logo
logo
Sign in

Shared Webhosting ModSecurity rules

avatar
David Wolf
Shared Webhosting ModSecurity rules
ModSecurity rules from Malware Expert are based on intelligence gathered from real-world investigations, penetration tests and research data in the REAL LIFE environment of over 10 000 domains. These rules are developed over ten years with the help of real traffic to websites.

 

Web applications must be effectively protected against malware, botnet and hacker attacks at all times. Malware Expert ModSecurity rules provide powerful, real-time protection for web applications and websites running on Apache, Nginx on Linux Servers with ModSecurity. Our rules, provide advanced filtering, security and intrusion protection for PHP applications.

Just install ModSecurity, setup Malware Expert’s rules, and automatic background updates is an effort to promote better security for your services and shared web hosting servers.

 

Generic Apache and PHP rules, broken out into the following attack categories:

  • SQL injection
  • Cross-site Scripting (XSS)
  • Local File Include
  • Remote File Include
  • File upload vulnerabilities
  • Zero-Day attacks

Optimized application specific ModSecurity rules, covering the same vulnerability classes for applications such as:

  • WordPress
  • Joomla
  • Drupal

ModSecurity Rules requirements

– ModSecurity 2.9.x and higher
– Public IPV4/IPV6 address
– Apache, Nginx and LiteSpeed Web Server (LSWS)

Working also these Web Hosting Control Panels

– Directadmin
– cPanel / WHM
– plesk

Optional RBL Reputation database which provides protection against malicious clients identified by the Malware Expert Distributed Web servers.

This article is published by Malware Expert, a webhosting security company.

collect
0
avatar
David Wolf
guide
Zupyak is the world’s largest content marketing community, with over 400 000 members and 3 million articles. Explore and get your content discovered.
Read more