Cpanel User Documentation

Total Page:16

File Type:pdf, Size:1020Kb

Cpanel User Documentation cPanel User Documentation This documentation describes the features of the cPanel interface. How to Access cPanel & WHM Services — This document details how to log in to cPanel, WHM, and Webmail. The cPanel Home Interface — This document describes the Home interface, which provides access to all of your cPanel functions. Preferences — These documents describe the features in the Preferences section. This section includes a setup wizard and general cPanel settings. Mail — These documents describe the features in the Mail section. This section includes all of cPanel's email-related features. Files — These documents describe the features in the Files section. This section includes cPanel's backup system, file managers, HTML editor, FTP configuration, and WebDiskconfiguration. Logs — These documents describe the features in the Logs section. This section includes error logs, information about bandwidth usage, and statistical analysis software. Security — These documents describe the features in the Security section. This section includes shell access, leech protection, hot link protection, and other security-related features. Domains — These documents describe the features in the Domains section. This section includes features that allow you to manage subdomains, addon domains, parked domains, and redirects. Databases — These documents describe the features in the Databases section. This section includes features that allow you to manage MySQL® and PostgreSQL databases. Software/Services — These documents describe the features in the Software/Services section. This section includes features that allow you to install Perl packages, and manage CGI and PHP and PEAR packages. Advanced — These documents describe the features in the Advanced section. This section includes features that allow you to manage advanced cPanel tasks (for example, cron jobs or MIME types). The Password Generator — You can use the Password Generator to generate secure passwords for your accounts. cPanel User Documentation Page 1 1.0 How to Access cPanel & WHM Services Overview How to read a URL How to access cPanel How to access WHM How to access Webmail o Access webmail from the cPanel interface o Access webmail directly How to change an interface's locale 1.1 Overview This document describes how to access cPanel, WHM, and Webmail with or without SSL. Important: Icon We strongly recommend that you log in over an encrypted SSL connection. An encrypted SSL connection will not transmit your username and password in plain text over the Internet. For more information about cPanel, WHM, and Webmail connections, read our How to Configure Your Firewall for cPanel & WHM's Services documentation. Note: Icon In the following examples, replace 192.168.0.1 with your IP address and replace example.com with your domain name. 1.2 How to read a URL The URL is composed of four sections: cPanel User Documentation Page 2 Section Description Example Protocol The protocol that your browser will use to communicate with a https:// remote server. For cPanel, WHM, and Webmail, this value is either http or https. httpsis http over an encrypted connection. We strongly recommend that you use https whenever you access cPanel & WHM services. Address The address can consist of either an IP address (for example.com example, 192.168.0.1) or a domain (for example, example.com). This section of the URL specifies the remote server that you wish to access. When you use a domain name to access cPanel & WHM services name, make sure that the domain's DNS information has propagated across the domain name system (DNS). Port When you access most websites via http or https, the port 2083 number number is implied. However, cPanel & WHM services use their own set of port numbers. If you wish to access a cPanel & WHM service over an encrypted or unencrypted connection, you must specify the port number. https and http port numbers are different, even for the same service. To specify a port number, enter a colon (:) followed by a number. Security After you log in to your server, it will automatically append a cpsess1234567890 token security token to the URL for your session. Security tokens help prevent authorized use of a website through XSRF (Cross-Site Request Forgery). Security tokens contain the string cpsess and a 10-digit number. 