{"id":630,"date":"2021-07-27T16:22:18","date_gmt":"2021-07-27T16:22:18","guid":{"rendered":"http:\/\/www.webhostingchennai.co.in\/blog\/?p=630"},"modified":"2021-09-21T12:16:33","modified_gmt":"2021-09-21T06:46:33","slug":"securing-your-cpanel-server-webhosting-chennai","status":"publish","type":"post","link":"https:\/\/bestunixhosting.in\/blog\/securing-your-cpanel-server-webhosting-chennai\/","title":{"rendered":"How to secure your WHM\/cPanel server"},"content":{"rendered":"<div class=\"hero-unit\">\n<div class=\"ac\">\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_69_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/bestunixhosting.in\/blog\/securing-your-cpanel-server-webhosting-chennai\/#Secure_your_cPanel_server\" title=\"Secure your cPanel server\">Secure your cPanel server<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/bestunixhosting.in\/blog\/securing-your-cpanel-server-webhosting-chennai\/#Updates_Installation\" title=\"Updates &amp; Installation\">Updates &amp; Installation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/bestunixhosting.in\/blog\/securing-your-cpanel-server-webhosting-chennai\/#Use_The_Security_Advisors\" title=\"Use The Security Advisors\">Use The Security Advisors<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/bestunixhosting.in\/blog\/securing-your-cpanel-server-webhosting-chennai\/#Web_Server_Security_Firewall_ModSecurity\" title=\"Web Server Security &amp; Firewall (ModSecurity)\">Web Server Security &amp; Firewall (ModSecurity)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/bestunixhosting.in\/blog\/securing-your-cpanel-server-webhosting-chennai\/#4_Tweaks\" title=\"4)\u00a0Tweaks\">4)\u00a0Tweaks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/bestunixhosting.in\/blog\/securing-your-cpanel-server-webhosting-chennai\/#5_eXploit_Scanner\" title=\"5) eXploit Scanner\">5) eXploit Scanner<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/bestunixhosting.in\/blog\/securing-your-cpanel-server-webhosting-chennai\/#IMPORTANT_NOTE\" title=\"IMPORTANT NOTE!\">IMPORTANT NOTE!<\/a><\/li><\/ul><\/nav><\/div>\n<h4><span class=\"ez-toc-section\" id=\"Secure_your_cPanel_server\"><\/span><span style=\"text-decoration: underline;\">Secure your cPanel server<\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/div>\n<\/div>\n<div id=\"blog\" class=\"row\">\n<div class=\"span8\">\n<article id=\"post-60\" class=\"post-60 post type-post status-publish format-gallery hentry category-cpanel-server category-linux-server category-security tag-cpanelwhm tag-linux-server-2 tag-security post_format-post-format-gallery\">\n<div class=\"entry-content\">\n<p>After the initial setup of cPanel server the server is not very secure and there are many things that can be done to secure your server.<\/p>\n<p>In this tutorial we will go over some steps that include few software installation and web server security settings modification.<\/p>\n<p>The collection of these\u00a0easy steps is a results of years of experience in maintenance and management of linux servers.