ModSecurity in Website Hosting
ModSecurity comes by default with all website hosting plans that we supply and it shall be switched on automatically for any domain or subdomain you add/create in your Hepsia hosting Control Panel. The firewall has three different modes, so you'll be able to activate and deactivate it with simply a click or set it to detection mode, so it will keep a log of all attacks, but it will not do anything to prevent them. The log for any of your websites shall feature elaborate info such as the nature of the attack, where it originated from, what action was taken by ModSecurity, and so forth. The firewall rules which we use are frequently updated and comprise of both commercial ones we get from a third-party security business and custom ones our system admins add in case that they detect a new type of attacks. This way, the sites you host here shall be much more protected without any action required on your end.
ModSecurity in Semi-dedicated Hosting
ModSecurity is a part of our semi-dedicated hosting packages and if you opt to host your websites with our company, there will not be anything special you'll have to do given that the firewall is switched on by default for all domains and subdomains which you include via your hosting CP. If necessary, you could disable ModSecurity for a particular site or turn on the so-called detection mode in which case the firewall shall still function and record information, but shall not do anything to prevent potential attacks on your sites. Detailed logs shall be accessible inside your Control Panel and you will be able to see which kind of attacks happened, what security rules were triggered and how the firewall addressed the threats, what Internet protocol addresses the attacks came from, and so forth. We use 2 kinds of rules on our servers - commercial ones from a firm which operates in the field of web security, and custom ones which our admins occasionally add to respond to newly found risks in a timely manner.
ModSecurity in VPS
ModSecurity is included with all Hepsia-based virtual private servers that we offer and it shall be turned on automatically for every new domain or subdomain that you add on the hosting server. That way, any web application which you install will be secured immediately without doing anything personally on your end. The firewall could be handled through the section of the CP which has the same name. This is the location whereyou'll be able to switch off ModSecurity or activate its passive mode, so it won't take any action towards threats, but will still maintain a thorough log. The recorded info is available within the same area as well and you shall be able to see what IPs any attacks came from so that you block them, what the nature of the attempted attacks was and based upon what security rules ModSecurity responded. The rules which we use on our servers are a mixture between commercial ones which we obtain from a security organization and custom ones that are added by our administrators to improve the protection of any web apps hosted on our end.
ModSecurity in Dedicated Hosting
ModSecurity is offered as standard with all dedicated servers that are set up with the Hepsia CP and is set to “Active” automatically for any domain you host or subdomain you create on the server. Just in case that a web application does not function adequately, you can either switch off the firewall or set it to work in passive mode. The latter means that ModSecurity shall maintain a log of any possible attack which may happen, but will not take any action to prevent it. The logs created in passive or active mode shall give you more details about the exact file which was attacked, the form of the attack and the IP it came from, and so forth. This information shall permit you to decide what steps you can take to boost the security of your sites, for instance blocking IPs or carrying out script and plugin updates. The ModSecurity rules that we employ are updated constantly with a commercial package from a third-party security company we work with, but from time to time our administrators include their own rules too when they discover a new potential threat.