1.3 How to access cPanel Your domain's DNS information must propagate before you can access cPanel with your domain name. If you cannot access the cPanel interface with your domain name, use your domain's IP address. cPanel User Documentation Page 3 Your domain can take approximately 48-72 hours to propagate after you set up your website, After your domain propogates, navigate to your website via your domain name (for example,https://example.com:2083) To access cPanel, perform the following steps: 1. Enter one of the following URLs in your preferred browser: a. https://192.168.0.1:2083 — This URL allows you to access cPanel over an encrypted connection with your IP address. b. https://example.com:2083 — This URL allows you to access cPanel over an encrypted connection with your domain name. c. http://192.168.0.1:2082 — This URL allows you to access cPanel over an unencrypted connection with your IP address. d. http://example.com:2082 — This URL allows you to access cPanel over an unencrypted connection with your domain name. 2. Enter your cPanel username in the Username text box. 3. Enter your password in the Password text box. 4. Click Log in. 1.4 How to access WHM Your domain's DNS information must propagate before you can access WHM with your domain name. If you cannot access the WHM interface with your domain name, use your domain's IP address. To access WHM, perform the following steps: 1. Enter one of the following URLs in your preferred browser: a. https://192.168.0.1:2087 — This URL allows you to access WHM over an encrypted connection with your IP address. b. https://example.com:2087 — This URL allows you to access WHM over an encrypted connection with your domain name. c. http://192.168.0.1:2086 — This URL allows you to access WHM over an unencrypted connection with your IP address. d. http://example.com:2086 — This URL allows you to access WHM over an unencrypted connection with your domain name. 2. Enter your WHM username in the Username text box. 3. Enter your password in the Password text box. 4. Click Log in. cPanel User Documentation Page 4 1.5 How to access Webmail Your domain's DNS information must propagate before you can access to Webmail with your domain name. If you cannot access the Webmail interface with your domain name, use your domain's IP address. 1.5.1 Access webmail from the cPanel interface The Webmail icon will not display if you logged in with the reseller or root password. To access Webmail from the cPanel interface, either click the Webmail icon in the Mail section of the cPanel Home interface, or perform the following steps: 1. Navigate to cPanel's Email Accounts interface (Home >> Mail >> Email Accounts). 2. Click More in the row that corresponds to the email account for which you wish to access Webmail. 3. Select Access Webmail. 4. Enter the password for the selected email account, and click Log In. 5. Click the logo or the Read Mail Using link for your preferred webmail application. The interface for your chosen webmail application will appear. a. If you are not sure which webmail application you should use, read our Which Webmail Application Should I Choose? documentation. b. Click Enable AutoLoad if you want the chosen webmail application to load automatically the next time that you access Webmail. 6. The webmail client will retrieve and display all of your email account's read and unread messages. 1.5.2 Access webmail directly To access webmail directly from your web browser, perform the following steps: 1. Enter one of the following URLs: a. https://192.168.0.1:2096 — This URL allows you to access your Webmail over an encrypted connection with your IP address. b. https://example.com:2096 — This URL allows you to access your Webmail over an encrypted connection with your domain name. c. http://192.168.0.1:2095 — This URL allows you to access your Webmail over an unencrypted connection with your IP address. d. http://example.com:2095 — This URL allows you to access your Webmail over an unencrypted connection with your domain name. 2. Enter the email address (for example, [email protected]) and password. 3. Click Log In. cPanel User Documentation Page 5 4. Click the logo or the Read Mail Using link for your preferred webmail application.The interface for your chosen webmail application will appear. a. If you are not sure which webmail application you should use, read our Which Webmail Application Should I Choose? documentation. b. Click Enable AutoLoad if you want the chosen webmail application to load automatically the next time that you access Webmail. 5. The webmail client will retrieve and display all of your email account's read and unread messages. 1.6 How to change an interface's locale You can choose a new language setting (locale) in which to view an interface. This change sets a cookie in your browser that expires after one year. You must perform this step whenever you log in to an account from a new browser, when you delete cookies, and after the cookie expires. To change an interface's locale, perform the following steps: 1. At the bottom of the login interface, click the desired locale name. 2. The interface will refresh and a message of success will appear. Note: If your browser's Accept-Language header is set, then the login interface will attempt to display the locale that corresponds to your browser setting.