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Updates_Installation\"><\/span><span style=\"text-decoration: underline;\">Updates &amp; Installation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Update cPanel to the latest version from the WHM interface:<\/p>\n<p>Navigate to: <strong><em>Home \u00bb cPanel \u00bb Upgrade to Latest Version<\/em><\/strong><\/p>\n<p>Next, install the Apache mod_security with EasyApache:<\/p>\n<p>Navigate to: <strong><em>Home \u00bb Software \u00bb EasyApache (Apache Update)<\/em><\/strong><\/p>\n<p>On step 4 check the \u201c<strong>Mod Security<\/strong>\u201d option and click the \u201c<strong>Save and Build<\/strong>\u201d button.<\/p>\n<p>Next, login to the cPanel server as root via SSH and run OS update, then install some softwares from <a href=\"https:\/\/www.configserver.com\/\" target=\"_blank\" rel=\"noopener\">ConfigServer<\/a>:<\/p>\n<pre>yum update -y\r\n\r\nwget http:\/\/www.configserver.com\/free\/csf.tgz\r\ntar -xzf csf.tgz\r\ncd csf\/\r\nsh install.sh\r\ncd ..\r\nrm -Rfv csf\/ csf.tgz\r\n\r\nwget http:\/\/configserver.com\/free\/cmc.tgz\r\ntar -xzf cmc.tgz\r\ncd cmc\/\r\nsh install.sh\r\ncd ..\r\nrm -Rfv cmc\/ cmc.tgz<\/pre>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Use_The_Security_Advisors\"><\/span><span style=\"text-decoration: underline;\">Use The Security Advisors<\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>If your cPanel version is 11.42+ and CSF is installed on your server there is two\u00a0Security Advisors on your server that will check the security level of your server and will suggest recommendations on how fix\u00a0the security issues.<\/p>\n<p>For cPanel Security Advisor navigate to:<\/p>\n<p><strong><em>Home \u00bb Security Center \u00bb Security Advisor<\/em><\/strong><\/p>\n<p>For ConfigServer Firewall Security Advisor navigate to:<\/p>\n<p><strong><em>Home \u00bb Plugins \u00bb ConfigServer Security &amp; Firewall \u00bb Check Server Security<\/em><\/strong><\/p>\n<p>* Follow all the recommendations and make the necessary changes to fix your server security issues.<\/p>\n<p>We recommend to run the Security Advisors at least once a month.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Web_Server_Security_Firewall_ModSecurity\"><\/span><span style=\"text-decoration: underline;\">Web Server Security &amp; Firewall (ModSecurity)<\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Our choice for Mod Security rules is the Comodo Web Application Firewall (CWAF) agent. The cPanel\\WHM plugin automate the installation &amp; configuration of CWAF on the server and the deployment of periodically published predefined firewall rules set updates.<\/p>\n<p><strong>1)<\/strong> To get access to Comodo Mod Security rules and\u00a0CWAF free sign up is needed: <a href=\"https:\/\/waf.comodo.com\" target=\"_blank\" rel=\"noopener\">https:\/\/waf.comodo.com<\/a><\/p>\n<p><strong>2)<\/strong> To download the comodo client agent login to the web administration console and\u00a0click the \u201cDownload latest installer\u201d link (top right of the screen) <strong><em>\u201ccwaf_client_install.sh\u201d<\/em><\/strong>.<\/p>\n<p><strong>3)<\/strong> Copy the agent setup file to a local directory in the server E.g. \/root<\/p>\n<p><strong>4)<\/strong> Run the installation script as root via SSH:<\/p>\n<pre>bash \/root\/cwaf_client_install.sh<\/pre>\n<p>Follow the instructions in the setup wizard!<\/p>\n<p>Next edit mod_security conf file and include the CWAF Rules.