{"id":7244,"date":"2019-06-05T04:16:22","date_gmt":"2019-06-05T04:16:22","guid":{"rendered":"https:\/\/www.milesweb.in\/hosting-faqs\/?p=7244"},"modified":"2023-01-27T19:22:50","modified_gmt":"2023-01-27T13:52:50","slug":"install-and-configure-mod-security-on-ubuntu-16-04-server","status":"publish","type":"post","link":"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/","title":{"rendered":"A Guide to Install and Configure Mod_Security on Ubuntu 16.04 Server"},"content":{"rendered":"<p>Modsec the short form for Mod_security, is a powerful WAF (Web Application Firewall) that integrates directly into Apache\u2019s module system. Due to this direct integration the security module can intercept traffic at the initial stages of a request. It is important to detect the security flaw at an early stage so that one can block malicious requests before they get passed to web applications hosted by Apache websites. This creates an extra layer of security against common threats that a server faces. In this article you will get to see the installation of mod_security along with the CRS (Core Rule Set) in Ubuntu 16.04 LTS Server running Apache 2.4.<\/p>\n<h3>Prerequisites<\/h3>\n<p>Ensure your system environment comprises of following things:<\/p>\n<p>\u2022 Ubuntu 16.04 LTS Server.<br \/>\n\u2022 Baseline Apache 2.4 pre-installed.<br \/>\n\u2022 Pre-configured Network &amp; Internet Connection.<br \/>\n\u2022 Root user shell access (console or SSH).<\/p>\n<p>Additionally, you should also know the below system administration concepts:<\/p>\n<p>\u2022 How to basically navigate via the Linux command line shell?<br \/>\n\u2022 Ways to modify files in your chosen system editor (vim, nano, emacs, etc.).<\/p>\n<h3>Pre-Flight Checks<\/h3>\n<p>Many Apache-based OS images comprise of mod-security as a standard module and might be already installed on the target system. Prior to continuing, it is important to ensure, that you are running Apache 2.4 and mod-security isn\u2019t pre-installed. You can do this by running the below two commands:<\/p>\n<div style=\"background-color: #e0ffff; padding: 10px;\"><strong>Note:<\/strong> All commands in this documentation use the sudo prefix. You can execute root-level permissions on a command by command basis. If you are new to sudo, you might be asked for your password to allow execution of one or more the commands in this outline.<\/div>\n<h3>Check Apache\u2019s Version<\/h3>\n<pre class=\"lang:default decode:true \">sudo apache2ctl -v<\/pre>\n<p>Example Output:<\/p>\n<pre class=\"lang:default decode:true \">Server version: Apache\/2.4.18 (Ubuntu)\nServer built: 2018-06-07T19:43:03<\/pre>\n<h3>Check if the Security Module is Active<\/h3>\n<pre class=\"lang:default decode:true \">apache2ctl -M | grep security<\/pre>\n<p>\u2013 If you don\u2019t get an output with this command, mod_security is not installed so proceed to the <strong>Installation Section<\/strong>.<\/p>\n<p>\u2013 If you get the output as security2_module, mod_security is installed so proceed to the <strong>Configuration Section<\/strong>.<\/p>\n<h3>Installation Section<\/h3>\n<p>Installation is done in a quick and painless way with the apt package manager in all Debian-based system (like Ubuntu). In this case, offer the correct package name, libapache-modsecurity, to the apt command and confirm the installation.<\/p>\n<p><strong>Use Apt to Install the libpache2-modsecurity Plugin<\/strong><\/p>\n<pre class=\"lang:default decode:true \">sudo apt install libapache2-modsecurity -y<\/pre>\n<p>Example Output:<\/p>\n<pre class=\"lang:default decode:true \">Reading package lists... Done\nBuilding dependency tree\nReading state information... Done\nThe following additional packages will be installed:\nlibapache2-mod-security2 libyajl2 modsecurity-crs\nSuggested packages:\nlua geoip-database-contrib ruby\nThe following NEW packages will be installed:\nlibapache2-mod-security2 libapache2-modsecurity libyajl2 modsecurity-crs\n0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded.\nNeed to get 545 kB of archives.\nAfter this operation, 3,960 kB of additional disk space will be used.\nDo you want to continue? [Y\/n] y\nGet:1 http:\/\/us.archive.ubuntu.com\/ubuntu xenial\/main amd64 libyajl2 amd64 2.1.0-2 [19.6 kB] Get:2 http:\/\/us.archive.ubuntu.com\/ubuntu xenial\/universe amd64 libapache2-mod-security2 amd64 2.9.0-1 [314 kB] Get:3 http:\/\/us.archive.ubuntu.com\/ubuntu xenial\/universe amd64 libapache2-modsecurity all 2.9.0-1 [2,006 B] Get:4 http:\/\/us.archive.ubuntu.com\/ubuntu xenial\/universe amd64 modsecurity-crs all 2.2.9-1 [210 kB] Fetched 545 kB in 0s (1,659 kB\/s)\nSelecting previously unselected package libyajl2:amd64.\n(Reading database ... 92965 files and directories currently installed.)\nPreparing to unpack ...\/libyajl2_2.1.0-2_amd64.deb ...\nUnpacking libyajl2:amd64 (2.1.0-2) ...\nSelecting previously unselected package libapache2-mod-security2.\nPreparing to unpack ...\/libapache2-mod-security2_2.9.0-1_amd64.deb ...\nUnpacking libapache2-mod-security2 (2.9.0-1) ...\nSelecting previously unselected package libapache2-modsecurity.\nPreparing to unpack ...\/libapache2-modsecurity_2.9.0-1_all.deb ...\nUnpacking libapache2-modsecurity (2.9.0-1) ...\nSelecting previously unselected package modsecurity-crs.\nPreparing to unpack ...\/modsecurity-crs_2.2.9-1_all.deb ...\nUnpacking modsecurity-crs (2.2.9-1) ...\nSetting up libyajl2:amd64 (2.1.0-2) ...\nSetting up libapache2-mod-security2 (2.9.0-1) ...\napache2_invoke: Enable module security2\nSetting up libapache2-modsecurity (2.9.0-1) ...\nSetting up modsecurity-crs (2.2.9-1) ...\nProcessing triggers for libc-bin (2.23-0ubuntu11) ...<\/pre>\n<p>After installation, you need to confirm if the security module is being loaded by Apache:<\/p>\n<p><strong>Check if the Security Module is Active<\/strong><\/p>\n<pre class=\"lang:default decode:true \">apache2ctl -M | grep security<\/pre>\n<p>Example Output:<\/p>\n<pre class=\"lang:default decode:true \">security2_module (shared)<\/pre>\n<h3>Configuration Section<\/h3>\n<p>Now as the base module is installed, you will need to configure and enable it. This requires a few steps:<\/p>\n<p><strong>Step 1) Use the below command to copy the recommended config over as the live config<\/strong><\/p>\n<pre class=\"lang:default decode:true \">sudo cp \/etc\/modsecurity\/modsecurity.conf{-recommended,}<\/pre>\n<p><strong>Step 2)With the below command, modify the live config and change \u201cSecRuleEngine DetectionOnly\u201d to \u201cSecRuleEngine On\u201d<\/strong><\/p>\n<pre class=\"lang:default decode:true \">sudo sed -i -e 's\/DetectionOnly$\/On\/i' \/etc\/modsecurity\/modsecurity.conf<\/pre>\n<p><strong>Step 3) Check Apache\u2019s config syntax &amp; restart Apache if all is fine<\/strong><\/p>\n<pre class=\"lang:default decode:true \">sudo apache2ctl -t &amp;&amp; sudo apache2ctl restart<\/pre>\n<p>Example output:<\/p>\n<pre class=\"lang:default decode:true \">Syntax OK<\/pre>\n<p>You will find Apache running actively with mod_security in place. But, you won\u2019t find rules in place for it. In the next section, you will learn to configure these rules.<\/p>\n<h3>Enable Core Rule Set &amp; Base Rules<\/h3>\n<p>You will find the security module appears to be good only because of the rules governing it. In order to start, the libapache2-modsecurity package comes with a companion package (modsecurity-crs). In this package you get the Core Rule Set or CRS, a basic set of rules that manages some of the most common malicious activity on the Internet today. Many dangerous types of traffic include are protected by the CRS, but not limited to:<\/p>\n<p>\u2022 SQL Injections (SQLi)<br \/>\n\u2022 Remote Code Execution (RCE)<br \/>\n\u2022 Cross Site Scripting (XSS)<br \/>\n\u2022 And many other common malicious behavior<\/p>\n<p>The installation of CRS is done along with the security module. Follow the below steps to enable CRS &amp; its Base Rules.<\/p>\n<p><strong>Step 1) Using your preferred editor include the below lines to modsecurity.conf<\/strong><\/p>\n<pre class=\"lang:default decode:true \"># ModSecurity Core Rule Set (CRS)\nIncludeOptional \/usr\/share\/modsecurity-crs\/*.conf\nIncludeOptional \/usr\/share\/modsecurity-crs\/activated_rules\/*.conf<\/pre>\n<p><strong>Step 2) In the activated_rules directory, create a symlink for all *.conf files in the base_rules directory<\/strong><\/p>\n<pre class=\"lang:default decode:true \">CSRD=\/usr\/share\/modsecurity-crs; for e in $CSRD\/base_rules\/*.conf; do sudo ln -s $e $CSRD\/activated_rules\/; done<\/pre>\n<p><strong>Step 3) Confirm symlinks are in the activated_rules directory (this is optional)<\/strong><\/p>\n<pre class=\"lang:default decode:true \">sudo ls \/usr\/share\/modsecurity-crs\/activated_rules\/*.