Recommended publications
  • Learning Apache Mahout Classification Table of Contents
    Learning Apache Mahout Classification Table of Contents Learning Apache Mahout Classification Credits About the Author About the Reviewers www.PacktPub.com Support files, eBooks, discount offers, and more Why subscribe? Free access for Packt account holders Preface What this book covers What you need for this book Who this book is for Conventions Reader feedback Customer support Downloading the example code Downloading the color images of this book Errata Piracy Questions 1. Classification in Data Analysis Introducing the classification Application of the classification system Working of the classification system Classification algorithms Model evaluation techniques The confusion matrix The Receiver Operating Characteristics (ROC) graph Area under the ROC curve The entropy matrix Summary 2. Apache Mahout Introducing Apache Mahout Algorithms supported in Mahout Reasons for Mahout being a good choice for classification Installing Mahout Building Mahout from source using Maven Installing Maven Building Mahout code Setting up a development environment using Eclipse Setting up Mahout for a Windows user Summary 3. Learning Logistic Regression / SGD Using Mahout Introducing regression Understanding linear regression Cost function Gradient descent Logistic regression Stochastic Gradient Descent Using Mahout for logistic regression Summary 4. Learning the Naïve Bayes Classification Using Mahout Introducing conditional probability and the Bayes rule Understanding the Naïve Bayes algorithm Understanding the terms used in text classification Using the Naïve Bayes algorithm in Apache Mahout Summary 5. Learning the Hidden Markov Model Using Mahout Deterministic and nondeterministic patterns The Markov process Introducing the Hidden Markov Model Using Mahout for the Hidden Markov Model Summary 6. Learning Random Forest Using Mahout Decision tree Random forest Using Mahout for Random forest Steps to use the Random forest algorithm in Mahout Summary 7.
    [Show full text]
  • Ispconfig 3 Manual]
    [ISPConfig 3 Manual] ISPConfig 3 Manual Version 1.0 for ISPConfig 3.0.3 Author: Falko Timme <[email protected]> Last edited 09/30/2010 1 The ISPConfig 3 manual is protected by copyright. No part of the manual may be reproduced, adapted, translated, or made available to a third party in any form by any process (electronic or otherwise) without the written specific consent of projektfarm GmbH. You may keep backup copies of the manual in digital or printed form for your personal use. All rights reserved. This copy was issued to: Thomas CARTER - [email protected] - Date: 2010-11-20 [ISPConfig 3 Manual] ISPConfig 3 is an open source hosting control panel for Linux and is capable of managing multiple servers from one control panel. ISPConfig 3 is licensed under BSD license. Managed Services and Features • Manage one or more servers from one control panel (multiserver management) • Different permission levels (administrators, resellers and clients) + email user level provided by a roundcube plugin for ISPConfig • Httpd (virtual hosts, domain- and IP-based) • FTP, SFTP, SCP • WebDAV • DNS (A, AAAA, ALIAS, CNAME, HINFO, MX, NS, PTR, RP, SRV, TXT records) • POP3, IMAP • Email autoresponder • Server-based mail filtering • Advanced email spamfilter and antivirus filter • MySQL client-databases • Webalizer and/or AWStats statistics • Harddisk quota • Mail quota • Traffic limits and statistics • IP addresses 2 The ISPConfig 3 manual is protected by copyright. No part of the manual may be reproduced, adapted, translated, or made available to a third party in any form by any process (electronic or otherwise) without the written specific consent of projektfarm GmbH.
