<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.hostek.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Davidd</id>
		<title>Hostek.com Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.hostek.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Davidd"/>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/Special:Contributions/Davidd"/>
		<updated>2026-04-16T22:06:30Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.24.2</generator>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=How_to_Enable_Robust_Exceptions_on_a_per_Site_basis_in_ColdFusion&amp;diff=3815</id>
		<title>How to Enable Robust Exceptions on a per Site basis in ColdFusion</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=How_to_Enable_Robust_Exceptions_on_a_per_Site_basis_in_ColdFusion&amp;diff=3815"/>
				<updated>2018-03-27T18:25:34Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In circumstances when you need to enable robust exceptions for a site, here are the steps needed:&lt;br /&gt;
&lt;br /&gt;
You can configure this at the site level within your Application.cfc using the &amp;quot;this.EnableRobustException&amp;quot; property:&lt;br /&gt;
&lt;br /&gt;
https://helpx.adobe.com/coldfusion/cfml-reference/application-cfc-reference/application-variables.html&lt;br /&gt;
&lt;br /&gt;
Example &amp;quot;Application.cfc&amp;quot; file:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;cfcomponent&amp;gt;&lt;br /&gt;
     &amp;lt;cfset this.Name = &amp;quot;My Application Name&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;cfset this.EnableRobustException = &amp;quot;True&amp;quot; /&amp;gt;&lt;br /&gt;
 &amp;lt;/cfcomponent&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example for restricting based on IP address:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;cfcomponent&amp;gt;&lt;br /&gt;
     &amp;lt;cfset this.Name = &amp;quot;My Application Name&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;cfif CGI.REMOTE_ADDR EQ &amp;quot;123.123.123.123&amp;quot;&amp;gt;&lt;br /&gt;
          &amp;lt;cfset this.EnableRobustException = &amp;quot;True&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;/cfif&amp;gt;&lt;br /&gt;
 &amp;lt;/cfcomponent&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' Replace '''123.123.123.123''' with your actual IP address.&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=How_to_Enable_Robust_Exceptions_on_a_per_Site_basis_in_ColdFusion&amp;diff=3814</id>
		<title>How to Enable Robust Exceptions on a per Site basis in ColdFusion</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=How_to_Enable_Robust_Exceptions_on_a_per_Site_basis_in_ColdFusion&amp;diff=3814"/>
				<updated>2018-03-27T18:22:34Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In circumstances when you need to enable robust exceptions for a site, here are the steps needed:&lt;br /&gt;
&lt;br /&gt;
You can configure this at the site level within your Application.cfc using the &amp;quot;this.EnableRobustException&amp;quot; property:&lt;br /&gt;
&lt;br /&gt;
https://helpx.adobe.com/coldfusion/cfml-reference/application-cfc-reference/application-variables.html&lt;br /&gt;
&lt;br /&gt;
Example &amp;quot;Application.cfc&amp;quot; file:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;cfcomponent&amp;gt;&lt;br /&gt;
     &amp;lt;cfset this.Name = &amp;quot;My Application Name&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;cfset this.EnableRobustException = &amp;quot;True&amp;quot; /&amp;gt;&lt;br /&gt;
 &amp;lt;/cfcomponent&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example for restricting based on IP address:&lt;br /&gt;
&lt;br /&gt;
NOTE: Replace &amp;quot;123.123.123.123&amp;quot; with your actual IP address.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;cfcomponent&amp;gt;&lt;br /&gt;
     &amp;lt;cfset this.Name = &amp;quot;My Application Name&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;cfif CGI.REMOTE_ADDR EQ &amp;quot;123.123.123.123&amp;quot;&amp;gt;&lt;br /&gt;
          &amp;lt;cfset this.EnableRobustException = &amp;quot;True&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;/cfif&amp;gt;&lt;br /&gt;
 &amp;lt;/cfcomponent&amp;gt;&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=How_to_Enable_Robust_Exceptions_on_a_per_Site_basis_in_ColdFusion&amp;diff=3813</id>
		<title>How to Enable Robust Exceptions on a per Site basis in ColdFusion</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=How_to_Enable_Robust_Exceptions_on_a_per_Site_basis_in_ColdFusion&amp;diff=3813"/>
				<updated>2018-03-27T18:20:02Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In circumstances when you need to enable robust exceptions for a site, here are the steps needed:&lt;br /&gt;
&lt;br /&gt;
You can configure this at the site level within your Application.cfc using the &amp;quot;this.EnableRobustException&amp;quot; property:&lt;br /&gt;
&lt;br /&gt;
https://helpx.adobe.com/coldfusion/cfml-reference/application-cfc-reference/application-variables.html&lt;br /&gt;
&lt;br /&gt;
Example &amp;quot;Application.cfc&amp;quot; file:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;cfcomponent&amp;gt;&lt;br /&gt;
     &amp;lt;cfset this.Name = &amp;quot;My Application Name&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;cfset this.EnableRobustException = &amp;quot;True&amp;quot; /&amp;gt;&lt;br /&gt;
 &amp;lt;/cfcomponent&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example for restricting based on IP address:&lt;br /&gt;
&lt;br /&gt;
NOTE: Replace &amp;quot;123.123.123.123&amp;quot; with your actual IP address.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;cfcomponent&amp;gt;&lt;br /&gt;
     &amp;lt;cfset this.Name = &amp;quot;My Application Name&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;cfif CGI.REMOTE_ADDR == &amp;quot;123.123.123.123&amp;quot;&amp;gt;&lt;br /&gt;
          &amp;lt;cfset this.EnableRobustException = &amp;quot;True&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;/cfif&amp;gt;&lt;br /&gt;
 &amp;lt;/cfcomponent&amp;gt;&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SmarterMail&amp;diff=3273</id>
		<title>SmarterMail</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SmarterMail&amp;diff=3273"/>
				<updated>2017-06-26T21:15:47Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==SmarterMail Help==&lt;br /&gt;
===SmarterMail Documentation===&lt;br /&gt;
*The link below will send you to the SmarterMail Documentation, this will familiarize you with the interface and it's functions:&lt;br /&gt;
#https://help.smartertools.com/SmarterMail/v13/&lt;br /&gt;
#For a different version of SmarterMail, please see this page: https://help.smartertools.com/Default.aspx&lt;br /&gt;
===SmarterMail Video Tutorials===&lt;br /&gt;
*The link below will send you to our SmarterMail Video Tutorials Wiki:&lt;br /&gt;
#https://wiki.hostek.com/SmarterMail_-_Video_Tutorials&lt;br /&gt;
===Anti-Virus Information===&lt;br /&gt;
*Our SmarterMail MailServers use Trend Micro's Server Protection Anti-Virus software along with AVG Cloudcare. These programs are continually updated and they filter all known viruses.&lt;br /&gt;
&lt;br /&gt;
==Limits within SmarterMail==&lt;br /&gt;
===Information===&lt;br /&gt;
*A &amp;quot;limit&amp;quot; in this aspect is more like a safeguard or protective measure.  &lt;br /&gt;
*#The word &amp;quot;limit&amp;quot; is a little misleading here, as we're not limiting anything ''most'' customers would do.&lt;br /&gt;
*#If you do run into any of these &amp;quot;limits&amp;quot;, please contact support right away and we'll work with you further.&lt;br /&gt;
&lt;br /&gt;
*A '''SmarterMail VPS''' or '''Windows VPS with SmarterMail''' is always a good option for you if you need to have some abnormal situations handled.&lt;br /&gt;
&lt;br /&gt;
===Emails Per Hour===&lt;br /&gt;
#The number of emails a domain can send per hour is '''100'''.  &lt;br /&gt;
#In normal situations, a domain will not send this many in a Day or Week.&lt;br /&gt;
&lt;br /&gt;
===Email Attachment Size===&lt;br /&gt;
#The Maximum size of an Email Attachment is '''30MB'''. &lt;br /&gt;
#If you feel you need to send a larger attachment, please consider the end recipient and the effect such a large attachment will have on them. (Storage Space + ISP Data Usage concerns)&lt;br /&gt;
#Here are a couple of alternatives:&lt;br /&gt;
##FTP(File Transfer Protocol) can be used to move the the file(s) to your site. Once that is accomplished you can email them a link to the file. You may need to place the file in a .zip so that they can easily download it though.&lt;br /&gt;
###More information on FTP [https://wiki.hostek.com/Connecting_to_FTP here].&lt;br /&gt;
##File Sharing Services such as:&lt;br /&gt;
###Dropbox: https://www.dropbox.com/&lt;br /&gt;
###Google Drive: https://www.google.com/drive/&lt;br /&gt;
===Users Per Domain===&lt;br /&gt;
#The number of users per domain needs to be kept to '''100''' or less.&lt;br /&gt;
#In most situations, only a handful of addresses are needed.&lt;br /&gt;
#Anything approaching that limit is a little abnormal and [depending on your situation] a '''SmarterMail VPS''' would be your next step after hitting that marker.&lt;br /&gt;
&lt;br /&gt;
==Basic Interface Functions==&lt;br /&gt;
&lt;br /&gt;
===How to import mail from another mail server===&lt;br /&gt;
#Log into SmarterMail as your email user.&lt;br /&gt;
#Click the Settings icon.&lt;br /&gt;
#Expand the My Settings and Advanced Settings folders in the navigation pane.&lt;br /&gt;
#Click Mailbox Migration.&lt;br /&gt;
*The mailbox migration tool will open in a new window. Follow the on-screen instructions to import email and collaboration data from a third-party mail server to your SmarterMail mailbox.&lt;br /&gt;
&lt;br /&gt;
===How to Create a Folder===&lt;br /&gt;
#Sign in to '''SmarterMail'''.&lt;br /&gt;
#Click on the '''Mail''' icon.&lt;br /&gt;
#Click on '''Actions''' (On the far-left side of the light-blue bar.)&lt;br /&gt;
#Click on  '''New Folder'''.&lt;br /&gt;
#Name your folder.&lt;br /&gt;
*You can access any folders you create by Clicking on the '''+''' button next to '''Inbox'''.&lt;br /&gt;
&lt;br /&gt;
===How to Perform a Mass Deletion===&lt;br /&gt;
#Sign in to '''SmarterMail'''.&lt;br /&gt;
#Click on the '''Mail''' icon.&lt;br /&gt;
#Select the '''appropriate''' inbox.&lt;br /&gt;
#Click on '''Delete'''.&lt;br /&gt;
#Select '''Delete All Messages in Folder'''.&lt;br /&gt;
*If you want to save certain emails, please follow '''How to Move Emails to a Folder'''.&lt;br /&gt;
&lt;br /&gt;
===How to Move Emails to a Folder===&lt;br /&gt;
#Sign in to '''SmarterMail'''.&lt;br /&gt;
#Click on the '''Mail''' icon.&lt;br /&gt;
#Select the '''appropriate''' inbox.&lt;br /&gt;
#Tick all of the '''appropriate''' emails.&lt;br /&gt;
#Click on '''Actions''' (Above the Emails).&lt;br /&gt;
#Select '''Move'''.&lt;br /&gt;
#Specify the '''folder''' of choice (You might have to find it by Clicking on the '''+''' next to '''Inbox''').&lt;br /&gt;
&lt;br /&gt;
===How to Set a Notification Profile===&lt;br /&gt;
*This will allow you to set any number of email address to receive '''very''' important '''System Administrator''' Notification emails.&lt;br /&gt;
#Sign in as the primary administrator email account (the default is the ''''mailadmin@'''' user) in '''SmarterMail'''.&lt;br /&gt;
#Click on '''Settings''' (the '''gears''' icon).&lt;br /&gt;
#Expand '''Domain Settings'''.&lt;br /&gt;
#Click on '''Notification Profiles'''.&lt;br /&gt;
#You now have the option to create a '''New''' entry, '''Delete''' an entry, or '''Edit''' the default/existing entry.&lt;br /&gt;
*These are the options you will have to choose from when setting a '''Notification Profile'''.&lt;br /&gt;
#'''Email Address(es)''' - The email address(es) to which notifications are sent.&lt;br /&gt;
##'''Enable''' - Select this option to enable email notifications.&lt;br /&gt;
#'''SMS Email Address(es)''' - The mobile device email address to which notifications are sent.&lt;br /&gt;
##'''Enable''' - Select this option to enable SMS notifications.&lt;br /&gt;
#'''Enable Reminders for all domain administrators''' - Select this option to send a reminder to all domain administrators when the event is triggered.&lt;br /&gt;
&lt;br /&gt;
==How to Add a Disk Space &amp;quot;Event&amp;quot;==&lt;br /&gt;
*This will setup a notification to alert you whenever a User's Disk Space is close to, say for example 90% Full.&lt;br /&gt;
*This is done through SmarterMail's '''Events''' feature.&lt;br /&gt;
#Log in to SmarterMail&lt;br /&gt;
##Example: &amp;lt;nowiki&amp;gt;mail.yourawesomedomain.com&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#Go to the '''Settings''' tab, which is the Gears icon on the left-hand side.&lt;br /&gt;
#Click on '''Events''':&lt;br /&gt;
#*You can set this up for '''your user''' in the '''Events''' section under the '''My Settings''' area.&lt;br /&gt;
#*You can set this up for '''any user''' in the '''Events''' section under the '''Domain Settings''' area.&lt;br /&gt;
#Click the '''New''' button near the top of the page.&lt;br /&gt;
#Here is an example Disk Space Event:&lt;br /&gt;
##This is in the &amp;quot;Conditions Tab&amp;quot;&lt;br /&gt;
##'''Event Name:''' Example Disk Space Alert&lt;br /&gt;
##'''Event Category:''' User&lt;br /&gt;
##'''Event Type:''' User Disk Space Used&lt;br /&gt;
##'''Time of Day:''' Disabled&lt;br /&gt;
##'''Mailbox Usage (%):''' [Greater Than] [90]&lt;br /&gt;
#Click on the '''Actions''' tab next to the '''Conditions''' tab, and hit '''Add Action'''.&lt;br /&gt;
#Click '''Save''' if the Defaults look good or after you make your custom changes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Add a Trusted Sender==&lt;br /&gt;
===User-level Trusted Senders List===&lt;br /&gt;
*This can also be called a [soft-]whitelist for your user.&lt;br /&gt;
#Login to Webmail&lt;br /&gt;
##Example: &amp;lt;nowiki&amp;gt;http://mail.yourawesomedomain.com/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#Go to '''Settings''' (Gears Icon)&lt;br /&gt;
#Under '''My Settings''' select '''Trusted Senders'''&lt;br /&gt;
#Click '''New'''&lt;br /&gt;
#Add a Domain or Email User (one per line) and click '''Save'''&lt;br /&gt;
&lt;br /&gt;
===Domain-level Trusted Senders List===&lt;br /&gt;
*This can also be called a [soft-]whitelist for your whole domain.&lt;br /&gt;
#Login to Webmail(e.g. &amp;lt;nowiki&amp;gt;http://mail.yourawesomedomain.com/&amp;lt;/nowiki&amp;gt;) as an Administrator of the Domain&lt;br /&gt;
##If you don't have an Administrator user, then you'll want to start by logging into '''[https://wcp.hostek.com/ WCP]''' and following the below steps:&lt;br /&gt;
##We're going to access the Default Admin User which is called '''mailadmin'''.&lt;br /&gt;
##Click on '''Users''' underneath the '''Email''' section in WCP.&lt;br /&gt;
##Click on '''Login''' parallel to the '''mailadmin''' user.&lt;br /&gt;
#Go to '''Settings''' (Gears Icon)&lt;br /&gt;
#Under '''Domain Settings''' select '''Trusted Senders'''&lt;br /&gt;
#Click '''New'''&lt;br /&gt;
#Add a Domain or Email User (one per line) and click '''Save'''&lt;br /&gt;
&lt;br /&gt;
==How to Add a Signature==&lt;br /&gt;
*A Signature will always appear at the bottom of your next Email. So you'll want to make sure that it's appropriate for all uses.&lt;br /&gt;
#Login to your '''SmarterMail'''&lt;br /&gt;
##Example: &amp;lt;nowiki&amp;gt;http://mail.yourawesomedomain.com/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#Click on '''Settings''' (Gears Icon)&lt;br /&gt;
#Expand the '''My Settings'''&lt;br /&gt;
#Click on '''Signatures'''&lt;br /&gt;
#Click on the '''Signatures''' tab&lt;br /&gt;
#Select '''Add'''&lt;br /&gt;
#Apply your '''Signature''' in the text box and click '''Save'''&lt;br /&gt;
&lt;br /&gt;
===Adding an Image to your Signature===&lt;br /&gt;
#You will first need to upload the image to your website unless the image already exists in your root folder.&lt;br /&gt;
#Enter in the '''URL''' location of the image in the code (Shown below), as well as the '''Width''' and '''Height'''. &lt;br /&gt;
#Login to your '''SmarterMail'''&lt;br /&gt;
##Example: &amp;lt;nowiki&amp;gt;http://mail.yourawesomedomain.com/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#Click on '''Settings''' (Gears Icon)&lt;br /&gt;
#Expand the '''My Settings'''&lt;br /&gt;
#Click on '''Signatures'''&lt;br /&gt;
#Click on the '''Signatures''' tab&lt;br /&gt;
#Right-Click on the Signature and select '''Edit'''&lt;br /&gt;
#Next, click on the '''&amp;lt;&amp;gt;''' (Code Snippet) icon listed below the window and paste the full '''Image Code''' from below [only with your URL] in any location you are wanting the image displayed.&lt;br /&gt;
*URL EXAMPLE:&lt;br /&gt;
**http://www.example.com/folder/logo.jpg&lt;br /&gt;
*Image code:&lt;br /&gt;
**&amp;lt;code&amp;gt;&amp;lt;img src='http://example.com/folder/logo.jpg' width='###' height='###' /&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Shared Calendar==&lt;br /&gt;
*To share your SmarterMail Calendar with other users within your domain, follow these steps:&lt;br /&gt;
#Go to '''Settings''' (Gears Icon)&lt;br /&gt;
#Expand '''Sharing'''&lt;br /&gt;
#Click on '''Shared Resources'''&lt;br /&gt;
#Right-click on each user you want to have access to your Calendar and click '''Edit'''&lt;br /&gt;
#Choose the access level you want them to have. The options are:&lt;br /&gt;
##'''None''': No access.&lt;br /&gt;
##'''Availability-only''': This allows users to only see the availability of others when setting up Events.&lt;br /&gt;
##'''Read only''': Allows users to only see the shared data but not have any ability to edit it.&lt;br /&gt;
##'''Full control''': Allows users to fully edit and view the shared resource.&lt;br /&gt;
*VPS-Customer Note: The SmarterMail '''Sharing''' feature is only available on SmarterMail Enterprise Edition.&lt;br /&gt;
&lt;br /&gt;
==How to setup Content Filters== &lt;br /&gt;
*Content Filtering is a very powerful method to filter all of your important emails to one folder, or even automatically delete the emails you don't want to see. &lt;br /&gt;
#Log into SmarterMail&lt;br /&gt;
#Example: &amp;lt;nowiki&amp;gt;http://mail.yourawesomedomain.com/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#Click the '''Settings''' (Gears Icon)&lt;br /&gt;
#Expand '''&amp;quot;Filtering&amp;quot;'''&lt;br /&gt;
#Click on '''Content Filtering'''&lt;br /&gt;
#In this screen you can Add and Manage your Content Filters as you see fit.&lt;br /&gt;
*If used against Spam, Content Filtering should be used ''with'' Spam Filtering.&lt;br /&gt;
&lt;br /&gt;
==Forwarding==&lt;br /&gt;
===How to add a Forwarding Email Alias===&lt;br /&gt;
# Log into your WCP at https://wcp.hostek.com&lt;br /&gt;
# In the '''Email''' section click on '''Forwarding'''&lt;br /&gt;
# Click '''Add Email Alias'''&lt;br /&gt;
# In the '''Alias Name''' field enter the first part of the email address you want to forward (i.e. '''john''') ... do not include the @domain.com part.&lt;br /&gt;
# In the '''Forwarding Address''' field, enter the real destination email address like '''john@another_domain.com'''&lt;br /&gt;
# Click '''Save'''&lt;br /&gt;
===How to add Forwarding to an Existing Email User===&lt;br /&gt;
# Log into your WCP at https://wcp.hostek.com&lt;br /&gt;
# Click on the '''Users''' icon.&lt;br /&gt;
# Click the '''Login''' button for the specific user.&lt;br /&gt;
# Once in SmarterMail click the '''Settings''' icon on the left.&lt;br /&gt;
# Click on the Forward Tab at the top.&lt;br /&gt;
# Type in the address you want to have emails forwarded to.&lt;br /&gt;
#The '''Remove Emails on Forward''' option removes emails from the server that have already been Forwarded.&lt;br /&gt;
##This keeps your Email Disk Space Usage low, rather than keeping the messages on the server.&lt;br /&gt;
# Click '''Save''' at the top to save the settings.&lt;br /&gt;
&lt;br /&gt;
==How to Create a Backup Email Address==&lt;br /&gt;
*If you ever forget your SmarterMail password and would like to have it reset[without contacting support], you will need a backup e-mail address setup in SmarterMail, below you are shown how to set one up:&lt;br /&gt;
#Login to SmarterMail&lt;br /&gt;
##Example: &amp;lt;nowiki&amp;gt;http://mail.yourawesomedomain.com/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#Click on '''Settings''' (Gears Icon)&lt;br /&gt;
#Make sure you're on the '''Account Settings''' page&lt;br /&gt;
#Fill out the '''Backup Email Address''' box&lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
*Now if you forget your SmarterMail password you can click on the '''Forgot Password''' link and you will be sent more information to your Backup Email Address.&lt;br /&gt;
&lt;br /&gt;
==Email Headers==&lt;br /&gt;
===Importance===&lt;br /&gt;
*Email headers can be very useful for tracking down issues with failed emails and spammers. This is because they include such information as the sender's IP Address, the originating MailServer, and the FROM Email Address.&lt;br /&gt;
*The IP Address of the originating server is very important, because it can provide us with very good information on the issue.&lt;br /&gt;
===How to view Email Headers===&lt;br /&gt;
#Login to Webmail&lt;br /&gt;
##Example: &amp;lt;nowiki&amp;gt;http://mail.yourawesomedomain.com/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#Find and open the message in your Inbox&lt;br /&gt;
#Click '''&amp;quot;Header&amp;quot;''' in the lower right-hand corner of the screen&lt;br /&gt;
#The content of the email should now show several lines of information including '''return-path''', and '''received'''&lt;br /&gt;
&lt;br /&gt;
==Mailing List Management==&lt;br /&gt;
&lt;br /&gt;
===How to Create a Mailing list===&lt;br /&gt;
#Log in to SmarterMail as the mailadmin&lt;br /&gt;
#Click the Settings icon&lt;br /&gt;
#Expand the Domain Settings and Mailing Lists folders&lt;br /&gt;
#Click Mailing Lists in the navigation pane&lt;br /&gt;
#Click New in the content pane toolbar&lt;br /&gt;
#Click the List Settings tab and complete the appropriate fields. The Name and Moderator fields are required&lt;br /&gt;
#Click the Options tab and select the appropriate checkboxes to enable the desired mailing list options&lt;br /&gt;
#Click Save&lt;br /&gt;
&lt;br /&gt;
===How to Import a Mailing List===&lt;br /&gt;
#Export your subscribers from where they are now.&lt;br /&gt;
#Open your subscribers file in a text editor such as NotePad.&lt;br /&gt;
#Add the Email Address identifier explained below:&lt;br /&gt;
##The first line of your list should be this text &amp;lt;code&amp;gt;EmailAddress&amp;lt;/code&amp;gt;&lt;br /&gt;
#Save the file with the '''.csv''' extension.&lt;br /&gt;
#Login as one of the Domain-level Admins (mailadmin@... is the Default one)&lt;br /&gt;
#Click '''Settings''' (Gears Icon)&lt;br /&gt;
#Expand the '''Mailing Lists''' section&lt;br /&gt;
#Click '''Mailing Lists'''&lt;br /&gt;
#Click on '''Subscribers'''&lt;br /&gt;
#Select '''Upload''' and find the file on your machine to upload it.&lt;br /&gt;
*'''Example:'''&lt;br /&gt;
#By default a file &amp;quot;list.txt&amp;quot; should be saved to your local computer after exporting the list.&lt;br /&gt;
#Open the file in NotePad or any other text editor.&lt;br /&gt;
#Here is the body of the example file:&lt;br /&gt;
##&amp;lt;code&amp;gt;EmailAddress&amp;lt;br&amp;gt;example@exampletest.com&amp;lt;/code&amp;gt;&lt;br /&gt;
