ModSecurity in Website Hosting
We offer ModSecurity with all website hosting solutions, so your web applications shall be shielded from harmful attacks. The firewall is activated as standard for all domains and subdomains, but if you would like, you'll be able to stop it via the respective area of your Hepsia CP. You can also switch on a detection mode, so ModSecurity will keep a log as intended, but will not take any action. The logs that you will discover within Hepsia are incredibly detailed and offer info about the nature of any attack, when it happened and from what IP, the firewall rule which was triggered, and so forth. We employ a set of commercial rules which are often updated, but sometimes our administrators add custom rules as well in order to better protect the sites hosted on our servers.
ModSecurity in Semi-dedicated Hosting
Any web program you install in your new semi-dedicated hosting account shall be protected by ModSecurity since the firewall is included with all our hosting plans and is turned on by default for any domain and subdomain which you include or create via your Hepsia hosting Control Panel. You will be able to manage ModSecurity through a dedicated area inside Hepsia where not simply can you activate or deactivate it completely, but you could also enable a passive mode, so the firewall shall not block anything, but it shall still keep an archive of potential attacks. This normally requires only a click and you shall be able to look at the logs regardless of if ModSecurity is in active or passive mode through the same section - what the attack was and where it came from, how it was dealt with, and so on. The firewall uses two sets of rules on our machines - a commercial one which we get from a third-party web security firm and a custom one which our admins update manually as to respond to recently discovered threats at the earliest opportunity.
ModSecurity in VPS Web Hosting
Security is vital to us, so we set up ModSecurity on all virtual private servers that are set up with the Hepsia Control Panel by default. The firewall can be managed through a dedicated section inside Hepsia and is turned on automatically when you include a new domain or create a subdomain, so you will not have to do anything by hand. You'll also be able to disable it or switch on the so-called detection mode, so it will maintain a log of potential attacks that you can later study, but will not stop them. The logs in both passive and active modes include details about the form of the attack and how it was stopped, what IP address it originated from and other valuable information which might help you to tighten the security of your sites by updating them or blocking IPs, for example. In addition to the commercial rules that we get for ModSecurity from a third-party security company, we also implement our own rules since every now and then we find specific attacks which aren't yet present within the commercial package. This way, we can boost the protection of your Virtual private server right away instead of waiting for a certified update.
ModSecurity in Dedicated Servers Hosting
ModSecurity is provided as standard with all dedicated servers that are set up with the Hepsia CP and is set to “Active” automatically for any domain which you host or subdomain that you create on the hosting server. In case that a web application does not work correctly, you may either turn off the firewall or set it to function in passive mode. The latter means that ModSecurity will maintain a log of any potential attack which could happen, but won't take any action to prevent it. The logs produced in active or passive mode will provide you with additional details about the exact file that was attacked, the form of the attack and the IP address it originated from, and so on. This information will allow you to determine what actions you can take to boost the security of your Internet sites, for instance blocking IPs or carrying out script and plugin updates. The ModSecurity rules we employ are updated often with a commercial pack from a third-party security firm we work with, but occasionally our staff include their own rules as well in the event that they discover a new potential threat.