    [Show full text]
  • Linux VDS Release Notes
    Linux VDS Release Notes Linux VDS Release Notes Introduction Important: This document is based on the most recent available information regarding the release of Linux VDS. Future revisions of this document will include updates not only to the status of features, but also an overview of updates to customer documentation. The Linux VDS platform provides a set of features designed and implemented to suit the value-added reseller (VAR), small hosting service provider (HSP), application service provider (ASP), independent software vendor (ISV), and any small- and medium-sized business (SMB). This document provides administrators who possess minimal to moderate technical skills with a guide to the latest documentation and other sources of information available at the time of the release. This document also includes any cautions and warnings specific to this release. For more information, refer to the following documents: • Linux VDS User’s Guide • Linux VDS Getting Started Guide In addition, you can also refer to the following Web content: • Frequently-asked questions (FAQ) Status of Features Linux VDS introduces new features and enhancements. What’s New? The following table describes the status of features included with this release: Feature Status Accrisoft This release introduces support for Accrisoft e-commerce software (http://www.accrisoft.com/ ). You can use the software to build and manage profitable Web sites. Accrisoft is a fee-based, optional application. This release also provides an installation script to assure the software operates fully and correctly on your account. An uninstall script assures that you can remove the software completely and effectively if you need to do so.
    [Show full text]
  • G7: RASC Halifax Centre Website Standard Operating Procedures (SOP) (Adopted November 2, 2019)
    Royal Astronomical Society of Canada (RASC), Halifax Centre Dedicated to the Advancement of Astronomy and Allied Sciences G7: RASC Halifax Centre Website Standard Operating Procedures (SOP) (Adopted November 2, 2019) Background: In October 2005, the standard operating procedures (SOP) for the RASC Halifax Centre website were developed and defined who was responsible for the various aspects of the Centre’s website and for making changes to it. During 2019, the Centre’s website was upgraded to use a new content management system. The SOP was consequently changed to reflect the changes made. Rationale: The SOP defines the assignment of responsibility for making changes to the site on an ongoing basis. Policies Relating to the RASC Halifax Centre Website Standard Operating Procedures: 1. The RASC Halifax Centre maintains a web page at http://halifax.rasc.ca on a server maintained by the Department of Astronomy & Physics, Saint Mary's University (SMUDA&P). Upload privileges are held by selected SMUDA&P staff, the RASC Halifax Centre webmaster, the RASC Halifax Vice-President, and the organizers of the annual Nova East Star Party. 2. The website is created using the Joomla content management system. All page editing is done using a web-based interface. The site for the centre (halifax.rasc.ca) and Nova East (novaeast.rasc.ca) are separate Joomla sites. These sites and associated email addresses and mailing lists are contained in a "Virtualmin" on the serverpluto.smu.ca. The login is at: https://halifax.rasc.ca:10000/ (password can be made available by SMUDA&P staff). 3. The Webmaster reports to the RASC Halifax Centre Board of Directors through the President and accepts new material for the web page from the Board.
    [Show full text]
  • Godaddy's Hosting Services System Description Updated
    GoDaddy’s Hosting Services System Description Background GoDaddy, based in Scottsdale, Arizona, provides a broad range of internet business software and services. GoDaddy’s hosting services refer to the housing, maintenance, and provision of internet service (bandwidth) to servers. GoDaddy offers the following hosting services which are covered by this system overview: • Web Hosting including cPanel for Linux, Parallels Plesk for Windows, and legacy Shared/Grid Hosting products (4GH) • WordPress Hosting • Servers – Dedicated and Virtual Private GoDaddy’s hosting services are housed in the following domestic and international data center locations, with the breakdown of hosting services as referenced in the table below: Data cPanel Plesk Legacy WordPress Dedicated Virtual Center Shared Private Virginia √ √ √ √ √ Arizona √ √ √ √ √ √ Netherlands √ √ √ √ √ Germany √ Singapore √ √ √ √ Infrastructure Shared web hosting services and WordPress hosting house multiple customers in a single server cluster, following a multi-tenant architecture. Customers interact with their hosting environment using the applicable control panel – cPanel for Linux, Parallels Plesk for Windows, and Hosting Control Center (HCC) for the legacy shared environment. Customers manage their own content including information stored on MySQL and MSSQL customer databases. Customers are also responsible for website setup and backups. GoDaddy manages system and hardware level security and patching. Updated: December 30, 2019 Page 1 GoDaddy’s Hosting Services System Description Dedicated servers in VA and AZ provide customers with an entire single-tenant virtual server housed on a single hypervisor1. Initial configuration is performed by provisioning code on the hypervisor based on customer elections made during the setup process. The customer manages system level access and is responsible for server setup, security, patching, and backups while GoDaddy manages hardware level security for all dedicated servers.
