ModSecurity in Shared Hosting
ModSecurity is available on all shared hosting web servers, so if you decide to host your Internet sites with our firm, they will be resistant to an array of attacks. The firewall is enabled as standard for all domains and subdomains, so there shall be nothing you shall have to do on your end. You'll be able to stop ModSecurity for any website if necessary, or to enable a detection mode, so that all activity shall be recorded, but the firewall shall not take any real action. You'll be able to view comprehensive logs through your Hepsia CP including the IP address where the attack originated from, what the attacker planned to do and how ModSecurity handled the threat. As we take the protection of our customers' sites seriously, we use a collection of commercial rules that we get from one of the top companies that maintain this sort of rules. Our admins also include custom rules to make certain that your sites shall be protected against as many risks as possible.
ModSecurity in Semi-dedicated Hosting
ModSecurity is part of our semi-dedicated hosting plans and if you opt to host your sites with us, there will not be anything special you'll need to do since the firewall is activated by default for all domains and subdomains that you include via your hosting Control Panel. If required, you could disable ModSecurity for a particular website or activate the so-called detection mode in which case the firewall shall still function and record data, but shall not do anything to prevent possible attacks on your websites. Comprehensive logs will be accessible inside your Control Panel and you'll be able to see what type of attacks happened, what security rules were triggered and how the firewall handled the threats, what IP addresses the attacks came from, etcetera. We employ two kinds of rules on our servers - commercial ones from a firm which operates in the field of web security, and custom ones which our administrators sometimes include to respond to newly discovered threats in a timely manner.
ModSecurity in VPS
ModSecurity is provided with all Hepsia-based virtual private servers we offer and it will be switched on automatically for every new domain or subdomain you add on the hosting server. That way, any web app which you install shall be protected from the very beginning without doing anything manually on your end. The firewall can be managed from the section of the Control Panel which has the same name. This is the area whereyou could disable ModSecurity or activate its passive mode, so it will not take any action towards threats, but will still keep a detailed log. The recorded data is available in the same section as well and you will be able to see what IPs any attacks originated from so that you can stop them, what the nature of the attempted attacks was and based upon what security rules ModSecurity responded. The rules which we use on our servers are a mix between commercial ones which we get from a security organization and custom ones which are added by our admins to improve the protection of any web applications hosted on our end.
ModSecurity in Dedicated Hosting
ModSecurity is offered by default with all dedicated servers that are set up with the Hepsia CP and is set to “Active” automatically for any domain that you host or subdomain you create on the web server. Just in case that a web application doesn't work correctly, you can either disable the firewall or set it to operate in passive mode. The second means that ModSecurity shall maintain a log of any potential attack which could take place, but will not take any action to stop it. The logs produced in passive or active mode will offer you additional details about the exact file that was attacked, the nature of the attack and the IP address it came from, etc. This information will permit you to choose what actions you can take to enhance the protection of your Internet sites, such as blocking IPs or performing script and plugin updates. The ModSecurity rules which we employ are updated often with a commercial package from a third-party security firm we work with, but from time to time our admins include their own rules as well if they identify a new potential threat.