What's in Security

In the Security section, you will find information on how to configure and optimize the Zend Server and components to function more securely.

This document includes information on the following information:

  • Allowed Hosts - This section describes the Allowed Hosts lists and offers recommendations on which hosts to add to the Allowed Hosts list for development and production environments.
  • Securing the User Interface - This section provides information on how to set an IP address-based access control list on the Web server running the User Interface for the Windows and Linux operating systems.
  • Configuring PHP for Security - This section explores how you can add an additional security boost to your PHP applications by properly configuring your PHP runtime environment settings.
  • Monitor Security Blacklist - How to hide certain values that are not relevant for diagnostics for security reasons.