![]() NOTE: this line tells Apache to INCLUDE into the VirtualHost config ANY file ending in. Include "/usr/local/apache/conf/userdata/std/2/USERNAME/DOMAIN.COM/*.conf" ![]() Uncomment out the include line that looks like this: Find the VirtualHost entry for that specific domain. SSH into the server and open the nf file.This is perfectly fine and since the set_modsec tool is only available on shared servers you will need to disable mod_security for a single domain: Some applications may require you to disable mod_security for them to function correctly. Manually Disabling Mod_Security on a VPS or Dedicated Server ![]() Please take note that mod_security is enabled as an extra layer of security and removing it can expose you to potential risks. This can be accomplished in WHM by selecting “No Configuration” from WHM >Mod Security. If you are a VPS or Dedicated customer you can disable mod_security for the entire server as well. If you’d like to simply disable a certain rule that is being triggered instead of disabling mod_security for the entire domain, please contact our Live Support team. We apologize for any inconvenience this may cause. Please contact Live Support if you need assistance disabling a mod security rule. **Note: The Mod Security Manager in cPanel is not working currently.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |