ModSecurity in Hosting
ModSecurity is provided with all hosting servers, so when you decide to host your sites with our company, they'll be protected against a wide array of attacks. The firewall is enabled by default for all domains and subdomains, so there will be nothing you will need to do on your end. You shall be able to stop ModSecurity for any website if required, or to switch on a detection mode, so that all activity shall be recorded, but the firewall shall not take any real action. You will be able to view specific logs using your Hepsia Control Panel including the IP where the attack originated from, what the attacker planned to do and how ModSecurity dealt with the threat. Since we take the protection of our clients' Internet sites seriously, we use a collection of commercial rules that we get from one of the leading companies that maintain this type of rules. Our administrators also add custom rules to make sure that your sites will be resistant to as many risks as possible.
ModSecurity in Semi-dedicated Hosting
All semi-dedicated hosting solutions that we offer come with ModSecurity and since the firewall is enabled by default, any website which you build under a domain or a subdomain shall be secured right away. An independent section within the Hepsia Control Panel which comes with the semi-dedicated accounts is devoted to ModSecurity and it will allow you to start and stop the firewall for any Internet site or switch on a detection mode. With the last mentioned, ModSecurity shall not take any action, but it'll still recognize possible attacks and will keep all information in a log as if it were 100% active. The logs could be found in the very same section of the CP and they offer details about the IP where an attack came from, what its nature was, what rule ModSecurity applies to detect and stop it, and so forth. The security rules we employ on our servers are a mix of commercial ones from a security firm and custom ones created by our system admins. For that reason, we offer greater security for your web applications as we can defend them from attacks before security businesses release updates for brand new threats.