{"id":1045,"date":"2021-07-19T06:15:00","date_gmt":"2021-07-19T11:15:00","guid":{"rendered":"https:\/\/www.knownhost.com\/kb\/?p=1045"},"modified":"2022-01-28T06:35:10","modified_gmt":"2022-01-28T12:35:10","slug":"what-is-mod-security","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/","title":{"rendered":"What is mod_security?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 ez-toc-wrap-right counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #212121;color:#212121\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #212121;color:#212121\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#what_is_mod_security\" >What is mod_security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#where_can_i_find_mod_security_rulesets\" >Where can I find mod_security rulesets?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#how_can_i_install_mod_security\" >How can I install mod_security?<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#cpanel_installation\" >cPanel installation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#directadmin_installation\" >DirectAdmin installation<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#compatibility\" >Compatibility<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#firewall\" >Firewall<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#should_i_use_mod_security\" >Should I use mod_security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>Keeping our websites secure is one of the most important and challenging topics of all time. This article will cover the &#8216;mod_security&#8217; module and whether or not you should consider using it on your server(s)\/website(s).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"what_is_mod_security\"><\/span>What is mod_security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>ModSecurity is a toolkit for real-time web application monitoring, logging, and access control. I like to think about it as an enabler: there are no hard rules telling you what to do; instead, it is up to you to choose your own path through the available features. That&#8217;s why the title of this section asks what ModSecurity can do, not what it does.<\/p><\/blockquote>\n\n\n\n<p><em>Quoted from&nbsp;<a href=\"https:\/\/www.modsecurity.org\/about.html\">modsecurity.org<\/a><\/em><\/p>\n\n\n\n<p>That is a general overview. Breaking it down a little further, mod_security is an Apache module (or extension) specifically designed to protect your website(s) from malicious activity.<\/p>\n\n\n\n<p>ModSecurity (aka mod_security, security2_module, or modsec) is an apache module designed to work similarly to a Web Application Firewall, to help protect websites from certain types of attacks. Which types of attacks the sites are then protected from would depend on which ruleset is in use. In terms of the&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/OSI_model\">7-Layer OSI Model<\/a>, it is only Level 7 (the Application Layer) which is affected by ModSecurity.<\/p>\n\n\n\n<p>In general, ModSecurity looks at the incoming apache requests, compares it to patterns described in the rules in the ruleset, and takes actions on the requests based on the results of the tests.<\/p>\n\n\n\n<p>The official mod_security reference manual can be found here:&nbsp;<a href=\"https:\/\/github.com\/SpiderLabs\/ModSecurity\/wiki\/Reference-Manual\">SpiderLabs ModSecurity Reference Manual<\/a><\/p>\n\n\n\n<p>But, it is very important to note that in recent cPanel &amp; DirectAdmin versions, it is usually not necessary to do any of the ModSecurity configuration manually.<\/p>\n\n\n\n<p>It is useful to know which ruleset is appropriate for your server depends heavily on the specific types of sites you will be hosting, and more importantly, the specific types of Apache requests that will be needed in order for the site applications to work. If one of the types of requests being blocked by the ModSecurity ruleset installed is needed in order for one of the sites to work, then parts of that site will not work while that ruleset is installed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"where_can_i_find_mod_security_rulesets\"><\/span>Where can I find mod_security rulesets?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Rulesets are required for mod_security to function properly. SpiderLabs has teamed with OWASP&nbsp;<a href=\"https:\/\/www.owasp.org\/index.php\/Alabama\">Open Web Application Security Project<\/a>) for developing a &#8216;generic&#8217; list of rulesets for out of the box functionality from mod_security.<\/p>\n\n\n\n<p>Their open source ruleset can be downloaded here:&nbsp;<a href=\"https:\/\/github.com\/SpiderLabs\/owasp-modsecurity-crs\/tarball\/master\">owasp-modsecurity-crs<\/a><br>More information regarding their project can be found here:&nbsp;<a href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_ModSecurity_Core_Rule_Set_Project\">OWASP ModSecurity Core Rule Set Project<\/a><\/p>\n\n\n\n<p>You can, of course, write your own rulesets or purchase custom licensed rulesets. A quick Google search can provide relevant listings.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"how_can_i_install_mod_security\"><\/span>How can I install mod_security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>mod_security can be installed through different methods across cPanel and DirectAdmin. We&#8217;ll go over both methods within this section to ensure that it&#8217;s properly explained.<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"cpanel_installation\"><\/span>cPanel installation<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>The tools for configuring ModSecurity do not do anything unless the module has been installed in Apache. If ModSecurity is not yet installed, this can be done via&nbsp;<a href=\"https:\/\/docs.cpanel.net\/whm\/software\/easyapache-4-interface\/\">EasyApache<\/a>. Make sure that ModSecurity has been selected before beginning the build process.