    [Show full text]
  • For Your Linux Server
    cPanel // Linux Server Getting Started Guide cPanel for your Linux Server AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1 cPanel // Linux Server Getting Started Guide: cPanel, Linux Server Version 2.2 (1.6.2012) © Copyright 2012. All rights reserved. Distribution of this work or derivative of this work is prohibited unless prior written permission is obtained from the copyright holder. Trademarks used in this book Linux® is a registered trademark of Linus Torvalds. cPanel® is a registered trademark of cPanel, Inc. SSH® and Secure Shell® are trademarks of SSH Communications Security, Inc. RedHat® and Fedora® are registered trademarks of Red Hat Software, Inc. Mac® is a registered trademark of Apple Computer, Inc. UNIX® is a registered trademark of The Open Group. Windows XP®, Entourage®, and Outlook® are registered trademarks of Microsoft Corporation in the United States and/or other countries. Thunderbird™ is an unregistered trademark of the Mozilla Foundation. All other trademarks and copyrights are the property of their respective owners. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 2 cPanel // Linux Server Table of Contents Introduction 5 SECURITY INFORMATION! 5 REPROVISIONING YOUR SERVER! 6 GETTING HELP! 7 OTHER RESOURCES! 9 Setting Up Your Dedicated Server 10 CHOOSING A HOST NAME, USER ID, AND PASSWORD! 10 LOGGING IN TO YOUR MANAGER FOR THE FIRST TIME! 13 Connecting to Your Dedicated Server 14 CONNECTING TO YOUR SERVER USING WHM! 15 CONNECTING TO YOUR SERVER USING SSH! 20 GAINING ROOT ACCESS ON YOUR SERVER! 22 AKJZNAzsqknsxxkjnsjx
    [Show full text]
  • Webmaster - Web Designer
    Webmaster - Web Designer (INTERNATIONAL LOGISTICS – GLOBAL SUPPLY CHAIN) Baltimore, MD 21230 (Locust Point, McHenry Row) O Web Designer, Webmaster, wherefore art thou creative website guru? In a world facing new challenges, a nimble but steady ship is more important than ever. Is there a seat on our boat for you? Want a career, not a job? Find out. In a modern era where expertise is often devalued, Shapiro stands strong at 105-years old. We’re so compliant that US Customs learns from us! Our headquarters was named as a “Best Place to Work.” Shapiro is not your grandpa’s shipping company. We have a track record of transparency, developing employees, and investing in our environment like office space and now…work-from-home technology. At Shapiro, our Web Designer/Webmaster is an integral member of Shapiro's marketing team. Responsibilities include bringing Shapiro's digital website strategy to life across all digital touchpoints. You will also own the shapiro.com web platform to expand our brand presence, maintain our website content, and ensure security. JOB DESCRIPTION Responsibilities include: • Design website pages that are user-friendly, attractive, and engaging while remaining loyal to the company brand and promoting the company image and values. Excellent internal customer service in an engaging environment. • Add new site elements and update content on existing pages to keep the website fresh and exciting. • Ensure all content is optimized for search engines (SEO) to drive traffic to pages. • Track and analyze all website visitors and create regular analytics reports to show increases and decreases in traffic/conversions.