#Save it as a  '''.csv''' file.&lt;br /&gt;
#The file should now be called &amp;quot;list.csv&amp;quot; instead of &amp;quot;list.txt&amp;quot;.&lt;br /&gt;
#Upload(Import) the file into SmarterMail.&lt;br /&gt;
===How to Export a Mailing List===&lt;br /&gt;
#Login as one of the Domain-level Admins (mailadmin@... is the Default one)&lt;br /&gt;
#Click '''Settings''' (Gears Icon)&lt;br /&gt;
#Expand the '''Mailing Lists''' section&lt;br /&gt;
#Click '''Mailing Lists'''&lt;br /&gt;
#Click on '''Subscribers'''&lt;br /&gt;
#Select '''Download'''&lt;br /&gt;
#Select the location you wish to save the file to and click '''Save'''&lt;br /&gt;
===How to Add and Remove Subscribers===&lt;br /&gt;
*When you add a new Subscriber you can only add them one at a time unless you upload a text file of the Subscribers.&lt;br /&gt;
*To manage your mailing list, please follow these steps:&lt;br /&gt;
#Login to Webmail as a Domain-level Administrator&lt;br /&gt;
##Example: &amp;lt;nowiki&amp;gt;http://mail.yourawesomedomain.com/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
##Example: mailadmin@yourawesomedomain.com&lt;br /&gt;
#Go to '''Settings''' (Gears Icon)&lt;br /&gt;
#From the '''Domain Settings''' area select '''Mailing Lists'''&lt;br /&gt;
#Select the mailing list you wish to manage.&lt;br /&gt;
#Click Actions, then click '''List Subscribers'''. &lt;br /&gt;
#Choose from the following options:&lt;br /&gt;
##'''Add Addresses''': adds one or many email addresses to the list (when adding multiple addresses, enter only one address per line - duplicates will not be added) &lt;br /&gt;
##'''Download''': initiates the download of a .txt file containing your mailing list subscribers &lt;br /&gt;
##'''Upload''': initiates the upload a new .txt file containing your list subscribers (one per line). Choose to add the uploaded addresses to the existing list or to completely replace the old list with the new addresses. Duplicates will not be added. &lt;br /&gt;
##'''Delete All''': initiates the deletion of all email accounts in the list. A confirmation dialog will appear. Once you delete subscribers, you cannot recover them, so it is recommended that you first download the list before deleting. &lt;br /&gt;
##'''Delete link''': this option will delete only the selected email address from the list &lt;br /&gt;
#Click Save.&lt;br /&gt;
&lt;br /&gt;
===How to Subscribe/Unsubscribe===&lt;br /&gt;
&lt;br /&gt;
*The following explains the steps involved in subscribing and unsubscribing to an existing mailing list. This is done by sending an email message to the list. You are also able to execute other Listserv Commands through email messages.&lt;br /&gt;
====To subscribe to a mailing list, please follow these steps:====&lt;br /&gt;
#Open your Email client and create a new message. &lt;br /&gt;
#Enter &amp;lt;code&amp;gt;stServ@yourawesomedomain.com&amp;lt;/code&amp;gt; (this is the Default MailList Admin) as the TO Address. &lt;br /&gt;
#Enter &amp;lt;code&amp;gt;subscribe listname&amp;lt;/code&amp;gt; in the Body of your message where &amp;quot;listname&amp;quot; is the name of the list you are subscribing to. &lt;br /&gt;
#Leave the Subject of the message '''blank'''. If your mail program requires text in the subject field, enter a few random characters. &lt;br /&gt;
#Send the email&lt;br /&gt;
#If you successfully Subscribed you will receive a confirmation email. &lt;br /&gt;
====To unsubscribe from a mailing list, please follow these steps:====&lt;br /&gt;
#Open your Email client and create a new message. &lt;br /&gt;
#Enter &amp;lt;code&amp;gt;stServ@yourawesomedomain.com&amp;lt;/code&amp;gt; (this is the Default MailList Admin) as the TO Address.&lt;br /&gt;
#Enter &amp;lt;code&amp;gt;unsubscribe listname&amp;lt;/code&amp;gt; in the Body of your message where &amp;quot;listname&amp;quot; is the name of the list you are unsubscribing from. &lt;br /&gt;
#Leave the Subject of the message '''blank'''. If your mail program requires text in the subject field, enter a few random characters. &lt;br /&gt;
#Send the email&lt;br /&gt;
#If you successfully Unsubscribed you will receive a confirmation email. &lt;br /&gt;
===Listserv Commands===&lt;br /&gt;
*Listserv commands allow you to control the list through commands sent in email messages to the Listserv Command Address. By default, the Command Address for a domain is &amp;quot;stServ@yourawesomedomain.com&amp;quot;. &lt;br /&gt;
*#Your System-level Administrator may change this Command Address.&lt;br /&gt;
*To send a command, compose an email to the Command Address with the command in the body of the message. &lt;br /&gt;
*#The subject of the message is ignored.&lt;br /&gt;
*'''Note:''' Any references to &amp;quot;listname&amp;quot; should be replaced with the list you are trying to use.&lt;br /&gt;
#&amp;lt;code&amp;gt;Help&amp;lt;/code&amp;gt; - Replies to the email with basic instructions on using Listserv Commands.&lt;br /&gt;
#&amp;lt;code&amp;gt;Help listname&amp;lt;/code&amp;gt; - Replies to the email with the contents of the Help File for that list.&lt;br /&gt;
#&amp;lt;code&amp;gt;List&amp;lt;/code&amp;gt; - Replies to the email with a list of all available lists.&lt;br /&gt;
#&amp;lt;code&amp;gt;List listname&amp;lt;/code&amp;gt; - Replies to the email with a list of all subscribers for a particular list. This command can be disabled by the moderator in General Settings.&lt;br /&gt;
#&amp;lt;code&amp;gt;Subscribe listname&amp;lt;/code&amp;gt; - Adds your email address to the subscribers list of the mailing list. This command may be disabled for private lists by the moderator in General Settings.&lt;br /&gt;
#&amp;lt;code&amp;gt;Unsubscribe listname&amp;lt;/code&amp;gt; - Removes your email address from the subscribers list for the mailing list referenced by listname.&lt;br /&gt;
#&amp;lt;code&amp;gt;Set mode digest listname&amp;lt;/code&amp;gt; - Sets your email address to receive emails in digest mode, which will send all messages for the list combined into one email at regular intervals.&lt;br /&gt;
#&amp;lt;code&amp;gt;Set mode standard listname&amp;lt;/code&amp;gt; - Sets your email address to receive emails in standard mode (the default), which will send messages one at a time to your email account.&lt;br /&gt;
&lt;br /&gt;
==How to Enable the Sent Items Folder==&lt;br /&gt;
&lt;br /&gt;
===In SmarterMail===&lt;br /&gt;
#Login to SmarterMail&lt;br /&gt;
##Example: &amp;lt;nowiki&amp;gt;http://mail.yourawesomedomain.com/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#Click on '''Settings''' (Gears Icon) on the left-hand side of the page.&lt;br /&gt;
#Next click on '''Account Settings''', which should be under the '''My Settings''' section.&lt;br /&gt;
#Towards the middle of the page click on the Tab labelled '''Compose'''.&lt;br /&gt;
#There should now be a box that reads '''Enable sent items folder''' click that box and then click '''Save'''.&lt;br /&gt;
#The next time you compose an email through SmarterMail the email will appear in your '''Sent Items''' folder.&lt;br /&gt;
&lt;br /&gt;
===In Email Client===&lt;br /&gt;
#Make sure the Email Account type in your Email Client is set to '''IMAP''', if it is set to POP3 this shouldn't apply to you.&lt;br /&gt;
#In your Email Client, enable what is commonly called placing a copy of '''Sent''' mail to be placed in the email address folder on the server.  This is worded differently per email client.&lt;br /&gt;
##In '''ThunderBird''':&lt;br /&gt;
###In Account Settings&lt;br /&gt;
###Then in Copies and Folders&lt;br /&gt;
###Tick the box next to '''Place a Copy in:'''&lt;br /&gt;
###Select the Radio Button next to '''&amp;quot;&amp;lt;u&amp;gt;S&amp;lt;/u&amp;gt;ent&amp;quot; Folder On:'''&lt;br /&gt;
##In '''Outlook:''' &lt;br /&gt;
###You should create a '''Rule''' to have the Sent messages '''forwarded''' to the server's '''Sent Items''' location.&lt;br /&gt;
&lt;br /&gt;
==How to handle Disk Space Alerts==&lt;br /&gt;
===Alert Information===&lt;br /&gt;
#If you receive the below message for one of your email accounts you will need to either clear out emails to free up some space for that user, or use the steps below to increase the space for that user.&lt;br /&gt;
#*&amp;lt;code&amp;gt;&amp;quot;The size limit of ### MB for mailbox youremail@yourdomainexample.com has been exceeded. Incoming mail is currently being rejected.&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
#Emails will be bounced back to the sender until enough space is added/cleared. The emails that are bounced, will be unrecoverable by our system. However, the logs will have record of all messages that were rejected. &lt;br /&gt;
#Learn how to view your Delivery and SMTP logs [https://wiki.hostek.com/WCP_(Windows_based_Control_Panel)#Mail_Logs here].&lt;br /&gt;
&lt;br /&gt;
===Viewing Disk Space Usage===&lt;br /&gt;
*These steps will allow you to view the disk space currently being used for each of your SmarterMail users, as well as the maximum allowed disk space for each user.&lt;br /&gt;
#Log into SmarterMail for your domain as an administrator account such as '''mailadmin'''. Example Login URL: &amp;lt;b&amp;gt;&amp;lt;nowiki&amp;gt;http://mail.yourdomain.com&amp;lt;/nowiki&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
#Click '''Reports''' on the far left navigation bar&lt;br /&gt;
#Expand '''Domain Summary Reports'''&lt;br /&gt;
#Expand '''Traffic Reports'''&lt;br /&gt;
#Click '''Disk Usage'''&lt;br /&gt;
*'''NOTE''': If you do not see any Usage Reports, then you will need to contact Support to have those enabled for the Domain.&lt;br /&gt;
&lt;br /&gt;
===POP3 Utilization===&lt;br /&gt;
*We also recommend the use of '''POP3''' in a '''Mail Client''' (such as Microsoft Outlook, Mozilla Thunderbird, Roundcube, etc.) to pull the emails off of the server and onto your local device. &lt;br /&gt;
#Configuration steps for common Mail Clients: [https://wiki.hostek.com/Email_Client_Setup_Tutorials  '''here''']&amp;lt;br clear=all&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Editing Disk Space Limits In SmarterMail===&lt;br /&gt;
*These steps will allow you to change the disk space limit for your SmarterMail users.&lt;br /&gt;
#Log into SmarterMail for your domain as an administrator account such as '''mailadmin'''&lt;br /&gt;
##Example Login URL: &amp;lt;b&amp;gt;&amp;lt;nowiki&amp;gt;http://mail.yourdomain.com&amp;lt;/nowiki&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
#Click '''Settings'''&lt;br /&gt;
#Click '''Expand Domain Settings'''&lt;br /&gt;
#Click '''Users'''&lt;br /&gt;
#Right-click the user you want to edit and click '''Edit'''&lt;br /&gt;
#Change the '''Mailbox Size Limit''' to the new limit you want to assign&lt;br /&gt;
##Setting the limit to '''0''' means 'Unlimited' or 'No Set Limit' (this means that the limit is now however much Disk Space your Domain has on the MailServer)&lt;br /&gt;
#Click '''Save'''.&lt;br /&gt;
&lt;br /&gt;
===Editing Disk Space Limits in WCP===&lt;br /&gt;
#Log into your '''Windows Control Panel''' by going to http://wcp.hostek.com.&lt;br /&gt;
#Click on '''Users''' under the '''Email''' section.&lt;br /&gt;
#Click the pencil icon (Edit) to the left of the specific email user.&lt;br /&gt;
#In the section '''Mailbox Size (MB)''' change the amount to your desired size.&lt;br /&gt;
#Click '''Save'''.&lt;br /&gt;
*'''NOTE''': Maximum size to set per user is '''999'''. If you would like no limitations, set the size to '''0'''.&lt;br /&gt;
&lt;br /&gt;
===Ordering Additional Disk Space===&lt;br /&gt;
#Log into your '''Client Billing Area''' at '''https://cp.hostek.com'''.&lt;br /&gt;
#Click on the '''Services''' tab in the menu bar and select '''View Available Addons'''.&lt;br /&gt;
#Next, click on the '''Order Now''' tab next to the product add-on you would like to choose.&lt;br /&gt;
#Fill in the payment methods below and click on '''Complete Order'''.&lt;br /&gt;
*'''NOTE''': If you have ordered an '''irregular amount of Disk Space''': our '''SmarterMail VPS''' would be another solution for your '''high email storage''' needs. These are located in the VPS section of our main website.&lt;br /&gt;
&lt;br /&gt;
=== (VPS-only) Altering Domain Disk Space Limits===&lt;br /&gt;
#Log in to the SmarterMail Administrator&lt;br /&gt;
#*Example Login URL: &amp;lt;nowiki&amp;gt;http://mail.your-awesome-domain.com&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#*Username: '''This is located in the Informational Email sent to you after the initial setup of your VPS'''&lt;br /&gt;
#*Password: '''This is located in the Informational Email sent to you after the initial setup of your VPS'''&lt;br /&gt;
#Go to '''Domains''' (Globe icon)&lt;br /&gt;
#'''Right-click''' on the domain and select '''Edit'''&lt;br /&gt;
#Go to the '''Limits''' tab&lt;br /&gt;
#Change the '''Disk Space''' box to whatever you want&lt;br /&gt;
#*('''0''' is &amp;quot;Unlimited&amp;quot; or &amp;quot;No Set Limit&amp;quot;; this means that the limit is now however much Disk Space your VPS has, which isn't recommended in the case of spam.)&lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
&lt;br /&gt;
==CalDAV Setup==&lt;br /&gt;
#CalDAV is an Internet standard allowing a client to access scheduling information on a remote server.&lt;br /&gt;
#CalDAV synchronizes any modifications to a predefined calendar, whether the change is made directly on the server(Webmail) or if it was made on your iPhone(Mobile Device).&lt;br /&gt;
&lt;br /&gt;
*You'll find step-by-step instructions on how to configure SmarterMail's CalDAV in certain email clients:&lt;br /&gt;
===Thunderbird with Lightning Extension===&lt;br /&gt;
*Steps for adding a CalDav calendar to Thunderbird Lightning.&lt;br /&gt;
#Choose '''File'''-&amp;gt;'''New'''-&amp;gt;'''Calendar...'''&lt;br /&gt;
#Select '''On the Network''' and click '''Next &amp;gt;'''&lt;br /&gt;
#Select '''CalDAV''' and enter the following for the location:&lt;br /&gt;
##&amp;lt;nowiki&amp;gt;https://mail.[yourdomain.com]/WebDAV/cal&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
##(Replace '''[yourdomain.com]''' with your actual domain name)&lt;br /&gt;
#Enter a name for your calendar and choose the '''E-mail''' to associate the calendar with and click '''Next &amp;gt;'''&lt;br /&gt;
#Click '''Confirm Security Exception''' when prompted (this is just required because you're using '''mail.yourdomain.com''' for the connection instead of '''mail##.hostek.com''')&lt;br /&gt;
#You will now be prompted to enter a '''User Name''' and '''Password''' to authenticate with SmarterMail.  Enter the following:&lt;br /&gt;
##User Name: **Your Full Email Address**&lt;br /&gt;
##Password:  **Your Email Password**&lt;br /&gt;
#Check the checkbox if you do not want to enter the password every time you open Thunderbird.&lt;br /&gt;
&lt;br /&gt;
===Other===&lt;br /&gt;
*[https://wiki.hostek.com/IPhone#iPhone_Calendar_Sync_with_SmarterMail iPhone CalDAV Setup Wiki]&lt;br /&gt;
*Tutorials for other email clients will be added in the future.&lt;br /&gt;
*If you would like to see a tutorial for a specific email client, please let us know by submitting a ticket [https://support.hostek.com/ here].&lt;br /&gt;
&lt;br /&gt;
==SmarterMail Chat/XMPP==&lt;br /&gt;
===Information===&lt;br /&gt;
*SmarterMail Chat is a feature within SmarterMail that allows users on the same domain to &amp;quot;chat&amp;quot; with one another .&lt;br /&gt;
*Smartermail Chat is '''NOT''' available on our Shared Hosting packages.&lt;br /&gt;
&lt;br /&gt;
===VPS Activation===&lt;br /&gt;
*You can enable SmarterMail Chat on your VPS by following the steps below:&lt;br /&gt;
&lt;br /&gt;
====Enabling Chat for a Domain====&lt;br /&gt;
#Log in to SmarterMail as the '''System-level Administrator'''&lt;br /&gt;
#Click '''Domains''' (Globe Icon)&lt;br /&gt;
#Right-click and select '''Edit''' on the desired domain and the Domain Settings will load in a separate window&lt;br /&gt;
#Go to the '''Features''' tab&lt;br /&gt;
#Tick the '''Enable XMPP Communication''' checkbox&lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
&lt;br /&gt;
====Enabling Chat for an User====&lt;br /&gt;
#Log in to SmarterMail as the '''Domain-level Administrator'''&lt;br /&gt;
#Click '''Settings''' (Gears Icon)&lt;br /&gt;
#Expand '''Domain Settings''' &lt;br /&gt;
#Click on '''Users'''&lt;br /&gt;
#Right-click and select '''Edit''' on the desired user and the User Settings will load in a separate window.&lt;br /&gt;
#Click the '''Service Access''' tab.&lt;br /&gt;
#Select the '''Enable XMPP Access''' checkbox.&lt;br /&gt;
&lt;br /&gt;
==ActiveSync/EAS==&lt;br /&gt;
===Information===&lt;br /&gt;
*Pricing an Purchasing:&lt;br /&gt;
#This is a $4.79/month Addon on per user basis.&lt;br /&gt;
#Currently you must contact [http://support.hostek.com '''Support'''] to purchase this Addon.&lt;br /&gt;
##To speed up this process, please provide Security Verification(Security Answer +/- Security Question) with your request and we'll get this setup for you.&lt;br /&gt;
*Description:&lt;br /&gt;
#Microsoft Exchange ActiveSync(EAS) is a data synchronization protocol that enables over-the-air access to email, calendars, tasks, and notes from most mobile devices, including Blackberry, iPhone, Palm Pre, and Windows Mobile devices. &lt;br /&gt;
#In addition, ActiveSync(EAS) enables SmarterMail users to have access their email, calendars, tasks, and notes while working offline.&lt;br /&gt;
*What it's for:&lt;br /&gt;
#Mobile Devices ( iPhone, BlackBerry, Windows Mobile Devices )&lt;br /&gt;
#Microsoft Desktop Email Clients ( Outlook 2013 and above, Windows Mail (Windows 8 or above))&lt;br /&gt;
*What it's '''NOT''' for:&lt;br /&gt;
#Non-Microsoft Desktop Email Clients ( ThunderBird, OperaMail, etc. )&lt;br /&gt;
&lt;br /&gt;
===How to setup ActiveSync in a Mobile Device===&lt;br /&gt;
#If you already have mail setup on your phone as an IMAP Account, then you will need to delete the Email Account off your phone to re-add it as an Exchange Account.&lt;br /&gt;
##The same thing goes for the POP3 Accounts too, but know that the Emails stored on your phone will be deleted and will only be recoverable via a nightly backup from our team.&lt;br /&gt;
##If this is the case you'll want to add a separate Exchange Account to your Mobile Device and keep the POP3 one.&lt;br /&gt;
#Add the Email Account back to your phone, choosing Exchange as the type.&lt;br /&gt;
##Example: [[File:Iphone-exchange.png|100px]]&lt;br /&gt;
#Enter the details accordingly (leave the '''Domain (Optional)''' field blank.)&lt;br /&gt;
#iPHone users need to make sure '''Fetch New Data''' is set to '''Push'''.&lt;br /&gt;
===Proper use of Sub-Folders with ActiveSync===&lt;br /&gt;
*When creating New Folders, '''DO NOT''' create Sub-Folders within your Inbox:&lt;br /&gt;
#While technically possible, many third-party Email Clients and most Mobile Devices '''CANNOT''' sync Sub-Folders that are part of a user's Inbox.&lt;br /&gt;
#To make your SmarterMail folders available for a third-party Email Client such as Outlook, when you set up the account in your Email Client you will need to use IMAP as your Incoming MailServer type.&lt;br /&gt;
#If you use POP3 for your email you only have access to your SmarterMail Inbox, this means you can't access your personal mail folders you've created to organize messages.&lt;br /&gt;
#In addition, when using syncing protocols like Microsoft Exchange ActiveSync(EAS), any folders that are created will also sync with whatever Mobile or Desktop Email Client you're setting up with ActiveSync. &lt;br /&gt;
#Just be aware of the concern noted previously about syncing Sub-Folders created within your Inbox.&lt;br /&gt;
&lt;br /&gt;
[[Category:SmarterMail]]&lt;br /&gt;
[[Category:Email]]&lt;br /&gt;
[[Category:Email-VPS]]&lt;br /&gt;
[[Category:Misc-Email]]&lt;br /&gt;
[[Category:Configuring-Email-Clients]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=WordPress_Site_Hacked&amp;diff=3266</id>
		<title>WordPress Site Hacked</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=WordPress_Site_Hacked&amp;diff=3266"/>
				<updated>2017-05-30T20:11:32Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* More Information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''IMPORTANT NOTE:  Be sure to keep your WordPress install up to date AND keep your themes and plugins up to date.'''&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This article explains what to do if your WordPress site is compromised by a hacker and how to resolve the issue.  If you find that the steps in this article are too technically challenging, please contact our support team and explain the situation; and we can offer assistance with getting your site back to normal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Causes==&lt;br /&gt;
&lt;br /&gt;
The following are the most common way that a WordPress site gets compromised:&lt;br /&gt;
&lt;br /&gt;
* Your desktop or laptop computer gets a virus/spyware/malware application installed, and that application records your login keystrokes on the WordPress site([https://en.wikipedia.org/wiki/Keystroke_logging keylogger]) and sends the username/password to the hacker.&lt;br /&gt;
* The WordPress site contains a theme with a vulnerability&lt;br /&gt;
* The WordPress site contains a plugin with a vulnerability&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Remedy==&lt;br /&gt;
&lt;br /&gt;
Below are some steps you can take to fix your WordPress site:&lt;br /&gt;
&lt;br /&gt;
# Move everything except the /wp-config.php file into a backup directory (you can name it something like /Quarantine or /OLD)&lt;br /&gt;
# Create a backup of your MySQL database through PHPMyAdmin (Accessible from your hosting control panel)&lt;br /&gt;
# '''NOTE: Steps 1 and 2 are critical.  If anything goes wrong, the backup of your site files and database will allow you to revert the changes.'''&lt;br /&gt;
# Download the latest version of WordPress here: https://wordpress.org/download/&lt;br /&gt;
# Upload the files and folders from the latest version of WordPress that you downloaded.  This should replace the /wp-admin, /wp-includes, index.php, etc. that you moved to the backup folder in the first step.&lt;br /&gt;
# Edit your wp-config.php file and ensure nothing bad was added by the hacker (this can often be a snippet of code added to the beginning or end of the file that shouldn't be there.  If you are unsure, compare the wp-config.php file with the wp-config-sample.php that came with version of WordPress you downloaded in step one)&lt;br /&gt;
# Update the MySQL database password and place the new password in the wp-config.php file because the hacker may have gotten the old password&lt;br /&gt;
# Log into the WordPress admin (/wp-login.php) and navigate to the 'Users' section.  The hacker may have added some additional users to your site so you should delete any users that you did not add.&lt;br /&gt;
# Update the password for all of the valid WordPress users in-case that is how the hacker got into the site&lt;br /&gt;
# Go to the 'Settings'-&amp;gt;'Permalinks' page and click 'Save'.  This will re-create your .htaccess(Apache) or web.config(IIS) file.&lt;br /&gt;
# Copy everything from your old /wp-content/Uploads folder into your new /wp-content folder.  This will bring over any images, audio, and video that were previously uploaded to your site.&lt;br /&gt;
# Re-install any plugins and themes you were using on the site.  If you had made modifications to your theme or plugins and need to bring the files over from the backup of the site, be very careful.  The hacker may have injected bad code into your old theme and/or plugin files that will allow them to get back into the site.  You should only move over files that are absolutely necessary and check the content of those files for anything suspicious.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Adding extra security==&lt;br /&gt;
&lt;br /&gt;