<br><br>Alternatively, if you&#8217;re familiar with CLI &#8212; you can login to your server as root and run the following command on a cPanel server with EasyApache 4<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># &#091;root@knownhost] yum install ea-apache24-mod_security2<\/code><\/pre>\n\n\n\n<p>This will install mod_security and it&#8217;s necessary rules in order for it to function.<br><br>Once the build process has completed, the next step is to add a ruleset. The recommended way to do this is in WHM at&nbsp;<code>Home &gt;&gt; Security Center &gt;&gt; ModSecurity\u2122 Vendors<\/code>&nbsp;as described&nbsp;<a href=\"https:\/\/docs.cpanel.net\/whm\/security-center\/modsecurity-vendors\/\">here<\/a>. By default, there should be a cPanel-curated OWASP ruleset available to choose. If there is a different published ruleset you prefer to use instead, check with the developer of the ruleset if they make their ruleset available as a Vendor that can be added via WHM. If the ruleset is available in this format, it is the strongly preferred method of installing the ruleset.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"directadmin_installation\"><\/span>DirectAdmin installation<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>mod_security for DirectAdmin gets installed over CLI through Custombuild, so it&#8217;s recommended that you&#8217;re familiar with DirectAdmin and Custombuild before continuing. <br><br>It&#8217;s important to note that DirectAdmin offers two different rulesets &#8212; OWASP and Comodo. We&#8217;ll be using &#8216;comodo&#8217; for the ruleset below.<br><br>Login to your DirectAdmin server as root and perform the following:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cd \/usr\/local\/directadmin\/custombuild\n.\/build update\n.\/build set modsecurity yes\n.\/build set modsecurity_ruleset \"comodo\"\n.\/build modsecurity\n.\/build modsecurity_rules\n.\/build rewrite_confs<\/code><\/pre>\n\n\n\n<p>This will run through the compilation process of mod_security to install it onto your server and active Directadmin installation. Once it&#8217;s finished you can then login to DirectAdmin and utilize the ModSecurity Interface at&nbsp;<strong>Server Manager &gt;&gt; ModSecurity<\/strong>&nbsp;(https:\/\/hostname:2222\/admin\/modsecurity).<br><br>This will allow you to manage ModSecurity, check the logs, customize its rules and other various administrative tasks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"compatibility\"><span class=\"ez-toc-section\" id=\"compatibility\"><\/span>Compatibility<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Some types of rules are not compatible with mod_ruid2. In particular, any ModSecurity rules that need to store values in files will not work when mod_ruid2 due to the interaction between the file permissions and ownerships, and the users the apache processes would run as. Rules that do not work with mod_ruid2 for this reason are also not likely to work with mpm-itk for the same reasons. If you are not sure whether a specific ruleset has rules in it that need to store values in files, you may want to check with the developer of the ruleset before trying to use the ruleset in a server using mod_ruid2 or mpm-itk.Edit<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"firewall\"><span class=\"ez-toc-section\" id=\"firewall\"><\/span>Firewall<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you also have ConfigServer Security&amp;Firewall installed in the server, you may want be aware that LF_MODSEC is enabled by default. If this feature is enabled, then if the same IP address triggers modsec rules a certain number of times within a certain period of time, that IP address will be blocked in the firewall (either temporarily or permanently, depending on how related settings are configured). But, since it is possible for some rules to conflict with some web applications, it is strongly recommended to make sure the installed modsec ruleset is appropriate for the specific server before enabling this firewall feature. Otherwise, typical visitors doing typical site activities might become blocked in the firewall.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"should_i_use_mod_security\"><\/span>Should I use mod_security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"kb-shortcode kb-shortcode_warning\">\n                    <div class=\"kb-shortcode-icon\">\n                        <i class=\"fa fa-exclamation-triangle fa-2x\"><\/i>\n                    <\/div>\n                    <div class=\"kb-shortcode-content_warning\">If uncertain, consult your developer before enabling!<\/div>\n                <\/div>\n\n\n\n<p>Now, this is difficult question.&nbsp;<em>*IF*<\/em>&nbsp;you are able to confirm that your rulesets do not interfere with your websites functionality, there is no reason not to use mod_security. However, if your website requires numerous, custom POST requests, it&#8217;s most likely mod_security will interfere with your websites&#8217; core functionality and should be avoided.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In the end mod_security can be a very beneficial Web Application Firewall for protecting your website from malicious attacks such as Cross-Site Scripting, SQL Injection, PHP Shell uploads and more. However, if you&#8217;re not utilizing up to date software this may not work in your favor. That&#8217;s why at the end of the day, it&#8217;s always best to consult the developer to ensure that the applications you utilize won&#8217;t be affected by mod_security. <br><br>KnownHost offers 365 days a year, 24 hours a day, all 7 days of the week best in class technical support. A dedicated team ready to help you with installing mod_security or general questions regarding it should you need our assistance. You&#8217;re not using KnownHost for the best web hosting experience? Well, why not? Check with <a href=\"https:\/\/www.knownhost.com\/contact\">our Sales team<\/a> to see what can KnownHost do for you in improving your webhosting experience.