Search Our Database

Securing Web Traffic using Modsecurity

Last updated on |

Introduction

This guide explains how to secure your website in your Novacloud instance by adding Modsecurity

 

Traditional Firewall operate at layer 3 / 4 (IP / Port), block traffic based on source IP, port or protocol.

Modsecurity operate at layer 7 (Application), block traffic based on patters in the HTTP request.

Prerequisites

  • Access to your hosting panel (cPanel, DirectAdmin) or root shell (CLI)
  • Basic understanding of HTTP protocols

 

What is Modsecurity?

ModSecurity is an open-source Web Application Firewall (WAF) deployed at the web server layer to monitor, log, and block HTTP traffic based on predefined rules.

  • Monitors HTTP/S requests and responses
  • Detects and blocks malicious behavior using rules
  • Works with Apache, NGINX (via connector), and LiteSpeed

 

What is Traffic Modsecurity Scan?

ModSecurity scans dynamic HTTP or HTTP/S traffic:

  • .php, .asp, .jsp, .cgi (based on URL and content-type)
  • GET and POST requests with query strings, form data, cookies, headers
  • PUT, DELETE, PATCH methods for RESTful APIs
  • AJAX and background HTTP calls (common in WordPress, Joomla, etc.)
  • File uploads via multipart/form-data
  • API calls with JSON/XML payloads
  • WebSocket handshake headers (limited)

It scans HTTP payloads, not the file system itself.

 

It does NOT scan :

  • Static file content (e.g., .jpg, .css, .js) beyond metadata
  • Encrypted payloads without TLS termination

 

Recommended Rulesets

OWASP Core Rule Set (CRS) – Open source, broad coverage

Malware.Expert – Premium, optimized for performance and low false positives

 

Impact

  • False Positives: May break AJAX or REST APIs
  • Performance: Heavy rulesets can impact server performance (required fine tuning)
  • Access Loss: Blocking admin requests or API calls (e.g. update WordPress as wp-admin, some changes are not saved)

 

Best Practices

  • Pair with Fail2Ban or CSF to ban abusive IP
  • Whitelist legitimate false positives with SecRuleRemoveById
  • Review and Audit Regularly
  • Pair with other security measures such as MFA, Captcha, VPNs and role-based authentication for added web server security.

 

Step-by-Step Guide

Enabling ModSecurity in WHM (GUI)

  1. Log in to WHM
  2. Navigate to Security Center > ModSecurity™ Vendors
  3. Click Install next to OWASP
  4. After installation, set configuration to On / Off.
  5. (Optionally) you can install third party ruleset by click on Add Vendor
  6. Go to Security Center > ModSecurity™ Configuration
  7. Set configuration to On, apply rules to specific domains or globally

 

Enabling ModSecurity in DirectAdmin(GUI) Evo skin

  1. Log in to Directadmin
  2. Navigate to Server Manager > Custombuild > Options
  3. Click radio button in modsecurity to yes
  4. Example, ruleset select OWASP
  5. Wait for 1-2 seconds (auto saved)
  6. Back to previous screen, click Build

 

For user comfortable with CLI managing Directadmin

ssh root@your-server-ip
cd /usr/local/directadmin/custombuild
./build set modsecurity yes
./build set modsecurity_ruleset owasp
./build modsecurity
./build rewrite_confs
./build apache

 

References

https://coreruleset.org/

https://github.com/SpiderLabs/ModSecurity

https://docs.cpanel.net/whm/security-center/modsecurity-tools/

https://docs.directadmin.com/webservices/apache/modsecurity.html

 

Conclusion

ModSecurity plays a critical role in protecting web applications by filtering HTTP traffic based on security rule inspection. While it’s not a replacement for a network firewall, it complements it by focusing on Layer 7 threats. When properly configured and maintained with up-to-date rulesets, ModSecurity significantly reduces exposure to common web threats for your deployment against unauthorized access while maintaining operational control.

 

Need Help?
Reach out to our support team at support@ipserverone.com for assistance.