ModSecurity in Cloud Hosting
ModSecurity is available on all cloud hosting machines, so if you choose to host your websites with our firm, they'll be protected against a wide array of attacks. The firewall is turned on as standard for all domains and subdomains, so there'll be nothing you will have to do on your end. You shall be able to stop ModSecurity for any Internet site if necessary, or to switch on a detection mode, so that all activity shall be recorded, but the firewall won't take any real action. You'll be able to view comprehensive logs from your Hepsia Control Panel including the IP address where the attack originated from, what the attacker wanted to do and how ModSecurity addressed the threat. As we take the safety of our clients' websites seriously, we employ a collection of commercial rules which we take from one of the leading companies that maintain this type of rules. Our admins also include custom rules to make sure that your Internet sites shall be shielded from as many risks as possible.
ModSecurity in Semi-dedicated Servers
All semi-dedicated server packages which we offer feature ModSecurity and given that the firewall is enabled by default, any Internet site which you build under a domain or a subdomain shall be secured right away. An independent section in the Hepsia Control Panel that comes with the semi-dedicated accounts is dedicated to ModSecurity and it'll permit you to stop and start the firewall for any Internet site or activate a detection mode. With the last option, ModSecurity won't take any action, but it will still identify possible attacks and shall keep all information inside a log as if it were completely active. The logs could be found in the same section of the CP and they offer details about the IP where an attack came from, what its nature was, what rule ModSecurity applies to recognize and stop it, etc. The security rules which we use on our web servers are a mix of commercial ones from a security firm and custom ones developed by our system administrators. As a result, we offer greater security for your web programs as we can defend them from attacks before security firms release updates for new threats.
ModSecurity in VPS Servers
All VPS servers that are offered with the Hepsia Control Panel include ModSecurity. The firewall is set up and activated by default for all domains that are hosted on the web server, so there won't be anything special which you'll have to do to protect your websites. It'll take you just a click to stop ModSecurity if needed or to turn on its passive mode so that it records what happens without taking any measures to prevent intrusions. You shall be able to see the logs created in passive or active mode from the corresponding section of Hepsia and discover more about the form of the attack, where it came from, what rule the firewall employed to take care of it, and so forth. We employ a mixture of commercial and custom rules in order to make sure that ModSecurity shall block as many risks as possible, thus enhancing the security of your web apps as much as possible.
ModSecurity in Dedicated Servers
ModSecurity is available as standard with all dedicated servers which are set up with the Hepsia Control Panel and is set to “Active” automatically for any domain which you host or subdomain you create on the web server. Just in case that a web application doesn't work adequately, you may either disable the firewall or set it to function in passive mode. The latter means that ModSecurity will maintain a log of any possible attack which could happen, but will not take any action to stop it. The logs generated in passive or active mode shall provide you with additional details about the exact file that was attacked, the nature of the attack and the IP it originated from, and so forth. This info will enable you to decide what steps you can take to enhance the security of your Internet sites, such as blocking IPs or performing script and plugin updates. The ModSecurity rules that we use are updated constantly with a commercial pack from a third-party security provider we work with, but sometimes our staff include their own rules as well when they discover a new potential threat.