ModSecurity is a plugin for Apache web servers which functions as a web application layer firewall. It is employed to prevent attacks towards script-driven Internet sites by using security rules that contain certain expressions. This way, the firewall can stop hacking and spamming attempts and preserve even sites which are not updated frequently. For instance, numerous unsuccessful login attempts to a script administrative area or attempts to execute a specific file with the purpose to get access to the script shall trigger certain rules, so ModSecurity shall block out these activities the moment it detects them. The firewall is quite efficient as it monitors the entire HTTP traffic to a site in real time without slowing it down, so it can prevent an attack before any damage is done. It furthermore maintains an incredibly thorough log of all attack attempts that features more info than typical Apache logs, so you can later examine the data and take further measures to increase the security of your Internet sites if required.
ModSecurity in Cloud Web Hosting
ModSecurity is provided with all cloud web hosting servers, so if you choose to host your Internet sites with our company, they shall be resistant to a wide array of attacks. The firewall is turned on by default for all domains and subdomains, so there'll be nothing you will need to do on your end. You shall be able to stop ModSecurity for any Internet site if necessary, or to activate a detection mode, so that all activity will be recorded, but the firewall will not take any real action. You shall be able to view comprehensive logs via your Hepsia CP including the IP address where the attack originated from, what the attacker wished to do and how ModSecurity dealt with the threat. As we take the protection of our customers' sites seriously, we use a set of commercial rules that we take from one of the leading companies which maintain this type of rules. Our administrators also include custom rules to make sure that your sites shall be protected against as many threats as possible.