ModSecurity is an effective firewall for Apache web servers that is used to stop attacks against web apps. It tracks the HTTP traffic to a given site in real time and stops any intrusion attempts the instant it detects them. The firewall relies on a set of rules to do this - as an illustration, trying to log in to a script administrator area unsuccessfully a few times sets off one rule, sending a request to execute a particular file which could result in getting access to the site triggers a different rule, and so on. ModSecurity is amongst the best firewalls available and it will preserve even scripts that are not updated often as it can prevent attackers from using known exploits and security holes. Quite thorough info about every single intrusion attempt is recorded and the logs the firewall maintains are much more detailed than the regular logs provided by the Apache server, so you may later examine them and determine if you need to take extra measures in order to boost the security of your script-driven Internet sites.
ModSecurity in Cloud Hosting
ModSecurity is available with every single cloud hosting plan that we provide and it is turned on by default for every domain or subdomain which you add via your Hepsia Control Panel. If it disrupts any of your applications or you'd like to disable it for whatever reason, you'll be able to do that through the ModSecurity area of Hepsia with merely a mouse click. You may also enable a passive mode, so the firewall will discover possible attacks and keep a log, but will not take any action. You'll be able to view comprehensive logs in the exact same section, including the IP where the attack came from, exactly what the attacker aimed to do and at what time, what ModSecurity did, and so on. For optimum safety of our clients we use a collection of commercial firewall rules combined with custom ones which are included by our system administrators.
ModSecurity in Semi-dedicated Hosting
We've incorporated ModSecurity as a standard in all semi-dedicated hosting products, so your web apps shall be protected whenever you set them up under any domain or subdomain. The Hepsia Control Panel which comes with the semi-dedicated accounts shall permit you to switch on or disable the firewall for any Internet site with a mouse click. You'll also have the ability to turn on a passive detection mode in which ModSecurity will maintain a log of potential attacks without really preventing them. The comprehensive logs include the nature of the attack and what ModSecurity response that attack caused, where it came from, and so on. The list of rules we use is frequently updated as to match any new threats which might appear on the Internet and it consists of both commercial rules that we get from a security business and custom-written ones that our administrators add in the event that they discover a threat that's not present inside the commercial list yet.
ModSecurity in VPS Hosting
All virtual private servers which are provided with the Hepsia Control Panel include ModSecurity. The firewall is installed and switched on by default for all domains that are hosted on the server, so there won't be anything special which you'll need to do to protect your Internet sites. It'll take you simply a click to stop ModSecurity if needed or to switch on its passive mode so that it records what happens without taking any measures to stop intrusions. You will be able to look at the logs generated in active or passive mode through the corresponding section of Hepsia and find out more about the type of the attack, where it came from, what rule the firewall used to tackle it, etcetera. We employ a combination of commercial and custom rules in order to ensure that ModSecurity will block out as many threats as possible, therefore increasing the security of your web programs as much as possible.
ModSecurity in Dedicated Web Hosting
When you opt to host your websites on a dedicated server with the Hepsia Control Panel, your web apps will be protected immediately because ModSecurity is supplied with all Hepsia-based packages. You shall be able to regulate the firewall with ease and if required, you'll be able to turn it off or switch on its passive mode when it'll only maintain a log of what is occurring without taking any action to prevent potential attacks. The logs which you will find within the very same section of the Control Panel are quite detailed and contain details about the attacker IP address, what site and file were attacked and in what ways, what rule the firewall employed to stop the intrusion, and so forth. This data will permit you to take measures and enhance the security of your Internet sites even more. To be on the safe side, we use not only commercial rules, but also custom-made ones which our administrators include whenever they detect attacks which have not yet been included inside the commercial pack.