Knowledge Base

Getting Started With Site Protection

This guide will explain you how to protect your site and keep your customers safe from hackers and online threats. The Site Protection application was designed to scan, identify, report and fix most of the common security issues that may threaten your site.

Table of Contents

  1. Setting up Site Protection
  2. Scan Your Site
  3. Monitor Your Site

Setting up Site Protection

When you apply for Site Protection, your site will be automatically set up for scanning and monitoring. All settings for Site Protection can be controlled from within your Account Manager. Click the link below for instructions on how to set up Site Protection.

Scan Your Site

Site Protection has highly effective scanners that identify infections, potentially harmful signatures on websites and code anomalies that may not be shown by regular virus scanners. Click the link below for instructions on how to scan for malware.

Monitor Your Site

With Site protection, your site is automatically set up to be monitored daily. Site Protection will perform Malware , Whois , SSL , DNS , and Blacklisting scans and report any infections when they occur.

Explained here are the different types of monitoring:

Malware Monitoring

This identifies obfuscated javascript injections, cross site scripting, website defacements, hidden & malicious iframes, PHP mailers, phishing attempts, malicious redirects, backdoors, anomalies, drive-by-downloads, social engineering attacks, black hat SEO spam, pharma hacks, conditional redirects and mobile redirects. To perform this malware monitoring, we use two types scans: Remote Scans and Server Level Scans.

Server Level scans are included in our monitoring and cleanup plans. The main difference between them is that the remote scanner checks what visitors see when they access your site and the server scanner checks what visitors can't see, scanning every single file on the site. This may uncover serious risks in your site or malware exploits that are not immediately visible.

Whois monitoring

Whois is an internet directory that provides information on who owns a domain. It contains information about the Registrant (the person who owns the domain), the Registrar (the entity that registered the domain), dates, nameservers and other important information. With this monitoring option, you will be notified if the information regarding your domain changes.

SSL Certification

If you are using Secure Sockets Layer (SSL), a secure protocol to transmit over HTTP, you need an SSL certificate. The SSL certificate is returned to a visitor of your site upon receiving an HTTPS request. This certificate often contains your site information and, in some instances, company information. With this monitoring option, you will be notified if this certificate changes unexpectedly.


DNS is a protocol used by all computers to intelligently communicate with each other. It turns a website's name (example.com, for instance) into an internet protocol (IP) address like The name provided by DNS is what we use as humans to read the site name, the IP is what computers use to communicate.

This monitoring option will monitor the IP address and associated DNS information of your domain for any changes. It's rare for it to change, but if it does we will notify you right away.


There are a number of blacklisting authorities that monitor for malware, SPAM, and phishing attempts. Our blacklisting option uses their APIs and insures you'll that know when your site is hacked and blacklisted by: Sucuri, Google, Norton, AVG, Phish Tank and McAfee SiteAdvisor.

Other Site Protection related options

There are many options and configuration settings related to your Site Protection, learn more from the links below.

Did you find this article helpful?

* Your feedback is too short