Frequently Asked Questions

Frequently Asked Questions

This page lists answers to questions that our customers frequently post. We strongly recommend that customers go through these FAQs before requesting support using the online ticketing system as this can save valuable time. We try our level best to keep the FAQs updated so they provide quick access to information that can be useful for our valued customers. The questions are organized by categories which can be easily filtered.


How can I provide failover protection to my management and service nodes?

To protect your platform, we recommend installing Plesk Automation on a cluster of Parallels Cloud Servers with the Parallels Cloud Storage solution enabled. This will give you ease of load balancing and protection for all your Plesk Automation nodes.

What is the recommended Plesk Automation infrastructure configuration?

The Minimal Configuration

In theory, the majority of hosting services can be provided by the management node. Nevertheless, we strongly recommend that you use a separate node for providing hosting services, even on entry-level environments. Thus, the basic Plesk Automation environment looks like this:


As you grow, consider implementing the optimal configuration as shown below.

The Recommended Configuration

For optimal performance and security, it is strongly recommended to move all services from the management node to separate service nodes. The best practice is to use the management node only for providing the Plesk Automation GUI. The diagram below shows one of the possible Plesk Automation environment configurations.The decision of whether service nodes should provide only one or multiple services is up to you and should depend on the actual server load.


What is Parallels Plesk Automation?

Plesk Automation is a hosting control panel where one central server (management node) controls an arbitrary number of other servers that have various roles – web, mail, DNS, and so on. In terms of Plesk Automation, these controlled servers are called service nodes. When a customer subscribes to a web hosting plan, Plesk Automation allocates all the necessary resources on service nodes and links these resources to the customer’s account. For example, when a customer subscribes to a shared web hosting plan, Plesk Automation creates a webspace (virtual host) on one of the available web server nodes. If the subscription also includes mail services, Plesk Automation creates the customer’s mailboxes on one of the mail server nodes.

What happens when the Plesk Panel subscripton expires?

Please refer to the following Parallels Plesk knowledge base article for more information.

License expiration date does not affect any key PP feature, such as SUS, email support, etc. If you do not fix the issue with key updating and do not install a renewed key manually, the PP web interface will be blocked.

How can I request a password reset for my Office 365 account?

Cusotmers who have authorized ITCS (IT Consulting and Services) for delegated administration of their Office 365 accounts, can open a support ticket using our online ticketing system and request a password reset. Your password will be reset by one of our Office 365 support staff and sent to you via SMS.


Who do I contact for support?

Customers who wish to contact ITCS for technical support can open a support ticket by visiting our online support ticketing system.

Which operating systems are supported by Plesk?

List of supported operating systems is available in Plesk release notes (Linux, Windows). Support for new operating systems may be introduced in micro-update to current version. Such information can be found in History of changes section to release notes. List of operating systems for which support has been discontinued is available on Parallels Plesk Panel Lifecycle Policy page.

What are the advantages of proactive maintenance?

Studies show that proactive maintenance improves equipment longevity, up time and efficiency, and provides cost savings over time. IT Consulting and Services offers IT consulting services to help businesses ensure high availability and up time through guidance and assistance.

How does Acunetix WVS perform an automated scan and detect vulnerabilities?

As a pattern and exploit analysis tool, Acunetix WVS performs a web security audit by executing the following 3 sub-tasks:

Step 1: Target identification

  1. WVS checks if the target(s) are running a web server, and therefore host any websites.
  2. Information is collected on the web-technologies used, as well as web server-type and responsiveness for appropriate filtering tests (some test will only work for example on UNIX machines or on IIS servers).

Step 2: Site crawling and structure mapping

  1. The first file on the site is retrieved. This is determined by the start URL (e.g., will load the main index.html).
  2. robots.txt and sitemap.xml are parsed.
  3. Recieved responses are parsed to detect links, forms, input fields, parameters and client side scripts. This contributes to building a list of directories and files within the site.
  4. All files detected in step 3 are traversed and processed.

Note: If AcuSensor technology is used a list of files will be accurately retrieved directly from the server.

Step 3: Pattern analysis is performed against the site structure determined in step 2

  1. Acunetix Web Vulnerability Scanner launches a number of security checks against the target website depending on the chosen scanning profile.
  2. As Acunetix WVS discovers vulnerabilities alerts are reported under the Web Alerts node in realtime. Each alert produces detailed information about the vulnerability, recommendations on how to fix it, as well as several links through which the user can learn more about the reported vulnerability and how to fix it.
  3. If AcuSensor Technology is enabled, debug information will also be reported, like the SQL query vulnerable to SQL injection and the line of vulnerable code responsible for the exploit.

After a scan is completed it may be saved to file for later analysis and for comparison to previous scans. Scan results can also be exported to AVDL and XML format, and the Acunetix Reporter tool can also generate reports based on a number of professional and regulatory complaince standards.

Does the Barracuda Web Filter support off-network users?

Yes. The Barracuda Web Security Agent comes with the Barracuda Web Filter 410 and higher models. The Barracuda Web Security Agent is downloadable client software for installation on off-network Windows and Mac computers. The agent provides the same malware protection and policy enforcement as configured on the Barracuda Web Filter appliance. Administrators can configure the agent to either route traffic through a central Barracuda Web Filter or route traffic through a local gateway to lookup policies and enforce rules locally.

How can I access the Office 365 Portal?

about_1aMany customers often forget how to access the Office 365 Web Portal. Below is the URL that will help you navigate to the Office 365 Web Portal. Login to your Office 365 portal or web mail with a simple click.