ModSecurity in Cloud Hosting
ModSecurity is available on all cloud hosting web servers, so if you opt to host your websites with our business, they shall be resistant to a wide range of attacks. The firewall is enabled as standard for all domains and subdomains, so there shall be nothing you shall have to do on your end. You will be able to stop ModSecurity for any site if needed, or to switch on a detection mode, so all activity shall be recorded, but the firewall won't take any real action. You shall be able to view comprehensive logs through your Hepsia CP including the IP where the attack came from, what the attacker wanted to do and how ModSecurity addressed the threat. As we take the safety of our customers' Internet sites seriously, we use a selection of commercial rules that we take from one of the best companies that maintain this kind of rules. Our administrators also add custom rules to ensure that your Internet sites will be shielded from as many threats as possible.
ModSecurity in Semi-dedicated Servers
All semi-dedicated server solutions that we offer feature ModSecurity and since the firewall is switched on by default, any Internet site you create under a domain or a subdomain will be secured right from the start. A separate section inside the Hepsia Control Panel that comes with the semi-dedicated accounts is dedicated to ModSecurity and it will allow you to stop and start the firewall for any website or activate a detection mode. With the latter, ModSecurity won't take any action, but it'll still identify possible attacks and shall keep all information in a log as if it were 100% active. The logs can be found within the very same section of the CP and they feature specifics about the IP where an attack came from, what its nature was, what rule ModSecurity applies to recognize and stop it, and so forth. The security rules which we employ on our servers are a mix between commercial ones from a security firm and custom ones made by our system admins. As a result, we offer greater security for your web programs as we can protect them from attacks before security companies release updates for brand new threats.
ModSecurity in VPS Servers
Safety is essential to us, so we set up ModSecurity on all VPS servers which are set up with the Hepsia Control Panel by default. The firewall can be managed through a dedicated section in Hepsia and is activated automatically when you include a new domain or create a subdomain, so you won't have to do anything by hand. You will also be able to disable it or switch on the so-called detection mode, so it'll keep a log of potential attacks that you can later analyze, but will not block them. The logs in both passive and active modes include information regarding the form of the attack and how it was prevented, what IP address it originated from and other valuable information that could help you to tighten the security of your websites by updating them or blocking IPs, for example. Besides the commercial rules which we get for ModSecurity from a third-party security company, we also use our own rules because every now and then we find specific attacks that aren't yet present within the commercial package. This way, we can easily boost the protection of your VPS immediately as opposed to waiting for a certified update.
ModSecurity in Dedicated Servers
ModSecurity is provided with all dedicated servers that are set up with our Hepsia Control Panel and you'll not need to do anything specific on your end to use it since it's enabled by default each time you add a new domain or subdomain on your server. In case it disrupts some of your applications, you'll be able to stop it through the respective section of Hepsia, or you could leave it working in passive mode, so it shall recognize attacks and will still keep a log for them, but won't block them. You may examine the logs later to determine what you can do to improve the safety of your Internet sites as you'll find info such as where an intrusion attempt came from, what site was attacked and in accordance with what rule ModSecurity responded, etc. The rules we use are commercial, hence they are constantly updated by a security firm, but to be on the safe side, our admins also add custom rules from time to time in order to respond to any new threats they have discovered.