Knowledge base

1000 FAQs, 500 tutorials and instructional videos. Here, there are only solutions!

Cancel an automatic vulnerability scan correction

This guide explains how to apply or cancel a patch, quarantine, or block performed by the vulnerability detection tool, the free and complementary antivirus protection that automatically protects Web Hostings against malware and security vulnerabilities.

 

Preamble

  • The tool automatically corrects detected vulnerabilities within 7 days without any action on your part.
  • It is strongly discouraged to cancel a patch or quarantine unless you are sure of what you are doing.

 

Apply or cancel a correction

To do this:

  1. Click here to access the management of your hosting on the Infomaniak Manager (need help?).
  2. Click directly on the name assigned to the hosting concerned:
  3. Click on Security in the left sidebar.
  4. Click on Vulnerability scan in the left sidebar:
  5. If nothing specific is displayed, first click on the button to View history.
  6. If there is an event history, click on the action menu to the right of the vulnerability concerned in the displayed table.
  7. Click on Cancel correction.
  8. In some cases, other actions are possible:
    1. Apply the patch: immediately corrects the vulnerability.
    2. Cancel the patch: cancels the correction and restores the original vulnerable file (not recommended).
    3. Delete the file: permanently removes the malware from your hosting (may affect the functioning of your site).
    4. Quarantine: isolates the vulnerable file and allows you to restore it if needed (may affect the functioning of your site).
    5. Cancel quarantine: restores the isolated file to its original location (not recommended).
    6. Add an exception: allows you to indicate to the tool that the vulnerable file is safe; it will no longer be analyzed.
    7. Delete an exception : deletes the Allowed status of the file; the latter will be reanalyzed.

 

Details of the different statuses

  1. VULNERABLE : a vulnerability has been detected in a file; the path column indicates the location of the file.
  2. RESOLVED : the vulnerability has been fixed by the tool.
  3. ALLOWED : the vulnerable file has been manually allowed; the latter will no longer be analyzed by the tool.
  4. RESOLVED : a manual correction outside the tool has been applied to the file (CMS update, source code modification, manual file deletion, etc.).
  5. FIX REVERTED : the tool's fix has been manually reverted; it is possible to reapply the patch.

Has this FAQ been helpful?