ModSecurity in Shared Hosting
ModSecurity comes standard with all shared hosting solutions which we provide and it shall be switched on automatically for any domain or subdomain which you add/create within your Hepsia hosting Control Panel. The firewall has three different modes, so you'll be able to activate and deactivate it with a mouse click or set it to detection mode, so it shall keep a log of all attacks, but it shall not do anything to prevent them. The log for each of your sites will feature comprehensive info including the nature of the attack, where it came from, what action was taken by ModSecurity, and so on. The firewall rules we use are constantly updated and incorporate both commercial ones which we get from a third-party security firm and custom ones our system admins include in the event that they detect a new type of attacks. In this way, the Internet sites which you host here shall be way more secure with no action expected on your end.
ModSecurity in Semi-dedicated Servers
All semi-dedicated server solutions which we offer feature ModSecurity and because the firewall is switched on by default, any Internet site you build under a domain or a subdomain will be secured immediately. An independent section within the Hepsia Control Panel that comes with the semi-dedicated accounts is devoted to ModSecurity and it will allow you to start and stop the firewall for any Internet site or enable a detection mode. With the last mentioned, ModSecurity won't take any action, but it will still detect possible attacks and shall keep all info within a log as if it were 100% active. The logs can be found within the same section of the CP and they include info about the IP where an attack came from, what its nature was, what rule ModSecurity applies to detect and stop it, etcetera. The security rules we employ on our web servers are a mix between commercial ones from a security business and custom ones made by our system administrators. Therefore, we offer greater security for your web applications as we can shield them from attacks even before security businesses release updates for completely new threats.
ModSecurity in VPS Servers
Security is vital to us, so we set up ModSecurity on all VPS servers which are made available with the Hepsia CP by default. The firewall can be managed through a dedicated section inside Hepsia and is activated automatically when you include a new domain or create a subdomain, so you'll not need to do anything personally. You will also be able to deactivate it or activate the so-called detection mode, so it'll keep a log of possible attacks which you can later examine, but shall not block them. The logs in both passive and active modes offer info regarding the type of the attack and how it was eliminated, what IP address it came from and other valuable data that may help you to tighten the security of your Internet sites by updating them or blocking IPs, for example. Besides the commercial rules that we get for ModSecurity from a third-party security enterprise, we also employ our own rules because occasionally we identify specific attacks which aren't yet present in the commercial package. That way, we could boost the security of your Virtual private server promptly rather than awaiting an official update.
ModSecurity in Dedicated Servers
ModSecurity is included with all dedicated servers which are integrated with our Hepsia CP and you will not need to do anything specific on your end to use it because it's turned on by default whenever you add a new domain or subdomain on your hosting server. In the event that it disrupts any of your programs, you will be able to stop it via the respective area of Hepsia, or you can leave it working in passive mode, so it shall identify attacks and will still maintain a log for them, but shall not block them. You'll be able to look at the logs later to find out what you can do to increase the protection of your sites as you'll find information such as where an intrusion attempt originated from, what site was attacked and based on what rule ModSecurity responded, etcetera. The rules we use are commercial, thus they are regularly updated by a security firm, but to be on the safe side, our admins also add custom rules once in a while in order to deal with any new threats they have identified.