ModSecurity in Cloud Hosting
ModSecurity is provided with all cloud hosting machines, so if you decide to host your websites with our organization, they'll be shielded from a wide array of attacks. The firewall is turned on as standard for all domains and subdomains, so there shall be nothing you will need to do on your end. You shall be able to stop ModSecurity for any Internet site if needed, or to enable a detection mode, so all activity will be recorded, but the firewall won't take any real action. You shall be able to view detailed logs via your Hepsia Control Panel including the IP where the attack originated from, what the attacker wished to do and how ModSecurity dealt with the threat. Since we take the security of our customers' sites very seriously, we use a collection of commercial rules which we get from one of the top companies that maintain this sort of rules. Our administrators also add custom rules to ensure that your websites shall be protected against as many risks as possible.
ModSecurity in Semi-dedicated Hosting
ModSecurity is a part of our semi-dedicated hosting plans and if you choose to host your websites with us, there will not be anything special you'll have to do as the firewall is activated by default for all domains and subdomains that you add via your hosting Control Panel. If needed, you'll be able to disable ModSecurity for a certain website or activate the so-called detection mode in which case the firewall shall still operate and record info, but won't do anything to prevent possible attacks on your Internet sites. Thorough logs will be accessible within your Control Panel and you will be able to see what sort of attacks took place, what security rules were triggered and how the firewall handled the threats, what Internet protocol addresses the attacks came from, etcetera. We use two sorts of rules on our servers - commercial ones from a company which operates in the field of web security, and custom made ones which our administrators occasionally add to respond to newly identified threats promptly.
ModSecurity in VPS
Protection is very important to us, so we set up ModSecurity on all virtual private servers that are provided with the Hepsia Control Panel as a standard. The firewall could be managed through a dedicated section inside Hepsia and is turned on automatically when you include a new domain or generate a subdomain, so you won't need to do anything by hand. You'll also be able to disable it or activate the so-called detection mode, so it will maintain a log of possible attacks that you can later analyze, but won't stop them. The logs in both passive and active modes include details regarding the form of the attack and how it was stopped, what IP address it came from and other valuable information that might help you to tighten the security of your Internet sites by updating them or blocking IPs, as an example. Besides the commercial rules we get for ModSecurity from a third-party security company, we also employ our own rules because occasionally we discover specific attacks that aren't yet present within the commercial pack. That way, we could boost the security of your Virtual private server instantly as opposed to awaiting an official update.
ModSecurity in Dedicated Hosting
ModSecurity is provided with all dedicated servers that are integrated with our Hepsia CP and you'll not need to do anything specific on your end to employ it since it's turned on by default whenever you add a new domain or subdomain on your hosting server. If it disrupts some of your programs, you will be able to stop it via the respective part of Hepsia, or you can leave it in passive mode, so it shall identify attacks and will still maintain a log for them, but shall not block them. You could analyze the logs later to learn what you can do to increase the security of your websites since you'll find info such as where an intrusion attempt came from, what website was attacked and in accordance with what rule ModSecurity responded, etc. The rules we employ are commercial, thus they're frequently updated by a security company, but to be on the safe side, our administrators also include custom rules occasionally in order to respond to any new threats they have identified.