• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Search results

  1. J

    BEAST (Browser Exploit Against SSL/TLS) Vulnerability on port 8443

    Hello, I'm running Plesk 10.3/ Centos 5.8 and one of the sites hosted on this server is being scanned for PCI compliance by Trustwave. I've followed all the PCI compliance stuff in the guide but it's still getting the threat below on port 8443. BEAST (Browser Exploit Against SSL/TLS)...
  2. J

    CVE addressed in Plesk?

    Is there anyway to get a list of CVE addressed in the Plesk RPMs? rpm -q --changelog psa-package-name doesn't return anything.
  3. J

    Setting up chroot enviroment with scponlyc.

    Hello, I'm trying to give my clients a chroot scponly shell for sftp access, the only way I found to do this in plesk currently isn't very clean and was wondering if there was a better way. The way I'm currently doing it. 1) Adding scponlyc to /etc/shells. 2) Setting the user's shell...
Back
Top