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_20_protocol_violations.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_21_protocol_anomalies.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_23_request_limits.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_30_http_policy.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_35_bad_robots.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_40_generic_attacks.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_41_sql_injection_attacks.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_41_xss_attacks.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_42_tight_security.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_45_trojans.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_47_common_exceptions.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_49_inbound_blocking.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_50_outbound.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_59_outbound_blocking.conf\n\/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_60_correlation.conf<\/pre>\n<p>Step 4) Verify Apache\u2019s config syntax &amp; restart Apache if all is fine:<\/p>\n<pre class=\"lang:default decode:true \">sudo apache2ctl -t &amp;&amp; sudo apache2ctl restart<\/pre>\n<p>Example output:<\/p>\n<pre class=\"lang:default decode:true \">Syntax OK<\/pre>\n<p>You will now find that the server configured and actively using the base_rules from the CRS. The CRS package provides additional rules. These rules are discussed in more detail in the next section.<\/p>\n<div style=\"background-color: #e0ffff; padding: 10px;\"><strong>Rule of Thumb:<\/strong><br \/>\nYou should verify syntax and restart Apache, anytime changes are made to one or more mod_security rules.<\/div>\n<h3>Enable Additional Rules [Optional]<\/h3>\n<p>Many additional rules are included in the Core Rule Set. These rules are divided into three distinct categories: experimental_rules, optional_rules, and slr_rules. Each category\u2019s rules are included within their own directory of the same name. In order to activate these rules you need to follow the same process as to enable the base_rules.<\/p>\n<p>From the activated_rules directory, create a symlink to the desired rule from the activated_rules directory. You can use the below commands to quickly enable these rules if required.<\/p>\n<div style=\"background-color: #e0ffff; padding: 10px;\"><strong>Caution:<\/strong><br \/>\nIt is important to judge while you enable the additional rules after those in the base_rules set. In additional rules, experimental_rules might encounter false positives, blocking legitimate traffic. The commands are given below for easing the process and isn\u2019t a support of enabling all rules by chance.<\/div>\n<p><strong>experimental_rules<\/strong><\/p>\n<pre class=\"lang:default decode:true\">CSRD=\/usr\/share\/modsecurity-crs; for e in $CSRD\/experimental_rules\/*.conf; do sudo ln -s $e \n$CSRD\/activated_rules\/; done<\/pre>\n<p><strong>optional_rules<\/strong><\/p>\n<pre class=\"lang:default decode:true\">CSRD=\/usr\/share\/modsecurity-crs; for e in $CSRD\/optional_rules\/*.conf; do sudo ln -s $e \n$CSRD\/activated_rules\/; done<\/pre>\n<p><strong>slr_rules<\/strong><\/p>\n<pre class=\"lang:default decode:true\">CSRD=\/usr\/share\/modsecurity-crs; for e in $CSRD\/slr_rules\/*.conf; do sudo ln -s $e $CSRD\/activated_rules\/; \ndone<\/pre>\n<h3>Disable Rules<\/h3>\n<p>For disabling rules, delete the symlink within the activated_rules directory that relates to the rule in question. After deleting it, you need a quick restart of Apache services for making the change active.<\/p>\n<p><strong>Example: Delete the application_defects rule then restart Apache.<\/strong><\/p>\n<pre class=\"lang:default decode:true \">sudo rm -rf \/usr\/share\/modsecurity-crs\/activated_rules\/modsecurity_crs_55_application_defects.conf\nsudo apache2ctl restart<\/pre>\n<p>That\u2019s it! You have now learned to install and configure mod_security on Ubuntu 16.04 server.