In the Security section, you will find information on how to configure and optimize the Zend Server and components to function more securely.
This document includes information on the following information:
- Allowed Hosts - This section describes the Allowed Hosts lists and offers recommendations on which hosts to add to the Allowed Hosts list for development and production environments.
- Securing the User Interface - This section provides information on how to set an IP address-based access control list on the Web server running the User Interface .
- Configuring PHP for Security - This section explores how you can add an additional security boost to your PHP applications by properly configuring your PHP runtime environment settings.
- Monitor Security Blacklist - How to hide certain values that are not relevant for diagnostics for security reasons.
 
                            
                        


