ModSecurity is an effective firewall for Apache web servers which is used to stop attacks against web apps. It tracks the HTTP traffic to a given website in real time and stops any intrusion attempts the moment it discovers them. The firewall uses a set of rules to accomplish that - for instance, trying to log in to a script admin area unsuccessfully several times triggers one rule, sending a request to execute a specific file which may result in accessing the site triggers a different rule, and so forth. ModSecurity is amongst the best firewalls available on the market and it'll protect even scripts that are not updated on a regular basis since it can prevent attackers from employing known exploits and security holes. Quite comprehensive data about each intrusion attempt is recorded and the logs the firewall keeps are a lot more specific than the regular logs provided by the Apache server, so you can later examine them and decide whether you need to take extra measures in order to enhance the protection of your script-driven Internet sites.
ModSecurity in Cloud Hosting
We offer ModSecurity with all cloud hosting plans, so your Internet apps shall be shielded from harmful attacks. The firewall is turned on by default for all domains and subdomains, but if you would like, you shall be able to stop it through the respective part of your Hepsia CP. You can also activate a detection mode, so ModSecurity shall keep a log as intended, but shall not take any action. The logs that you will discover in Hepsia are incredibly detailed and offer information about the nature of any attack, when it occurred and from what IP address, the firewall rule that was triggered, and so on. We employ a group of commercial rules which are regularly updated, but sometimes our admins add custom rules as well in order to better protect the Internet sites hosted on our machines.
ModSecurity in Semi-dedicated Servers
We've integrated ModSecurity by default in all semi-dedicated server products, so your web applications shall be protected as soon as you set them up under any domain or subdomain. The Hepsia Control Panel that comes with the semi-dedicated accounts will allow you to enable or disable the firewall for any site with a mouse click. You will also be able to turn on a passive detection mode through which ModSecurity will keep a log of potential attacks without really preventing them. The thorough logs include things like the nature of the attack and what ModSecurity response that attack activated, where it originated from, and so forth. The list of rules we employ is constantly updated as to match any new risks that could appear on the Internet and it features both commercial rules that we get from a security business and custom-written ones which our admins add if they find a threat that's not present inside the commercial list yet.
ModSecurity in VPS Servers
All VPS servers which are offered with the Hepsia CP include ModSecurity. The firewall is set up and switched on by default for all domains which are hosted on the web server, so there will not be anything special which you'll need to do to protect your websites. It will take you only a mouse click to stop ModSecurity if required or to turn on its passive mode so that it records what goes on without taking any steps to stop intrusions. You will be able to view the logs generated in active or passive mode from the corresponding section of Hepsia and find out more about the type of the attack, where it came from, what rule the firewall used to deal with it, etc. We employ a mixture of commercial and custom rules so as to make sure that ModSecurity will prevent as many risks as possible, consequently boosting the protection of your web apps as much as possible.
ModSecurity in Dedicated Servers
If you choose to host your websites on a dedicated server with the Hepsia CP, your web apps will be secured straight away since ModSecurity is provided with all Hepsia-based solutions. You'll be able to control the firewall with ease and if needed, you'll be able to turn it off or switch on its passive mode when it shall only maintain a log of what's taking place without taking any action to prevent possible attacks. The logs that you'll find within the exact same section of the CP are quite detailed and contain details about the attacker IP address, what website and file were attacked and in what way, what rule the firewall used to stop the intrusion, and so forth. This info shall permit you to take measures and enhance the protection of your Internet sites even more. To be on the safe side, we use not only commercial rules, but also custom-made ones that our admins add every time they detect attacks that have not yet been included in the commercial pack.