Plesk's Security Policies
Plesk exercises two different security policies towards Windows objects: disk security and hosting security. The difference between the policies is dictated by the different security requirements for hosted content as opposed to the rest of the server disks. Both policies are defined by security rules specified in corresponding Plesk security metadata files. The disk security policy is defined by the disk security metadata file and is applied to all server disks except for the contents of the
%plesk_vhosts% directory, where all hosted content is located. For more information about the disk security metadata file, see Disk Security Metadata File. All hosting directories are governed by security policies defined by corresponding hosting security metadata files. Hosting security metadata files are automatically generated from hosting security metadata file templates. For more information about security metadata file templates, see Hosting Security Metadata File Templates.
Leave your comments on this page
Leave your feedback or question on this documentation topic below. For technical assistance, contact your hosting service provider or submit a request to Plesk support. Suggest new features for Plesk here. Discuss general questions on the Plesk forum. All offtopic comments will be removed.