ModSecurity is a plugin for Apache web servers which acts as a web app layer firewall. It's employed to prevent attacks against script-driven websites by employing security rules which contain certain expressions. In this way, the firewall can prevent hacking and spamming attempts and shield even sites which aren't updated on a regular basis. As an example, numerous unsuccessful login attempts to a script administrator area or attempts to execute a certain file with the intention to get access to the script shall trigger specific rules, so ModSecurity will block out these activities the minute it discovers them. The firewall is very efficient as it tracks the entire HTTP traffic to an Internet site in real time without slowing it down, so it can prevent an attack before any damage is done. It furthermore keeps an exceptionally comprehensive log of all attack attempts that contains more information than typical Apache logs, so you can later analyze the data and take extra measures to boost the security of your sites if required.

ModSecurity in Cloud Hosting

ModSecurity is available on all cloud hosting servers, so if you decide to host your sites with our company, they shall be shielded from a wide range of attacks. The firewall is turned on by default for all domains and subdomains, so there shall be nothing you'll need to do on your end. You shall be able to stop ModSecurity for any site if required, or to switch on a detection mode, so that all activity shall be recorded, but the firewall will not take any real action. You will be able to view detailed logs via your Hepsia Control Panel including the IP where the attack came from, what the attacker planned to do and how ModSecurity addressed the threat. Since we take the protection of our clients' Internet sites very seriously, we employ a collection of commercial rules that we get from one of the top companies which maintain this type of rules. Our administrators also include custom rules to make sure that your Internet sites will be protected against as many threats as possible.