ModSecurity in Shared Hosting
ModSecurity is provided with all shared hosting servers, so if you choose to host your Internet sites with our organization, they will be resistant to a wide range of attacks. The firewall is enabled by default for all domains and subdomains, so there shall be nothing you'll need to do on your end. You'll be able to stop ModSecurity for any website if necessary, or to switch on a detection mode, so that all activity will be recorded, but the firewall will not take any real action. You shall be able to view detailed logs through your Hepsia Control Panel including the IP where the attack came from, what the attacker wanted to do and how ModSecurity handled the threat. Since we take the security of our customers' websites seriously, we use a selection of commercial rules which we get from one of the best companies which maintain this kind of rules. Our administrators also include custom rules to make certain that your websites shall be shielded from as many threats as possible.
ModSecurity in Semi-dedicated Hosting
ModSecurity is a part of our semi-dedicated hosting solutions and if you opt to host your sites with us, there won't be anything special you will have to do since the firewall is turned on by default for all domains and subdomains which you include through your hosting Control Panel. If needed, you can disable ModSecurity for a certain site or switch on the so-called detection mode in which case the firewall shall still operate and record info, but will not do anything to prevent possible attacks on your websites. Comprehensive logs will be accessible within your Control Panel and you shall be able to see which kind of attacks took place, what security rules were triggered and how the firewall handled the threats, what Internet protocol addresses the attacks originated from, etcetera. We use 2 types of rules on our servers - commercial ones from a business that operates in the field of web security, and customized ones which our administrators sometimes add to respond to newly identified risks in a timely manner.
ModSecurity in VPS
All virtual private servers which are set up with the Hepsia CP feature ModSecurity. The firewall is installed and activated by default for all domains which are hosted on the web server, so there will not be anything special which you will have to do to protect your sites. It shall take you only a mouse click to stop ModSecurity if needed or to switch on its passive mode so that it records what goes on without taking any actions to prevent intrusions. You will be able to see the logs generated in active or passive mode from the corresponding section of Hepsia and learn more about the form of the attack, where it originated from, what rule the firewall used to take care of it, and so on. We employ a mix of commercial and custom rules in order to ensure that ModSecurity shall stop as many threats as possible, therefore improving the security of your web applications as much as possible.
ModSecurity in Dedicated Hosting
ModSecurity is available as standard with all dedicated servers that are set up with the Hepsia Control Panel and is set to “Active” automatically for any domain you host or subdomain which you create on the server. In case that a web app does not work adequately, you could either disable the firewall or set it to work in passive mode. The second means that ModSecurity will keep a log of any potential attack that might take place, but won't take any action to prevent it. The logs produced in passive or active mode shall offer you additional details about the exact file that was attacked, the type of the attack and the IP address it came from, and so on. This info shall enable you to choose what steps you can take to boost the security of your sites, such as blocking IPs or carrying out script and plugin updates. The ModSecurity rules we use are updated often with a commercial package from a third-party security enterprise we work with, but oftentimes our administrators include their own rules also in case they come across a new potential threat.