These are some extra steps you can take to lock down your WordPress installation.&lt;br /&gt;
&lt;br /&gt;
* Disable file editing through the WordPress by adding &amp;quot;''define('DISALLOW_FILE_EDIT', true);''&amp;quot; to your wp-config.php file - reference: [https://codex.wordpress.org/Hardening_WordPress#Disable_File_Editing]&lt;br /&gt;
* Disable direct script execution in both your /wp-content and /wp-includes directories.  The PHP files in these directories should only be used via includes from the core WordPress code and not directly.&lt;br /&gt;
* Add Basic authentication to your /wp-admin directory.  This will cause your administrator section to require a double-login, but it adds an extra layer of security to your WordPress admin dashboard.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Additional considerations==&lt;br /&gt;
&lt;br /&gt;
Here are some additional considerations to take after an event.&lt;br /&gt;
&lt;br /&gt;
* Scan the desktop or laptop computer you use to administer the site for malware.&lt;br /&gt;
* Update your FTP password.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
&lt;br /&gt;
[https://codex.wordpress.org/Hardening_WordPress https://codex.wordpress.org/Hardening_WordPress] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://codex.wordpress.org/FAQ_My_site_was_hacked https://codex.wordpress.org/FAQ_My_site_was_hacked]&lt;br /&gt;
&lt;br /&gt;
[[Category:WordPress]]&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=WordPress_Site_Hacked&amp;diff=3265</id>
		<title>WordPress Site Hacked</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=WordPress_Site_Hacked&amp;diff=3265"/>
				<updated>2017-05-30T20:10:04Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''IMPORTANT NOTE:  Be sure to keep your WordPress install up to date AND keep your themes and plugins up to date.'''&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This article explains what to do if your WordPress site is compromised by a hacker and how to resolve the issue.  If you find that the steps in this article are too technically challenging, please contact our support team and explain the situation; and we can offer assistance with getting your site back to normal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Causes==&lt;br /&gt;
&lt;br /&gt;
The following are the most common way that a WordPress site gets compromised:&lt;br /&gt;
&lt;br /&gt;
* Your desktop or laptop computer gets a virus/spyware/malware application installed, and that application records your login keystrokes on the WordPress site([https://en.wikipedia.org/wiki/Keystroke_logging keylogger]) and sends the username/password to the hacker.&lt;br /&gt;
* The WordPress site contains a theme with a vulnerability&lt;br /&gt;
* The WordPress site contains a plugin with a vulnerability&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Remedy==&lt;br /&gt;
&lt;br /&gt;
Below are some steps you can take to fix your WordPress site:&lt;br /&gt;
&lt;br /&gt;
# Move everything except the /wp-config.php file into a backup directory (you can name it something like /Quarantine or /OLD)&lt;br /&gt;
# Create a backup of your MySQL database through PHPMyAdmin (Accessible from your hosting control panel)&lt;br /&gt;
# '''NOTE: Steps 1 and 2 are critical.  If anything goes wrong, the backup of your site files and database will allow you to revert the changes.'''&lt;br /&gt;
# Download the latest version of WordPress here: https://wordpress.org/download/&lt;br /&gt;
# Upload the files and folders from the latest version of WordPress that you downloaded.  This should replace the /wp-admin, /wp-includes, index.php, etc. that you moved to the backup folder in the first step.&lt;br /&gt;
# Edit your wp-config.php file and ensure nothing bad was added by the hacker (this can often be a snippet of code added to the beginning or end of the file that shouldn't be there.  If you are unsure, compare the wp-config.php file with the wp-config-sample.php that came with version of WordPress you downloaded in step one)&lt;br /&gt;
# Update the MySQL database password and place the new password in the wp-config.php file because the hacker may have gotten the old password&lt;br /&gt;
# Log into the WordPress admin (/wp-login.php) and navigate to the 'Users' section.  The hacker may have added some additional users to your site so you should delete any users that you did not add.&lt;br /&gt;
# Update the password for all of the valid WordPress users in-case that is how the hacker got into the site&lt;br /&gt;
# Go to the 'Settings'-&amp;gt;'Permalinks' page and click 'Save'.  This will re-create your .htaccess(Apache) or web.config(IIS) file.&lt;br /&gt;
# Copy everything from your old /wp-content/Uploads folder into your new /wp-content folder.  This will bring over any images, audio, and video that were previously uploaded to your site.&lt;br /&gt;
# Re-install any plugins and themes you were using on the site.  If you had made modifications to your theme or plugins and need to bring the files over from the backup of the site, be very careful.  The hacker may have injected bad code into your old theme and/or plugin files that will allow them to get back into the site.  You should only move over files that are absolutely necessary and check the content of those files for anything suspicious.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Adding extra security==&lt;br /&gt;
&lt;br /&gt;
These are some extra steps you can take to lock down your WordPress installation.&lt;br /&gt;
&lt;br /&gt;
* Disable file editing through the WordPress by adding &amp;quot;''define('DISALLOW_FILE_EDIT', true);''&amp;quot; to your wp-config.php file - reference: [https://codex.wordpress.org/Hardening_WordPress#Disable_File_Editing]&lt;br /&gt;
* Disable direct script execution in both your /wp-content and /wp-includes directories.  The PHP files in these directories should only be used via includes from the core WordPress code and not directly.&lt;br /&gt;
* Add Basic authentication to your /wp-admin directory.  This will cause your administrator section to require a double-login, but it adds an extra layer of security to your WordPress admin dashboard.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Additional considerations==&lt;br /&gt;
&lt;br /&gt;
Here are some additional considerations to take after an event.&lt;br /&gt;
&lt;br /&gt;
* Scan the desktop or laptop computer you use to administer the site for malware.&lt;br /&gt;
* Update your FTP password.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==More Information==&lt;br /&gt;
&lt;br /&gt;
https://codex.wordpress.org/Hardening_WordPress &amp;lt;br&amp;gt;&lt;br /&gt;
[http://codex.wordpress.org/FAQ_My_site_was_hacked codex.wordpress.org/FAQ_My_site_was_hacked]&lt;br /&gt;
&lt;br /&gt;
[[Category:WordPress]]&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=ISAPI_Rewrite&amp;diff=2986</id>
		<title>ISAPI Rewrite</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=ISAPI_Rewrite&amp;diff=2986"/>
				<updated>2017-02-09T18:47:49Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* HTTP to HTTPS with www Redirect */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
= ISAPI_Rewrites and Redirects Version 3 =&lt;br /&gt;
&lt;br /&gt;
ISAPI_Rewrite Version 3 is a powerful URL manipulation engine based on regular expressions, which is supported on our Windows Servers. Hostek.com has lots of experience with Isapi_Rewrite Hosting. This wiki contains some examples of how to implement Isapi_Rewrite Version 3.&lt;br /&gt;
&lt;br /&gt;
*ISAPI_Rewrite is an IIS Module that is very similar to the Apache Module &amp;quot;Mod_Rewrite&amp;quot;, Mod_Rewrite is also enabled on our LiteSpeed servers.&lt;br /&gt;
*For more information on Mod_Rewrite please see our [https://wiki.hostek.com/Mod_rewrite Mod_Rewrite Wiki] and our [https://wiki.hostek.com/URL_Rewrite#Apache_.28Linux.29 URL Rewrite Wiki.]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
IMPORTANT: Place the rewrite rules in a file named .htaccess and place it in the website's Default Directory(i.e. the \wwwroot folder).&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
*If you do not have an .htaccess file already created you can:&lt;br /&gt;
*#Open a text editor--like Notepad--and save the file as &amp;quot;.htaccess&amp;quot;.&lt;br /&gt;
*#Use the File Manager in the hosting control panel to create a .htaccess file on the server.&lt;br /&gt;
&lt;br /&gt;
== Simple Redirects and Rewrites ==&lt;br /&gt;
&lt;br /&gt;
==== Redirecting to a different domain ====&lt;br /&gt;
If you need to redirect your website to another website&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_HOST} ^(www\.)?domain\.com$ [NC]&lt;br /&gt;
RewriteRule ^(.*)$ http://www.newdomain.com/$1 [QSA,R=301]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Rewrite a Folder to another Folder ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteBase /&lt;br /&gt;
&lt;br /&gt;
RewriteRule ^oldfolder$ /correctfolder [NC,R=301,L] &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Redirect File Names ====&lt;br /&gt;
To have your index.htm page auto redirect to index.asp user this example&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
RewriteRule index.htm index.asp [R=301,L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Subfolder Rewrite ====&lt;br /&gt;
To redirect your domain to a subfolder of that domain example: www.domain.com to www.domain.com/folder&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
# Exclude requests already going to /subfolder to avoid an infinite loop&lt;br /&gt;
RewriteRule ^subfolder.*$ - [NC,L]&lt;br /&gt;
&lt;br /&gt;
# Rewrite normal requests to /subfolder&lt;br /&gt;
RewriteRule ^(.*)$ /subfolder/$1 [L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== non-www. to www. Redirects ====&lt;br /&gt;
&lt;br /&gt;
Redirecting non-www version to www., example domain.com to www.domain.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_HOST} !^$&lt;br /&gt;
RewriteCond %{HTTP_HOST} !^www\. [NC]&lt;br /&gt;
RewriteCond %{HTTPS}s ^on(s)|&lt;br /&gt;
RewriteRule ^ http%1://www.%{HTTP_HOST}%{REQUEST_URI} [R=301,L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== www. to non-www. Redirects ====&lt;br /&gt;
&lt;br /&gt;
Redirecting www version to non-www., example www.domain.com to domain.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
RewriteCond %{HTTP_HOST} ^www.domain.com&lt;br /&gt;
RewriteRule ^ http://domain.com%{REQUEST_URI} [R=301,L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== URL Rewrite ====&lt;br /&gt;
&lt;br /&gt;
Suppose you have URL like www.example.com/foo.asp?a=A&amp;amp;b=B&amp;amp;c=C and you want to access it as www.example.com/foo.asp/a/A/b/B/c/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteRule ^(.*?\.asp)/([^/]*)/([^/]*)(/.+)? $1$4?$2=$3 [NC,LP,QSA]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== WordPress Permalinks ====&lt;br /&gt;
&lt;br /&gt;
WordPress Permalinks using mod_rewrite are for Linux, but ISAPI_Rewrite does offer the equivalent. If you want to have index.php not show in the url try using these in your .htaccess file.&lt;br /&gt;
&lt;br /&gt;
If your WordPress site is in the wwwroot folder.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
# BEGIN WordPress&lt;br /&gt;
&lt;br /&gt;
#Options +Followsymlinks&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
RewriteBase /&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-f&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-d&lt;br /&gt;
RewriteRule . /index.php [NC,L]&lt;br /&gt;
&lt;br /&gt;
# END WordPress&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If your WordPress site is in a subfolder.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
# BEGIN WordPress&lt;br /&gt;
&lt;br /&gt;
#Options +Followsymlinks&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
RewriteBase /&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-f&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-d&lt;br /&gt;
RewriteRule . /subfolder/index.php [NC,L]&lt;br /&gt;
&lt;br /&gt;
# END WordPress&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Redirect wwwroot/public_html to subfolder ====&lt;br /&gt;
&lt;br /&gt;
Allows you load your domain from a subfolder instead of the wwwroot/public_html folder.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteCond %{HTTP_HOST} ^(www.)?example.com$&lt;br /&gt;
RewriteCond %{REQUEST_URI} !^/subfolder/ &lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-f &lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-d &lt;br /&gt;
RewriteRule ^(.*)$ /subfolder/$1 &lt;br /&gt;
RewriteCond %{HTTP_HOST} ^(www.)?example.com$&lt;br /&gt;
RewriteRule ^(/)?$ subfolder/index.html [L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== HTTP to HTTPS SSL Rewrites ==&lt;br /&gt;
&lt;br /&gt;
Suppose you have URL like http://shop.example.com and you want your visitors to be redirected to https://shop.example.com&lt;br /&gt;
&lt;br /&gt;
Here are some examples of how to force SSL.  Simply place the following rules into your '''.htaccess''' file:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== HTTP to HTTPS Redirect ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Enable rewrite rules&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## Redirect HTTP to HTTPS&lt;br /&gt;
&lt;br /&gt;
# Only trigger rule if a non-ssl port is being used&lt;br /&gt;
RewriteCond %{SERVER_PORT} !443&lt;br /&gt;
# Redirect to HTTPS&lt;br /&gt;
RewriteRule (.*) https://%{HTTP_HOST}/$1 [R=301]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== HTTP to HTTPS with www Redirect====&lt;br /&gt;
&lt;br /&gt;
This version will both redirect to HTTPS as well as add &amp;quot;www.&amp;quot; to the beginning of the hostname if it is missing.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Enable rewrite rules&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## Redirect HTTP to HTTPS with www&lt;br /&gt;
&lt;br /&gt;
# Only trigger rule if a non-ssl port is being used&lt;br /&gt;
RewriteCond %{SERVER_PORT} !443&lt;br /&gt;
# Extract non-www portion of HTTP_HOST&lt;br /&gt;
RewriteCond %{HTTP_HOST} ^(www\.)?(.*) [NC]&lt;br /&gt;
# Redirect to HTTPS with www&lt;br /&gt;
RewriteRule (.*) https://www.%2/$1 [R=301]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''NOTE:  If you prefer to remove the www from the URL, simply change &amp;quot;&amp;lt;nowiki&amp;gt;https://www.%2/$1&amp;lt;/nowiki&amp;gt;&amp;quot; to &amp;quot;&amp;lt;nowiki&amp;gt;https://%2/$1&amp;lt;/nowiki&amp;gt;&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
==== Shared SSL ====&lt;br /&gt;
&lt;br /&gt;
If you are using the shared SSL and want to force SSL, the below script will redirect traffic to the shared SSL URL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Enable rewrite rules&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## Redirect HTTP to HTTPS on shared SSL&lt;br /&gt;
&lt;br /&gt;
# Only trigger rule if a non-ssl port is being used&lt;br /&gt;
RewriteCond %{SERVER_PORT} !443&lt;br /&gt;
RewriteRule (.*) https://secure##.ezhostingserver.com/mywebsite-com/$1 [R=301]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''NOTE: Replace the above URL with the correct shared SSL URL for your site, which can be found within your hosting control panel.''&lt;br /&gt;
&lt;br /&gt;
== Site Crawlers ==&lt;br /&gt;
&lt;br /&gt;
Example on how to prevent certain spiders from crawling your site.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_USER_AGENT} ^Baiduspider.*$&lt;br /&gt;
RewriteRule .* /block.htm&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_USER_AGENT} ^Yandex.*$&lt;br /&gt;
RewriteRule .* /block.htm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Wild-Card Subdomains &amp;amp; Variables Rewrites ==&lt;br /&gt;
&lt;br /&gt;
Here is an example to show how to get the variables from positions 1 and 2 without it mattering how many items are in the URL. In other words, a good example for a rewrite rule for optional parameters.&lt;br /&gt;
&lt;br /&gt;
==== Variable URLs ====&lt;br /&gt;
Let's say you want to have a URL display like: http://your_domain.com/some-folder/34-77-some-key-word.html&lt;br /&gt;
But you want that to really process a query like:http://your_domain.com/folder/search.asp?country=34&amp;amp;city=77&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteRule ^some-folder/([^-]+)-([^-]+)-.*$ /folder/search.asp?country=$1&amp;amp;city=$2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Wild-Card Subdomains ====&lt;br /&gt;
&lt;br /&gt;
Rewrite all wild-card sub-domain requests to a folder without affecting &amp;quot;your_domain.com&amp;quot; or &amp;quot;www.your_domain.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
# Ignore requests that are already rewritten &lt;br /&gt;
RewriteRule ^subdomainfolder/.*$ - [NC,L]&lt;br /&gt;
&lt;br /&gt;
# Rewrite all requests to non-www sub-domains to /subdomainfolder &lt;br /&gt;
RewriteCond %{HTTP_HOST} !^(www\.)?your_domain\.com$ [NC] &lt;br /&gt;
RewriteRule ^(.*)$ /subdomainfolder/$1 [L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For more Examples and other uses please visit [http://www.helicontech.com/isapi_rewrite/doc/examples.htm#SEF Helicon Tech]&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:Tutorials]]&lt;br /&gt;
[[Category:ISAPI_Rewrite]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=ISAPI_Rewrite&amp;diff=2985</id>
		<title>ISAPI Rewrite</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=ISAPI_Rewrite&amp;diff=2985"/>
				<updated>2017-02-09T18:41:56Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* HTTP to HTTPS SSL Rewrites */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
= ISAPI_Rewrites and Redirects Version 3 =&lt;br /&gt;
&lt;br /&gt;
ISAPI_Rewrite Version 3 is a powerful URL manipulation engine based on regular expressions, which is supported on our Windows Servers. Hostek.com has lots of experience with Isapi_Rewrite Hosting. This wiki contains some examples of how to implement Isapi_Rewrite Version 3.&lt;br /&gt;
&lt;br /&gt;
*ISAPI_Rewrite is an IIS Module that is very similar to the Apache Module &amp;quot;Mod_Rewrite&amp;quot;, Mod_Rewrite is also enabled on our LiteSpeed servers.&lt;br /&gt;
*For more information on Mod_Rewrite please see our [https://wiki.hostek.com/Mod_rewrite Mod_Rewrite Wiki] and our [https://wiki.hostek.com/URL_Rewrite#Apache_.28Linux.29 URL Rewrite Wiki.]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
IMPORTANT: Place the rewrite rules in a file named .htaccess and place it in the website's Default Directory(i.e. the \wwwroot folder).&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
*If you do not have an .htaccess file already created you can:&lt;br /&gt;
*#Open a text editor--like Notepad--and save the file as &amp;quot;.htaccess&amp;quot;.&lt;br /&gt;
*#Use the File Manager in the hosting control panel to create a .htaccess file on the server.&lt;br /&gt;
&lt;br /&gt;
== Simple Redirects and Rewrites ==&lt;br /&gt;
&lt;br /&gt;
==== Redirecting to a different domain ====&lt;br /&gt;
If you need to redirect your website to another website&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_HOST} ^(www\.)?domain\.com$ [NC]&lt;br /&gt;
RewriteRule ^(.*)$ http://www.newdomain.com/$1 [QSA,R=301]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Rewrite a Folder to another Folder ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteBase /&lt;br /&gt;
&lt;br /&gt;
RewriteRule ^oldfolder$ /correctfolder [NC,R=301,L] &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Redirect File Names ====&lt;br /&gt;
To have your index.htm page auto redirect to index.asp user this example&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
RewriteRule index.htm index.asp [R=301,L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Subfolder Rewrite ====&lt;br /&gt;
To redirect your domain to a subfolder of that domain example: www.domain.com to www.domain.com/folder&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
# Exclude requests already going to /subfolder to avoid an infinite loop&lt;br /&gt;
RewriteRule ^subfolder.*$ - [NC,L]&lt;br /&gt;
&lt;br /&gt;
# Rewrite normal requests to /subfolder&lt;br /&gt;
RewriteRule ^(.*)$ /subfolder/$1 [L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== non-www. to www. Redirects ====&lt;br /&gt;
&lt;br /&gt;
Redirecting non-www version to www., example domain.com to www.domain.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_HOST} !^$&lt;br /&gt;
RewriteCond %{HTTP_HOST} !^www\. [NC]&lt;br /&gt;
RewriteCond %{HTTPS}s ^on(s)|&lt;br /&gt;
RewriteRule ^ http%1://www.%{HTTP_HOST}%{REQUEST_URI} [R=301,L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== www. to non-www. Redirects ====&lt;br /&gt;
&lt;br /&gt;
Redirecting www version to non-www., example www.domain.com to domain.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
RewriteCond %{HTTP_HOST} ^www.domain.com&lt;br /&gt;
RewriteRule ^ http://domain.com%{REQUEST_URI} [R=301,L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== URL Rewrite ====&lt;br /&gt;
&lt;br /&gt;
Suppose you have URL like www.example.com/foo.asp?a=A&amp;amp;b=B&amp;amp;c=C and you want to access it as www.example.com/foo.asp/a/A/b/B/c/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteRule ^(.*?\.asp)/([^/]*)/([^/]*)(/.+)? $1$4?$2=$3 [NC,LP,QSA]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== WordPress Permalinks ====&lt;br /&gt;
&lt;br /&gt;
WordPress Permalinks using mod_rewrite are for Linux, but ISAPI_Rewrite does offer the equivalent. If you want to have index.php not show in the url try using these in your .htaccess file.&lt;br /&gt;
&lt;br /&gt;
If your WordPress site is in the wwwroot folder.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
# BEGIN WordPress&lt;br /&gt;
&lt;br /&gt;
#Options +Followsymlinks&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
RewriteBase /&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-f&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-d&lt;br /&gt;
RewriteRule . /index.php [NC,L]&lt;br /&gt;
&lt;br /&gt;
# END WordPress&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If your WordPress site is in a subfolder.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
# BEGIN WordPress&lt;br /&gt;
&lt;br /&gt;
#Options +Followsymlinks&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
RewriteBase /&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-f&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-d&lt;br /&gt;
RewriteRule . /subfolder/index.php [NC,L]&lt;br /&gt;
&lt;br /&gt;
# END WordPress&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Redirect wwwroot/public_html to subfolder ====&lt;br /&gt;
&lt;br /&gt;
Allows you load your domain from a subfolder instead of the wwwroot/public_html folder.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteCond %{HTTP_HOST} ^(www.)?example.com$&lt;br /&gt;
