ModSecurity in Cloud Web Hosting
ModSecurity is offered with each and every cloud web hosting package which we provide and it is activated by default for every domain or subdomain that you include via your Hepsia Control Panel. If it interferes with any of your apps or you'd like to disable it for whatever reason, you'll be able to do that through the ModSecurity section of Hepsia with merely a click. You could also activate a passive mode, so the firewall will recognize possible attacks and keep a log, but shall not take any action. You can view detailed logs in the exact same section, including the IP where the attack came from, exactly what the attacker tried to do and at what time, what ModSecurity did, etcetera. For optimum safety of our customers we use a collection of commercial firewall rules mixed with custom ones that are included by our system admins.
ModSecurity in Semi-dedicated Hosting
Any web app you set up in your new semi-dedicated hosting account shall be protected by ModSecurity since the firewall is provided with all our hosting packages and is activated by default for any domain and subdomain you include or create via your Hepsia hosting CP. You shall be able to manage ModSecurity through a dedicated area within Hepsia where not simply could you activate or deactivate it entirely, but you may also enable a passive mode, so the firewall will not stop anything, but it shall still maintain an archive of potential attacks. This requires just a mouse click and you shall be able to look at the logs regardless of if ModSecurity is in active or passive mode through the same section - what the attack was and where it came from, how it was addressed, and so forth. The firewall employs two sets of rules on our servers - a commercial one which we get from a third-party web security firm and a custom one that our admins update personally as to respond to newly discovered risks immediately.
ModSecurity in VPS Web Hosting
Security is very important to us, so we set up ModSecurity on all virtual private servers which are provided with the Hepsia Control Panel by default. The firewall could be managed through a dedicated section within Hepsia and is switched on automatically when you add a new domain or generate a subdomain, so you'll not need to do anything by hand. You shall also be able to deactivate it or activate the so-called detection mode, so it'll maintain a log of potential attacks which you can later analyze, but will not block them. The logs in both passive and active modes include info regarding the kind of the attack and how it was eliminated, what IP address it originated from and other important information which could help you to tighten the security of your websites by updating them or blocking IPs, for instance. Beyond the commercial rules which we get for ModSecurity from a third-party security company, we also employ our own rules since occasionally we identify specific attacks which are not yet present inside the commercial package. This way, we can improve the protection of your VPS promptly instead of waiting for a certified update.
ModSecurity in Dedicated Servers Hosting
ModSecurity is offered by default with all dedicated servers that are set up with the Hepsia CP and is set to “Active” automatically for any domain that you host or subdomain that you create on the hosting server. In case that a web application doesn't function adequately, you could either turn off the firewall or set it to operate in passive mode. The latter means that ModSecurity will maintain a log of any potential attack which could occur, but shall not take any action to stop it. The logs created in passive or active mode will present you with additional details about the exact file which was attacked, the nature of the attack and the IP it originated from, etcetera. This data will permit you to choose what actions you can take to increase the safety of your websites, such as blocking IPs or performing script and plugin updates. The ModSecurity rules that we employ are updated constantly with a commercial pack from a third-party security provider we work with, but occasionally our administrators add their own rules too if they discover a new potential threat.