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Modsec the short form for Mod_security, is a powerful WAF (Web Application Firewall) that integrates directly into Apache\u2019s module system. Due to this direct integration the security module can intercept traffic at the initial stages of a request. It is important to detect the security flaw at an early stage so that one can block [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[741,740,742],"class_list":["post-7244","post","type-post","status-publish","format-standard","placeholder-for-hentry","category-web-hosting-faq","tag-configure-mod-security-on-ubuntu-16-04-server","tag-install-mode-security-on-ubuntu-16-04-server","tag-mod-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Steps to Install and Configure Mod_Security on Ubuntu 16.04 Server<\/title>\n<meta name=\"description\" content=\"In this article you will get to see the installation of mod_security along with the CRS (Core Rule Set) in Ubuntu 16.04 LTS Server running Apache 2.4\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Steps to Install and Configure Mod_Security on Ubuntu 16.04 Server\" \/>\n<meta property=\"og:description\" content=\"In this article you will get to see the installation of mod_security along with the CRS (Core Rule Set) in Ubuntu 16.04 LTS Server running Apache 2.4\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/\" \/>\n<meta property=\"og:site_name\" content=\"Web Hosting FAQs by MilesWeb\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-05T04:16:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-27T13:52:50+00:00\" \/>\n<meta name=\"author\" content=\"Pallavi Godse\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pallavi Godse\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/\"},\"author\":{\"name\":\"Pallavi Godse\",\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/#\/schema\/person\/7e3952607fa9eb4e82fea9f7cad9c945\"},\"headline\":\"A Guide to Install and Configure Mod_Security on Ubuntu 16.04 Server\",\"datePublished\":\"2019-06-05T04:16:22+00:00\",\"dateModified\":\"2023-01-27T13:52:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/\"},\"wordCount\":945,\"commentCount\":0,\"keywords\":[\"configure mod-security on Ubuntu 16.04 server\",\"install mode-security on Ubuntu 16.04 server\",\"mod-security\"],\"articleSection\":[\"Web Hosting FAQ\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/\",\"url\":\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/\",\"name\":\"Steps to Install and Configure Mod_Security on Ubuntu 16.04 Server\",\"isPartOf\":{\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/#website\"},\"datePublished\":\"2019-06-05T04:16:22+00:00\",\"dateModified\":\"2023-01-27T13:52:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/#\/schema\/person\/7e3952607fa9eb4e82fea9f7cad9c945\"},\"description\":\"In this article you will get to see the installation of mod_security along with the CRS (Core Rule Set) in Ubuntu 16.04 LTS Server running Apache 2.4\",\"breadcrumb\":{\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.milesweb.in\/hosting-faqs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Guide to Install and Configure Mod_Security on Ubuntu 16.04 Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/#website\",\"url\":\"https:\/\/www.milesweb.in\/hosting-faqs\/\",\"name\":\"Web Hosting FAQs by MilesWeb\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.milesweb.in\/hosting-faqs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/#\/schema\/person\/7e3952607fa9eb4e82fea9f7cad9c945\",\"name\":\"Pallavi Godse\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.milesweb.in\/hosting-faqs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3602d0ac1ab89332aea8205dcf474af4ff4eb319cfd584544038908cd5e4c966?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3602d0ac1ab89332aea8205dcf474af4ff4eb319cfd584544038908cd5e4c966?s=96&d=blank&r=g\",\"caption\":\"Pallavi Godse\"},\"description\":\"Pallavi is a Digital Marketing Executive at MilesWeb and has an experience of over 4 years in content development. She is interested in writing engaging content on business, technology, web hosting and other topics related to information technology.