RewriteCond %{REQUEST_URI} !^/subfolder/ &lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-f &lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-d &lt;br /&gt;
RewriteRule ^(.*)$ /subfolder/$1 &lt;br /&gt;
RewriteCond %{HTTP_HOST} ^(www.)?example.com$&lt;br /&gt;
RewriteRule ^(/)?$ subfolder/index.html [L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== HTTP to HTTPS SSL Rewrites ==&lt;br /&gt;
&lt;br /&gt;
Suppose you have URL like http://shop.example.com and you want your visitors to be redirected to https://shop.example.com&lt;br /&gt;
&lt;br /&gt;
Here are some examples of how to force SSL.  Simply place the following rules into your '''.htaccess''' file:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== HTTP to HTTPS Redirect ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Enable rewrite rules&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## Redirect HTTP to HTTPS&lt;br /&gt;
&lt;br /&gt;
# Only trigger rule if a non-ssl port is being used&lt;br /&gt;
RewriteCond %{SERVER_PORT} !443&lt;br /&gt;
# Redirect to HTTPS&lt;br /&gt;
RewriteRule (.*) https://%{HTTP_HOST}/$1 [R=301]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== HTTP to HTTPS with www Redirect====&lt;br /&gt;
&lt;br /&gt;
This version will both redirect to HTTPS as well as add &amp;quot;www.&amp;quot; to the beginning of the hostname if it is missing.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Enable rewrite rules&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## Redirect HTTP to HTTPS with www&lt;br /&gt;
&lt;br /&gt;
# Only trigger rule if a non-ssl port is being used&lt;br /&gt;
RewriteCond %{SERVER_PORT} !443&lt;br /&gt;
# Extract non-www portion of HTTP_HOST&lt;br /&gt;
RewriteCond %{HTTP_HOST} ^(www\.)?(.*)&lt;br /&gt;
# Redirect to HTTPS with www&lt;br /&gt;
RewriteRule (.*) https://www.%2/$1 [R=301]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''NOTE:  If you prefer to remove the www from the URL, simply change &amp;quot;&amp;lt;nowiki&amp;gt;https://www.%2/$1&amp;lt;/nowiki&amp;gt;&amp;quot; to &amp;quot;&amp;lt;nowiki&amp;gt;https://%2/$1&amp;lt;/nowiki&amp;gt;&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Shared SSL ====&lt;br /&gt;
&lt;br /&gt;
If you are using the shared SSL and want to force SSL, the below script will redirect traffic to the shared SSL URL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Enable rewrite rules&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## Redirect HTTP to HTTPS on shared SSL&lt;br /&gt;
&lt;br /&gt;
# Only trigger rule if a non-ssl port is being used&lt;br /&gt;
RewriteCond %{SERVER_PORT} !443&lt;br /&gt;
RewriteRule (.*) https://secure##.ezhostingserver.com/mywebsite-com/$1 [R=301]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''NOTE: Replace the above URL with the correct shared SSL URL for your site, which can be found within your hosting control panel.''&lt;br /&gt;
&lt;br /&gt;
== Site Crawlers ==&lt;br /&gt;
&lt;br /&gt;
Example on how to prevent certain spiders from crawling your site.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_USER_AGENT} ^Baiduspider.*$&lt;br /&gt;
RewriteRule .* /block.htm&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_USER_AGENT} ^Yandex.*$&lt;br /&gt;
RewriteRule .* /block.htm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Wild-Card Subdomains &amp;amp; Variables Rewrites ==&lt;br /&gt;
&lt;br /&gt;
Here is an example to show how to get the variables from positions 1 and 2 without it mattering how many items are in the URL. In other words, a good example for a rewrite rule for optional parameters.&lt;br /&gt;
&lt;br /&gt;
==== Variable URLs ====&lt;br /&gt;
Let's say you want to have a URL display like: http://your_domain.com/some-folder/34-77-some-key-word.html&lt;br /&gt;
But you want that to really process a query like:http://your_domain.com/folder/search.asp?country=34&amp;amp;city=77&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteRule ^some-folder/([^-]+)-([^-]+)-.*$ /folder/search.asp?country=$1&amp;amp;city=$2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Wild-Card Subdomains ====&lt;br /&gt;
&lt;br /&gt;
Rewrite all wild-card sub-domain requests to a folder without affecting &amp;quot;your_domain.com&amp;quot; or &amp;quot;www.your_domain.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
# Ignore requests that are already rewritten &lt;br /&gt;
RewriteRule ^subdomainfolder/.*$ - [NC,L]&lt;br /&gt;
&lt;br /&gt;
# Rewrite all requests to non-www sub-domains to /subdomainfolder &lt;br /&gt;
RewriteCond %{HTTP_HOST} !^(www\.)?your_domain\.com$ [NC] &lt;br /&gt;
RewriteRule ^(.*)$ /subdomainfolder/$1 [L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For more Examples and other uses please visit [http://www.helicontech.com/isapi_rewrite/doc/examples.htm#SEF Helicon Tech]&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:Tutorials]]&lt;br /&gt;
[[Category:ISAPI_Rewrite]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SQL_Server_Identity_Jumps&amp;diff=2952</id>
		<title>SQL Server Identity Jumps</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SQL_Server_Identity_Jumps&amp;diff=2952"/>
				<updated>2017-01-05T18:41:12Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A feature that has the side-effect of sometimes causing jumps in identity numbers is &amp;quot;identity caching&amp;quot;.  The reason this is implemented in SQL 2012 and above is to improve the efficiency of generating new IDs for identity fields by incrementing the on-disk number by some amount (1000 for 'int' fields) and serving the next 1000 IDs directly from memory.  The side-effect of this is that if SQL Server is restarted, it may start up using the pre-written number on disk, and there will seem to be a gap since the ID numbers that were cached in memory were never used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We do not disable this behavior on our shared SQL Servers for the following reasons:&lt;br /&gt;
&lt;br /&gt;
* SQL Server trace flags are only meant for debugging, and the only way to disable the behavior is with a trace flag (Not to mention that it is an undocumented trace flag).  Since we need to run our shared SQL Servers in a supported configuration, using the trace flag is not a good option for us.&lt;br /&gt;
&lt;br /&gt;
* The identity-caching feature help reduce disk-writes and improve SQL Server performance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following alternatives are available if sequential numbers are important:&lt;br /&gt;
&lt;br /&gt;
* You can use the new 'Sequence' object that is also implemented in SQL 2012 and above.  The sequence object allows you to disable caching.  However, it will require some changes to your application's SQL and/or stored procedures to take advantage of it.&lt;br /&gt;
&lt;br /&gt;
* You can generate the numbers using an algorithm within your application.&lt;br /&gt;
&lt;br /&gt;
* We offer VPS servers with SQL Server.  With your own VPS running SQL Server, you can make any changes you want, such as adding the trace flag.&lt;br /&gt;
&lt;br /&gt;
* If the main goal is to reduce confusion for users when they see a gap, starting identity numbers higher (such as 10000) or displaying numbers with a minimum number of digits and leading zeros (such as 00001) can reduce the perceived difference when this occurs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Added By: [[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 10:30, 13 November 2015 (CST)&lt;br /&gt;
&lt;br /&gt;
[[Category:MSSQL]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=Bulk_Mail&amp;diff=2811</id>
		<title>Bulk Mail</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=Bulk_Mail&amp;diff=2811"/>
				<updated>2016-03-24T20:26:24Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Pricing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Bulk Email==&lt;br /&gt;
===Notices===&lt;br /&gt;
#The Bulk Email option is NOT for sending spam.&lt;br /&gt;
#It is for sending to legitimate customers and subscribers.&lt;br /&gt;
#It is NOT to be used to send to purchased lists.&lt;br /&gt;
&lt;br /&gt;
===Pricing===&lt;br /&gt;
*Pricing for the Bulk Mail service.&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;margin: 1em 1em 1em 0; background: #f9f9f9; border: 1px #aaa solid; border-collapse: collapse;&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; style=&amp;quot;background-color:lightgrey;&amp;quot; | Emails Per Month&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background-color:lightgrey;&amp;quot; | Equals&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; style=&amp;quot;background-color:lightgrey;&amp;quot; | Pricing&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; | #1 - 25,000&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; align=&amp;quot;center&amp;quot; | =&lt;br /&gt;
| Not considered bulk - included in hosting - N/A for Bulk Mail service&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; |#25,001 - 50,000&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; align=&amp;quot;center&amp;quot; | =&lt;br /&gt;
| $20/month add-on&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; |#50,001 - 100,000&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; align=&amp;quot;center&amp;quot; | =&lt;br /&gt;
| $35/month add-on&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; |#100,001 - 200,000&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; align=&amp;quot;center&amp;quot; | =&lt;br /&gt;
| $50/month add-on&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; |#200,001 - 400,000&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; align=&amp;quot;center&amp;quot; | =&lt;br /&gt;
| $75/month add-on&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; |#400,001 - 750,000&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; align=&amp;quot;center&amp;quot; | =&lt;br /&gt;
| $90/month add-on&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; |#750,001 - 1,000,000&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; align=&amp;quot;center&amp;quot; | =&lt;br /&gt;
| $110/month add-on&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; |#1,000,001+&lt;br /&gt;
! scope=&amp;quot;row&amp;quot; align=&amp;quot;center&amp;quot; | =&lt;br /&gt;
| Contact sales [https://support.hostek.com/ here]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Ordering===&lt;br /&gt;
#To order a Bulk Mail Account, please contact us by submitting a ticket [http://support.hostek.com here] with the domain name and the tier of Bulk Mail that you've chosen.&lt;br /&gt;
##If you have ''multiple domains'' '''OR''' if want ''more than one Bulk Mail Account'' you will need to order a separate service for each one.&lt;br /&gt;
&lt;br /&gt;
==Bulk Email In Outlook==&lt;br /&gt;
&lt;br /&gt;
===For new accounts in Outlook, follow these steps:===&lt;br /&gt;
# Add a new account under File---&amp;gt;Add New Account.   Be sure your bulk account has been added to your actual mail server in Smartermail/Cpanel&lt;br /&gt;
# Select Manually configure server settings and click next&lt;br /&gt;
# Select Internet E-mail and click next&lt;br /&gt;
# Enter the name and the bulk e-mail address&lt;br /&gt;
# Select the account type you want for the incoming mail that's set up on Smartermail (even if the account won't receive incoming mail this needs to be done or Outlook setup cannot complete)&lt;br /&gt;
# Input the incoming mail server (typically mail.yourdomainname.com)&lt;br /&gt;
# Input the outgoing mail server which is mailout-b.ezhostingserver.com &lt;br /&gt;
# Enter the full e-mail address for the username&lt;br /&gt;
# Enter the password you set for the user in Smartermail/Cpanel&lt;br /&gt;
# Click on More Settings&lt;br /&gt;
# Click on Outgoing Server&lt;br /&gt;
# Check the &amp;quot;My Outgoing Server Requires authentication&amp;quot; box&lt;br /&gt;
# Select &amp;quot;Log On Using&amp;quot; enter in the bulk username and password that was e-mailed to you here&lt;br /&gt;
# Click on the &amp;quot;Advanced&amp;quot; tab&lt;br /&gt;
# Change the Outgoing Server port from 25 to 26&lt;br /&gt;
# Click OK and then Next&lt;br /&gt;
&lt;br /&gt;
===For existing accounts in Outlook, follow these steps:===&lt;br /&gt;
# Click on File---&amp;gt;Account Settings&lt;br /&gt;
# Double-Click on your account&lt;br /&gt;
# Change the outgoing mail server to mailout-b.ezhostingserver.com&lt;br /&gt;
# Click on More Settings&lt;br /&gt;
# Click on Outgoing Server&lt;br /&gt;
# Check the &amp;quot;My Outgoing Server Requires authentication&amp;quot; box&lt;br /&gt;
# Select &amp;quot;Log On Using&amp;quot; enter in the bulk username and password that was e-mailed to you here&lt;br /&gt;
# Click on the &amp;quot;Advanced&amp;quot; tab&lt;br /&gt;
# Change the Outgoing Server port from 25 to 26&lt;br /&gt;
# Click OK and then Next&lt;br /&gt;
*Following these steps will successfully set up your Outlook e-mail account to use the Bulk Mail service you purchased for sending e-mails.&lt;br /&gt;
&lt;br /&gt;
==Bulk Email in SmarterMail==&lt;br /&gt;
&lt;br /&gt;
===Setting up Bulk Email in SmarterMail===&lt;br /&gt;
#Login into '''Webmail''' (e.g. &amp;lt;nowiki&amp;gt;http://mail.yourawesomedomain.com/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#Go to '''Settings''' (Gears Icon)&lt;br /&gt;
#Open the '''Advanced Settings''' section&lt;br /&gt;
#Click on '''SMTP Accounts'''&lt;br /&gt;
#Click on '''New'''&lt;br /&gt;
#Fillout the form with the information you were provided after purchasing the Bulk Email User Account. Below is an Example:&lt;br /&gt;
##'''Server Address:''' mailout-b.ezhostingserver.com&lt;br /&gt;
##'''Port:''' 25&lt;br /&gt;
##'''Display Name:''' example@yourawesomedomain.com&lt;br /&gt;
##'''Email Address:''' example@yourawesomedomain.com&lt;br /&gt;
##'''Username:''' example_yourawesomedomain_com&lt;br /&gt;
##'''Password:''' ******************&lt;br /&gt;
##'''Encryption:''' None&lt;br /&gt;
##'''Authentication Enabled:''' Yes&lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
===Using the Bulk Email in SmarterMail===&lt;br /&gt;
#Go to the '''Mail''' section&lt;br /&gt;
#Click on '''New''' [to compose a new message]&lt;br /&gt;
#You'll notice that the '''From:''' Address has a '''drop-down menu''' now, '''click''' on this and choose the Email Address which you set up in the SMTP Accounts.&lt;br /&gt;
##If there are duplicates you choose the closest one to the bottom.&lt;br /&gt;
#Send your message(s) as you normally would.&lt;br /&gt;
*Note: If you have a MailingList, you'll simply send '''TO''' that MailingList's ID. (e.g. clients@yourawesomedomain.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:SmarterMail]]&lt;br /&gt;
[[Category:CPanel-Mail]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2808</id>
		<title>SQL Server and TLS 1.2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2808"/>
				<updated>2016-03-16T20:34:05Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Due to PCI DSS requirements, many sites and servers have disabled support for TLS versions older than 1.2.  For servers that have MS SQL Server installed, this can cause failure for the SQL Server to start if the appropriate version and update are not installed.&lt;br /&gt;
&lt;br /&gt;
==SQL Server Versions Supporting TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
These are the SQL Server version and update levels that will function with TLS 1.0 disabled.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Update&lt;br /&gt;
! Download Link&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP2&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 10&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50731&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP3&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50733&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 RTM&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 12&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51187&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 SP1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 5&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51186&lt;br /&gt;
|}&lt;br /&gt;
Source: https://support.microsoft.com/en-us/kb/3052404&lt;br /&gt;
&lt;br /&gt;
==Applying Updates to SQL Server==&lt;br /&gt;
&lt;br /&gt;
You can apply the update to your SQL Server instance by downloading the installer from the appropriate link above and running it on the server with the SQL instance.  The SQL Service will be stopped during update, and the update may require a reboot.  Therefore, an update should only be applied during off-peak/maintenance hours for production environments.&lt;br /&gt;
&lt;br /&gt;
==SQL Server Clients Support TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
After applying the update and removing support for TLS 1.0, all clients connecting to SQL Server remotely will need to support TLS 1.2.  If you encounter any issues connecting remotely with SQL Management Studio, we recommend that on the remote PC that is having issues connecting, you update SQL Server Management Studio to match the version of SQL Server that was installed on the server and also install the latest .Net version (download link: https://www.microsoft.com/en-us/download/details.aspx?id=49981).&lt;br /&gt;
&lt;br /&gt;
NOTE:  The same installer that was used to update the server can be used to update SQL Management Studio.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 14:12, 14 March 2016 (CDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Databases-MSSQL]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2807</id>
		<title>SQL Server and TLS 1.2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2807"/>
				<updated>2016-03-16T20:33:22Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Due to PCI DSS requirements, many sites and servers have disabled support for TLS versions older than 1.2.  For servers that have MS SQL Server installed, this can cause failure for the SQL Server to start if the appropriate version and update are not installed.&lt;br /&gt;
&lt;br /&gt;
==SQL Server Versions Supporting TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
These are the SQL Server version and update levels that will function with TLS 1.0 disabled.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Update&lt;br /&gt;
! Download Link&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP2&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 10&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50731&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP3&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50733&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 RTM&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 12&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51187&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 SP1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 5&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51186&lt;br /&gt;
|}&lt;br /&gt;
Source: https://support.microsoft.com/en-us/kb/3052404&lt;br /&gt;
&lt;br /&gt;
==Applying Updates to SQL Server==&lt;br /&gt;
&lt;br /&gt;
You can apply the update to your SQL Server instance by downloading the installer from the appropriate link above and running it on the server with the SQL instance.  The SQL Service will be stopped during update, and the update may require a reboot.  Therefore, an update should only be applied during off-peak/maintenance hours for production environments.&lt;br /&gt;
&lt;br /&gt;
==SQL Server Clients Support TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
After applying the update and removing support for TLS 1.0, all clients connecting to SQL Server remotely will need to support TLS 1.2.  If you encounter any issues connecting remotely with SQL Management Studio, we recommend that on the remote PC that is having issues connecting, you update SQL Server Management Studio to match the version of SQL Server that was installed on the server and also install the latest .Net version (download link: https://www.microsoft.com/en-us/download/details.aspx?id=49981).&lt;br /&gt;
&lt;br /&gt;
NOTE:  The same installer that was used to update the server can be used to update SQL Management Studio.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 14:12, 14 March 2016 (CDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:MSSQL]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2806</id>
		<title>SQL Server and TLS 1.2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2806"/>
				<updated>2016-03-14T19:16:02Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Applying Updates to SQL Server */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Due to PCI DSS requirements, many sites and servers have disabled support for TLS versions older than 1.2.  For servers that have MS SQL Server installed, this can cause failure for the SQL Server to start if the appropriate version and update are not installed.&lt;br /&gt;
&lt;br /&gt;
==SQL Server Versions Supporting TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
These are the SQL Server version and update levels that will function with TLS 1.0 disabled.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Update&lt;br /&gt;
! Download Link&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP2&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 10&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50731&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP3&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50733&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 RTM&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 12&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51187&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 SP1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 5&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51186&lt;br /&gt;
|}&lt;br /&gt;
Source: https://support.microsoft.com/en-us/kb/3052404&lt;br /&gt;
&lt;br /&gt;
==Applying Updates to SQL Server==&lt;br /&gt;
&lt;br /&gt;
You can apply the update to your SQL Server instance by downloading the installer from the appropriate link above and running it on the server with the SQL instance.  The SQL Service will be stopped during update, and the update may require a reboot.  Therefore, an update should only be applied during off-peak/maintenance hours for production environments.&lt;br /&gt;
&lt;br /&gt;
==SQL Server Clients Support TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
After applying the update and removing support for TLS 1.0, all clients connecting to SQL Server remotely will need to support TLS 1.2.  If you encounter any issues connecting remotely with SQL Management Studio, we recommend that on the remote PC that is having issues connecting, you update SQL Server Management Studio to match the version of SQL Server that was installed on the server and also install the latest .Net version (download link: https://www.microsoft.com/en-us/download/details.aspx?id=49981).&lt;br /&gt;
&lt;br /&gt;
NOTE:  The same installer that was used to update the server can be used to update SQL Management Studio.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 14:12, 14 March 2016 (CDT)&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2805</id>
