ModSecurity in Cloud Hosting
ModSecurity is supplied with all cloud hosting servers, so if you decide to host your sites with our business, they shall be protected against a wide range of attacks. The firewall is enabled as standard for all domains and subdomains, so there'll be nothing you will have to do on your end. You will be able to stop ModSecurity for any site if required, or to enable a detection mode, so that all activity shall be recorded, but the firewall shall not take any real action. You shall be able to view comprehensive logs via your Hepsia Control Panel including the IP where the attack came from, what the attacker planned to do and how ModSecurity dealt with the threat. Since we take the protection of our customers' sites very seriously, we use a set of commercial rules which we get from one of the leading companies that maintain such rules. Our admins also add custom rules to make sure that your sites will be resistant to as many threats as possible.
ModSecurity in Semi-dedicated Servers
ModSecurity is part of our semi-dedicated server packages and if you decide to host your websites with us, there shall not be anything special you'll have to do since the firewall is turned on by default for all domains and subdomains which you include through your hosting Control Panel. If required, you could disable ModSecurity for a certain site or switch on the so-called detection mode in which case the firewall will still function and record information, but won't do anything to stop possible attacks on your sites. Thorough logs shall be accessible within your CP and you will be able to see what sort of attacks took place, what security rules were triggered and how the firewall handled the threats, what Internet protocol addresses the attacks originated from, etc. We use 2 types of rules on our servers - commercial ones from an organization which operates in the field of web security, and custom made ones which our admins often add to respond to newly found threats in a timely manner.
ModSecurity in VPS Servers
Security is extremely important to us, so we install ModSecurity on all VPS servers which are provided with the Hepsia Control Panel by default. The firewall can be managed through a dedicated section in Hepsia and is switched on automatically when you include a new domain or generate a subdomain, so you will not need to do anything by hand. You'll also be able to disable it or turn on the so-called detection mode, so it will maintain a log of potential attacks which you can later analyze, but will not block them. The logs in both passive and active modes contain information regarding the form of the attack and how it was eliminated, what IP it originated from and other valuable information that might help you to tighten the security of your sites by updating them or blocking IPs, for instance. Besides the commercial rules which we get for ModSecurity from a third-party security firm, we also use our own rules since from time to time we discover specific attacks that aren't yet present inside the commercial pack. This way, we could increase the protection of your Virtual private server in a timely manner as opposed to waiting for an official update.
ModSecurity in Dedicated Servers
ModSecurity is provided by default with all dedicated servers which are set up with the Hepsia CP and is set to “Active” automatically for any domain that you host or subdomain which you create on the server. Just in case that a web application doesn't operate correctly, you could either switch off the firewall or set it to work in passive mode. The latter means that ModSecurity shall keep a log of any possible attack which might take place, but will not take any action to prevent it. The logs created in active or passive mode will present you with additional details about the exact file that was attacked, the form of the attack and the IP it came from, etc. This info will permit you to determine what measures you can take to boost the safety of your websites, including blocking IPs or performing script and plugin updates. The ModSecurity rules we employ are updated often with a commercial bundle from a third-party security firm we work with, but oftentimes our staff add their own rules as well in the event that they identify a new potential threat.