\",\"sameAs\":[\"https:\/\/www.milesweb.in\"],\"url\":\"https:\/\/www.milesweb.in\/hosting-faqs\/author\/pallavi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Steps to Install and Configure Mod_Security on Ubuntu 16.04 Server","description":"In this article you will get to see the installation of mod_security along with the CRS (Core Rule Set) in Ubuntu 16.04 LTS Server running Apache 2.4","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/","og_locale":"en_US","og_type":"article","og_title":"Steps to Install and Configure Mod_Security on Ubuntu 16.04 Server","og_description":"In this article you will get to see the installation of mod_security along with the CRS (Core Rule Set) in Ubuntu 16.04 LTS Server running Apache 2.4","og_url":"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/","og_site_name":"Web Hosting FAQs by MilesWeb","article_published_time":"2019-06-05T04:16:22+00:00","article_modified_time":"2023-01-27T13:52:50+00:00","author":"Pallavi Godse","twitter_misc":{"Written by":"Pallavi Godse","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/#article","isPartOf":{"@id":"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/"},"author":{"name":"Pallavi Godse","@id":"https:\/\/www.milesweb.in\/hosting-faqs\/#\/schema\/person\/7e3952607fa9eb4e82fea9f7cad9c945"},"headline":"A Guide to Install and Configure Mod_Security on Ubuntu 16.04 Server","datePublished":"2019-06-05T04:16:22+00:00","dateModified":"2023-01-27T13:52:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/"},"wordCount":945,"commentCount":0,"keywords":["configure mod-security on Ubuntu 16.04 server","install mode-security on Ubuntu 16.04 server","mod-security"],"articleSection":["Web Hosting FAQ"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/","url":"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/","name":"Steps to Install and Configure Mod_Security on Ubuntu 16.04 Server","isPartOf":{"@id":"https:\/\/www.milesweb.in\/hosting-faqs\/#website"},"datePublished":"2019-06-05T04:16:22+00:00","dateModified":"2023-01-27T13:52:50+00:00","author":{"@id":"https:\/\/www.milesweb.in\/hosting-faqs\/#\/schema\/person\/7e3952607fa9eb4e82fea9f7cad9c945"},"description":"In this article you will get to see the installation of mod_security along with the CRS (Core Rule Set) in Ubuntu 16.04 LTS Server running Apache 2.4","breadcrumb":{"@id":"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.milesweb.in\/hosting-faqs\/install-and-configure-mod-security-on-ubuntu-16-04-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.milesweb.in\/hosting-faqs\/"},{"@type":"ListItem","position":2,"name":"A Guide to Install and Configure Mod_Security on Ubuntu 16.04 Server"}]},{"@type":"WebSite","@id":"https:\/\/www.milesweb.in\/hosting-faqs\/#website","url":"https:\/\/www.milesweb.in\/hosting-faqs\/","name":"Web Hosting FAQs by MilesWeb","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.milesweb.in\/hosting-faqs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.milesweb.in\/hosting-faqs\/#\/schema\/person\/7e3952607fa9eb4e82fea9f7cad9c945","name":"Pallavi Godse","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.milesweb.in\/hosting-faqs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3602d0ac1ab89332aea8205dcf474af4ff4eb319cfd584544038908cd5e4c966?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3602d0ac1ab89332aea8205dcf474af4ff4eb319cfd584544038908cd5e4c966?s=96&d=blank&r=g","caption":"Pallavi Godse"},"description":"Pallavi is a Digital Marketing Executive at MilesWeb and has an experience of over 4 years in content development. She is interested in writing engaging content on business, technology, web hosting and other topics related to information technology.","sameAs":["https:\/\/www.milesweb.in"],"url":"https:\/\/www.milesweb.in\/hosting-faqs\/author\/pallavi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.milesweb.in\/hosting-faqs\/wp-json\/wp\/v2\/posts\/7244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.milesweb.in\/hosting-faqs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.milesweb.in\/hosting-faqs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.milesweb.in\/hosting-faqs\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.milesweb.in\/hosting-faqs\/wp-json\/wp\/v2\/comments?post=7244"}],"version-history":[{"count":4,"href":"https:\/\/www.milesweb.in\/hosting-faqs\/wp-json\/wp\/v2\/posts\/7244\/revisions"}],"predecessor-version":[{"id":7315,"href":"https:\/\/www.milesweb.in\/hosting-faqs\/wp-json\/wp\/v2\/posts\/7244\/revisions\/7315"}],"wp:attachment":[{"href":"https:\/\/www.milesweb.in\/hosting-faqs\/wp-json\/wp\/v2\/media?parent=7244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.milesweb.in\/hosting-faqs\/wp-json\/wp\/v2\/categories?post=7244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.milesweb.in\/hosting-faqs\/wp-json\/wp\/v2\/tags?post=7244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}