<\/p>\n<pre>vi \/usr\/local\/apache\/conf\/modsec2.conf<\/pre>\n<p>And add this line:<\/p>\n<pre>Include \"\/var\/cpanel\/cwaf\/etc\/cwaf.conf\"<\/pre>\n<p>The file\u00a0should look like this:<\/p>\n<pre>LoadFile \/opt\/xml2\/lib\/libxml2.so \r\n# LoadFile \/opt\/lua\/lib\/liblua.so \r\nLoadModule security2_module  modules\/mod_security2.so \r\n&lt;IfModule mod_security2.c&gt; \r\nSecRuleEngine On \r\nSecTmpDir \/tmp \r\nSecDataDir \/tmp \r\nSecRequestBodyAccess On \r\nSecAuditEngine RelevantOnly \r\nSecPcreMatchLimitRecursion 250000 \r\nSecDebugLog logs\/modsec_debug_log \r\nSecPcreMatchLimit 250000 \r\nSecAuditLog logs\/modsec_audit.log \r\nSecDebugLogLevel 0 \r\nInclude \"\/var\/cpanel\/cwaf\/etc\/cwaf.conf\" \r\n&lt;\/IfModule&gt;<\/pre>\n<p><strong>5)<\/strong> Now login to WHM as root and navigate to:<\/p>\n<p><em><strong>Home \u00bb Plugins \u00bb Comodo WAF<\/strong> <\/em><\/p>\n<p>At the \u201cMain\u201d tab you can run updates if needed,<\/p>\n<p>At the \u201cCatalog\u201d tab you can set or unset rules for all vhosts or for a singel domain.<\/p>\n<p><strong>6)<\/strong> Restart Apache<\/p>\n<pre>service httpd restart<\/pre>\n<p><strong>7)<\/strong> Set new Apache configuration:<\/p>\n<p><em><strong>Home \u00bb Service Configuration\u00a0\u00bb Apache Configuration\u00a0\u00bb Global Configuration <\/strong><\/em><\/p>\n<p>Change to:<\/p>\n<p><strong>SSL Cipher Suite<\/strong> = (PCI recommended)<\/p>\n<p><strong>Trace Enable<\/strong> = Off<\/p>\n<p><strong>Server Signature<\/strong> = Off<\/p>\n<p><strong>Server Tokens<\/strong> = ProductOnly<\/p>\n<p><strong>File ETag<\/strong> = None<\/p>\n<p>Then\u00a0clicking on <strong>\u201cSave\u201d<\/strong><\/p>\n<p><strong>8)<\/strong> Set new PHP configuration:<\/p>\n<p><em><strong>Home \u00bb Service Configuration \u00bb PHP Configuration Editor<\/strong><\/em><\/p>\n<p>Select the <strong>\u201cAdvanced Mode\u201d<\/strong> and set the following settings:<\/p>\n<p><strong>allow_url_fopen<\/strong> = off<\/p>\n<p><strong>expose_php<\/strong> = Off<\/p>\n<p><strong>enable_dl<\/strong>= Off<\/p>\n<p><strong>register_globals<\/strong> = off<\/p>\n<p><strong>display_errors<\/strong> = off<\/p>\n<p><strong>disable_functions<\/strong> = show_source, system, shell_exec, passthru, exec, popen, proc_open, eval, symlink, link, readlink, dl, escapeshellarg, escapeshellcmd, ini_restore, apache_get_modules, ini_get_all, get_cfg_var<\/p>\n<p><strong>9)<\/strong> Restart Apache<\/p>\n<pre>service httpd restart<\/pre>\n<p><strong>\u00a010)<\/strong> Enable failure detection of repeated Apache mod_security rule triggers<\/p>\n<p>Navigate to:<\/p>\n<p><strong><em>Home \u00bb Plugins \u00bb ConfigServer Security &amp; Firewall \u00bb Firewall Configuration<br \/>\n<\/em><\/strong><\/p>\n<p>And set the number of failures between 3 and 5 by changing the value:<\/p>\n<p><strong>LF_MODSEC<\/strong> = 3<\/p>\n<h4><span class=\"ez-toc-section\" id=\"4_Tweaks\"><\/span><span style=\"text-decoration: underline;\">4)\u00a0<strong>Tweaks<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><strong>1)<\/strong> Install and config \u201ctmpwatch\u201d<\/p>\n<pre>yum install tmpwatch<\/pre>\n<p>Edit the tmpwatch cron file:<\/p>\n<pre>vi \/etc\/cron.daily\/tmpwatch<\/pre>\n<p>The file\u00a0should look like this:<\/p>\n<pre>#! \/bin\/sh\r\nflags=-umc\r\n\/usr\/sbin\/tmpwatch \"$flags\" -x \/tmp\/.X11-unix -x \/tmp\/.XIM-unix \\\r\n\t-x \/tmp\/.font-unix -x \/tmp\/.ICE-unix -x \/tmp\/.Test-unix \\\r\n\t-X '\/tmp\/hsperfdata_*' -m 24 \/tmp\r\n\/usr\/sbin\/tmpwatch \"$flags\" -m 12 \/var\/tmp\r\nfor d in \/var\/{cache\/man,catman}\/{cat?,X11R6\/cat?,local\/cat?}; do\r\n    if [ -d \"$d\" ]; then\r\n\t\/usr\/sbin\/tmpwatch \"$flags\" -mf 12 \"$d\"\r\n    fi\r\ndone<\/pre>\n<p><strong>2)<\/strong> Disable Compilers for all accounts from:<\/p>\n<p><em><strong>Home \u00bb Security Center \u00bb Compiler Access<\/strong><\/em><\/p>\n<p><strong>3)<\/strong> Disable Anonymous FTP &amp; Logins with root<\/p>\n<p><em><strong>Home \u00bb Service Configuration \u00bb FTP Server Configuration<\/strong><\/em><\/p>\n<h4><span class=\"ez-toc-section\" id=\"5_eXploit_Scanner\"><\/span><span style=\"text-decoration: underline;\">5) <strong>eXploit Scanner<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>The eXploit Scanner is the best tool out there for detecting malicious code on the server and for real time detection while files are uploaded to the server.<\/p>\n<p>eXploit Scanner detecting malicious code uploaded real time and deny the upload and blocks the IP address from which the file is upload.<\/p>\n<p><strong>1)<\/strong> Install ClamAV:<\/p>\n<p><em><strong>Home \u00bb cPanel \u00bb Manage Plugins<\/strong><\/em><\/p>\n<p>Select \u201cclamavconnector\u201d and Seve.<\/p>\n<p><strong>2)<\/strong> The \u201ceXploit Scanner\u201d is not free, but worth every cent. Buy license at:<\/p>\n<p><a href=\"http:\/\/configserver.com\/cp\/cxs.html\" target=\"_blank\" rel=\"noopener\">http:\/\/configserver.com\/cp\/cxs.html<\/a><\/p>\n<p><strong>3)<\/strong> Once you received the confirmation email of the activation of the license you can start the installation of the eXploit Scanner plugin:<\/p>\n<pre>wget http:\/\/www.configserver.com\/free\/cxsinstaller.tgz\r\ntar -xzf cxsinstaller.tgz\r\nperl cxsinstaller.pl\r\nrm -fv cxsinstaller.*\r\n\r\nmkdir -m 1777 \/usr\/suspicious_files\r\ntouch \/var\/log\/cxs.log\r\nchmod 0666 \/var\/log\/cxs.log\r\n\r\ncp \/etc\/cxs\/cxs.defaults.example \/etc\/cxs\/cxs.defaults\r\ncp \/etc\/cxs\/cxs.ignore.example \/etc\/cxs\/cxs.ignore\r\ncp \/etc\/cxs\/cxs.xtra.example \/etc\/cxs\/cxs.xtra\r\nchmod 644 \/etc\/cxs\/cxs.xtra \/etc\/cxs\/cxs.defaults \/etc\/cxs\/cxs.ignore\r\nchmod 755 \/etc\/cxs\/cxscgi.sh \/etc\/cxs\/cxsftp.sh<\/pre>\n<p><strong>4)<\/strong> Enable the pure-ftp upload script:<\/p>\n<pre>vi \/etc\/pure-ftpd.conf<\/pre>\n<p>And change the \u201cCallUploadScript\u201d value<\/p>\n<p>From:<br \/>\n<strong> # CallUploadScript yes<\/strong><\/p>\n<p>To:<br \/>\n<strong> CallUploadScript yes<\/strong><\/p>\n<p>Next, restart the pure-uploadscript daemon:<\/p>\n<pre>\/etc\/init.d\/pure-uploadscript restart<\/pre>\n<p><strong>5)<\/strong> Edit the config files and comment any exiting line with # in this files:<\/p>\n<p><strong>Edit cxscgi.sh file:<\/strong><\/p>\n<pre>vi \/etc\/cxs\/cxscgi.sh<\/pre>\n<p>Add:<\/p>\n<pre>\/usr\/sbin\/cxs -Z --cgi --block --smtp --mail root --delete --qoptions Mexv -I \/etc\/cxs\/cxs.ignore --xtra \/etc\/cxs\/cxs.xtra \"$1\"<\/pre>\n<p><strong>Edit cxsftp.sh file:<\/strong><\/p>\n<pre>vi \/etc\/cxs\/cxsftp.sh<\/pre>\n<p>And set the line:<\/p>\n<pre>\/usr\/sbin\/cxs -Z --ftp --block --smtp --mail root --delete --qoptions Mexv -I \/etc\/cxs\/cxs.ignore --xtra \/etc\/cxs\/cxs.xtra \"$1\"<\/pre>\n<p><strong>Edit cxswatch.sh file:<\/strong><\/p>\n<pre>vi \/etc\/cxs\/cxswatch.sh<\/pre>\n<p>And set the