ModSecurity in Shared Hosting
ModSecurity is available on all shared hosting machines, so if you choose to host your sites with our business, they'll be protected against an array of attacks. The firewall is enabled as standard for all domains and subdomains, so there shall be nothing you'll have to do on your end. You'll be able to stop ModSecurity for any Internet site if required, or to switch on a detection mode, so all activity will be recorded, but the firewall will not take any real action. You will be able to view specific logs from your Hepsia Control Panel including the IP where the attack came from, what the attacker planned to do and how ModSecurity dealt with the threat. Since we take the safety of our clients' Internet sites very seriously, we use a set of commercial rules that we take from one of the top companies that maintain such rules. Our administrators also add custom rules to make certain that your sites shall be shielded from as many threats as possible.
ModSecurity in Semi-dedicated Hosting
ModSecurity is a part of our semi-dedicated hosting packages and if you choose to host your sites with us, there will not be anything special you will have to do as the firewall is turned on by default for all domains and subdomains that you include using your hosting Control Panel. If needed, you'll be able to disable ModSecurity for a particular Internet site or turn on the so-called detection mode in which case the firewall shall still work and record information, but will not do anything to stop potential attacks on your Internet sites. Detailed logs will be readily available within your CP and you will be able to see what type of attacks occurred, what security rules were triggered and how the firewall dealt with the threats, what IP addresses the attacks originated from, and so on. We use 2 types of rules on our servers - commercial ones from a company that operates in the field of web security, and custom ones that our administrators occasionally add to respond to newly discovered threats in a timely manner.
ModSecurity in VPS Hosting
ModSecurity is included with all Hepsia-based virtual private servers which we offer and it will be turned on automatically for every new domain or subdomain that you include on the web server. That way, any web app you install shall be protected right from the start without doing anything by hand on your end. The firewall can be handled through the section of the CP that has the same name. This is the area whereyou can turn off ModSecurity or activate its passive mode, so it shall not take any action toward threats, but will still keep a thorough log. The recorded info is available within the same section as well and you will be able to see what IPs any attacks originated from so that you stop them, what the nature of the attempted attacks was and based on what security rules ModSecurity reacted. The rules that we use on our servers are a blend between commercial ones which we obtain from a security firm and custom ones which are added by our administrators to optimize the security of any web apps hosted on our end.
ModSecurity in Dedicated Web Hosting
ModSecurity is provided as standard with all dedicated servers which are set up with the Hepsia Control Panel and is set to “Active” automatically for any domain that you host or subdomain that you create on the hosting server. In case that a web app does not work properly, you could either switch off the firewall or set it to work in passive mode. The second means that ModSecurity will keep a log of any possible attack which might occur, but shall not take any action to stop it. The logs generated in active or passive mode will provide you with more details about the exact file which was attacked, the form of the attack and the IP it originated from, and so forth. This data will allow you to choose what measures you can take to boost the safety of your Internet sites, such as blocking IPs or carrying out script and plugin updates. The ModSecurity rules which we employ are updated frequently with a commercial bundle from a third-party security provider we work with, but oftentimes our administrators add their own rules too if they come across a new potential threat.