{"id":3174,"date":"2026-02-20T09:49:42","date_gmt":"2026-02-20T09:49:42","guid":{"rendered":"https:\/\/pheonixsolutions.com\/knowledge-base\/?p=3174"},"modified":"2026-02-20T09:49:48","modified_gmt":"2026-02-20T09:49:48","slug":"how-to-install-and-configure-modsecurity-in-whm","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/","title":{"rendered":"How to Install and Configure ModSecurity in WHM"},"content":{"rendered":"\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>ModSecurity (also known as mod_security) is a Web Application Firewall (WAF) module for Apache, LiteSpeed, and NGINX. It helps protect web applications from common attacks such as SQL injection, XSS, brute force attempts, and malicious bots.<\/p>\n\n\n\n<p>In a cPanel\/WHM environment, ModSecurity adds an extra layer of security to hosted websites.<\/p>\n\n\n\n<p><strong>Prerequisites<\/strong><\/p>\n\n\n\n<p>Before proceeding, ensure:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You have root access to WHM.<\/li>\n\n\n\n<li>cPanel\/WHM is properly installed.<\/li>\n\n\n\n<li>Apache is installed and running.<\/li>\n\n\n\n<li>The server is updated (<code>yum update<\/code> or <code>dnf update<\/code> recommended)<\/li>\n<\/ul>\n\n\n\n<p><strong>Implementation<\/strong><\/p>\n\n\n\n<p>Step 1: Login to WHM<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"788\" height=\"950\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM.png\" alt=\"\" class=\"wp-image-3175\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM.png 788w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM-249x300.png 249w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM-768x926.png 768w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM-124x150.png 124w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM-300x362.png 300w\" sizes=\"auto, (max-width: 788px) 100vw, 788px\" \/><\/figure>\n\n\n\n<p>Steps 2: Enable ModSecurity<\/p>\n\n\n\n<p>(1) In WHM, go to:<br>Home \u2192 Security Center \u2192 ModSecurity\u2122 Vendors<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"410\" height=\"414\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.10.18-PM.png\" alt=\"\" class=\"wp-image-3176\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.10.18-PM.png 410w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.10.18-PM-297x300.png 297w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.10.18-PM-150x150.png 150w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.10.18-PM-300x303.png 300w\" sizes=\"auto, (max-width: 410px) 100vw, 410px\" \/><\/figure>\n\n\n\n<p>(2) If ModSecurity is not enabled:<\/p>\n\n\n\n<p>Go to:<br>Home \u2192 Security Center \u2192 ModSecurity\u2122 Configuration<\/p>\n\n\n\n<p>Click Enable ModSecurity.<\/p>\n\n\n\n<p>Step 3: Install ModSecurity Rule Set<\/p>\n\n\n\n<p>ModSecurity without rules will not protect your server effectively.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to:<br>Home \u2192 Security Center \u2192 ModSecurity\u2122 Vendors<\/li>\n\n\n\n<li>You will see available vendors such as:\n<ul class=\"wp-block-list\">\n<li>OWASP<\/li>\n\n\n\n<li>Comodo<\/li>\n\n\n\n<li>Atomic (if configured)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Click Install next to a vendor rule set.<\/li>\n<\/ol>\n\n\n\n<p>The most commonly used rule set is from:<\/p>\n\n\n\n<p>OWASP (OWASP Core Rule Set \u2013 free and widely trusted)<\/p>\n\n\n\n<p>Step 4: Confirm Installation<\/p>\n\n\n\n<p>To verify:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to:<br>Home \u2192 Security Center \u2192 ModSecurity\u2122 Tools<\/li>\n\n\n\n<li>Check:\n<ul class=\"wp-block-list\">\n<li>Rule sets installed<\/li>\n\n\n\n<li>Status: Enabled<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"99\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.12.16-PM-1024x99.png\" alt=\"\" class=\"wp-image-3177\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.12.16-PM-1024x99.png 1024w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.12.16-PM-300x29.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.12.16-PM-768x74.png 768w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.12.16-PM-1536x148.png 1536w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.12.16-PM-2048x197.png 2048w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.12.16-PM-150x14.png 150w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>You can also verify via SSH:<\/p>\n\n\n\n<p>$ apachectl -M | grep security<\/p>\n\n\n\n<p>Expected output:<\/p>\n\n\n\n<p><code>security2_module (shared)<\/code><\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Installing ModSecurity in WHM significantly strengthens server security by protecting hosted websites from common web attacks. Always install a trusted rule set such as OWASP and monitor logs regularly to avoid false positives.<\/p>\n\n\n\n<p>Proper configuration ensures maximum protection without impacting legitimate traffic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction ModSecurity (also known as mod_security) is a Web Application Firewall (WAF) module for Apache, LiteSpeed, and NGINX. It helps protect web applications from common attacks such as SQL injection, XSS, brute force attempts, and malicious bots. In a cPanel\/WHM environment, ModSecurity adds an extra layer of security to hosted websites. Prerequisites Before proceeding, ensure: ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3174","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Install and Configure ModSecurity in WHM - PheonixSolutions Knowledge-Base<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Install and Configure ModSecurity in WHM - PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"og:description\" content=\"Introduction ModSecurity (also known as mod_security) is a Web Application Firewall (WAF) module for Apache, LiteSpeed, and NGINX. It helps protect web applications from common attacks such as SQL injection, XSS, brute force attempts, and malicious bots. In a cPanel\/WHM environment, ModSecurity adds an extra layer of security to hosted websites. Prerequisites Before proceeding, ensure: ..Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/\" \/>\n<meta property=\"og:site_name\" content=\"PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-20T09:49:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-20T09:49:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"788\" \/>\n\t<meta property=\"og:image:height\" content=\"950\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"meenakshi k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"meenakshi k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/\"},\"author\":{\"name\":\"meenakshi k\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/baf2a3c7578108699459ee9dfee7211f\"},\"headline\":\"How to Install and Configure ModSecurity in WHM\",\"datePublished\":\"2026-02-20T09:49:42+00:00\",\"dateModified\":\"2026-02-20T09:49:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/\"},\"wordCount\":250,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Screenshot-2026-02-20-at-3.09.13-PM.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/\",\"name\":\"How to Install and Configure ModSecurity in WHM - PheonixSolutions Knowledge-Base\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Screenshot-2026-02-20-at-3.09.13-PM.png\",\"datePublished\":\"2026-02-20T09:49:42+00:00\",\"dateModified\":\"2026-02-20T09:49:48+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/baf2a3c7578108699459ee9dfee7211f\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Screenshot-2026-02-20-at-3.09.13-PM.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Screenshot-2026-02-20-at-3.09.13-PM.png\",\"width\":788,\"height\":950},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/02\\\/20\\\/how-to-install-and-configure-modsecurity-in-whm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Install and Configure ModSecurity in WHM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\",\"name\":\"PheonixSolutions Knowledge-Base\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/baf2a3c7578108699459ee9dfee7211f\",\"name\":\"meenakshi k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g\",\"caption\":\"meenakshi k\"},\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/author\\\/meenakshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Install and Configure ModSecurity in WHM - PheonixSolutions Knowledge-Base","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/","og_locale":"en_US","og_type":"article","og_title":"How to Install and Configure ModSecurity in WHM - PheonixSolutions Knowledge-Base","og_description":"Introduction ModSecurity (also known as mod_security) is a Web Application Firewall (WAF) module for Apache, LiteSpeed, and NGINX. It helps protect web applications from common attacks such as SQL injection, XSS, brute force attempts, and malicious bots. In a cPanel\/WHM environment, ModSecurity adds an extra layer of security to hosted websites. Prerequisites Before proceeding, ensure: ..Read more","og_url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/","og_site_name":"PheonixSolutions Knowledge-Base","article_published_time":"2026-02-20T09:49:42+00:00","article_modified_time":"2026-02-20T09:49:48+00:00","og_image":[{"width":788,"height":950,"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM.png","type":"image\/png"}],"author":"meenakshi k","twitter_card":"summary_large_image","twitter_misc":{"Written by":"meenakshi k","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/"},"author":{"name":"meenakshi k","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/baf2a3c7578108699459ee9dfee7211f"},"headline":"How to Install and Configure ModSecurity in WHM","datePublished":"2026-02-20T09:49:42+00:00","dateModified":"2026-02-20T09:49:48+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/"},"wordCount":250,"commentCount":0,"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/","name":"How to Install and Configure ModSecurity in WHM - PheonixSolutions Knowledge-Base","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM.png","datePublished":"2026-02-20T09:49:42+00:00","dateModified":"2026-02-20T09:49:48+00:00","author":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/baf2a3c7578108699459ee9dfee7211f"},"breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/#primaryimage","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM.png","contentUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-20-at-3.09.13-PM.png","width":788,"height":950},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/02\/20\/how-to-install-and-configure-modsecurity-in-whm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/knowledge-base\/"},{"@type":"ListItem","position":2,"name":"How to Install and Configure ModSecurity in WHM"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/","name":"PheonixSolutions Knowledge-Base","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/knowledge-base\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/baf2a3c7578108699459ee9dfee7211f","name":"meenakshi k","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g","caption":"meenakshi k"},"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/author\/meenakshi\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/3174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/comments?post=3174"}],"version-history":[{"count":2,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/3174\/revisions"}],"predecessor-version":[{"id":3179,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/3174\/revisions\/3179"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/media?parent=3174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/categories?post=3174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/tags?post=3174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}