How to Install Centrora Security in Joomla

What is Centrora Security on Joomla ?

Centrora Security is a new plugin that modified from OSE Firewall Security. A Joomla Firewall Security to protect your Joomla Sites from attacks and hacking.

The built-in Malware and Security Scanner helps you identify any security risks, malicious codes, spam, virus, SQL injection, and security vulnerabilities.

Why Centrora Security for Joomla ?

AntiSpam: utilizing blacklisting IPs from Stop Forum Spam.
AntiVirus: virus scanning that scans through your site for malware and variants that are known security threats, heuristics of backdoors, trojans, suspicious code and other security issues.

IP Mangement: manage ip by allow, block and track IP that access to your site

Security Check: DoS Attacks where automated bots constituting flooding attacks to your website.
Report security threats to defined owner or security analysts.

This article will explain how to install, configure, and use the basic options in the Centrora Security plugin.

Install the Centrora Security plugin,

Step 1.) Login to your Joomla Dashboard.

Login to your Joomla Dashboard as admin Or the user which is having admin privileges.

Step 2.)  Navigate to Extensions >> Manage >> Install.

There are 4 Options to install

1.) Either you can download the Plugin on your local & upload it to the server

2.) You can install it from the Web.

3.) Install the Plugin from the uploaded folder on your account.

4.) or you can install it from the URL.

Step 3.) Search for security in the plugin search.

If you are going to install the Plugin from the Joomla dashboard itself search for the Plugin. Here we are going to install it from the web.

Step 4.) Installing the Plugin.

Choose the Plugin called Centrora Security & click on Install, It will ask you to confirm the installation.

you can see the Extension Name & the installation source.

Step 5.) Plugin Activation.

After installing the Plugin we need to activate it. Go to Extensions >> Plugins ( here you can able to see the installed plugins) >> Search for Centrora. Click the Plugin & change the status to Enabled.

From here you can change who can access the Plugin. here i am going to use as special user. once you made the necessary changes click save & close.

Step 6.) Installing Database Tables.

After the activation, please go to the component Centrora –> Installation, and click the “Install Database Tables” button to install the database. If you want to uninstall the component thoroughly, you can also use the “Uninstall” button there to erase all the data.

Step 7.) Audit My Website.

Now you can audit the site to get the basic security information and suggestions in the component Centrora –> Audit My Website.

Step 8.) You can do following in FREE version.

  • MD5 hash scanner
  • Modified file scanner
  • Vulnerabilities scanner
  • File permissions scanner
  • Brute force protection
  • Two-factor authentication
  • Block TRADE/DELETE/TRACK HTTP method
  • Check malicious user agent
  • Check basic SQL injection
  • Backup
  • and much more….

That’s all, we have installed & configured Centrora Security Plugin.

 

 

 

 

 

 

 

tech@squarebrothers.com'About Tutor

Speak Your Mind

Tell us what you're thinking...
and oh, if you want a pic to show with your comment, go get a gravatar!

You must be logged in to post a comment.