    [Show full text]
  • A Rule Based Approach for Spam Detection
    A RULE BASED APPROACH FOR SPAM DETECTION Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering In Computer Science & Engineering By: Ravinder Kamboj (Roll No. 800832030) Under the supervision of: Dr. V.P Singh Mrs. Sanmeet Bhatia Assistant Professor Assistant Professor Computer Science & Engineering Department of SMCA COMPUTER SCIENCE AND ENGINEERING DEPARTMENT THAPAR UNIVERSITY PATIALA – 147004 JULY- 2010 i ii Abstract Spam is defined as a junk Email or unsolicited Email. Spam has increased tremendously in the last few years. Today more than 85% of e-mails that are received by e-mail users are spam. The cost of spam can be measured in lost human time, lost server time and loss of valuable mail. Spammers use various techniques like spam via botnet, localization of spam and image spam. According to the mail delivery process anti-spam measures for Email Spam can be divided in to two parts, based on Emails envelop and Email data. Black listing, grey listing and white listing techniques can be applied on the Email envelop to detect spam. Techniques based on the data part of Email like heuristic techniques and Statistical techniques can be used to combat spam. Bayesian filters as part of statistical technique divides the income message in to words called tokens and checks their probability of occurrence in spam e-mails and ham e-mails. Two types of approaches can be followed for the detection of spam e-mails one is learning approach other is rule based approach. Learning approach required a large dataset of spam e-mails and ham e-mails is required for the training of spam filter; this approach has good time characteristics filter can be retrained quickly for new Spam.
    [Show full text]
  • How to Install Webmin/Virtualmin in Linux (Centos 7)
    Advanced Network/System Administration and Security Workshop ECE Building, Building, BUET, Dhaka Date: 10-12 December 2019 How to Install Webmin/Virtualmin in Linux (CentOS 7) What Is Virtualmin? Virtualmin is a Webmin module that is typically used to manage multiple virtual hosts through a single interface, similar to cPanel. It supports multiple functions such as creating/managing Apache virtual hosts, MySQL database creation/management, generating DNS zones, managing mailboxes, and much more. How Do I Install Virtualmin On CentOS 7? This guide implies that you’re using the root account on Cloud, VPS or Dedicated Server to perform the installation and that you have a basic working knowledge of a Linux shell. We highly suggest taking a backup of your server prior to proceeding with this script. Although this document is written for CentOS 7, Virtualmin offers an automated installation script for the following distros: • CentOS/RHEL/Scientific Linux 7 on x86_64 • CentOS/RHEL/Scientific Linux 5 and 6 on i386 or x86_64 • Debian 6, 7, and 8 on i386 or amd64 • Ubuntu 12.04 LTS, 14.04 LTS, and 16.04 LTS on i386 or amd64 (non-LTS releases are not supported) The following steps can be utilized to install Virtualmin in a CentOS 7 (RHEL 7) environment on a fresh OS installation. 1. Ensure your server is up to date sudo yum update -y 2. Download the Virtualmin installer script using wget sudo wget http://software.virtualmin.com/gpl/scripts/install.sh 3. Execute the install script Md. Ariful Islam Manager (Data & Transmission Network), BdREN E-mail: [email protected] Advanced Network/System Administration and Security Workshop ECE Building, Building, BUET, Dhaka Date: 10-12 December 2019 sudo sh install.sh As per the warning when the script is executed ensure that your OS is listed and type “y” then press “Enter” to continue with the installation If prompted you may need to enter in a fully qualified hostname.
