ModSecurity in Shared Hosting
ModSecurity is provided with all shared hosting servers, so when you decide to host your Internet sites with our organization, they'll be protected against a wide range of attacks. The firewall is enabled by default for all domains and subdomains, so there will be nothing you'll have to do on your end. You'll be able to stop ModSecurity for any website if necessary, or to switch on a detection mode, so all activity shall be recorded, but the firewall will not take any real action. You'll be able to view detailed logs using your Hepsia Control Panel including the IP where the attack originated from, what the attacker planned to do and how ModSecurity addressed the threat. Since we take the security of our clients' sites seriously, we employ a collection of commercial rules which we get from one of the best companies which maintain such rules. Our administrators also include custom rules to ensure that your websites will be resistant to as many risks as possible.
ModSecurity in Semi-dedicated Servers
Any web application which you install within your new semi-dedicated server account shall be protected by ModSecurity since the firewall is provided with all our hosting solutions and is activated by default for any domain and subdomain which you include or create using your Hepsia hosting CP. You will be able to manage ModSecurity via a dedicated area within Hepsia where not only could you activate or deactivate it entirely, but you could also enable a passive mode, so the firewall shall not stop anything, but it'll still keep a record of potential attacks. This takes only a click and you shall be able to view the logs regardless of if ModSecurity is in passive or active mode through the same section - what the attack was and where it originated from, how it was dealt with, and so forth. The firewall employs two sets of rules on our servers - a commercial one that we get from a third-party web security company and a custom one that our admins update personally as to respond to recently discovered threats at the earliest opportunity.
ModSecurity in VPS Servers
ModSecurity is provided with all Hepsia-based VPS servers which we offer and it will be turned on automatically for any new domain or subdomain that you include on the hosting server. In this way, any web application that you install will be protected immediately without doing anything by hand on your end. The firewall could be managed from the section of the CP that bears the same name. This is the location whereyou'll be able to turn off ModSecurity or activate its passive mode, so it won't take any action against threats, but shall still keep a comprehensive log. The recorded data is available inside the same area as well and you shall be able to see what IPs any attacks came from so that you stop them, what the nature of the attempted attacks was and in accordance with what security rules ModSecurity responded. The rules that we use on our servers are a combination between commercial ones which we get from a security organization and custom ones that are included by our staff to optimize the security of any web applications hosted on our end.
ModSecurity in Dedicated Servers
ModSecurity is provided as standard with all dedicated servers that are set up with the Hepsia CP and is set to “Active” automatically for any domain that you host or subdomain which you create on the hosting server. In the event that a web application does not operate properly, you may either switch off the firewall or set it to operate in passive mode. The latter means that ModSecurity will maintain a log of any possible attack that could take place, but will not take any action to stop it. The logs generated in active or passive mode will provide you with additional details about the exact file which was attacked, the nature of the attack and the IP address it came from, etcetera. This information will allow you to choose what actions you can take to enhance the protection of your Internet sites, including blocking IPs or carrying out script and plugin updates. The ModSecurity rules which we employ are updated constantly with a commercial package from a third-party security enterprise we work with, but occasionally our staff add their own rules too in case they discover a new potential threat.