1 / 11

What is the ModSecurity, how it is different from CSF and how to configure ModSecurity on Centos Web Panel (CWP)?

Our main motive is to solve your problems in an easy and quick way so, that in this blog we are going to explain you about u201cWhat is the ModSecurity, How it is different from CSF, and How to configure ModSecurity on Centos Web Panel (CWP)?u201d If you are a newbie then, go with the below-given link for more updates:

Download Presentation

What is the ModSecurity, how it is different from CSF and how to configure ModSecurity on Centos Web Panel (CWP)?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What is the ModSecurity, how it is different from CSF and how to ModSecurity on Centos Web Panel (CWP)? www.cloudminister.com configure WWW.CLOUDMINISTER.COM/BLOG/

  2. ModSecurity ModSecurity is an open source web based application firewalls are deployed to establish an external security layer to prevent web servers from various attacks. ModSecurity is also supported by different web servers like: nginx, apache and IIS. www.cloudminister.com

  3. It help to protect from various attacks happens in our surrounding like: Session hijacking, SQL injection, trojans, etc. ModSecurity is different from CSF as CSF provides server security for FTP, SSH and various Ports but there is no protection for web servers that’s why ModSecurity modules help to protect web servers. www.cloudminister.com

  4. CONFIGUREMODSECURITY ToconfigureModSecurityinCWP, firstyouneedtologininCWP admin panel withthe2087port. Then select Security dropdownoptionand insideitselectModSecurity. www.cloudminister.com

  5. InCWPonlyoneModSecurityisfreelyavailableandtheothertwocomewithCWPProversion,InCWPonlyoneModSecurityisfreelyavailableandtheothertwocomewithCWPProversion, clickonInstallModSecurityConfigurationandittakessometime.

  6. Aftertheinstallationiscompleteditshowsalogfile, nowyoumustrestarttheApache server tosee theeffect.

  7. NOWYOUCANALSOCHECKTHEERRORLOGSBYCLICKINGONTHEERRORLOGTABON THETOP.

  8. MostCommonErrors Ifyouget403Forbiddenmessages thatmeansthattheModSecurity ruleswork, nowchecktheerrorlog fileandsearchfortheruleIDsare displayed. www.cloudminister.com

  9. TosolvetheaboveproblemcopytheruleIDandclickonaccountsandclickonEditRules.TosolvetheaboveproblemcopytheruleIDandclickonaccountsandclickonEditRules.

  10. Makeentryineditfilelikethisandsavethechanges. SecRuleRemoveById970091 After the above changes in file the error 403 will be resolved. CONCLUSION-The above configuration shows how to configure ModSecurity in CWP and enhanced the web based security. www.cloudminister.com

More Related