		<title>SQL Server and TLS 1.2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2805"/>
				<updated>2016-03-14T19:15:15Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* SQL Server Versions Supporting TLS 1.2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Due to PCI DSS requirements, many sites and servers have disabled support for TLS versions older than 1.2.  For servers that have MS SQL Server installed, this can cause failure for the SQL Server to start if the appropriate version and update are not installed.&lt;br /&gt;
&lt;br /&gt;
==SQL Server Versions Supporting TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
These are the SQL Server version and update levels that will function with TLS 1.0 disabled.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Update&lt;br /&gt;
! Download Link&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP2&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 10&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50731&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP3&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50733&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 RTM&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 12&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51187&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 SP1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 5&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51186&lt;br /&gt;
|}&lt;br /&gt;
Source: https://support.microsoft.com/en-us/kb/3052404&lt;br /&gt;
&lt;br /&gt;
==Applying Updates to SQL Server==&lt;br /&gt;
&lt;br /&gt;
You can apply the update to your SQL Server instance by downloading the installer and running it on the server with the SQL instance.  The SQL Service will need to be stopped during update, and the update may require a reboot.  Therefore, an update should only be applied during off-peak/maintenance hours for production environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SQL Server Clients Support TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
After applying the update and removing support for TLS 1.0, all clients connecting to SQL Server remotely will need to support TLS 1.2.  If you encounter any issues connecting remotely with SQL Management Studio, we recommend that on the remote PC that is having issues connecting, you update SQL Server Management Studio to match the version of SQL Server that was installed on the server and also install the latest .Net version (download link: https://www.microsoft.com/en-us/download/details.aspx?id=49981).&lt;br /&gt;
&lt;br /&gt;
NOTE:  The same installer that was used to update the server can be used to update SQL Management Studio.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 14:12, 14 March 2016 (CDT)&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2804</id>
		<title>SQL Server and TLS 1.2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2804"/>
				<updated>2016-03-14T19:15:04Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* SQL Server Versions Supporting TLS 1.2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Due to PCI DSS requirements, many sites and servers have disabled support for TLS versions older than 1.2.  For servers that have MS SQL Server installed, this can cause failure for the SQL Server to start if the appropriate version and update are not installed.&lt;br /&gt;
&lt;br /&gt;
==SQL Server Versions Supporting TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
This are the SQL Server version and update levels that will function with TLS 1.0 disabled.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Update&lt;br /&gt;
! Download Link&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP2&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 10&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50731&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP3&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50733&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 RTM&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 12&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51187&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 SP1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 5&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51186&lt;br /&gt;
|}&lt;br /&gt;
Source: https://support.microsoft.com/en-us/kb/3052404&lt;br /&gt;
&lt;br /&gt;
==Applying Updates to SQL Server==&lt;br /&gt;
&lt;br /&gt;
You can apply the update to your SQL Server instance by downloading the installer and running it on the server with the SQL instance.  The SQL Service will need to be stopped during update, and the update may require a reboot.  Therefore, an update should only be applied during off-peak/maintenance hours for production environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SQL Server Clients Support TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
After applying the update and removing support for TLS 1.0, all clients connecting to SQL Server remotely will need to support TLS 1.2.  If you encounter any issues connecting remotely with SQL Management Studio, we recommend that on the remote PC that is having issues connecting, you update SQL Server Management Studio to match the version of SQL Server that was installed on the server and also install the latest .Net version (download link: https://www.microsoft.com/en-us/download/details.aspx?id=49981).&lt;br /&gt;
&lt;br /&gt;
NOTE:  The same installer that was used to update the server can be used to update SQL Management Studio.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 14:12, 14 March 2016 (CDT)&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2803</id>
		<title>SQL Server and TLS 1.2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SQL_Server_and_TLS_1.2&amp;diff=2803"/>
				<updated>2016-03-14T19:12:16Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: Created page with &amp;quot;Due to PCI DSS requirements, many sites and servers have disabled support for TLS versions older than 1.2.  For servers that have MS SQL Server installed, this can cause failu...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Due to PCI DSS requirements, many sites and servers have disabled support for TLS versions older than 1.2.  For servers that have MS SQL Server installed, this can cause failure for the SQL Server to start if the appropriate version and update are not installed.&lt;br /&gt;
&lt;br /&gt;
==SQL Server Versions Supporting TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Update&lt;br /&gt;
! Download Link&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP2&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 10&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50731&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2012 SP3&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=50733&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 RTM&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 12&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51187&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |SQL 2014 SP1&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |Cumulative Update 5&lt;br /&gt;
| style=&amp;quot;padding: 5px;&amp;quot; |https://www.microsoft.com/en-us/download/details.aspx?id=51186&lt;br /&gt;
|}&lt;br /&gt;
Source: https://support.microsoft.com/en-us/kb/3052404&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Applying Updates to SQL Server==&lt;br /&gt;
&lt;br /&gt;
You can apply the update to your SQL Server instance by downloading the installer and running it on the server with the SQL instance.  The SQL Service will need to be stopped during update, and the update may require a reboot.  Therefore, an update should only be applied during off-peak/maintenance hours for production environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SQL Server Clients Support TLS 1.2==&lt;br /&gt;
&lt;br /&gt;
After applying the update and removing support for TLS 1.0, all clients connecting to SQL Server remotely will need to support TLS 1.2.  If you encounter any issues connecting remotely with SQL Management Studio, we recommend that on the remote PC that is having issues connecting, you update SQL Server Management Studio to match the version of SQL Server that was installed on the server and also install the latest .Net version (download link: https://www.microsoft.com/en-us/download/details.aspx?id=49981).&lt;br /&gt;
&lt;br /&gt;
NOTE:  The same installer that was used to update the server can be used to update SQL Management Studio.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 14:12, 14 March 2016 (CDT)&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2793</id>
		<title>HTTP/2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2793"/>
				<updated>2016-02-17T17:28:40Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;HTTP/2 is a successor to the http/1.1 protocol.  It is based on the SPDY protocol and offers some improvements over http/1.1, such as http header compression, server push, multiplexing, and pipelining.&lt;br /&gt;
&lt;br /&gt;
==Support for HTTP/2==&lt;br /&gt;
&lt;br /&gt;
Below is a Matrix showing support for http/2:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Server&lt;br /&gt;
! HTTP/2 Support&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; | IIS 7.5 (Windows Server 2008 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 8.5 (Windows Server 2012 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 10 (Windows Server 2016)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkGreen&amp;quot;| Yes&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 1.x&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.2&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.4.17 and newer&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Yellow&amp;quot;| If mod_http2 is enabled&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 11:28, 17 February 2016 (CST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:Linux]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2792</id>
		<title>HTTP/2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2792"/>
				<updated>2016-02-17T17:28:12Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: HTTP/2 - What it is and where it is supported&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;HTTP/2 is a successor to the http/1.1 protocol.  It is based on the SPDY protocol and offers some improvements over http/1.1, such as http header compression, server push, multiplexing, and pipelining.&lt;br /&gt;
&lt;br /&gt;
==Support for HTTP/2==&lt;br /&gt;
&lt;br /&gt;
Below is a Matrix showing support for http/2:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Server&lt;br /&gt;
! HTTP/2 Support&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; | IIS 7.5 (Windows Server 2008 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 8.5 (Windows Server 2012 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 10 (Windows Server 2016)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkGreen&amp;quot;| Yes&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 1.x&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.2&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.4.17 and newer&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Yellow&amp;quot;| If mod_http2 is enabled&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:Linux]]&lt;br /&gt;
[[Category:VPS]]&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 11:28, 17 February 2016 (CST)&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2791</id>
		<title>HTTP/2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2791"/>
				<updated>2016-02-17T17:19:09Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Support for HTTP/2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;HTTP/2 is a successor to the http/1.1 protocol.  It is based on the SPDY protocol and offers some improvements over http/1.1, such as http header compression, server push, multiplexing, and pipelining.&lt;br /&gt;
&lt;br /&gt;
==Support for HTTP/2==&lt;br /&gt;
&lt;br /&gt;
Below is a Matrix showing support for http/2:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Server&lt;br /&gt;
! HTTP/2 Support&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; | IIS 7.5 (Windows Server 2008 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 8.5 (Windows Server 2012 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 10 (Windows Server 2016)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkGreen&amp;quot;| Yes&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 1.x&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.2&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: DarkRed&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.4.17 and newer&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Yellow&amp;quot;| If mod_http2 is enabled&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2790</id>
		<title>HTTP/2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2790"/>
				<updated>2016-02-17T17:17:22Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Support for HTTP/2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;HTTP/2 is a successor to the http/1.1 protocol.  It is based on the SPDY protocol and offers some improvements over http/1.1, such as http header compression, server push, multiplexing, and pipelining.&lt;br /&gt;
&lt;br /&gt;
==Support for HTTP/2==&lt;br /&gt;
&lt;br /&gt;
Below is a Matrix showing support for http/2:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Server&lt;br /&gt;
! HTTP/2 Support&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; | IIS 7.5 (Windows Server 2008 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 8.5 (Windows Server 2012 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 10 (Windows Server 2016)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Green&amp;quot;| Yes&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 1.x&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.2&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.4.17 and newer&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: LightGreen&amp;quot;| With mod_http2 enabled&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2789</id>
		<title>HTTP/2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2789"/>
				<updated>2016-02-17T17:17:12Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Support for HTTP/2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;HTTP/2 is a successor to the http/1.1 protocol.  It is based on the SPDY protocol and offers some improvements over http/1.1, such as http header compression, server push, multiplexing, and pipelining.&lt;br /&gt;
&lt;br /&gt;
==Support for HTTP/2==&lt;br /&gt;
&lt;br /&gt;
Below is a Matrix showing support for http/2:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Server&lt;br /&gt;
! HTTP/2 Support&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; | IIS 7.5 (Windows Server 2008 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 8.5 (Windows Server 2012 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 10 (Windows Server 2016)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Green&amp;quot;| Yes&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 1.x&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.2&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.4.17 and above&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: LightGreen&amp;quot;| With mod_http2 enabled&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2788</id>
		<title>HTTP/2</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=HTTP/2&amp;diff=2788"/>
				<updated>2016-02-17T17:16:44Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: Created page with &amp;quot;HTTP/2 is a successor to the http/1.1 protocol.  It is based on the SPDY protocol and offers some improvements over http/1.1, such as http header compression, server push, mul...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;HTTP/2 is a successor to the http/1.1 protocol.  It is based on the SPDY protocol and offers some improvements over http/1.1, such as http header compression, server push, multiplexing, and pipelining.&lt;br /&gt;
&lt;br /&gt;
==Support for HTTP/2==&lt;br /&gt;
&lt;br /&gt;
Below is a Matrix showing support for http/2:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Server&lt;br /&gt;
! HTTP/2 Support&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; | IIS 7.5 (Windows Server 2008 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 8.5 (Windows Server 2012 R2)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot; | No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |IIS 10 (Windows Server 2016)&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Green&amp;quot;| Yes&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 1.x&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.2&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: Red&amp;quot;| No&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center;&amp;quot; |Apache 2.4.17+&lt;br /&gt;
| style=&amp;quot;padding: 5px; text-align: center; background-color: LightGreen&amp;quot;| With mod_http2 enabled&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=Lucee_RESTful_Webservice_Tutorial&amp;diff=2766</id>
		<title>Lucee RESTful Webservice Tutorial</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=Lucee_RESTful_Webservice_Tutorial&amp;diff=2766"/>
				<updated>2016-01-21T16:58:43Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: Created page with &amp;quot;This tutorial will go over the steps for setting up a RESTful webservice using Lucee.  ==Overview==  All rest requests use one of the following special path formats:  '''/rest...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This tutorial will go over the steps for setting up a RESTful webservice using Lucee.&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
All rest requests use one of the following special path formats:&lt;br /&gt;
 '''/rest/APPLICATION/COMPONENT'''&lt;br /&gt;
 '''/rest/APPLICATION/COMPONENT/FUNCTION'''&lt;br /&gt;
&lt;br /&gt;
For the '''Default''' rest application, the following mappings are used.  The default rest application is assigned within the '''Lucee Web Administrator''':&lt;br /&gt;
 '''/rest/COMPONENT'''&lt;br /&gt;
 '''/rest/COMPONENT/FUNCTION'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''APPLICATION:''' The virtual path assigned to the application in the '''Lucee Web Administrator'''.&lt;br /&gt;
* '''COMPONENT:''' The '''name''' of the cfcomponent or the '''restpath''' of the component if one is provided.&lt;br /&gt;
* '''FUNCTION:''' The '''restpath''' of the cffunction if one is provided.&lt;br /&gt;
&lt;br /&gt;
For functions that do not have a '''restpath''', the specific function executed depends on the '''http verb'''(I.E. get,put,post,delete) matching the '''httpMethod''' property of the function.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Create webservice files==&lt;br /&gt;
&lt;br /&gt;
The webservice files should be added to a sub-folder within your site.  The webservice will be comprised of a group of '''.cfc''' files with the '''rest''' parameter on the '''cfcomponent''' tag set to '''true'''.  You can also use the '''restpath''' parameter to specify the path that should be used for each component if you do not want to use the default of the component name.  Each method also accepts a '''restpath''' parameter if you wish the method to use a sub-path under the component.  Here is an example service:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;cfcomponent rest=&amp;quot;true&amp;quot; restpath=&amp;quot;/restexample&amp;quot;&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;cffunction name=&amp;quot;greeting&amp;quot; access=&amp;quot;remote&amp;quot; returnType=&amp;quot;string&amp;quot; httpMethod=&amp;quot;get&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;cfreturn &amp;quot;{ &amp;quot;&amp;quot;Lucee&amp;quot;&amp;quot;: &amp;quot;&amp;quot;I'm home!&amp;quot;&amp;quot; }&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;/cffunction&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;/cfcomponent&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Add webservice mapping==&lt;br /&gt;
&lt;br /&gt;
* Log into the Lucee Web Administrator&lt;br /&gt;
* Select '''Archives and Resources''' -&amp;gt; '''Rest'''&lt;br /&gt;
* Enter the following details within the '''Create new mapping''' section:&lt;br /&gt;
** '''Virtual:''' The '''APPLICATION''' path that you will use when accessing the rest application.&lt;br /&gt;
** '''Physical:''' The '''site-relative''' path to the directory containing the rest cfc components.&lt;br /&gt;
** '''Default:''' The '''default''' rest application can be accessed without including the a '''APPLICATION''' portion in the url.&lt;br /&gt;
* Click '''save'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Add handler mapping==&lt;br /&gt;
&lt;br /&gt;
Since the rest URLs will not end with a normal cfml file extension, we will need to manually tell IIS that we want URLs under the rest path to be sent to Lucee for processing.  This is done by adding a '''handler''' to the '''web.config''' within the site's webroot(/wwwroot).  Below is an example of how we could add a rest mapping for the example component given previously:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;/configuration&amp;gt;&lt;br /&gt;
   &amp;lt;/system.webServer&amp;gt;&lt;br /&gt;
     &amp;lt;handlers&amp;gt;&lt;br /&gt;
       &amp;lt;add name=&amp;quot;BonCode-Tomcat-REST-Handler-restexample&amp;quot; path=&amp;quot;/rest/restexample/*&amp;quot; verb=&amp;quot;*&amp;quot; type=&amp;quot;BonCodeIIS.BonCodeCallHandler,BonCodeIIS,Version=1.0.0.0,Culture=neutral,PublicKeyToken=ad590a40d40745cf&amp;quot; resourceType=&amp;quot;Unspecified&amp;quot; preCondition=&amp;quot;integratedMode&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;/handlers&amp;gt;&lt;br /&gt;
   &amp;lt;/system.webServer&amp;gt;&lt;br /&gt;
 &amp;lt;/configuration&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Here is another example that we would use if we chose the '''Default''' option when adding the rest mapping in the Lucee Web Administrator:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;/configuration&amp;gt;&lt;br /&gt;
   &amp;lt;/system.webServer&amp;gt;&lt;br /&gt;
     &amp;lt;handlers&amp;gt;&lt;br /&gt;
       &amp;lt;add name=&amp;quot;BonCode-Tomcat-REST-Handler-default&amp;quot; path=&amp;quot;/rest/*&amp;quot; verb=&amp;quot;*&amp;quot; type=&amp;quot;BonCodeIIS.BonCodeCallHandler,BonCodeIIS,Version=1.0.0.0,Culture=neutral,PublicKeyToken=ad590a40d40745cf&amp;quot; resourceType=&amp;quot;Unspecified&amp;quot; preCondition=&amp;quot;integratedMode&amp;quot; /&amp;gt;&lt;br /&gt;
     &amp;lt;/handlers&amp;gt;&lt;br /&gt;
   &amp;lt;/system.webServer&amp;gt;&lt;br /&gt;
 &amp;lt;/configuration&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 10:58, 21 January 2016 (CST)&lt;br /&gt;
&lt;br /&gt;
[[Category:Lucee]]&lt;br /&gt;
[[Category:Railo]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=Using_Caching_to_Improve_Performance&amp;diff=2765</id>
		<title>Using Caching to Improve Performance</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=Using_Caching_to_Improve_Performance&amp;diff=2765"/>
