ModSecurity in Cloud Hosting
We offer ModSecurity with all cloud hosting solutions, so your web applications will be shielded from harmful attacks. The firewall is activated as standard for all domains and subdomains, but in case you'd like, you shall be able to stop it via the respective area of your Hepsia CP. You'll be able to also activate a detection mode, so ModSecurity shall keep a log as intended, but won't take any action. The logs that you will find within Hepsia are extremely detailed and feature information about the nature of any attack, when it happened and from what IP, the firewall rule which was triggered, etc. We use a range of commercial rules which are constantly updated, but sometimes our administrators add custom rules as well so as to efficiently protect the websites hosted on our servers.
ModSecurity in Semi-dedicated Servers
ModSecurity is part of our semi-dedicated server plans and if you decide to host your sites with our company, there will not be anything special you'll have to do as the firewall is turned on by default for all domains and subdomains you add using your hosting CP. If necessary, you can disable ModSecurity for a certain website or turn on the so-called detection mode in which case the firewall shall still work and record info, but shall not do anything to prevent possible attacks against your Internet sites. Comprehensive logs will be readily available within your CP and you will be able to see what type of attacks happened, what security rules were triggered and how the firewall handled the threats, what Internet protocol addresses the attacks originated from, and so on. We use two kinds of rules on our servers - commercial ones from an organization that operates in the field of web security, and custom made ones which our administrators often include to respond to newly found risks on time.
ModSecurity in Dedicated Servers
ModSecurity is provided as standard with all dedicated servers that are set up with the Hepsia Control Panel and is set to “Active” automatically for any domain you host or subdomain you create on the web server. In the event that a web application doesn't function properly, you may either turn off the firewall or set it to operate in passive mode. The latter means that ModSecurity shall maintain a log of any potential attack which could take place, but shall not take any action to stop it. The logs generated in active or passive mode shall offer you additional details about the exact file that was attacked, the type of the attack and the IP address it originated from, and so forth. This information shall allow you to choose what measures you can take to boost the security of your websites, for instance blocking IPs or performing script and plugin updates. The ModSecurity rules which we employ are updated frequently with a commercial bundle from a third-party security company we work with, but oftentimes our admins include their own rules as well when they come across a new potential threat.