ModSecurity is a plugin for Apache web servers which acts as a web app layer firewall. It's employed to stop attacks against script-driven Internet sites through the use of security rules which contain particular expressions. That way, the firewall can block hacking and spamming attempts and protect even websites which aren't updated often. As an example, multiple unsuccessful login attempts to a script administrator area or attempts to execute a certain file with the intention to get access to the script will trigger certain rules, so ModSecurity will stop these activities the minute it detects them. The firewall is extremely efficient as it screens the entire HTTP traffic to an Internet site in real time without slowing it down, so it could stop an attack before any damage is done. It also maintains a very thorough log of all attack attempts that includes more info than standard Apache logs, so you could later check out the data and take additional measures to increase the security of your Internet sites if needed.

ModSecurity in Shared Hosting

We provide ModSecurity with all shared hosting packages, so your web applications shall be protected against harmful attacks. The firewall is turned on as standard for all domains and subdomains, but in case you would like, you'll be able to stop it through the respective part of your Hepsia Control Panel. You'll be able to also switch on a detection mode, so ModSecurity will keep a log as intended, but won't take any action. The logs that you'll find in Hepsia are very detailed and include info about the nature of any attack, when it took place and from what IP, the firewall rule that was triggered, etcetera. We employ a range of commercial rules that are regularly updated, but sometimes our admins include custom rules as well in order to efficiently protect the websites hosted on our machines.

ModSecurity in Semi-dedicated Servers

All semi-dedicated server packages that we offer feature ModSecurity and given that the firewall is turned on by default, any site you create under a domain or a subdomain shall be secured right from the start. A separate section inside the Hepsia Control Panel which comes with the semi-dedicated accounts is devoted to ModSecurity and it will enable you to stop and start the firewall for any website or switch on a detection mode. With the last mentioned, ModSecurity won't take any action, but it'll still detect possible attacks and will keep all info inside a log as if it were 100% active. The logs can be found in the same section of the CP and they include details about the IP where an attack came from, what its nature was, what rule ModSecurity applies to identify and stop it, and so forth. The security rules we use on our servers are a mix between commercial ones from a security business and custom ones created by our system administrators. Consequently, we provide greater security for your web programs as we can protect them from attacks before security corporations release updates for new threats.

ModSecurity in Dedicated Servers

All of our dedicated servers which are installed with the Hepsia hosting Control Panel include ModSecurity, so any program which you upload or install will be protected from the very beginning and you won't need to stress about common attacks or vulnerabilities. A separate section inside Hepsia will enable you to start or stop the firewall for every domain or subdomain, or switch on a detection mode so that it records details about intrusions, but doesn't take actions to prevent them. What you will find in the logs can easily enable you to to secure your websites better - the IP address an attack came from, what site was attacked and how, what ModSecurity rule was triggered, etc. With this info, you can see whether a site needs an update, whether you need to block IPs from accessing your web server, and so forth. On top of the third-party commercial security rules for ModSecurity which we use, our administrators include custom ones as well when they discover a new threat which is not yet included in the commercial bundle.