				<updated>2016-01-20T22:39:34Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: Created page with &amp;quot;This article will show a few ways that you can use caching to improve page load times for your website.  ==Using Cache-Control Headers to Improve Page Load Performance==  The...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article will show a few ways that you can use caching to improve page load times for your website.&lt;br /&gt;
&lt;br /&gt;
==Using Cache-Control Headers to Improve Page Load Performance==&lt;br /&gt;
&lt;br /&gt;
The Cache-Control header of an HTTP response tells the client web browser when and how long it should cache responses.  This can be used for resources that do not often change to prevent the browser from repeatedly requesting the same resources on every page.&lt;br /&gt;
&lt;br /&gt;
The cache-control header that caches a response for 60 seconds appears as follows in the headers of a request:&lt;br /&gt;
 Cache-Control: max-age=60&lt;br /&gt;
 &lt;br /&gt;
You can also indicate that the page should only be cached by the end-user and not by any proxies (I.E. It contains content only intended for a single user) by adding the &amp;quot;private&amp;quot; directive:&lt;br /&gt;
 Cache-Control: private, max-age=60&lt;br /&gt;
 &lt;br /&gt;
Alternatively, if you want to ensure a page is cached at all proxies in addition to the end user, you can add the &amp;quot;public&amp;quot; directive:&lt;br /&gt;
 Cache-Control: public, max-age=60&lt;br /&gt;
&lt;br /&gt;
===Static Content===&lt;br /&gt;
&lt;br /&gt;
Static content is the easiest to apply cache-control to because by its very nature, it does not change frequently.  Static content includes javascript, css, images, and plain html pages.  In-general, These items can be safely cached by the client for the duration of their visit.  I would recommend setting the cache duration to be about the length that the average visitor stays on the site.&lt;br /&gt;
&lt;br /&gt;
The control panel allows you to specify the static cache duration on a per-folder basis by selecting a domain and going to 'IIS Settings' -&amp;gt; 'Caching'.&lt;br /&gt;
&lt;br /&gt;
===Dynamic Content===&lt;br /&gt;
&lt;br /&gt;
Dynamic content is often more difficult to cache due to its changing nature.  However, there are still often pages that are dynamically generated but do not change very often.  And these can be cached for a reasonable duration.&lt;br /&gt;
&lt;br /&gt;
====Packaged Applications====&lt;br /&gt;
&lt;br /&gt;
For pre-written applications, altering the cache-control settings for dynamic pages may or may not be available through the application's configuration.  Additionally, some applications, such as WordPress and Joomla, require plugins to add caching functionality.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Custom Applications====&lt;br /&gt;
&lt;br /&gt;
For applications that you have written yourself, you can specify the cache-control setting for a particular page by setting the cache-control header directly from the code.  Below are some examples of how to do this in several different programming languages:&lt;br /&gt;
&lt;br /&gt;
=====ColdFusion=====&lt;br /&gt;
&lt;br /&gt;
Cache for 1 hour:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;cfheader&lt;br /&gt;
     name=&amp;quot;cache-control&amp;quot;&lt;br /&gt;
     value=&amp;quot;max-age=3600&amp;quot;&lt;br /&gt;
     /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====PHP=====&lt;br /&gt;
&lt;br /&gt;
Cache for 5 minutes:&lt;br /&gt;
&lt;br /&gt;
 header('cache-control: max-age=300');&lt;br /&gt;
&lt;br /&gt;
=====C#.Net=====&lt;br /&gt;
&lt;br /&gt;
Cache for 1 day:&lt;br /&gt;
&lt;br /&gt;
 Response.AddHeader(&amp;quot;cache-control&amp;quot;, &amp;quot;max-age=86400&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
=====VB.Net=====&lt;br /&gt;
&lt;br /&gt;
Cache for 30 minutes:&lt;br /&gt;
&lt;br /&gt;
 Response.AddHeader(&amp;quot;cache-control&amp;quot;, &amp;quot;max-age=1800&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
=====Classic ASP=====&lt;br /&gt;
&lt;br /&gt;
Cache for 1 hour:&lt;br /&gt;
&lt;br /&gt;
 Response.AddHeader &amp;quot;cache-control&amp;quot;,&amp;quot;max-age=3600&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Using Response Caching to Improve Page Load Performance==&lt;br /&gt;
&lt;br /&gt;
Response caching allows the server to remember the response that was given for a particular page and use that response to reply to future requests for that page.  When using the response cache, the initial request for the page will take longer since the application must execute the code to generate the page.  However, subsequent requests will be almost instantly served from the response cache.  This can be helpful for sites that are dynamically built by a CMS-engine, but the content of the site does not change very often.&lt;br /&gt;
&lt;br /&gt;
The response caching must be configured within the folders &amp;quot;web.config&amp;quot; IIS configuration file.  If you have an existing configuration file, only the &amp;quot;caching&amp;quot; section below should be added.  If you do not currently have a web.config file in the folder, the entire example should be used:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;configuration&amp;gt;&lt;br /&gt;
   &amp;lt;system.webServer&amp;gt;&lt;br /&gt;
     &amp;lt;caching enabled=&amp;quot;true&amp;quot; enableKernelCache=&amp;quot;true&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;profiles&amp;gt;&lt;br /&gt;
         &amp;lt;add extension=&amp;quot;.asp&amp;quot; policy=&amp;quot;CacheUntilChange&amp;quot; kernelCachePolicy=&amp;quot;CacheUntilChange&amp;quot; /&amp;gt;&lt;br /&gt;
       &amp;lt;/profiles&amp;gt;&lt;br /&gt;
     &amp;lt;/caching&amp;gt;&lt;br /&gt;
   &amp;lt;/system.webServer&amp;gt;&lt;br /&gt;
 &amp;lt;/configuration&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The important part above is the '''add''' element inside of the '''profiles''' element.  You must add one more '''add''' elements to define what should be cached and for how long.  Below are the available properties for the '''add''' element:&lt;br /&gt;
&lt;br /&gt;
* '''Extension(''required''):''' The file extension for which you would like requests to be cached.&lt;br /&gt;
* '''Duration:''' How long to cache files when the '''CacheForTimePeriod''' option is used with the '''Policy''' or '''kernelCachePolicy''' parameters.  The default is 30 seconds.  The format is '''hh:mm:ss'''.&lt;br /&gt;
* '''Policy:''' How long to cache files.  Possible options are:&lt;br /&gt;
** '''DontCache:''' No caching is enabled.  This is the default.&lt;br /&gt;
** '''CacheUntilChange:''' Cache until the source file is modified.  This will only work when the URL maps to an actual file.&lt;br /&gt;
** '''CacheForTimePeriod:''' Cache for the duration specified in the '''Duration''' property.&lt;br /&gt;
* '''kernelCachePolicy:''' Same options as '''Policy''' property. &lt;br /&gt;
* '''varyByHeaders:''' A semi-colon delimited list of headers that should cause separate content to be cached for each combination.&lt;br /&gt;
* '''varyByQueryString:''' A semi-colon delimited list of querystring parameters that should cause separate content to be cached for each combination.  You can also specify '''*''' if you want any changes in the querystring to cause separate content to be cached.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Windows]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SQL_Server_Identity_Jumps&amp;diff=2740</id>
		<title>SQL Server Identity Jumps</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SQL_Server_Identity_Jumps&amp;diff=2740"/>
				<updated>2015-11-13T16:30:47Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The feature that has the side-effect of sometimes causing the jumps in identity numbers is &amp;quot;identity caching&amp;quot;.  The reason this was implemented in SQL 2012 and above is to improve the efficiency of generating new IDs for identity fields by incrementing the on-disk number by some amount (1000 for 'int' fields) and serving the next 1000 IDs directly from memory.  The side-effect of this is that if SQL Server is restarted, it may start up using the pre-written number on disk, and there will seem to be a gap since the cached ID numbers were never used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We do not disable this behavior on our shared SQL Servers for the following reasons:&lt;br /&gt;
&lt;br /&gt;
- SQL Server trace flags are only meant for debugging, and the only way to disable the behavior is with a trace flag (Not to mention it is an undocumented trace flag).  Since we need to run our shared SQL Servers in a supported configuration, using the trace flag is not a good option for us.&lt;br /&gt;
&lt;br /&gt;
- The identity-caching feature help reduce disk-writes and improve SQL Server performance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following alternatives are available if sequential numbers are important:&lt;br /&gt;
&lt;br /&gt;
- You can use the new 'Sequence' object that was also implemented in SQL 2012 and above.  The sequence object allows you to disable caching.  However, it will require some changes to your application's SQL and/or stored procedures to take advantage of it.&lt;br /&gt;
&lt;br /&gt;
- You can generate the numbers using some algorithm within your application.&lt;br /&gt;
&lt;br /&gt;
- We offer VPS servers with MSSQL.  With your own VPS running SQL Server, you can make any changes you want, such as adding the trace flag.&lt;br /&gt;
&lt;br /&gt;
- If the main goal is to reduce confusion for users when they see a gap, starting identity numbers higher (such as 10000) or displaying numbers with a minimum number of digits and leading zeros (such as 00001) can reduce the perceived difference when this occurs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Added By: [[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 10:30, 13 November 2015 (CST)&lt;br /&gt;
&lt;br /&gt;
[[Category:MSSQL]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SQL_Server_Identity_Jumps&amp;diff=2739</id>
		<title>SQL Server Identity Jumps</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SQL_Server_Identity_Jumps&amp;diff=2739"/>
				<updated>2015-11-13T16:30:15Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The feature that has the side-effect of sometimes causing the jumps in identity numbers is &amp;quot;identity caching&amp;quot;.  The reason this was implemented in SQL 2012 and above is to improve the efficiency of generating new IDs for identity fields by incrementing the on-disk number by some amount (1000 for 'int' fields) and serving the next 1000 IDs directly from memory.  The side-effect of this is that if SQL Server is restarted, it may start up using the pre-written number on disk, and there will seem to be a gap since the cached ID numbers were never used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We do not disable this behavior on our shared SQL Servers for the following reasons:&lt;br /&gt;
&lt;br /&gt;
- SQL Server trace flags are only meant for debugging, and the only way to disable the behavior is with a trace flag (Not to mention it is an undocumented trace flag).  Since we need to run our shared SQL Servers in a supported configuration, using the trace flag is not a good option for us.&lt;br /&gt;
&lt;br /&gt;
- The identity-caching feature help reduce disk-writes and improve SQL Server performance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following alternatives are available if sequential numbers are important:&lt;br /&gt;
&lt;br /&gt;
- You can use the new 'Sequence' object that was also implemented in SQL 2012 and above.  The sequence object allows you to disable caching.  However, it will require some changes to your application's SQL and/or stored procedures to take advantage of it.&lt;br /&gt;
&lt;br /&gt;
- You can generate the numbers using some algorithm within your application.&lt;br /&gt;
&lt;br /&gt;
- We offer VPS servers with MSSQL.  With your own VPS running SQL Server, you can make any changes you want, such as adding the trace flag.&lt;br /&gt;
&lt;br /&gt;
- If the main goal is to reduce confusion for users when they see a gap, starting identity numbers higher (such as 10000) or displaying numbers with a minimum number of digits and leading zeros (such as 00001) can reduce the perceived difference when this occurs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 10:30, 13 November 2015 (CST)&lt;br /&gt;
&lt;br /&gt;
[[Category:MSSQL]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=SQL_Server_Identity_Jumps&amp;diff=2738</id>
		<title>SQL Server Identity Jumps</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=SQL_Server_Identity_Jumps&amp;diff=2738"/>
				<updated>2015-11-13T16:28:22Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: Created page with &amp;quot;The feature that has the side-effect of sometimes causing the jumps in identity numbers is &amp;quot;identity caching&amp;quot;.  The reason this was implemented in SQL 2012 and above is to imp...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The feature that has the side-effect of sometimes causing the jumps in identity numbers is &amp;quot;identity caching&amp;quot;.  The reason this was implemented in SQL 2012 and above is to improve the efficiency of generating new IDs for identity fields by incrementing the on-disk number by some amount (1000 for 'int' fields) and serving the next 1000 IDs directly from memory.  The side-effect of this is that if SQL Server is restarted, it may start up using the pre-written number on disk, and there will seem to be a gap since the cached ID numbers were never used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We do not disable this behavior on our shared SQL Servers for the following reasons:&lt;br /&gt;
&lt;br /&gt;
- SQL Server trace flags are only meant for debugging, and the only way to disable the behavior is with a trace flag (Not to mention it is an undocumented trace flag).  Since we need to run our shared SQL Servers in a supported configuration, using the trace flag is not a good option for us.&lt;br /&gt;
&lt;br /&gt;
- The identity-caching feature help reduce disk-writes and improve SQL Server performance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following alternatives are available if sequential numbers are important:&lt;br /&gt;
&lt;br /&gt;
- You can use the new 'Sequence' object that was also implemented in SQL 2012 and above.  The sequence object allows you to disable caching.  However, it will require some changes to your application's SQL and/or stored procedures to take advantage of it.&lt;br /&gt;
&lt;br /&gt;
- You can generate the numbers using some algorithm within your application.&lt;br /&gt;
&lt;br /&gt;
- We offer VPS servers with MSSQL.  With your own VPS running SQL Server, you can make any changes you want, such as adding the trace flag.&lt;br /&gt;
&lt;br /&gt;
- If the main goal is to reduce confusion for users when they see a gap, starting identity numbers higher (such as 10000) or displaying numbers with a minimum number of digits and leading zeros (such as 00001) can reduce the perceived difference when this occurs.&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2561</id>
		<title>PCI Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2561"/>
				<updated>2015-06-09T18:04:43Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Shared Servers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
== Obtaining PCI Compliance ==&lt;br /&gt;
&lt;br /&gt;
You need PCI Compliance if your website/business: '''accepts, transmits or stores any cardholder data.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''If that is you:''' &lt;br /&gt;
&lt;br /&gt;
Find a Quality Security Accessor such as [https://www.securitymetrics.com SecurityMetrics] or [https://trustwave.com/ TrustWave], there are many such vendors. They will help you determine the type of compliance required for your business and provide the services to achieve and maintain compliance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How do I know what level / validation type?''' &lt;br /&gt;
&lt;br /&gt;
The Quality Security Accessor will help you determine this and based on PCI DSS Standards.&lt;br /&gt;
&lt;br /&gt;
*The level of &amp;quot;compliance&amp;quot; required (1-4) is based on transaction or monetary volume.&lt;br /&gt;
*The &amp;quot;Validation Type&amp;quot; determines the assessment requirements and is based on how much card data you store.&lt;br /&gt;
&lt;br /&gt;
A copy of the PCI DSS is available [https://www.pcisecuritystandards.org/security_standards/index.php here].&lt;br /&gt;
More general unofficial details can be found at [http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard here].&lt;br /&gt;
&lt;br /&gt;
=== How Hostek complements efforts for PCI compliance ===&lt;br /&gt;
&lt;br /&gt;
#Insuring PCI standards can be met and kept for our own systems.&lt;br /&gt;
#Providing firewall protection for all servers and the option for PCI compliant firewall rules to be applied to customers environment. &lt;br /&gt;
#Providing VPN for customers to securely connect and manage environment remotely.&lt;br /&gt;
#Providing VLAN (virtual private network) for customers environment with multiple servers so their database server is completely isolated from public access.&lt;br /&gt;
#Including or offering Anti-Virus scanning on VPS and/or Shared Hosting servers.&lt;br /&gt;
#Protecting physical access to network and servers. Data centers are managed &amp;amp; monitored 24x7 by security cameras and on-site staff. &lt;br /&gt;
&lt;br /&gt;
== Hostek.com ==&lt;br /&gt;
&lt;br /&gt;
PCI compliance requires quarterly scans from a PCI compliance vendor.  Hostek.com goes above and beyond this requirement by having regular scans from two different PCI compliance vendors.  One vendor's scans are done quarterly.  The other's scans are done nightly.  This ensures that all potential PCI compliance issues are accurately identified and dealt with promptly.&lt;br /&gt;
&lt;br /&gt;
===Hostek.com PCI Compliance Report===&lt;br /&gt;
Hostek.com PCI DSS Compliance report: [[Media:Hostek-PCI-Compliance-040115.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==Datacenter==&lt;br /&gt;
The St. Louis, MO data center where the hostek.com equipment is housed maintains SOC 2 Certification.  This replaced the SSAE16 Certification.&lt;br /&gt;
&lt;br /&gt;
Certification: [[File:2014CyberconSoc2Cert.pdf]]&lt;br /&gt;
&lt;br /&gt;
Audit: [[File:2014CyberconSoc2Audit.pdf]]&lt;br /&gt;
&lt;br /&gt;
===Previous Certifications===&lt;br /&gt;
2011-12 - SSAE 16 Certification ([http://hostek.com/forms/SSAE-16_Letter_of_Cert.pdf audit report]).  This replaced the SAS 70 Type 2 Certification.&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 1: [[File:SOC2-2013_CYBERCON_Full_Report_PART-1.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 2: [[File:SOC2-2013_CYBERCON_Full_Report_PART-2.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Shared Servers==&lt;br /&gt;
&lt;br /&gt;
We support PCI compliance on our shared hosting servers.  If your PCI scan shows any issues that are not directly related to your web application, you can attach the report in a support ticket so that we can address any issues.&lt;br /&gt;
&lt;br /&gt;
===TLS 1.0===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable floatright&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 8.1  &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 10 / Win Phone 8.0&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 11 / Win Phone 8.1 &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Java 6u45  &lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 7u25&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 8u31 &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 0.9.8y&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.1l  &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.2  &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 5.1.9 / OS X 10.6.8&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6 / iOS 6.0.1   &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6.0.4 / OS X 10.8.4 &lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / iOS 7.1   &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / OS X 10.9   &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / iOS 8.1.2   &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / OS X 10.10   &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Yahoo Slurp Jan 2015 &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| YandexBot Jan 2015 &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;float: right; margin: 0 0 .5em .5em&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| Android 2.3.7&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.0.4&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.1.1&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.2.2&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.3&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.4.2&lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Android 5.0.0&lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Baidu Jan 2015&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| BingPreview Jan 2015&lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Chrome 42 / OS X&lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 31.3.0 ESR / Win 7 &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 37 / OS X  &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| Googlebot Feb 2015 &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE 6 / XP   No FS 1  &lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 7 / Vista&lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8 / XP   No FS 1  &lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8-10 / Win 7 &lt;br /&gt;
| style=&amp;quot;background-color: #FFAAAA&amp;quot; | Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 7   &lt;br /&gt;
| style=&amp;quot;background-color: #AAFFAA&amp;quot; | Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
We are disabling support for TLS 1.0 on our Shared Windows Servers.&lt;br /&gt;
&lt;br /&gt;
*Disabling TLS 1.0 is now required for PCI DSS compliance.&lt;br /&gt;
*This change is to ensure that any connection over HTTPS is secured against &amp;quot;eavesdropping&amp;quot; from Man-In-The-Middle(MITM) attacks.&lt;br /&gt;
*The majority of users will be unaffected by this change because it will only affect outdated browsers and old mobile devices that do not support TLS 1.1 or TLS 1.2.&lt;br /&gt;
====Internet Explorer====&lt;br /&gt;
#After disabling this protocol '''Internet Explorer 11'''(only supported on '''Windows 7 and up''') will be the only version of Internet Explorer that can view HTTPS pages on the shared Windows servers.&lt;br /&gt;
#Users with '''Windows XP''' and '''Windows Vista''' will have an unsupported version of Internet Explorer.  In order to view HTTPS pages these users will need to use an alternate browser (Example: Google Chrome, Mozilla FireFox, Safari, etc.).&lt;br /&gt;
&lt;br /&gt;
====Support/Unsupported Browsers/OS's====&lt;br /&gt;
*See table on the right&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear: both;&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Common PCI Compliance Resolutions==&lt;br /&gt;
