๐Ÿ› ๏ธ Temporarily Disable Imunify360 on AlmaLinux 9 / CloudLinux 9

๐Ÿ” Purpose

This guide helps you temporarily disable Imunify360 to isolate or verify whether itโ€™s the source of issues such as blocked requests, firewall rules, or ModSecurity behavior. It applies to servers running AlmaLinux 9 or CloudLinux 9 with cPanel/WHM or Plesk.


โœ… Environment

  • OS: AlmaLinux 9 / CloudLinux 9
  • Control Panel: WHM/cPanel or Plesk
  • Security Software: Imunify360 + ModSecurity

๐Ÿ”ง Step-by-Step Instructions

1. Stop the Imunify360 Services

SSH into the server as root, then run:

systemctl stop imunify360
systemctl stop imunify360-agent

This stops the main Imunify360 services temporarily without uninstalling the software.


2. Disable ModSecurity Vendor (Optional but Recommended)

๐Ÿ”น On cPanel/WHM

Go to:
WHM ยป Security Center ยป ModSecurityยฎ Vendors
Remove the Imunify360 ruleset (often named imunify360-full-apache).

Alternatively, run this from the terminal:

/scripts/modsec_vendor remove imunify360-full-apache

Adjust the vendor name if using LiteSpeed or a custom set.

๐Ÿ”น On Plesk

Use the GUI:
Plesk ยป Tools & Settings ยป Web Application Firewall (ModSecurity)
Disable custom or Imunify360 ruleset.

Or via CLI:

plesk sbin modsecurity_ctl --disable-all-rules --ruleset custom

3. Perform Your Testing

Now that Imunify360 and ModSecurity (ruleset) are disabled, proceed with:

  • Application debugging
  • File or network testing
  • Connectivity troubleshooting
  • Checking for blocked requests

4. Re-Enable Imunify360 After Testing

When you’re done, re-enable Imunify360 and its rulesets:

systemctl start imunify360
imunify360-agent install-vendors

This ensures the rules and protection are re-applied correctly.


๐Ÿ“š Useful References


โš ๏ธ Notes

  • This does not uninstall or permanently disable Imunify360.
  • Ensure you re-enable Imunify360 to maintain server security.
  • If you use LiteSpeed, also ensure ModSecurity integration is properly restored after testing.
Scroll to Top