-
Getting Started
-
App Portal
-
Features
-
cPGuard Lite
-
Command line
-
User plugin
- Articles coming soon
-
FAQs
- Reissue license
- Notify users on outdated CMS
- Restore a file
- Blacklist a file
- Whitelist files
- Start manual files scan
- Exclude domain from bot attack and captcha check
- SRBL - Whitelist domain or sender IP Address
- Enable Ioncube in cPanel PHP
- Grant server access to support
- How to fix the agent error in App Portal
- Whitelist a WAF rule ID
- Run a hook script after file detection
- Whitelist a user in the scanner engine
- What is inotify watch and how will it affects server performance
- Migrate license to a new server or IP Address
- Tagging Servers
- How to install cPGuard Standalone
- How do we calculate the number of users on a server
- Add additional directories to automatic scan list
- cPGuard WAF required settings and depencies
- So many cpguard-job-logs::fetchlogs processes running
- Install ModSecurity with Nginx on CentOS/RockyLinux/AlmaLinux
- How to install latest ModSecurity 2.9.7 with Apache - Install ModSecurity 2.9.7 with Apache
- How to whitelist an IP address
- How to report a file?
- Block PHP script upload using cPGuard WAF
- cPGuard License abuse is detected
- Webuzo Security using cPGuard - Webuzo Antivirus - Webuzo Antimalware
- Block countries from accessing your websites and server
- Import and export cPGuard configuration
- Customising/Branding the email Templates (user emails)
- Show all articles ( 17 ) Collapse Articles
-
General
- Migrating cPGuard V3 to V4
- Uninstalling cPGuard
- Overriding WordPress cron job
- Install ModSecurity with Nginx on Debian/Ubuntu
- How do we calculate the number of users on a server
- How to install latest ModSecurity 2.9.7 with Apache - Install ModSecurity 2.9.7 with Apache
- Bulk Action - Run an action against multiple servers
- How to whitelist an IP address
- How to report a file?
- Block PHP script upload using cPGuard WAF
- cPGuard License abuse is detected
- Request body excluding files is bigger than the maximum - Request body no files data length is larger than the configured limit
- Block countries from accessing your websites and server
- Import and export cPGuard configuration
- IPDB Error ::(nf_tables): table `filter' is incompatible, use 'nft' tool
-
Change Logs
-
Standalone
- cPGuard Standalone Configuration
- How to modify standalone configuration file cpguard.ini
- How to install cPGuard Standalone
- How to secure the websites on a Webmin/Virtualmin server using cPGuard
- Install ModSecurity with Nginx on Debian/Ubuntu
- Secure websites on Control Web Panel / CWP Server
- Installing cPGuard on Enhance panel
- How to install latest ModSecurity 2.9.7 with Apache - Install ModSecurity 2.9.7 with Apache
- Secure websites on Interworx Control Panel
-
Standalone Panels
-
WAF
- cPGuard WAF required settings and depencies
- Install ModSecurity with Nginx on Debian/Ubuntu
- Whitelist a WAF rule ID
- WAF Integration
- Web Application Firewall
- Install ModSecurity with Nginx on CentOS/RockyLinux/AlmaLinux
- How to install latest ModSecurity 2.9.7 with Apache - Install ModSecurity 2.9.7 with Apache
- Block PHP script upload using cPGuard WAF
- Request body excluding files is bigger than the maximum - Request body no files data length is larger than the configured limit
- What is Proxy IP Check in WAF
- Debug WAF blocking
-
cPGuard X
- cPGuard X Installation
- How to switch webserver
- How to Create a New Website from the Control Panel
- How to Migrate a Website to cPGuardX
- Managing PHP Settings in the Control Panel
- Service Management and Monitoring in Control Panel
- Managing and Scheduling Website Backups
- Adding Alias or Addon Domains to Your Website
- Enforcing HTTPS for Your Website
- Nginx Configuration Management via GUI
- Global PHP Settings via Panel Settings (Server-Wide)
- Introducing Lynis: Enhanced Server Security Auditing
- SSH Authentication & GitHub Integration
- Managing SSL Certificates
- Enabling PHP Extensions in the GUI
- Guide to Installing Additional PHP Modules Using PECL
- Show all articles ( 1 ) Collapse Articles
How to report a file?
0 out of 5 stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |
You have options to report files for our review in case
- you suspect that the reported file(s) by the scanner as a virus is a legitimate file
- if cPGuard scanner engine does not identify a virus file
In both of the above cases, we have to access the file contents and analyze the code to make necessary modifications in the scanner engine. You may use the following options to report the files to us
1. Report a false positive
You can report a file as a false positive from the App Portal or using CLI.
From the App Portal, go to the scanner logs, locate the file to report, click on the file details icon on the right side, and click on the “Report False Positive” button in the pop-up menu on the right side of the page. Please refer the given image below.

You can also report the false positive using CLI with the following command. Here make sure that the <file path> is the exact location of the file on your server ( in quarantine or the actual path in the user account )
cpgcli report --false-positive <file path>
2. Report a virus file
Like any other scanner engine, the cPGuard scanner also works based on how it is trained with the virus samples. If cPGuard scanner is not reporting a virus file after the files scan, you may report the particular virus file to us so that we can check, analyze and update the scanner engine to detect similar files in the future.
You can use the following command to report a virus file for our review
cpgcli report --virus <file path>
Any such sample reporting, feedback, and any similar inputs will help us to improve cPGuard and offer better protection in each updates.
0 out of 5 stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |