diff --git a/web/app/docs/post-install/security/page.tsx b/web/app/docs/post-install/security/page.tsx index c4aa900..136ac90 100644 --- a/web/app/docs/post-install/security/page.tsx +++ b/web/app/docs/post-install/security/page.tsx @@ -71,53 +71,75 @@ systemctl stop rpcbind `} /> +
- This optimization installs Lynis, a powerful security auditing tool for Unix-based systems. + Lynis is a comprehensive security auditing tool that analyzes your system, detects vulnerabilities, and provides recommendations for improving security.
- Why it's beneficial: Lynis helps identify security vulnerabilities, configuration errors, and - provides recommendations for system hardening. Regular security audits with Lynis can significantly improve your - system's overall security posture. + How it works: Lynis scans the system and evaluates various security parameters, including:
-This adjustment automates the following commands:
+This adjustment automates the following command:
To run a system security audit, execute:
+- This optimization installs and configures fail2ban to protect the Proxmox VE web interface from brute-force - attacks. + Fail2Ban enhances security by monitoring login attempts and banning malicious IPs that attempt unauthorized access.
- Why it's beneficial: fail2ban helps prevent unauthorized access attempts by temporarily banning - IP addresses that show malicious signs, such as too many password failures. This adds an extra layer of security - to your Proxmox VE web interface. + How it works: Fail2Ban analyzes logs, detects repeated authentication failures, and automatically bans the source IP address to prevent further attacks.
+This adjustment automates the following commands:
Define security rules for Proxmox:
+Set up global Fail2Ban policies:
+Enable and restart the Fail2Ban service:
+Check active Fail2Ban jails:
+