you some insight on how you can better secure your server, please consider sharing this post on social media through our share buttons. If you have any additional tips, we&#8217;d love to hear them. Feel free to write them in our comments section. Thank you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securing your server from any kind of attacks is a key part of any web hosting provider or system administrator. &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Improving Server Security (Firewall, Tools, Rules, and Tips)\" class=\"read-more button\" href=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#more-34315\" aria-label=\"Read more about Improving Server Security (Firewall, Tools, Rules, and Tips)\">Read More<\/a><\/p>\n","protected":false},"author":4,"featured_media":34389,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1703,21],"tags":[22,65,70],"class_list":["post-34315","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tips-and-tricks","tag-linux-security","tag-security","tag-server","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Improving Server Security (Firewall, Tools, Rules, and Tips) | RoseHosting<\/title>\n<meta name=\"description\" content=\"Improving your server security is important in keeping your clients and your data safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Improving Server Security (Firewall, Tools, Rules, and Tips)\" \/>\n<meta property=\"og:description\" content=\"Improving Server Security (Firewall, Tools, Rules, and Tips) | RoseHosting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/\" \/>\n<meta property=\"og:site_name\" content=\"RoseHosting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RoseHosting\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/rosehosting.helpdesk\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-01T17:27:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-03T08:32:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"742\" \/>\n\t<meta property=\"og:image:height\" content=\"372\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rosehosting\" \/>\n<meta name=\"twitter:site\" content=\"@rosehosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/\"},\"author\":{\"name\":\"Jeff Wilson\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713\"},\"headline\":\"Improving Server Security (Firewall, Tools, Rules, and Tips)\",\"datePublished\":\"2020-10-01T17:27:49+00:00\",\"dateModified\":\"2022-06-03T08:32:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/\"},\"wordCount\":1101,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg\",\"keywords\":[\"linux security\",\"security\",\"server\"],\"articleSection\":[\"Security\",\"Tips and Tricks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/\",\"name\":\"Improving Server Security (Firewall, Tools, Rules, and Tips) | RoseHosting\",\"isPartOf\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg\",\"datePublished\":\"2020-10-01T17:27:49+00:00\",\"dateModified\":\"2022-06-03T08:32:39+00:00\",\"description\":\"Improving your server security is important in keeping your clients and your data safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#primaryimage\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg\",\"contentUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg\",\"width\":742,\"height\":372,\"caption\":\"Improving Server Security Firewall Tools Rules and Tips\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rosehosting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Improving Server Security (Firewall, Tools, Rules, and Tips)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#website\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/\",\"name\":\"RoseHosting.com\",\"description\":\"Premium Linux Tutorials Since 2001\",\"publisher\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rosehosting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#organization\",\"name\":\"RoseHosting\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png\",\"contentUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png\",\"width\":192,\"height\":192,\"caption\":\"RoseHosting\"},\"image\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RoseHosting\",\"https:\/\/x.com\/rosehosting\",\"https:\/\/www.linkedin.com\/in\/rosehosting\/\"],\"description\":\"RoseHosting is a leading Linux hosting provider, serving thousands of clients world-wide since 2001.\",\"email\":\"info@rosehosting.com\",\"telephone\":\"(314) 275-0414\",\"legalName\":\"Rose Web Services LLC\",\"foundingDate\":\"2001-04-02\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713\",\"name\":\"Jeff Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"caption\":\"Jeff Wilson\"},\"description\":\"An experienced Linux veteran with many years of experience. Helping other Linux admins with frequent Linux and business-related blog posts on the RoseHosting blog. Techie by choice. Loving nature and travel. Happily married and father of two lovely children.