
Nginx, Apache and other web servers, which support ModSecurity and SecRemoteRules. If your server is running cPanel 11.48 and higher you may install Comodo as ModSecurity Vendor using the next steps: ol- Go to Security Center ModSecurity Vendors./ol Click Add Vendor. Q: Can I install Malware Expert rules and Comodo rule set same time. The same issues are not occuring with the Atomic basic rule set on Onyx systems. Comodo can now be easily installed as ModSecurity Vendor to cPanel for Apache and LiteSpeed platforms. It's not feasible to have rules in place who frequently act against their own website operators.

It might be a good idea for Plesk staff to check into these rules and consider disabling them by default.

On August 8th it seems that an EasyApache 4 update patched ModSecurity to 2.9.2, but the Comodo YAML metadata only reports that it supports ModSecurity versions up to 2.9.1. So basically one can say: If these are not added to the exception list of the "Web Application Firewall" icon, most customers will sooner or later run into problems with accessing their sites, because they will be blocked by fail2ban responding to ModSecurity 403 blocks in the webserver log files. 2.Deploying Comodo ModSecurity Rule Set in cPanel Comodo ModSecurity protection rules are now integrated in cPanel and can be activated from the Security Center. We are provisioning a new host and going through the install process for adding Comodo as a ModSecurity rule vendor in cPanel WHM. We have also seen it in Nextcoud installations. We have seen it on Wordpress websites frequently when customers simply use the Wordpress editor, we've also seen it in shop systems.

It's not a bug, but it's a bit annoying.:On Obsidian no day passes on which we don't get a call or support ticket from a customer who is blocked by fail2ban because his website offended some Comodo basic ModSecurity rule.
