ModSecurity in Cloud Website Hosting
ModSecurity comes standard with all cloud website hosting plans that we provide and it will be turned on automatically for any domain or subdomain that you add/create inside your Hepsia hosting Control Panel. The firewall has 3 different modes, so you can activate and disable it with a mouse click or set it to detection mode, so it shall keep a log of all attacks, but it shall not do anything to prevent them. The log for any of your websites will include comprehensive info including the nature of the attack, where it came from, what action was taken by ModSecurity, etcetera. The firewall rules which we use are regularly updated and comprise of both commercial ones that we get from a third-party security company and custom ones our system administrators include in the event that they detect a new kind of attacks. In this way, the Internet sites you host here shall be far more secure without any action required on your end.
ModSecurity in Semi-dedicated Servers
All semi-dedicated server solutions that we offer include ModSecurity and because the firewall is switched on by default, any Internet site which you build under a domain or a subdomain shall be protected right from the start. An individual section inside the Hepsia Control Panel which comes with the semi-dedicated accounts is devoted to ModSecurity and it shall permit you to stop and start the firewall for any site or enable a detection mode. With the last option, ModSecurity won't take any action, but it'll still detect possible attacks and shall keep all info inside a log as if it were 100% active. The logs can be found in the exact same section of the CP and they include information regarding the IP where an attack came from, what its nature was, what rule ModSecurity applies to detect and stop it, and so forth. The security rules that we employ on our web servers are a mix of commercial ones from a security company and custom ones made by our system administrators. Therefore, we provide greater security for your web apps as we can protect them from attacks even before security companies release updates for brand new threats.
ModSecurity in VPS Servers
All VPS servers which are offered with the Hepsia CP feature ModSecurity. The firewall is set up and activated by default for all domains which are hosted on the web server, so there won't be anything special that you'll have to do to protect your Internet sites. It'll take you only a click to stop ModSecurity if needed or to turn on its passive mode so that it records what happens without taking any steps to prevent intrusions. You shall be able to see the logs generated in active or passive mode via the corresponding section of Hepsia and discover more about the type of the attack, where it came from, what rule the firewall employed to deal with it, etcetera. We use a mix of commercial and custom rules in order to make certain that ModSecurity will block out as many risks as possible, thus improving the security of your web programs as much as possible.
ModSecurity in Dedicated Servers
ModSecurity is provided as standard with all dedicated servers which are set up with the Hepsia Control Panel and is set to “Active” automatically for any domain that you host or subdomain that you create on the server. Just in case that a web application does not operate adequately, you could either turn off the firewall or set it to work in passive mode. The second means that ModSecurity shall maintain a log of any possible attack which might occur, but won't take any action to prevent it. The logs generated in active or passive mode shall offer you more details about the exact file which was attacked, the type of the attack and the IP address it originated from, etcetera. This info shall enable you to decide what actions you can take to enhance the protection of your sites, for instance blocking IPs or performing script and plugin updates. The ModSecurity rules we employ are updated often with a commercial bundle from a third-party security enterprise we work with, but sometimes our staff add their own rules as well in the event that they come across a new potential threat.