ModSecurity in Cloud Hosting
ModSecurity is provided with all cloud hosting machines, so if you decide to host your Internet sites with our business, they'll be protected against an array of attacks. The firewall is turned on as standard for all domains and subdomains, so there will be nothing you will have to do on your end. You shall be able to stop ModSecurity for any Internet site if necessary, or to enable a detection mode, so that all activity shall be recorded, but the firewall won't take any real action. You shall be able to view specific logs using your Hepsia Control Panel including the IP where the attack originated from, what the attacker planned to do and how ModSecurity addressed the threat. As we take the protection of our customers' websites seriously, we employ a group of commercial rules that we take from one of the top firms that maintain such rules. Our administrators also add custom rules to make sure that your sites shall be protected against as many threats as possible.
ModSecurity in Semi-dedicated Servers
ModSecurity is a part of our semi-dedicated server solutions and if you opt to host your websites with our company, there shall not be anything special you'll need to do since the firewall is switched on by default for all domains and subdomains which you add through your hosting Control Panel. If needed, you can disable ModSecurity for a certain site or switch on the so-called detection mode in which case the firewall will still function and record data, but will not do anything to prevent possible attacks on your sites. Comprehensive logs will be accessible in your CP and you shall be able to see which kind of attacks occurred, what security rules were triggered and how the firewall addressed the threats, what Internet protocol addresses the attacks came from, etc. We use 2 kinds of rules on our servers - commercial ones from an organization that operates in the field of web security, and customized ones which our admins often include to respond to newly discovered risks in a timely manner.
ModSecurity in VPS Servers
Protection is of the utmost importance to us, so we set up ModSecurity on all VPS servers that are provided with the Hepsia CP by default. The firewall could be managed through a dedicated section inside Hepsia and is activated automatically when you include a new domain or generate a subdomain, so you won't have to do anything personally. You'll also be able to deactivate it or activate the so-called detection mode, so it'll keep a log of possible attacks which you can later study, but will not prevent them. The logs in both passive and active modes offer information about the type of the attack and how it was stopped, what IP it came from and other valuable data which might help you to tighten the security of your websites by updating them or blocking IPs, for example. In addition to the commercial rules we get for ModSecurity from a third-party security company, we also employ our own rules because once in a while we find specific attacks that are not yet present within the commercial package. That way, we could improve the security of your VPS promptly as opposed to waiting for a certified update.
ModSecurity in Dedicated Servers
ModSecurity comes with all dedicated servers that are set up with our Hepsia Control Panel and you will not have to do anything specific on your end to employ it as it's enabled by default every time you include a new domain or subdomain on your hosting server. In the event that it interferes with some of your programs, you will be able to stop it through the respective part of Hepsia, or you can leave it operating in passive mode, so it shall recognize attacks and shall still maintain a log for them, but shall not block them. You could look at the logs later to find out what you can do to improve the safety of your Internet sites as you will find info such as where an intrusion attempt came from, what Internet site was attacked and based on what rule ModSecurity responded, and so on. The rules which we employ are commercial, therefore they are frequently updated by a security provider, but to be on the safe side, our administrators also include custom rules every now and then as to react to any new threats they have found.