&lt;br /&gt;
===SSL/TLS Protocol Initialization Vector Implementation Information Disclosure===&lt;br /&gt;
&lt;br /&gt;
aka: BEAST (Browser Exploit Against SSL/TLS) Vulnerability&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  If you are on a '''shared server''' or a '''managed VPS''', please submit a support ticket [http://support.hostek.com] and attach/include your PCI scan report.  The information below is for our non managed VPS customers.&lt;br /&gt;
&lt;br /&gt;
* Place the following text in a file named '''TLS.reg''' and execute the file.  It will add registry values to enable TLS 1.1 and TLS 1.2 support:&lt;br /&gt;
 Windows Registry Editor Version 5.00&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
&lt;br /&gt;
* After completing the above step, go to '''Start''' -&amp;gt; '''Run''' -&amp;gt; (type '''gpedit.msc''') -&amp;gt; (click '''OK''')&lt;br /&gt;
* Navigate to '''Computer Configuration''' -&amp;gt; '''Administrative Template''' -&amp;gt; '''Network''' -&amp;gt; '''SSL Configuration Settings'''&lt;br /&gt;
* Right click on '''SSL Cipher Suite Order''' and choose '''Edit''' (Windows 2008 R2) or '''Properties''' (Windows 2008)&lt;br /&gt;
* Select '''Enabled''' and replace the text in the textbox under '''SSL Cipher Suites'''(not to be confused with the '''Notes''' textbox) with the following long line of text(All on a single line - no line breaks or spaces):&lt;br /&gt;
TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_RC4_128_MD5,SSL_CK_RC4_128_WITH_MD5,TLS_RSA_WITH_NULL_SHA,TLS_RSA_WITH_NULL_MD5&lt;br /&gt;
* Click '''OK'''&lt;br /&gt;
* Reboot server&lt;br /&gt;
&lt;br /&gt;
===Disable SSLv2 &amp;amp; Strong Cyphers Only &amp;amp; Strong Protocols Only===&lt;br /&gt;
If you are on a shared server, please open a support ticket and attach the PCI scan report.&lt;br /&gt;
&lt;br /&gt;
For VPS's:  This generally applies to a Windows based server.  If you see one of these items on your PCI scan report, download this zip [http://hostek.com/wikifiles/disablessl2-strongcyphersonly-strongprotocolsonly.zip] and extract the appropriate .reg file and put that on your VPS and double click it to make the appropriate registry change to fix the issue.  Generally if one of these show on your report, we suggest running all three .reg files to fully take care of the issue at one time.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  You will need to reboot the server for these changes to take affect.&lt;br /&gt;
&lt;br /&gt;
====VPS-Windows 2008 Servers====&lt;br /&gt;
This free tool can be used to determine if vulnerable or weak protocols or cypers are enabled, and provides the option to disable them.&lt;br /&gt;
&lt;br /&gt;
https://www.nartac.com/Products/IISCrypto/Default.aspx&lt;br /&gt;
&lt;br /&gt;
Changes using this tool require a server reboot to complete them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Websites that allow testing for SSL Protocols and Cyphers:&lt;br /&gt;
&lt;br /&gt;
https://www.ssllabs.com/ssltest/index.html&lt;br /&gt;
&lt;br /&gt;
http://www.serversniff.net/sslcheck.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Visa E-commerce Security Checklist Questionaire==&lt;br /&gt;
&lt;br /&gt;
Click this link to Visa E-commerce Security Checklist Questionaire [[https://wiki.hostek.com/Visa_E-commerce_Security_Checklist_Questionaire]]&lt;br /&gt;
&lt;br /&gt;
==Cloud Assessment Questions==&lt;br /&gt;
 Q: Is your organization insured by a 3rd party for losses?&lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do your organization's service level agreements provide tenant renumeration for losses they may incur due to outages or losses experienced within your infrastructure?&lt;br /&gt;
 A: The Hostek.com SLA provides for a refund or credit limited to the dollar amount paid for the service during that monthly period.  The refund or credit amount is calculated based on amount paid for the monthly service / number of minutes in a month * number of down minutes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you collect capacity and utilization data for all relevant components of your cloud service offering?&lt;br /&gt;
 A: Yes.  Daily.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with capacity planning and utilization reports?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you have a documented procedure for responding to requests for tenant data from governments or third parties? &lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do you process, transmit or store any credit card related information on behalf Cisco?&lt;br /&gt;
 A: In our St. Louis facility, we do not use Cisco.  In our Dallas facility, we do.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation on policies and procedures for controls you have in place to protect tenant's intellectual property and sensitive data from unauthorized access.&lt;br /&gt;
 A: Utilization of IPS and IDS.  Customer has ability to lock down server access.  Internal access information is stored encrypted and only available via internal access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation and policies you have regarding how you may access, mine, utilize tenant data and/or metadata.&lt;br /&gt;
 A: We do not mine nor utilize tenant data.  Access to tenant data would occur if tenant asked for help in resolving a situation which may require such access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please specify any inspection technologies used for collecting or creating metadata about tenant data usage (search engines, etc.?).&lt;br /&gt;
 A: We do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to opt-out of having their data/metatdata accessed/mined via inspection technologies?&lt;br /&gt;
 A: N/A as we do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: Can you provide the physical location/geography of storage of a tenant’s data upon request?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to define acceptable geographical locations for data routing or resource instantiation?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to specify which of your geographic locations their data is allowed to traverse into/out of (to address legal jurisdictional considerations based on where data is stored vs. accessed?) &lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: What capability do you have to use system geographic location as an authentication factor?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 Q: Does legal counsel review all third party agreements?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you select and monitor outsourced providers in compliance with laws in the country where the data orignates, processed, stored and transmitted?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 Q: Have you established an Information Security Management Program (ISMP?)&lt;br /&gt;
 A: Our ISMP is being developed.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with a right to audit (tenant audit)?&lt;br /&gt;
 A: No, for security/confidential purposes.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to request deletion/removal of data as needed?&lt;br /&gt;
 Q: Provide the standards used for secure deletion of archived data upon request by tenants.&lt;br /&gt;
 Q: What is the process to sanitize all computing resource of tenant data once a customer has exited your environment.&lt;br /&gt;
 Q: What is time period that you retain customer data after explicit user deletion/removal?&lt;br /&gt;
 A: When a cloud tenant cancels, their virtual machine and backup data is deleted.  Data blocks are reused for new customers, which replace the old blocks.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you manage separate production and non production environments &amp;amp; what controls do you have in place to ensure that the production data in not copied to non-production environments?&lt;br /&gt;
 A: No.  We have a redundant production environment, which is replicated nightly from the primary environment.&lt;br /&gt;
&lt;br /&gt;
 Q: Are backups and archives of data using unique encryption keys for each tenant?&lt;br /&gt;
 A: Each tenant has their own uniquely retained archive.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the duration for keeping backed up data? And can you provide information about your backup rotations and rotation of your backup media?&lt;br /&gt;
 A: The backup duration depends on the plan selected.  By default this will range from 5-10 days.  The backups are full backups with a nightly differential, providing for a full 5-10 day restoration period.&lt;br /&gt;
&lt;br /&gt;
===Identity and Access Control===&lt;br /&gt;
&lt;br /&gt;
===Physical Security and Disaster Recovery===&lt;br /&gt;
&lt;br /&gt;
 Q: Do you require strong (multifactor) authentication options (card keys+PIN, biometric readers, etc.) for access to your physical facilities?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Are any of your datacenters located in places which have a high probability/occurrence of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes, etc.)?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you use 24X7 camera monitoring in all the access points of your datacenter and key locations within the datacenter? &lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you maintain liaisons and points of contact with local authorities in accordance with contracts and appropriate regulations?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Infrastructure]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2560</id>
		<title>PCI Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2560"/>
				<updated>2015-06-09T17:51:43Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* TLS 1.0 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
== Obtaining PCI Compliance ==&lt;br /&gt;
&lt;br /&gt;
You need PCI Compliance if your website/business: '''accepts, transmits or stores any cardholder data.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''If that is you:''' &lt;br /&gt;
&lt;br /&gt;
Find a Quality Security Accessor such as [https://www.securitymetrics.com SecurityMetrics] or [https://trustwave.com/ TrustWave], there are many such vendors. They will help you determine the type of compliance required for your business and provide the services to achieve and maintain compliance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How do I know what level / validation type?''' &lt;br /&gt;
&lt;br /&gt;
The Quality Security Accessor will help you determine this and based on PCI DSS Standards.&lt;br /&gt;
&lt;br /&gt;
*The level of &amp;quot;compliance&amp;quot; required (1-4) is based on transaction or monetary volume.&lt;br /&gt;
*The &amp;quot;Validation Type&amp;quot; determines the assessment requirements and is based on how much card data you store.&lt;br /&gt;
&lt;br /&gt;
A copy of the PCI DSS is available [https://www.pcisecuritystandards.org/security_standards/index.php here].&lt;br /&gt;
More general unofficial details can be found at [http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard here].&lt;br /&gt;
&lt;br /&gt;
=== How Hostek complements efforts for PCI compliance ===&lt;br /&gt;
&lt;br /&gt;
#Insuring PCI standards can be met and kept for our own systems.&lt;br /&gt;
#Providing firewall protection for all servers and the option for PCI compliant firewall rules to be applied to customers environment. &lt;br /&gt;
#Providing VPN for customers to securely connect and manage environment remotely.&lt;br /&gt;
#Providing VLAN (virtual private network) for customers environment with multiple servers so their database server is completely isolated from public access.&lt;br /&gt;
#Including or offering Anti-Virus scanning on VPS and/or Shared Hosting servers.&lt;br /&gt;
#Protecting physical access to network and servers. Data centers are managed &amp;amp; monitored 24x7 by security cameras and on-site staff. &lt;br /&gt;
&lt;br /&gt;
== Hostek.com ==&lt;br /&gt;
&lt;br /&gt;
PCI compliance requires quarterly scans from a PCI compliance vendor.  Hostek.com goes above and beyond this requirement by having regular scans from two different PCI compliance vendors.  One vendor's scans are done quarterly.  The other's scans are done nightly.  This ensures that all potential PCI compliance issues are accurately identified and dealt with promptly.&lt;br /&gt;
&lt;br /&gt;
===Hostek.com PCI Compliance Report===&lt;br /&gt;
Hostek.com PCI DSS Compliance report: [[Media:Hostek-PCI-Compliance-040115.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==Datacenter==&lt;br /&gt;
The St. Louis, MO data center where the hostek.com equipment is housed maintains SOC 2 Certification.  This replaced the SSAE16 Certification.&lt;br /&gt;
&lt;br /&gt;
Certification: [[File:2014CyberconSoc2Cert.pdf]]&lt;br /&gt;
&lt;br /&gt;
Audit: [[File:2014CyberconSoc2Audit.pdf]]&lt;br /&gt;
&lt;br /&gt;
===Previous Certifications===&lt;br /&gt;
2011-12 - SSAE 16 Certification ([http://hostek.com/forms/SSAE-16_Letter_of_Cert.pdf audit report]).  This replaced the SAS 70 Type 2 Certification.&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 1: [[File:SOC2-2013_CYBERCON_Full_Report_PART-1.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 2: [[File:SOC2-2013_CYBERCON_Full_Report_PART-2.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Shared Servers==&lt;br /&gt;
&lt;br /&gt;
We support PCI compliance on our shared hosting servers.  If your PCI scan shows any issues that are not directly related to your web application, you can attach the report in a support ticket so that we can address any issues.&lt;br /&gt;
&lt;br /&gt;
===TLS 1.0===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable floatright&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 8.1  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 10 / Win Phone 8.0&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 11 / Win Phone 8.1 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Java 6u45  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 7u25&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 8u31 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 0.9.8y&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.1l  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.2  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 5.1.9 / OS X 10.6.8&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6 / iOS 6.0.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6.0.4 / OS X 10.8.4 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / iOS 7.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / OS X 10.9   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / iOS 8.1.2   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / OS X 10.10   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Yahoo Slurp Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| YandexBot Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;float: right; margin: 0 0 .5em .5em&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| Android 2.3.7&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.0.4&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.1.1&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.2.2&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.3&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.4.2&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Android 5.0.0&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Baidu Jan 2015&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| BingPreview Jan 2015&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Chrome 42 / OS X&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 31.3.0 ESR / Win 7 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 37 / OS X  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Googlebot Feb 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE 6 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 7 / Vista&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8-10 / Win 7 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 7   &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
We are disabling support for TLS 1.0 on our Shared Windows Servers.&lt;br /&gt;
&lt;br /&gt;
*Disabling TLS 1.0 is now required for PCI DSS compliance.&lt;br /&gt;
*This change is to ensure that any connection over HTTPS is secured against &amp;quot;eavesdropping&amp;quot; from Man-In-The-Middle(MITM) attacks.&lt;br /&gt;
*The majority of users will be unaffected by this change because it will only affect outdated browsers and old mobile devices that do not support TLS 1.1 or TLS 1.2.&lt;br /&gt;
====Internet Explorer====&lt;br /&gt;
#After disabling this protocol '''Internet Explorer 11'''(only supported on '''Windows 7 and up''') will be the only version of Internet Explorer that can view HTTPS pages on the shared Windows servers.&lt;br /&gt;
#Users with '''Windows XP''' and '''Windows Vista''' will have an unsupported version of Internet Explorer.  In order to view HTTPS pages these users will need to use an alternate browser (Example: Google Chrome, Mozilla FireFox, Safari, etc.).&lt;br /&gt;
&lt;br /&gt;
====Support/Unsupported Browsers/OS's====&lt;br /&gt;
*See table on the right&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear: both;&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Common PCI Compliance Resolutions==&lt;br /&gt;
&lt;br /&gt;
===SSL/TLS Protocol Initialization Vector Implementation Information Disclosure===&lt;br /&gt;
&lt;br /&gt;
aka: BEAST (Browser Exploit Against SSL/TLS) Vulnerability&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  If you are on a '''shared server''' or a '''managed VPS''', please submit a support ticket [http://support.hostek.com] and attach/include your PCI scan report.  The information below is for our non managed VPS customers.&lt;br /&gt;
&lt;br /&gt;
* Place the following text in a file named '''TLS.reg''' and execute the file.  It will add registry values to enable TLS 1.1 and TLS 1.2 support:&lt;br /&gt;
 Windows Registry Editor Version 5.00&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
&lt;br /&gt;
* After completing the above step, go to '''Start''' -&amp;gt; '''Run''' -&amp;gt; (type '''gpedit.msc''') -&amp;gt; (click '''OK''')&lt;br /&gt;
* Navigate to '''Computer Configuration''' -&amp;gt; '''Administrative Template''' -&amp;gt; '''Network''' -&amp;gt; '''SSL Configuration Settings'''&lt;br /&gt;
* Right click on '''SSL Cipher Suite Order''' and choose '''Edit''' (Windows 2008 R2) or '''Properties''' (Windows 2008)&lt;br /&gt;
* Select '''Enabled''' and replace the text in the textbox under '''SSL Cipher Suites'''(not to be confused with the '''Notes''' textbox) with the following long line of text(All on a single line - no line breaks or spaces):&lt;br /&gt;
TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_RC4_128_MD5,SSL_CK_RC4_128_WITH_MD5,TLS_RSA_WITH_NULL_SHA,TLS_RSA_WITH_NULL_MD5&lt;br /&gt;
* Click '''OK'''&lt;br /&gt;
* Reboot server&lt;br /&gt;
&lt;br /&gt;
===Disable SSLv2 &amp;amp; Strong Cyphers Only &amp;amp; Strong Protocols Only===&lt;br /&gt;
If you are on a shared server, please open a support ticket and attach the PCI scan report.&lt;br /&gt;
&lt;br /&gt;
For VPS's:  This generally applies to a Windows based server.  If you see one of these items on your PCI scan report, download this zip [http://hostek.com/wikifiles/disablessl2-strongcyphersonly-strongprotocolsonly.zip] and extract the appropriate .reg file and put that on your VPS and double click it to make the appropriate registry change to fix the issue.  Generally if one of these show on your report, we suggest running all three .reg files to fully take care of the issue at one time.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  You will need to reboot the server for these changes to take affect.&lt;br /&gt;
&lt;br /&gt;
====VPS-Windows 2008 Servers====&lt;br /&gt;
This free tool can be used to determine if vulnerable or weak protocols or cypers are enabled, and provides the option to disable them.&lt;br /&gt;
&lt;br /&gt;
https://www.nartac.com/Products/IISCrypto/Default.aspx&lt;br /&gt;
&lt;br /&gt;
Changes using this tool require a server reboot to complete them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Websites that allow testing for SSL Protocols and Cyphers:&lt;br /&gt;
&lt;br /&gt;
https://www.ssllabs.com/ssltest/index.html&lt;br /&gt;
&lt;br /&gt;
http://www.serversniff.net/sslcheck.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Visa E-commerce Security Checklist Questionaire==&lt;br /&gt;
&lt;br /&gt;
Click this link to Visa E-commerce Security Checklist Questionaire [[https://wiki.hostek.com/Visa_E-commerce_Security_Checklist_Questionaire]]&lt;br /&gt;
&lt;br /&gt;
==Cloud Assessment Questions==&lt;br /&gt;
 Q: Is your organization insured by a 3rd party for losses?&lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do your organization's service level agreements provide tenant renumeration for losses they may incur due to outages or losses experienced within your infrastructure?&lt;br /&gt;
 A: The Hostek.com SLA provides for a refund or credit limited to the dollar amount paid for the service during that monthly period.  The refund or credit amount is calculated based on amount paid for the monthly service / number of minutes in a month * number of down minutes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you collect capacity and utilization data for all relevant components of your cloud service offering?&lt;br /&gt;
 A: Yes.  Daily.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with capacity planning and utilization reports?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you have a documented procedure for responding to requests for tenant data from governments or third parties? &lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do you process, transmit or store any credit card related information on behalf Cisco?&lt;br /&gt;
 A: In our St. Louis facility, we do not use Cisco.  In our Dallas facility, we do.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation on policies and procedures for controls you have in place to protect tenant's intellectual property and sensitive data from unauthorized access.&lt;br /&gt;
 A: Utilization of IPS and IDS.  Customer has ability to lock down server access.  Internal access information is stored encrypted and only available via internal access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation and policies you have regarding how you may access, mine, utilize tenant data and/or metadata.&lt;br /&gt;
 A: We do not mine nor utilize tenant data.  Access to tenant data would occur if tenant asked for help in resolving a situation which may require such access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please specify any inspection technologies used for collecting or creating metadata about tenant data usage (search engines, etc.?).&lt;br /&gt;
 A: We do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to opt-out of having their data/metatdata accessed/mined via inspection technologies?&lt;br /&gt;
