ModSecurity in Shared Web Hosting
ModSecurity is supplied with all shared web hosting web servers, so when you opt to host your websites with our firm, they shall be resistant to a wide range of attacks. The firewall is turned on as standard for all domains and subdomains, so there'll be nothing you will need to do on your end. You shall be able to stop ModSecurity for any Internet site if required, or to switch on a detection mode, so that all activity shall be recorded, but the firewall shall not take any real action. You shall be able to view comprehensive logs through your Hepsia CP including the IP where the attack came from, what the attacker wished to do and how ModSecurity dealt with the threat. As we take the security of our clients' sites very seriously, we use a selection of commercial rules which we get from one of the best companies which maintain this type of rules. Our administrators also add custom rules to ensure that your sites will be shielded from as many risks as possible.
ModSecurity in Semi-dedicated Servers
Any web program that you install inside your new semi-dedicated server account will be protected by ModSecurity since the firewall is included with all our hosting packages and is turned on by default for any domain and subdomain that you add or create through your Hepsia hosting Control Panel. You shall be able to manage ModSecurity through a dedicated section within Hepsia where not only could you activate or deactivate it fully, but you could also enable a passive mode, so the firewall will not stop anything, but it shall still keep an archive of potential attacks. This takes just a click and you will be able to view the logs regardless if ModSecurity is in passive or active mode through the same section - what the attack was and where it came from, how it was handled, and so forth. The firewall employs two groups of rules on our machines - a commercial one that we get from a third-party web security provider and a custom one that our administrators update manually as to respond to newly discovered threats as fast as possible.
ModSecurity in VPS Servers
ModSecurity is pre-installed on all VPS servers that are set up with the Hepsia hosting CP, so your web applications shall be protected from the instant your server is in a position. The firewall is activated by default for any domain or subdomain on the VPS, but if necessary, you could disable it with a click from the corresponding section of Hepsia. You could also set it to operate in detection mode, so it will keep a detailed log of any potential attacks without taking any action to prevent them. The logs are available within the exact same section and offer info about the nature of the attack, what IP address it originated from and what ModSecurity rule was activated to stop it. For best security, we use not only commercial rules from a business operating in the field of web security, but also custom ones which our administrators include manually so as to react to new threats that are still not dealt with in the commercial rules.
ModSecurity in Dedicated Servers
ModSecurity is offered by default with all dedicated servers which are set up with the Hepsia CP and is set to “Active” automatically for any domain which you host or subdomain which you create on the hosting server. Just in case that a web application doesn't work correctly, you can either disable the firewall or set it to function in passive mode. The latter means that ModSecurity shall keep a log of any potential attack which may occur, but won't take any action to stop it. The logs created in active or passive mode will provide you with more details about the exact file which was attacked, the form of the attack and the IP it originated from, etcetera. This info shall enable you to determine what steps you can take to boost the security of your websites, including blocking IPs or carrying out script and plugin updates. The ModSecurity rules we employ are updated frequently with a commercial package from a third-party security firm we work with, but oftentimes our staff add their own rules as well in the event that they identify a new potential threat.