ModSecurity in Cloud Web Hosting
ModSecurity comes standard with all cloud web hosting packages which we provide and it'll be activated automatically for any domain or subdomain that you add/create within your Hepsia hosting CP. The firewall has three different modes, so you can switch on and deactivate it with only a click or set it to detection mode, so it'll maintain a log of all attacks, but it will not do anything to prevent them. The log for each of your Internet sites will include in-depth info which includes the nature of the attack, where it originated from, what action was taken by ModSecurity, and so forth. The firewall rules we use are frequently updated and include both commercial ones that we get from a third-party security company and custom ones which our system administrators add in case that they detect a new type of attacks. This way, the sites that you host here will be much more protected without any action required on your end.
ModSecurity in Semi-dedicated Servers
All semi-dedicated server packages which we offer include ModSecurity and because the firewall is turned on by default, any website you set up under a domain or a subdomain shall be secured immediately. An independent section inside the Hepsia Control Panel that comes with the semi-dedicated accounts is dedicated to ModSecurity and it'll permit you to stop and start the firewall for any website or activate a detection mode. With the latter, ModSecurity will not take any action, but it'll still detect possible attacks and will keep all info inside a log as if it were completely active. The logs can be found inside the exact same section of the Control Panel and they include specifics about the IP where an attack originated from, what its nature was, what rule ModSecurity applies to recognize and stop it, etcetera. The security rules we use on our web servers are a mix of commercial ones from a security business and custom ones created by our system admins. For that reason, we provide increased security for your web applications as we can protect them from attacks before security corporations release updates for completely new threats.
ModSecurity in VPS Servers
Safety is of the utmost importance to us, so we set up ModSecurity on all VPS servers which are made available with the Hepsia Control Panel as a standard. The firewall can be managed through a dedicated section in Hepsia and is turned on automatically when you include a new domain or generate a subdomain, so you won't need to do anything manually. You'll also be able to disable it or turn on the so-called detection mode, so it shall keep a log of possible attacks you can later study, but won't block them. The logs in both passive and active modes offer information about the form of the attack and how it was stopped, what IP it originated from and other important data that may help you to tighten the security of your Internet sites by updating them or blocking IPs, for example. Beyond the commercial rules we get for ModSecurity from a third-party security firm, we also implement our own rules because occasionally we discover specific attacks which are not yet present in the commercial pack. This way, we could enhance the protection of your Virtual private server instantly instead of awaiting a certified update.
ModSecurity in Dedicated Servers
ModSecurity comes with all dedicated servers that are integrated with our Hepsia Control Panel and you won't need to do anything specific on your end to use it since it is activated by default whenever you include a new domain or subdomain on your web server. In the event that it interferes with some of your programs, you shall be able to stop it via the respective area of Hepsia, or you may leave it in passive mode, so it'll identify attacks and shall still maintain a log for them, but won't stop them. You may analyze the logs later to find out what you can do to boost the security of your websites since you'll find information such as where an intrusion attempt originated from, what website was attacked and based upon what rule ModSecurity responded, and so forth. The rules that we employ are commercial, thus they're frequently updated by a security firm, but to be on the safe side, our administrators also include custom rules from time to time in order to deal with any new threats they have identified.