ModSecurity in Hosting
We provide ModSecurity with all hosting plans, so your Internet applications shall be shielded from destructive attacks. The firewall is turned on as standard for all domains and subdomains, but in case you'd like, you'll be able to stop it using the respective area of your Hepsia Control Panel. You could also switch on a detection mode, so ModSecurity will keep a log as intended, but won't take any action. The logs that you'll find in Hepsia are extremely detailed and include info about the nature of any attack, when it happened and from what IP address, the firewall rule that was triggered, etcetera. We use a set of commercial rules which are frequently updated, but sometimes our administrators add custom rules as well in order to efficiently protect the Internet sites hosted on our machines.
ModSecurity in VPS Servers
ModSecurity is pre-installed on all VPS servers that are provided with the Hepsia hosting Control Panel, so your web apps shall be secured from the instant your server is ready. The firewall is switched on by default for any domain or subdomain on the VPS, but if necessary, you'll be able to disable it with a click of your mouse via the corresponding section of Hepsia. You may also set it to work in detection mode, so it shall keep an extensive log of any potential attacks without taking any action to stop them. The logs can be found within the same section and offer info about the nature of the attack, what IP it came from and what ModSecurity rule was activated to stop it. For best security, we employ not just commercial rules from a firm operating in the field of web security, but also custom ones our administrators add personally so as to respond to new threats which are still not dealt with in the commercial rules.
ModSecurity in Dedicated Servers
If you opt to host your sites on a dedicated server with the Hepsia Control Panel, your web apps shall be protected immediately because ModSecurity is available with all Hepsia-based solutions. You'll be able to control the firewall easily and if required, you'll be able to turn it off or switch on its passive mode when it will only maintain a log of what is occurring without taking any action to stop potential attacks. The logs that you'll find in the very same section of the Control Panel are extremely detailed and feature details about the attacker IP, what website and file were attacked and in what ways, what rule the firewall employed to prevent the intrusion, etc. This information will enable you to take measures and enhance the protection of your websites even more. To be on the safe side, we use not just commercial rules, but also custom-made ones which our staff include whenever they detect attacks that have not yet been included in the commercial pack.