ModSecurity is a great tool and a great compliment to IIS. The best thing is that it can secure all site , some sites, and regardless of what you want to secure as long as you can run the HTTPModule you can secure the inbound and outbound payloads.
From their site:
What Can ModSecurity Do?
ModSecurity is a toolkit for real-time web application monitoring, logging, and access control. I like to think about it as an enabler: there are no hard rules telling you what to do; instead, it is up to you to choose your own path through the available features. That’s why the title of this section asks what ModSecurity can do, not what it does.
In order to install Modsecurity, head over to to get the latest installer. :
Here are the install steps and the discovery and startup of your first site on premise and in the cloud.
First and foremost – use the double click! It’s what us Devs do best!
Away we go…
There are 64 and 32 bit renditions and a repository for the OWASP CRS which stands for Core Rule Set. Which you want.
Next is the ability to configure the instance you will want to say yes unless you are doing more of a silent install or want to powershell these permissions/additions …otherwise select the box and move along.
We are now complete , finish and go explore.
This said, first thing to oversee is IIS itself.
Notice the addition of 2 new HTTPModules:
Excellent, now off to the root! Which should reside at:
C:\Program Files\ModSecurity IIS
Peruse the files and concentrate on .conf.
Then for the site you want enabled use this in your web.config:
configFile=”C:\Program Files\ModSecurity IIS\modsecurity_iis.conf” />
<!–<remove name=”ModSecurity IIS” />–>
<add name=”ModSecurity IIS (64bits)” preCondition=”bitness64″ />
Away you, go…in my next post I will be attacking a localhost site with various tools to see how ModSecurity and IIS react.