Getting Started & Account Management Updating Contact and Billing Information Requesting Your Free Website Migration Step-by-Step CyberWAF Installation Guide How to Access Your CyberWAF Control Panel
WAF & Core Security Features Submitting a Malware Removal Request (SLA) How to Handle False Positives (Whitelisting) Managing Your Zero-Day Exploit Prevention Settings Understanding WAF Rules and Filtering Modes
Performance & Hosting Management How to Configure Email Accounts (Unlimited Email) Setting Up Your Free SSL/TLS Certificate Understanding NVMe SSD Storage & Performance Boost Monitoring Your Resource Usage (CPU & RAM)
Billing, Plans & Licensing Understanding the Service Level Agreement (SLA) Invoice and Payment Management How to Upgrade or Downgrade Your Service Plan Comparing Basic, Business, and E-commerce WAF Plans
Troubleshooting & Advanced Configuration Compliance and Security Best Practices Using SSH Access and FTP for Advanced Users How to Clear Your Website and Browser Cache How to Fix 500 Internal Server Errors
Contact & Custom Solutions How to Submit a Feature Request or Feedback Requesting a Custom Infrastructure Quote Understanding Our Support Response Times (SLAs) How to Contact CyberWAF Support (24/7/365)
CMS & Application Integrations Optimizing Database Connections Customizing WAF for Custom PHP/Legacy Applications Securing WooCommerce and E-commerce Platforms Integrating WAF with WordPress and Other CMS
Backup, Restore & Data Management Data Retention and Compliance How to Perform a Granular (File or DB) Restore How to Perform a Full Site Restore Understanding the Daily Backup Service
Cyber Security Education & Glossary Malware vs. Virus vs. Ransomware: Understanding the Differences The OWASP Top 10 Explained (and how WAF blocks them) What is a Zero-Day Exploit and How Does Virtual Patching Work? Cyber Security Glossary: Key WAF & DDoS Terms