cPGuard is a server-level security suite that’s included with every GoZen Host cPanel plan - shared hosting, WordPress hosting, and managed VPS. See our full security overview. You don’t need to install it, configure it, or pay extra for it. It runs automatically in the background.

What cPGuard Does

Think of it as a security layer between the internet and your website. It handles threats that most WordPress security plugins can’t touch because it operates at the server level, not the application level.

FeatureWhat It Does
Malware ScannerScans files on upload and modification. Quarantines known malicious files
Web Application Firewall (WAF)Blocks SQL injection, cross-site scripting (XSS), remote file inclusion
Brute Force ProtectionRate-limits failed login attempts on cPanel, WordPress wp-login, and other app login pages
Outgoing Spam DetectionMonitors outgoing email and catches compromised accounts before they damage server IP reputation
CMS Vulnerability ScannerChecks installed CMS applications (WordPress, Joomla, Drupal) for known vulnerabilities
IP Reputation MonitoringWatches server IP against blacklists and alerts if something gets listed

Checking Your Security Status

In cPanel

  1. Log into cPanel
  2. Look for the cPGuard section (usually under Security or as its own section)
  3. Click cPGuard to open the dashboard

The dashboard shows:

  • Overview - summary of recent scans, blocked attacks, and current status
  • Malware scan results - list of files scanned, any detections, and quarantine status
  • WAF logs - recent blocked requests with details (IP, attack type, URL targeted)
  • Brute force logs - login attempts blocked per service (cPanel, WordPress, FTP)

Understanding Scan Results

When cPGuard finds something, it either quarantines the file or flags it for review:

  • Quarantined - the file has been moved to a safe location and can no longer execute. Your site may show errors if it was an active file.
  • Flagged - the file is suspicious but not confirmed malicious. Review it manually.

Managing cPGuard

Restoring a Quarantined File

If cPGuard quarantined a file that you know is safe:

  1. Open the cPGuard dashboard in cPanel
  2. Go to MalwareQuarantine
  3. Find the file in the list
  4. Click Restore to put it back in its original location

Only do this if you’re sure the file is legitimate. If you’re not sure, open a support ticket and our team will review it.

Whitelisting Files or Paths

If you have a legitimate application that keeps getting flagged:

  1. In the cPGuard dashboard, go to Settings or Whitelist
  2. Add the specific file path (e.g., /home/username/public_html/wp-content/plugins/some-plugin/file.php)
  3. Save

Whitelist specific files, not entire directories. Whitelisting /public_html/ would disable protection for your whole site.

cPGuard vs WordPress Security Plugins

You might wonder if you still need Wordfence or Solid Security. Here’s how they compare:

FeaturecPGuardWordPress Security Plugin
Operates atServer levelApplication level (PHP)
ProtectsAll sites on your accountOnly the WordPress install it’s on
WAFBlocks before request hits PHPBlocks during PHP execution
Malware scanningAll file types, server-wideWordPress files only
Performance impactNone (runs outside your resource limits)Uses your PHP processes and memory
Brute force protectioncPanel, WordPress, FTP, emailWordPress login only
Requires configurationNoYes

The short answer: cPGuard handles server-level protection. A WordPress plugin adds application-level features like login URL changes, file integrity monitoring, and two-factor auth. They complement each other.

If you want the simplest setup: rely on cPGuard for scanning and WAF, and add two-factor authentication to your WordPress admin. That covers the vast majority of attacks.

Common Questions

“Is cPGuard really free?”

Yes. It’s included with every GoZen Host cPanel plan. No add-on purchase, no trial period, no feature gating.

“Can I disable it?”

The server-level WAF and malware scanner run automatically and can’t be disabled per-account (they protect the entire server). The cPanel dashboard gives you visibility into what it’s doing and the ability to manage quarantined files.

“Does it slow down my site?”

No. cPGuard operates at the server level, outside your CloudLinux resource limits. It doesn’t consume your CPU or memory allocation.

“I got hacked despite cPGuard. What happened?”

cPGuard blocks known threats. If an attacker used a zero-day vulnerability or gained access through a leaked password, cPGuard may not catch the initial entry. But it will detect the malware they drop and quarantine it. If you suspect a compromise, contact support immediately.

What to Do Next

Last updated 07 Apr 2026, 00:00 +0200. history

Was this page helpful?