Disable SSH/Shell Access for all users

MH-Andy

Member
Apr 3, 2009
6
0
51
Does anyone know of a quick way to disable SSH/Shell access for all users on the server?

As currently there's only a disable button that I'd have to click for every account that would take up my whole day.
 

cPanelDon

cPanel Quality Assurance Analyst
Staff member
Nov 5, 2008
2,545
12
268
Houston, Texas, U.S.A.
cPanel Access Level
DataCenter Provider
Twitter
Does anyone know of a quick way to disable SSH/Shell access for all users on the server?

As currently there's only a disable button that I'd have to click for every account that would take up my whole day.
Hello,

In WHM 11.25 under "Manage Shell Access" you now have the option to apply normal, jailed or no shell to all users with one click :)
What gvard described is correct; in cPanel 11.25 the Account Function "Manage Shell Access" is enhanced to include an option "apply to all" (accounts) when setting normal shell, jailed shell, or disabled shell access. For additional clarification here is the full menu path to access the feature and the applicable documentation:

WHM: Main >> Account Functions >> Manage Shell Access
Documentation: Manage Shell Access
 

Fakher

Member
Sep 29, 2010
8
0
51
Pakistan
Hello all,
i did this and disable shell access for all but again i am getting email alerts for different clients like
Code:
Time:Tue Oct 12 15:04:57 2010 +0400
IP:      122.108.xxx.xxx (AU/Australia/c122-108-100-179.sunsh1.vic.optusnet.com.au)
Account: emomom
Method:  password authentication
can some one advise me on this?
 

cPanelDon

cPanel Quality Assurance Analyst
Staff member
Nov 5, 2008
2,545
12
268
Houston, Texas, U.S.A.
cPanel Access Level
DataCenter Provider
Twitter
Hello all,
i did this and disable shell access for all but again i am getting email alerts for different clients like
Code:
Time:Tue Oct 12 15:04:57 2010 +0400
IP:      122.108.xxx.xxx (AU/Australia/c122-108-100-179.sunsh1.vic.optusnet.com.au)
Account: emomom
Method:  password authentication
can some one advise me on this?
The e-mail appears to be similar to what may be sent from CSF/LFD (using an e-mail template stored at "/etc/csf/sshalert.txt").

To help determine if the user was accessing SFTP (via SSH), look in the system log file at "/var/log/secure" for an entry that mentions "subsystem request for sftp" that would have been logged at the same time as the entries indicating the account username.