    [Show full text]
  • Return of Organization Exempt from Income
    OMB No. 1545-0047 Return of Organization Exempt From Income Tax Form 990 Under section 501(c), 527, or 4947(a)(1) of the Internal Revenue Code (except black lung benefit trust or private foundation) Open to Public Department of the Treasury Internal Revenue Service The organization may have to use a copy of this return to satisfy state reporting requirements. Inspection A For the 2011 calendar year, or tax year beginning 5/1/2011 , and ending 4/30/2012 B Check if applicable: C Name of organization The Apache Software Foundation D Employer identification number Address change Doing Business As 47-0825376 Name change Number and street (or P.O. box if mail is not delivered to street address) Room/suite E Telephone number Initial return 1901 Munsey Drive (909) 374-9776 Terminated City or town, state or country, and ZIP + 4 Amended return Forest Hill MD 21050-2747 G Gross receipts $ 554,439 Application pending F Name and address of principal officer: H(a) Is this a group return for affiliates? Yes X No Jim Jagielski 1901 Munsey Drive, Forest Hill, MD 21050-2747 H(b) Are all affiliates included? Yes No I Tax-exempt status: X 501(c)(3) 501(c) ( ) (insert no.) 4947(a)(1) or 527 If "No," attach a list. (see instructions) J Website: http://www.apache.org/ H(c) Group exemption number K Form of organization: X Corporation Trust Association Other L Year of formation: 1999 M State of legal domicile: MD Part I Summary 1 Briefly describe the organization's mission or most significant activities: to provide open source software to the public that we sponsor free of charge 2 Check this box if the organization discontinued its operations or disposed of more than 25% of its net assets.
    [Show full text]
  • Control Panels
    Control Panels cPanel Plesk Direct Admin Other Control Panels Docker cPanel Intro CrossBox for cPanel is one of our most popular control panel integrations. It's Plug-and-Play in its core, covering 95% of all cPanel setups out of the box. Our deep integration with cPanel hooks and APIs enables an automated and fine- tuned experience for both the end-user and service provider. All data and computing are 100% hosted/done on the cPanel server. Benefits End-users: Easy access either via cPanel's webmail system or direct URL No complicated IMAP/SMTP/POP3 configuration, only email address, and password are required Instant access to Email Chat Audio/video calls Conferences Files Contacts And many other features, directly integrated with a cPanel hosting account Real-time push notifications Change password within CrossBox Recover access to an email account Service Providers: Provide users with a modern communication suite that is deeply integrated with and running on a cPanel server Easier customer onboarding Better brand exposure No changes to the cPanel server, services, or configuration files needed Everything is 100% hosted on the cPanel server itself cPanel account quota support WHM Feature List support Automatic cPanel Integration MTA/Mail Server CrossBox supports Exim and Dovecot out of the box, and won't make any changes to your existing MTA/mail server configuration. From standard Exim configurations to smart external relays, CrossBox supports any configuration. Webmail cPanel users can choose CrossBox as their Webmail Application of choice when accessing cPanel's Webmail. Note that if you have a Branding Addon purchased, the cPanel Webmail interface will show your custom App Logo.
    [Show full text]
  • Editing Control Panel Instances
    R1Soft Continuous Data Protection®, Documentation, Version 3.18.2 Editing Control Panel Instances Follow the instructions below to edit a Control Panel Instance in CDP. 1. Click on "Policy" in the Main Menu to access the "Policies" page. Advanced Edition Enterprise Edition 2. Find the necessary Policy in the "Policies" list and click on the "Edit" icon in the "Actions" column for this Policy. Tip To find a Policy, you can use the Basic and Advanced List Filters. See Customizing the Policies List. 3. The "Edit Policy" window will open. 1 R1Soft Continuous Data Protection®, Documentation, Version 3.18.2 4. Choose the "Control Panels" tab. 5. Then you will access the "Control Panel Instance" list on the "Control Panels" tab. 6. Find the necessary Instance in the "Control Panel Instance" list and click on the "Edit" icon in the "Actions" column for this Instance. 2 R1Soft Continuous Data Protection®, Documentation, Version 3.18.2 7. The "Edit Control Panel Instance" window will appear. Familiarize yourself with the introductory information and click "Next" to proceed with adding the Instance. 8. On the following "Instance Details" screen you can change options for your Control Panel Instance: Enabled - Use this checkbox to enable or disable the Control Panel Instance. If an instance is disabled, it will not be discovered during replication, and control panel users will not be able to access their data from any recovery points created while the instance is disabled. Name - Define a new name for the Control Panel Instance to identify it. A control panel instance's name must be unique to its policy, meaning no more than one instance associated with a policy can have a certain name.
    [Show full text]