Announcement

Collapse
No announcement yet.

How can we submit information to improve Imunify360?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • How can we submit information to improve Imunify360?

    We use BlogVault for backing up websites and for managing sites when clients hire us to do so. On one of the sites we recently tranferred from Siteground to our hosting server, BlogVault caught an obfuscated runtime injection that Imunify360 missed:

    Click image for larger version

Name:	pu1uMCZ7RbsuLNuB8SN4Us8ze1phDjYB_e8z13gQxP4tPSP6FzVlbB68lvGBmuoZLSvyVN166HuNkgNsB4hVpCxMiZLk5laE48Y1Xu9NfOSSSfxKp92XIoDY61k_PDT64y6KMvBgP0wnKWsTW21Y8ps.png
Views:	102
Size:	54.6 KB
ID:	39682

    How can we submit information like this to the Imunify360 team to help improve their detection algorithms?

  • #2
    Hi,

    You can submit a file from the command-line interface using the following command:

    HTML Code:
    imunify360-agent submit false-negative <full path to the file>‚Äč
    You can refer to the following guidelines:

    Comment


    • #3
      The command imunify360-agent is not found. This is with ImunifyAV (Premium) installed on Plesk. Is there another way to submit a false negative?

      Comment


      • #4
        You can submit a file to our team via the ticket system here. Our engineers will check it and forward it to our malware analysts for further processing. Thanks!

        Comment

        Working...
        X