ModSecurity is a highly effective web application layer firewall for Apache web servers. It monitors the whole HTTP traffic to a website without affecting its performance and in case it identifies an intrusion attempt, it prevents it. The firewall furthermore maintains a more thorough log for the website visitors than any server does, so you shall manage to monitor what is going on with your websites much better than if you rely only on standard logs. ModSecurity uses security rules based on which it stops attacks. For instance, it identifies whether somebody is attempting to log in to the administration area of a particular script multiple times or if a request is sent to execute a file with a particular command. In these cases these attempts set off the corresponding rules and the firewall program hinders the attempts right away, then records in-depth details about them inside its logs. ModSecurity is amongst the very best software firewalls out there and it can easily protect your web applications against a huge number of threats and vulnerabilities, particularly in case you don’t update them or their plugins often.
ModSecurity in Cloud Website Hosting
We offer ModSecurity with all cloud website hosting plans, so your web apps will be resistant to destructive attacks. The firewall is switched on by default for all domains and subdomains, but in case you'd like, you will be able to stop it through the respective part of your Hepsia CP. You can also switch on a detection mode, so ModSecurity will keep a log as intended, but won't take any action. The logs which you shall find in Hepsia are quite detailed and offer data about the nature of any attack, when it transpired and from what IP address, the firewall rule that was triggered, etcetera. We use a range of commercial rules that are constantly updated, but sometimes our administrators include custom rules as well so as to efficiently protect the sites hosted on our machines.
ModSecurity in Semi-dedicated Servers
ModSecurity is a part of our semi-dedicated server plans and if you decide to host your Internet sites with our company, there will not be anything special you will have to do given that the firewall is activated by default for all domains and subdomains that you add using your hosting Control Panel. If necessary, you can disable ModSecurity for a given site or switch on the so-called detection mode in which case the firewall shall still work and record information, but won't do anything to stop potential attacks on your sites. Thorough logs shall be available in your CP and you shall be able to see what type of attacks took place, what security rules were triggered and how the firewall handled the threats, what Internet protocol addresses the attacks originated from, etc. We employ 2 sorts of rules on our servers - commercial ones from a business that operates in the field of web security, and customized ones that our admins often add to respond to newly found threats promptly.
ModSecurity in Dedicated Servers
ModSecurity is available by default with all dedicated servers which are set up with the Hepsia Control Panel and is set to “Active” automatically for any domain which you host or subdomain which you create on the server. In the event that a web app doesn't operate correctly, you may either disable the firewall or set it to function in passive mode. The second means that ModSecurity will keep a log of any possible attack which may take place, but shall not take any action to prevent it. The logs produced in active or passive mode shall provide you with additional details about the exact file which was attacked, the form of the attack and the IP it came from, etcetera. This information will permit you to decide what actions you can take to increase the protection of your sites, such as blocking IPs or performing script and plugin updates. The ModSecurity rules which we use are updated frequently with a commercial bundle from a third-party security enterprise we work with, but occasionally our staff include their own rules as well if they come across a new potential threat.