\",\"sameAs\":[\"https:\/\/www.rosehosting.com\",\"https:\/\/www.facebook.com\/rosehosting.helpdesk\"],\"url\":\"https:\/\/www.rosehosting.com\/blog\/author\/jwilson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Improving Server Security (Firewall, Tools, Rules, and Tips) | RoseHosting","description":"Improving your server security is important in keeping your clients and your data safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/","og_locale":"en_US","og_type":"article","og_title":"Improving Server Security (Firewall, Tools, Rules, and Tips)","og_description":"Improving Server Security (Firewall, Tools, Rules, and Tips) | RoseHosting","og_url":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/","og_site_name":"RoseHosting","article_publisher":"https:\/\/www.facebook.com\/RoseHosting","article_author":"https:\/\/www.facebook.com\/rosehosting.helpdesk","article_published_time":"2020-10-01T17:27:49+00:00","article_modified_time":"2022-06-03T08:32:39+00:00","og_image":[{"width":742,"height":372,"url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg","type":"image\/jpeg"}],"author":"Jeff Wilson","twitter_card":"summary_large_image","twitter_creator":"@rosehosting","twitter_site":"@rosehosting","twitter_misc":{"Written by":"Jeff Wilson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#article","isPartOf":{"@id":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/"},"author":{"name":"Jeff Wilson","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713"},"headline":"Improving Server Security (Firewall, Tools, Rules, and Tips)","datePublished":"2020-10-01T17:27:49+00:00","dateModified":"2022-06-03T08:32:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/"},"wordCount":1101,"commentCount":0,"publisher":{"@id":"https:\/\/www.rosehosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg","keywords":["linux security","security","server"],"articleSection":["Security","Tips and Tricks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/","url":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/","name":"Improving Server Security (Firewall, Tools, Rules, and Tips) | RoseHosting","isPartOf":{"@id":"https:\/\/www.rosehosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#primaryimage"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg","datePublished":"2020-10-01T17:27:49+00:00","dateModified":"2022-06-03T08:32:39+00:00","description":"Improving your server security is important in keeping your clients and your data safe.","breadcrumb":{"@id":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#primaryimage","url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg","contentUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2020\/09\/improving-server-security-firewall-tools-rules-and-tips.jpg","width":742,"height":372,"caption":"Improving Server Security Firewall Tools Rules and Tips"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rosehosting.com\/blog\/improving-server-security-firewall-tools-rules-etc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rosehosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Improving Server Security (Firewall, Tools, Rules, and Tips)"}]},{"@type":"WebSite","@id":"https:\/\/www.rosehosting.com\/blog\/#website","url":"https:\/\/www.rosehosting.com\/blog\/","name":"RoseHosting.com","description":"Premium Linux Tutorials Since 2001","publisher":{"@id":"https:\/\/www.rosehosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rosehosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rosehosting.com\/blog\/#organization","name":"RoseHosting","url":"https:\/\/www.rosehosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png","contentUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png","width":192,"height":192,"caption":"RoseHosting"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RoseHosting","https:\/\/x.com\/rosehosting","https:\/\/www.linkedin.com\/in\/rosehosting\/"],"description":"RoseHosting is a leading Linux hosting provider, serving thousands of clients world-wide since 2001.","email":"info@rosehosting.com","telephone":"(314) 275-0414","legalName":"Rose Web Services LLC","foundingDate":"2001-04-02","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713","name":"Jeff Wilson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","caption":"Jeff Wilson"},"description":"An experienced Linux veteran with many years of experience. Helping other Linux admins with frequent Linux and business-related blog posts on the RoseHosting blog. Techie by choice. Loving nature and travel. Happily married and father of two lovely children.","sameAs":["https:\/\/www.rosehosting.com","https:\/\/www.facebook.com\/rosehosting.helpdesk"],"url":"https:\/\/www.rosehosting.com\/blog\/author\/jwilson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/34315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/comments?post=34315"}],"version-history":[{"count":8,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/34315\/revisions"}],"predecessor-version":[{"id":34406,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/34315\/revisions\/34406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/media\/34389"}],"wp:attachment":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/media?parent=34315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/categories?post=34315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/tags?post=34315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}