Discover what ModSecurity is, how it works and just what it does so as to protect your websites and applications.
ModSecurity is a potent web application layer firewall for Apache web servers. It monitors the entire HTTP traffic to an Internet site without affecting its functionality and when it identifies an intrusion attempt, it blocks it. The firewall also maintains a more detailed log for the site visitors than any server does, so you will manage to keep track of what's happening with your sites a lot better than if you rely simply on standard logs. ModSecurity works with security rules based on which it helps prevent attacks. For example, it detects if anyone is attempting to log in to the admin area of a given script several times or if a request is sent to execute a file with a particular command. In these cases these attempts set off the corresponding rules and the software hinders the attempts in real time, then records detailed information about them inside its logs. ModSecurity is one of the most effective software firewalls available and it can easily protect your web applications against a large number of threats and vulnerabilities, especially in case you don’t update them or their plugins frequently.
ModSecurity in Shared Web Hosting
ModSecurity is available with each and every shared web hosting plan that we provide and it's turned on by default for any domain or subdomain that you add via your Hepsia Control Panel. In the event that it disrupts any of your applications or you would like to disable it for whatever reason, you'll be able to do this through the ModSecurity area of Hepsia with just a mouse click. You can also enable a passive mode, so the firewall will recognize potential attacks and keep a log, but will not take any action. You'll be able to view detailed logs in the same section, including the IP address where the attack originated from, exactly what the attacker aimed to do and at what time, what ModSecurity did, etcetera. For optimum protection of our clients we use a set of commercial firewall rules blended with custom ones that are included by our system administrators.