ModSecurity is a potent web application layer firewall for Apache web servers. It monitors the whole HTTP traffic to an Internet site without affecting its functionality and if it detects an intrusion attempt, it blocks it. The firewall additionally maintains a more thorough log for the traffic than any web server does, so you shall be able to monitor what's going on with your Internet sites much better than if you rely only on conventional logs. ModSecurity employs security rules based on which it helps prevent attacks. For example, it identifies if anyone is trying to log in to the administration area of a particular script a number of times or if a request is sent to execute a file with a particular command. In these instances these attempts set off the corresponding rules and the firewall hinders the attempts right away, after that records in-depth details about them inside its logs. ModSecurity is one of the best software firewalls out there and it could easily protect your web applications against a large number of threats and vulnerabilities, especially if you don’t update them or their plugins often.
ModSecurity in Cloud Web Hosting
We offer ModSecurity with all cloud web hosting
plans, so your web applications will be shielded from harmful attacks. The firewall is activated as standard for all domains and subdomains, but in case you would like, you shall be able to stop it through the respective section of your Hepsia CP. You can also switch on a detection mode, so ModSecurity shall keep a log as intended, but will not take any action. The logs which you shall find in Hepsia are incredibly detailed and offer information about the nature of any attack, when it happened and from what IP address, the firewall rule that was triggered, and so on. We use a group of commercial rules that are often updated, but sometimes our admins add custom rules as well so as to efficiently protect the Internet sites hosted on our servers.
ModSecurity in Semi-dedicated Hosting
All semi-dedicated hosting
solutions which we offer come with ModSecurity and since the firewall is turned on by default, any site that you create under a domain or a subdomain shall be secured straight away. A separate section in the Hepsia CP which comes with the semi-dedicated accounts is devoted to ModSecurity and it shall enable you to stop and start the firewall for any site or enable a detection mode. With the last mentioned, ModSecurity won't take any action, but it will still identify possible attacks and shall keep all info within a log as if it were 100% active. The logs could be found in the exact same section of the CP and they include information regarding the IP where an attack originated from, what its nature was, what rule ModSecurity applies to recognize and stop it, etcetera. The security rules we use on our machines are a mix between commercial ones from a security business and custom ones developed by our system admins. As a result, we provide higher security for your web applications as we can shield them from attacks even before security firms release updates for new threats.
ModSecurity in Dedicated Web Hosting
ModSecurity is included with all dedicated servers
that are set up with our Hepsia CP and you'll not need to do anything specific on your end to employ it as it is turned on by default every time you include a new domain or subdomain on your hosting server. In case it disrupts any of your apps, you will be able to stop it through the respective area of Hepsia, or you can leave it operating in passive mode, so it will identify attacks and will still keep a log for them, but won't stop them. You may look at the logs later to find out what you can do to enhance the protection of your websites as you'll find details such as where an intrusion attempt came from, what website was attacked and in accordance with what rule ModSecurity responded, etcetera. The rules that we employ are commercial, therefore they are regularly updated by a security firm, but to be on the safe side, our staff also include custom rules once in a while in order to react to any new threats they have identified.