ModSecurity is a highly effective firewall for Apache web servers that's used to prevent attacks towards web applications. It keeps track of the HTTP traffic to a given Internet site in real time and prevents any intrusion attempts the instant it discovers them. The firewall uses a set of rules to do this - as an illustration, attempting to log in to a script administrator area unsuccessfully a few times activates one rule, sending a request to execute a certain file that could result in getting access to the Internet site triggers another rule, and so forth. ModSecurity is one of the best firewalls out there and it'll preserve even scripts that are not updated regularly as it can prevent attackers from employing known exploits and security holes. Quite detailed data about each intrusion attempt is recorded and the logs the firewall maintains are considerably more comprehensive than the conventional logs provided by the Apache server, so you may later analyze them and determine whether you need to take extra measures in order to boost the protection of your script-driven sites.

ModSecurity in Cloud Hosting

ModSecurity is supplied with all cloud hosting web servers, so if you decide to host your sites with our business, they shall be protected against a wide array of attacks. The firewall is turned on by default for all domains and subdomains, so there shall be nothing you'll have to do on your end. You will be able to stop ModSecurity for any site if required, or to enable a detection mode, so that all activity shall be recorded, but the firewall shall not take any real action. You'll be able to view detailed logs via your Hepsia CP including the IP where the attack came from, what the attacker planned to do and how ModSecurity dealt with the threat. As we take the safety of our customers' sites very seriously, we use a selection of commercial rules that we get from one of the best firms that maintain this sort of rules. Our admins also include custom rules to ensure that your sites shall be resistant to as many threats as possible.