ModSecurity in Cloud Hosting
We offer ModSecurity with all cloud hosting solutions, so your Internet applications shall be resistant to malicious attacks. The firewall is activated as standard for all domains and subdomains, but if you'd like, you shall be able to stop it using the respective area of your Hepsia CP. You'll be able to also switch on a detection mode, so ModSecurity will keep a log as intended, but shall not take any action. The logs which you'll discover inside Hepsia are extremely detailed and include info about the nature of any attack, when it transpired and from what IP address, the firewall rule which was triggered, etc. We employ a range of commercial rules which are frequently updated, but sometimes our administrators add custom rules as well so as to efficiently protect the Internet sites hosted on our machines.
ModSecurity in Semi-dedicated Servers
All semi-dedicated server solutions which we offer include ModSecurity and because the firewall is enabled by default, any site that you build under a domain or a subdomain shall be protected right away. A separate section in the Hepsia CP which comes with the semi-dedicated accounts is dedicated to ModSecurity and it will permit you to start and stop the firewall for any Internet site or enable a detection mode. With the last mentioned, ModSecurity shall not take any action, but it shall still identify possible attacks and will keep all information inside a log as if it were fully active. The logs can be found within the exact same section of the CP and they offer details about the IP where an attack came from, what its nature was, what rule ModSecurity applies to identify and stop it, etcetera. The security rules we employ on our machines are a mix between commercial ones from a security company and custom ones made by our system admins. As a result, we provide higher security for your web applications as we can protect them from attacks even before security corporations release updates for new threats.
ModSecurity in VPS Servers
ModSecurity is provided with all Hepsia-based VPS servers we offer and it'll be activated automatically for every new domain or subdomain you include on the hosting server. In this way, any web application which you install shall be secured from the very beginning without doing anything personally on your end. The firewall could be managed through the section of the Control Panel that has the same name. This is the place whereyou can switch off ModSecurity or enable its passive mode, so it will not take any action towards threats, but shall still maintain a thorough log. The recorded information is available in the same area as well and you'll be able to see what IPs any attacks originated from so that you can block them, what the nature of the attempted attacks was and in accordance with what security rules ModSecurity responded. The rules we employ on our servers are a mixture between commercial ones we get from a security company and custom ones which are included by our administrators to improve the protection of any web applications hosted on our end.
ModSecurity in Dedicated Servers
ModSecurity is available by default with all dedicated servers that are set up with the Hepsia CP and is set to “Active” automatically for any domain which you host or subdomain you create on the server. Just in case that a web app doesn't function properly, you may either disable the firewall or set it to work in passive mode. The latter means that ModSecurity will maintain a log of any potential attack that might take place, but shall not take any action to stop it. The logs generated in active or passive mode will present you with more details about the exact file which was attacked, the type of the attack and the IP it came from, and so forth. This data will allow you to choose what actions you can take to boost the safety of your sites, including blocking IPs or performing script and plugin updates. The ModSecurity rules which we employ are updated constantly with a commercial bundle from a third-party security firm we work with, but occasionally our admins add their own rules also in the event that they discover a new potential threat.