line:<\/p>\n<pre>\/usr\/sbin\/cxs --Wstart --allusers --www --block --smtp --mail root --quarantine \/usr\/suspicious_files --qoptions Mexv --xtra \/etc\/cxs\/cxs.xtra --Wmaxchild 5 --Wloglevel 0 --Wsleep 3 --filemax 0 --Wrateignore 300<\/pre>\n<p><strong>6)<\/strong> Create Cron jobs via the UI from:<\/p>\n<p><em><strong>Home \u00bb Plugins \u00bb ConfigServer eXploit Scanner<\/strong><\/em><\/p>\n<p>Click on \u201cEdit Cron Jobs\u201d and add the command:<\/p>\n<pre>\/usr\/sbin\/cxs --mail root --exp --vir -I \/etc\/cxs\/cxs.ignore -X \/etc\/cxs\/cxs.xtra -Q \/usr\/suspicious_files --options mMOLfSGchexdnwWZDRPu --qoptions Mexv -Z --sum -S 1000000 -F 10000 -C \/var\/clamd -T 2 --MD5 -B --allusers<\/pre>\n<p>Add the auto update cron command:<\/p>\n<pre>\/usr\/sbin\/cxs --upgrade --quiet<\/pre>\n<p>Create the cxs suspicious files folder:<\/p>\n<pre>mkdir \/usr\/suspicious_files<\/pre>\n<p>&nbsp;<\/p>\n<p>* Enable detection of repeated cxs and mod_security rules trigger. This option will block the user IP address if cxs or ModSecurity triger is detected.<\/p>\n<p>Navigate to:<\/p>\n<p><strong><em>Home \u00bb Plugins \u00bb ConfigServer Security &amp; Firewall \u00bb Firewall Configuration<br \/>\n<\/em><\/strong><\/p>\n<p>And set: <b>LF_CXS <\/b> = 1<\/p>\n<p>Finally\u00a0we finished securing your server!<\/p>\n<p>Enjoy.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"IMPORTANT_NOTE\"><\/span>IMPORTANT NOTE!<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>* Know that security is not optimization. It will take more resources from the server!<\/p>\n<p>* This guide is not a complete solution for server security. Only the main first steps in the process of securing your server are covered!<\/p>\n<p>Now you can go ahead and\u00a0optimize your Web server, that belongs to another tutorial that you can find at: <a title=\"Optimize MySQL &amp; Apache on cPanel\/WHM server\" href=\"https:\/\/www.webhostingchennai.co.in\/blog\/vps\/optimizing-mysql-apache-cpanelwhm-server\/\" rel=\"bookmark noopener\" target=\"_blank\">Optimize MySQL &amp; Apache on cPanel\/WHM server<\/a><\/p>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Secure your cPanel server After the initial setup of cPanel server the server is not very secure and there are many things that can be done to secure your server. In this tutorial we will go over some steps that include few software installation and web server security settings modification. The collection of these\u00a0easy steps [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":954,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[27,56,23,29],"tags":[60],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/wp\/v2\/posts\/630"}],"collection":[{"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/wp\/v2\/comments?post=630"}],"version-history":[{"count":3,"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/wp\/v2\/posts\/630\/revisions"}],"predecessor-version":[{"id":1431,"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/wp\/v2\/posts\/630\/revisions\/1431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/wp\/v2\/media?parent=630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/wp\/v2\/categories?post=630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bestunixhosting.in\/blog\/wp-json\/wp\/v2\/tags?post=630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}