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keeping our websites secure is one of the most important and challenging topics of all time. This article will cover the &#8216;mod_security&#8217; module and whether or not you should consider using it on your server(s)\/website(s). What is mod_security? ModSecurity is a toolkit for real-time web application monitoring, logging, and access control. I like to think [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94],"tags":[181,177,143,123,125],"class_list":["post-1045","post","type-post","status-publish","format-standard","hentry","category-common-issues","tag-apache","tag-cloud","tag-dedicated","tag-linux","tag-vps"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is mod_security? - KnownHost<\/title>\n<meta name=\"description\" content=\"Learn more about mod_security, and how to install it on your KnownHost servers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is mod_security? - KnownHost\" \/>\n<meta property=\"og:description\" content=\"Learn more about mod_security, and how to install it on your KnownHost servers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-19T11:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-28T12:35:10+00:00\" \/>\n<meta name=\"author\" content=\"Jonathan K. W.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan K. W.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-mod-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-mod-security\\\/\"},\"author\":{\"name\":\"Jonathan K. W.\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\"},\"headline\":\"What is mod_security?\",\"datePublished\":\"2021-07-19T11:15:00+00:00\",\"dateModified\":\"2022-01-28T12:35:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-mod-security\\\/\"},\"wordCount\":1247,\"commentCount\":0,\"keywords\":[\"apache\",\"cloud\",\"dedicated\",\"linux\",\"vps\"],\"articleSection\":[\"Common Issues\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-mod-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-mod-security\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-mod-security\\\/\",\"name\":\"What is mod_security? - KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#website\"},\"datePublished\":\"2021-07-19T11:15:00+00:00\",\"dateModified\":\"2022-01-28T12:35:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\"},\"description\":\"Learn more about mod_security, and how to install it on your KnownHost servers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-mod-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-mod-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-mod-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is mod_security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/\",\"name\":\"KnownHost\",\"description\":\"KnownHost provides a comprehensive webhosting knowledge base to help answer many of your common webhosting and linux questions.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\",\"name\":\"Jonathan K. W.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"caption\":\"Jonathan K. W.\"},\"sameAs\":[\"https:\\\/\\\/www.knownhost.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is mod_security? - KnownHost","description":"Learn more about mod_security, and how to install it on your KnownHost servers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/","og_locale":"en_US","og_type":"article","og_title":"What is mod_security? - KnownHost","og_description":"Learn more about mod_security, and how to install it on your KnownHost servers.","og_url":"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/","og_site_name":"KnownHost","article_published_time":"2021-07-19T11:15:00+00:00","article_modified_time":"2022-01-28T12:35:10+00:00","author":"Jonathan K. W.","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jonathan K. W.","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/"},"author":{"name":"Jonathan K. W.","@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b"},"headline":"What is mod_security?","datePublished":"2021-07-19T11:15:00+00:00","dateModified":"2022-01-28T12:35:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/"},"wordCount":1247,"commentCount":0,"keywords":["apache","cloud","dedicated","linux","vps"],"articleSection":["Common Issues"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/","url":"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/","name":"What is mod_security? - KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/kb\/#website"},"datePublished":"2021-07-19T11:15:00+00:00","dateModified":"2022-01-28T12:35:10+00:00","author":{"@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b"},"description":"Learn more about mod_security, and how to install it on your KnownHost servers.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/kb\/what-is-mod-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/kb\/"},{"@type":"ListItem","position":2,"name":"What is mod_security?"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/kb\/#website","url":"https:\/\/www.knownhost.com\/kb\/","name":"KnownHost","description":"KnownHost provides a comprehensive webhosting knowledge base to help answer many of your common webhosting and linux questions.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/kb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b","name":"Jonathan K. W.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","caption":"Jonathan K. W."},"sameAs":["https:\/\/www.knownhost.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts\/1045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/comments?post=1045"}],"version-history":[{"count":0,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts\/1045\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/media?parent=1045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/categories?post=1045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/tags?post=1045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}