ModSecurity is a plugin for Apache web servers which acts as a web application layer firewall. It's used to prevent attacks toward script-driven Internet sites by employing security rules which contain particular expressions. This way, the firewall can block hacking and spamming attempts and preserve even sites which aren't updated often. For example, several unsuccessful login attempts to a script administrator area or attempts to execute a certain file with the objective to get access to the script will trigger certain rules, so ModSecurity will block these activities the moment it identifies them. The firewall is quite efficient because it screens the whole HTTP traffic to an Internet site in real time without slowing it down, so it could stop an attack before any damage is done. It also keeps an incredibly comprehensive log of all attack attempts which includes more info than traditional Apache logs, so you could later examine the data and take additional measures to enhance the security of your Internet sites if necessary.

ModSecurity in Shared Hosting

We provide ModSecurity with all shared hosting solutions, so your web applications will be shielded from harmful attacks. The firewall is switched on by default for all domains and subdomains, but in case you would like, you'll be able to stop it through the respective section of your Hepsia CP. You can also activate a detection mode, so ModSecurity will keep a log as intended, but won't take any action. The logs that you'll find within Hepsia are quite detailed and feature data about the nature of any attack, when it transpired and from what IP address, the firewall rule that was triggered, and so on. We use a set of commercial rules that are regularly updated, but sometimes our administrators add custom rules as well so as to efficiently protect the Internet sites hosted on our servers.

ModSecurity in Semi-dedicated Hosting

ModSecurity is a part of our semi-dedicated hosting plans and if you opt to host your sites with our company, there shall not be anything special you'll need to do given that the firewall is turned on by default for all domains and subdomains that you include via your hosting Control Panel. If needed, you can disable ModSecurity for a certain site or enable the so-called detection mode in which case the firewall will still operate and record data, but won't do anything to prevent potential attacks on your Internet sites. Detailed logs will be readily available in your Control Panel and you'll be able to see what type of attacks occurred, what security rules were triggered and how the firewall handled the threats, what Internet protocol addresses the attacks originated from, and so on. We employ two types of rules on our servers - commercial ones from a company which operates in the field of web security, and customized ones that our administrators often add to respond to newly discovered threats on time.

ModSecurity in VPS Hosting

All virtual private servers which are set up with the Hepsia Control Panel come with ModSecurity. The firewall is set up and activated by default for all domains that are hosted on the server, so there won't be anything special which you'll need to do to protect your sites. It will take you just a mouse click to stop ModSecurity if necessary or to activate its passive mode so that it records what occurs without taking any actions to stop intrusions. You shall be able to look at the logs created in passive or active mode from the corresponding section of Hepsia and learn more about the type of the attack, where it originated from, what rule the firewall used to handle it, etc. We employ a mixture of commercial and custom rules so as to make certain that ModSecurity shall block as many risks as possible, consequently boosting the security of your web applications as much as possible.

ModSecurity in Dedicated Web Hosting

When you decide to host your Internet sites on a dedicated server with the Hepsia Control Panel, your web programs shall be secured straight away because ModSecurity is provided with all Hepsia-based plans. You will be able to regulate the firewall with ease and if required, you will be able to turn it off or activate its passive mode when it shall only keep a log of what's taking place without taking any action to prevent potential attacks. The logs which you'll find within the very same section of the CP are extremely detailed and include information about the attacker IP, what website and file were attacked and in what ways, what rule the firewall used to prevent the intrusion, and so forth. This information will allow you to take measures and improve the security of your websites even more. To be on the safe side, we use not only commercial rules, but also custom-made ones which our administrators include every time they identify attacks which haven't yet been included inside the commercial pack.