 A: N/A as we do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: Can you provide the physical location/geography of storage of a tenant’s data upon request?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to define acceptable geographical locations for data routing or resource instantiation?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to specify which of your geographic locations their data is allowed to traverse into/out of (to address legal jurisdictional considerations based on where data is stored vs. accessed?) &lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: What capability do you have to use system geographic location as an authentication factor?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 Q: Does legal counsel review all third party agreements?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you select and monitor outsourced providers in compliance with laws in the country where the data orignates, processed, stored and transmitted?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 Q: Have you established an Information Security Management Program (ISMP?)&lt;br /&gt;
 A: Our ISMP is being developed.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with a right to audit (tenant audit)?&lt;br /&gt;
 A: No, for security/confidential purposes.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to request deletion/removal of data as needed?&lt;br /&gt;
 Q: Provide the standards used for secure deletion of archived data upon request by tenants.&lt;br /&gt;
 Q: What is the process to sanitize all computing resource of tenant data once a customer has exited your environment.&lt;br /&gt;
 Q: What is time period that you retain customer data after explicit user deletion/removal?&lt;br /&gt;
 A: When a cloud tenant cancels, their virtual machine and backup data is deleted.  Data blocks are reused for new customers, which replace the old blocks.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you manage separate production and non production environments &amp;amp; what controls do you have in place to ensure that the production data in not copied to non-production environments?&lt;br /&gt;
 A: No.  We have a redundant production environment, which is replicated nightly from the primary environment.&lt;br /&gt;
&lt;br /&gt;
 Q: Are backups and archives of data using unique encryption keys for each tenant?&lt;br /&gt;
 A: Each tenant has their own uniquely retained archive.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the duration for keeping backed up data? And can you provide information about your backup rotations and rotation of your backup media?&lt;br /&gt;
 A: The backup duration depends on the plan selected.  By default this will range from 5-10 days.  The backups are full backups with a nightly differential, providing for a full 5-10 day restoration period.&lt;br /&gt;
&lt;br /&gt;
===Identity and Access Control===&lt;br /&gt;
&lt;br /&gt;
===Physical Security and Disaster Recovery===&lt;br /&gt;
&lt;br /&gt;
 Q: Do you require strong (multifactor) authentication options (card keys+PIN, biometric readers, etc.) for access to your physical facilities?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Are any of your datacenters located in places which have a high probability/occurrence of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes, etc.)?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you use 24X7 camera monitoring in all the access points of your datacenter and key locations within the datacenter? &lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you maintain liaisons and points of contact with local authorities in accordance with contracts and appropriate regulations?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Infrastructure]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2559</id>
		<title>PCI Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2559"/>
				<updated>2015-06-09T17:49:26Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Internet Explorer */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
== Obtaining PCI Compliance ==&lt;br /&gt;
&lt;br /&gt;
You need PCI Compliance if your website/business: '''accepts, transmits or stores any cardholder data.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''If that is you:''' &lt;br /&gt;
&lt;br /&gt;
Find a Quality Security Accessor such as [https://www.securitymetrics.com SecurityMetrics] or [https://trustwave.com/ TrustWave], there are many such vendors. They will help you determine the type of compliance required for your business and provide the services to achieve and maintain compliance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How do I know what level / validation type?''' &lt;br /&gt;
&lt;br /&gt;
The Quality Security Accessor will help you determine this and based on PCI DSS Standards.&lt;br /&gt;
&lt;br /&gt;
*The level of &amp;quot;compliance&amp;quot; required (1-4) is based on transaction or monetary volume.&lt;br /&gt;
*The &amp;quot;Validation Type&amp;quot; determines the assessment requirements and is based on how much card data you store.&lt;br /&gt;
&lt;br /&gt;
A copy of the PCI DSS is available [https://www.pcisecuritystandards.org/security_standards/index.php here].&lt;br /&gt;
More general unofficial details can be found at [http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard here].&lt;br /&gt;
&lt;br /&gt;
=== How Hostek complements efforts for PCI compliance ===&lt;br /&gt;
&lt;br /&gt;
#Insuring PCI standards can be met and kept for our own systems.&lt;br /&gt;
#Providing firewall protection for all servers and the option for PCI compliant firewall rules to be applied to customers environment. &lt;br /&gt;
#Providing VPN for customers to securely connect and manage environment remotely.&lt;br /&gt;
#Providing VLAN (virtual private network) for customers environment with multiple servers so their database server is completely isolated from public access.&lt;br /&gt;
#Including or offering Anti-Virus scanning on VPS and/or Shared Hosting servers.&lt;br /&gt;
#Protecting physical access to network and servers. Data centers are managed &amp;amp; monitored 24x7 by security cameras and on-site staff. &lt;br /&gt;
&lt;br /&gt;
== Hostek.com ==&lt;br /&gt;
&lt;br /&gt;
PCI compliance requires quarterly scans from a PCI compliance vendor.  Hostek.com goes above and beyond this requirement by having regular scans from two different PCI compliance vendors.  One vendor's scans are done quarterly.  The other's scans are done nightly.  This ensures that all potential PCI compliance issues are accurately identified and dealt with promptly.&lt;br /&gt;
&lt;br /&gt;
===Hostek.com PCI Compliance Report===&lt;br /&gt;
Hostek.com PCI DSS Compliance report: [[Media:Hostek-PCI-Compliance-040115.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==Datacenter==&lt;br /&gt;
The St. Louis, MO data center where the hostek.com equipment is housed maintains SOC 2 Certification.  This replaced the SSAE16 Certification.&lt;br /&gt;
&lt;br /&gt;
Certification: [[File:2014CyberconSoc2Cert.pdf]]&lt;br /&gt;
&lt;br /&gt;
Audit: [[File:2014CyberconSoc2Audit.pdf]]&lt;br /&gt;
&lt;br /&gt;
===Previous Certifications===&lt;br /&gt;
2011-12 - SSAE 16 Certification ([http://hostek.com/forms/SSAE-16_Letter_of_Cert.pdf audit report]).  This replaced the SAS 70 Type 2 Certification.&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 1: [[File:SOC2-2013_CYBERCON_Full_Report_PART-1.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 2: [[File:SOC2-2013_CYBERCON_Full_Report_PART-2.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Shared Servers==&lt;br /&gt;
&lt;br /&gt;
We support PCI compliance on our shared hosting servers.  If your PCI scan shows any issues that are not directly related to your web application, you can attach the report in a support ticket so that we can address any issues.&lt;br /&gt;
&lt;br /&gt;
===TLS 1.0===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable floatright&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 8.1  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 10 / Win Phone 8.0&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 11 / Win Phone 8.1 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Java 6u45  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 7u25&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 8u31 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 0.9.8y&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.1l  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.2  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 5.1.9 / OS X 10.6.8&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6 / iOS 6.0.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6.0.4 / OS X 10.8.4 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / iOS 7.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / OS X 10.9   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / iOS 8.1.2   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / OS X 10.10   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Yahoo Slurp Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| YandexBot Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;float: right; margin: 0 0 .5em .5em&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| Android 2.3.7&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.0.4&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.1.1&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.2.2&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.3&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.4.2&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Android 5.0.0&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Baidu Jan 2015&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| BingPreview Jan 2015&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Chrome 42 / OS X&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 31.3.0 ESR / Win 7 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 37 / OS X  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Googlebot Feb 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE 6 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 7 / Vista&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8-10 / Win 7 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 7   &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
We are disabling support for TLS 1.0 on our Shared Windows Servers.&lt;br /&gt;
&lt;br /&gt;
*This is now required for PCI DSS compliance.&lt;br /&gt;
*This is to ensure that any connection over HTTPS is secured against &amp;quot;eavesdropping&amp;quot; from Man-In-The-Middle(MITM) attacks.&lt;br /&gt;
*The majority of users will not notice this change because this will only affect outdated browsers and old mobile devices.&lt;br /&gt;
====Internet Explorer====&lt;br /&gt;
#After disabling this protocol '''Internet Explorer 11'''(only supported on '''Windows 7 and up''') will be the only version of Internet Explorer that can view HTTPS pages on the shared Windows servers.&lt;br /&gt;
#Users with '''Windows XP''' and '''Windows Vista''' will have an unsupported version of Internet Explorer.  In order to view HTTPS pages these users will need to use an alternate browser (Example: Google Chrome, Mozilla FireFox, Safari, etc.).&lt;br /&gt;
&lt;br /&gt;
====Support/Unsupported Browsers/OS's====&lt;br /&gt;
*See table on the right&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear: both;&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Common PCI Compliance Resolutions==&lt;br /&gt;
&lt;br /&gt;
===SSL/TLS Protocol Initialization Vector Implementation Information Disclosure===&lt;br /&gt;
&lt;br /&gt;
aka: BEAST (Browser Exploit Against SSL/TLS) Vulnerability&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  If you are on a '''shared server''' or a '''managed VPS''', please submit a support ticket [http://support.hostek.com] and attach/include your PCI scan report.  The information below is for our non managed VPS customers.&lt;br /&gt;
&lt;br /&gt;
* Place the following text in a file named '''TLS.reg''' and execute the file.  It will add registry values to enable TLS 1.1 and TLS 1.2 support:&lt;br /&gt;
 Windows Registry Editor Version 5.00&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
&lt;br /&gt;
* After completing the above step, go to '''Start''' -&amp;gt; '''Run''' -&amp;gt; (type '''gpedit.msc''') -&amp;gt; (click '''OK''')&lt;br /&gt;
* Navigate to '''Computer Configuration''' -&amp;gt; '''Administrative Template''' -&amp;gt; '''Network''' -&amp;gt; '''SSL Configuration Settings'''&lt;br /&gt;
* Right click on '''SSL Cipher Suite Order''' and choose '''Edit''' (Windows 2008 R2) or '''Properties''' (Windows 2008)&lt;br /&gt;
* Select '''Enabled''' and replace the text in the textbox under '''SSL Cipher Suites'''(not to be confused with the '''Notes''' textbox) with the following long line of text(All on a single line - no line breaks or spaces):&lt;br /&gt;
TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_RC4_128_MD5,SSL_CK_RC4_128_WITH_MD5,TLS_RSA_WITH_NULL_SHA,TLS_RSA_WITH_NULL_MD5&lt;br /&gt;
* Click '''OK'''&lt;br /&gt;
* Reboot server&lt;br /&gt;
&lt;br /&gt;
===Disable SSLv2 &amp;amp; Strong Cyphers Only &amp;amp; Strong Protocols Only===&lt;br /&gt;
If you are on a shared server, please open a support ticket and attach the PCI scan report.&lt;br /&gt;
&lt;br /&gt;
For VPS's:  This generally applies to a Windows based server.  If you see one of these items on your PCI scan report, download this zip [http://hostek.com/wikifiles/disablessl2-strongcyphersonly-strongprotocolsonly.zip] and extract the appropriate .reg file and put that on your VPS and double click it to make the appropriate registry change to fix the issue.  Generally if one of these show on your report, we suggest running all three .reg files to fully take care of the issue at one time.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  You will need to reboot the server for these changes to take affect.&lt;br /&gt;
&lt;br /&gt;
====VPS-Windows 2008 Servers====&lt;br /&gt;
This free tool can be used to determine if vulnerable or weak protocols or cypers are enabled, and provides the option to disable them.&lt;br /&gt;
&lt;br /&gt;
https://www.nartac.com/Products/IISCrypto/Default.aspx&lt;br /&gt;
&lt;br /&gt;
Changes using this tool require a server reboot to complete them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Websites that allow testing for SSL Protocols and Cyphers:&lt;br /&gt;
&lt;br /&gt;
https://www.ssllabs.com/ssltest/index.html&lt;br /&gt;
&lt;br /&gt;
http://www.serversniff.net/sslcheck.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Visa E-commerce Security Checklist Questionaire==&lt;br /&gt;
&lt;br /&gt;
Click this link to Visa E-commerce Security Checklist Questionaire [[https://wiki.hostek.com/Visa_E-commerce_Security_Checklist_Questionaire]]&lt;br /&gt;
&lt;br /&gt;
==Cloud Assessment Questions==&lt;br /&gt;
 Q: Is your organization insured by a 3rd party for losses?&lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do your organization's service level agreements provide tenant renumeration for losses they may incur due to outages or losses experienced within your infrastructure?&lt;br /&gt;
 A: The Hostek.com SLA provides for a refund or credit limited to the dollar amount paid for the service during that monthly period.  The refund or credit amount is calculated based on amount paid for the monthly service / number of minutes in a month * number of down minutes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you collect capacity and utilization data for all relevant components of your cloud service offering?&lt;br /&gt;
 A: Yes.  Daily.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with capacity planning and utilization reports?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you have a documented procedure for responding to requests for tenant data from governments or third parties? &lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do you process, transmit or store any credit card related information on behalf Cisco?&lt;br /&gt;
 A: In our St. Louis facility, we do not use Cisco.  In our Dallas facility, we do.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation on policies and procedures for controls you have in place to protect tenant's intellectual property and sensitive data from unauthorized access.&lt;br /&gt;
 A: Utilization of IPS and IDS.  Customer has ability to lock down server access.  Internal access information is stored encrypted and only available via internal access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation and policies you have regarding how you may access, mine, utilize tenant data and/or metadata.&lt;br /&gt;
 A: We do not mine nor utilize tenant data.  Access to tenant data would occur if tenant asked for help in resolving a situation which may require such access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please specify any inspection technologies used for collecting or creating metadata about tenant data usage (search engines, etc.?).&lt;br /&gt;
 A: We do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to opt-out of having their data/metatdata accessed/mined via inspection technologies?&lt;br /&gt;
 A: N/A as we do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: Can you provide the physical location/geography of storage of a tenant’s data upon request?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to define acceptable geographical locations for data routing or resource instantiation?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to specify which of your geographic locations their data is allowed to traverse into/out of (to address legal jurisdictional considerations based on where data is stored vs. accessed?) &lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: What capability do you have to use system geographic location as an authentication factor?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 Q: Does legal counsel review all third party agreements?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you select and monitor outsourced providers in compliance with laws in the country where the data orignates, processed, stored and transmitted?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 Q: Have you established an Information Security Management Program (ISMP?)&lt;br /&gt;
 A: Our ISMP is being developed.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with a right to audit (tenant audit)?&lt;br /&gt;
 A: No, for security/confidential purposes.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to request deletion/removal of data as needed?&lt;br /&gt;
 Q: Provide the standards used for secure deletion of archived data upon request by tenants.&lt;br /&gt;
 Q: What is the process to sanitize all computing resource of tenant data once a customer has exited your environment.&lt;br /&gt;
 Q: What is time period that you retain customer data after explicit user deletion/removal?&lt;br /&gt;
 A: When a cloud tenant cancels, their virtual machine and backup data is deleted.  Data blocks are reused for new customers, which replace the old blocks.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you manage separate production and non production environments &amp;amp; what controls do you have in place to ensure that the production data in not copied to non-production environments?&lt;br /&gt;
 A: No.  We have a redundant production environment, which is replicated nightly from the primary environment.&lt;br /&gt;
&lt;br /&gt;
 Q: Are backups and archives of data using unique encryption keys for each tenant?&lt;br /&gt;
 A: Each tenant has their own uniquely retained archive.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the duration for keeping backed up data? And can you provide information about your backup rotations and rotation of your backup media?&lt;br /&gt;
 A: The backup duration depends on the plan selected.  By default this will range from 5-10 days.  The backups are full backups with a nightly differential, providing for a full 5-10 day restoration period.&lt;br /&gt;
&lt;br /&gt;
===Identity and Access Control===&lt;br /&gt;
&lt;br /&gt;
===Physical Security and Disaster Recovery===&lt;br /&gt;
&lt;br /&gt;
 Q: Do you require strong (multifactor) authentication options (card keys+PIN, biometric readers, etc.) for access to your physical facilities?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Are any of your datacenters located in places which have a high probability/occurrence of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes, etc.)?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you use 24X7 camera monitoring in all the access points of your datacenter and key locations within the datacenter? &lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you maintain liaisons and points of contact with local authorities in accordance with contracts and appropriate regulations?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Infrastructure]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2558</id>
		<title>PCI Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2558"/>
				<updated>2015-06-09T17:48:59Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Internet Explorer */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
== Obtaining PCI Compliance ==&lt;br /&gt;
&lt;br /&gt;
You need PCI Compliance if your website/business: '''accepts, transmits or stores any cardholder data.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''If that is you:''' &lt;br /&gt;
&lt;br /&gt;
Find a Quality Security Accessor such as [https://www.securitymetrics.com SecurityMetrics] or [https://trustwave.com/ TrustWave], there are many such vendors. They will help you determine the type of compliance required for your business and provide the services to achieve and maintain compliance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How do I know what level / validation type?''' &lt;br /&gt;
&lt;br /&gt;
The Quality Security Accessor will help you determine this and based on PCI DSS Standards.&lt;br /&gt;
&lt;br /&gt;
*The level of &amp;quot;compliance&amp;quot; required (1-4) is based on transaction or monetary volume.&lt;br /&gt;
*The &amp;quot;Validation Type&amp;quot; determines the assessment requirements and is based on how much card data you store.&lt;br /&gt;
&lt;br /&gt;
A copy of the PCI DSS is available [https://www.pcisecuritystandards.org/security_standards/index.php here].&lt;br /&gt;
More general unofficial details can be found at [http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard here].&lt;br /&gt;
&lt;br /&gt;
=== How Hostek complements efforts for PCI compliance ===&lt;br /&gt;
&lt;br /&gt;
#Insuring PCI standards can be met and kept for our own systems.&lt;br /&gt;
#Providing firewall protection for all servers and the option for PCI compliant firewall rules to be applied to customers environment. &lt;br /&gt;
#Providing VPN for customers to securely connect and manage environment remotely.&lt;br /&gt;
#Providing VLAN (virtual private network) for customers environment with multiple servers so their database server is completely isolated from public access.&lt;br /&gt;
#Including or offering Anti-Virus scanning on VPS and/or Shared Hosting servers.&lt;br /&gt;
#Protecting physical access to network and servers. Data centers are managed &amp;amp; monitored 24x7 by security cameras and on-site staff. &lt;br /&gt;
&lt;br /&gt;
== Hostek.com ==&lt;br /&gt;
&lt;br /&gt;
PCI compliance requires quarterly scans from a PCI compliance vendor.  Hostek.com goes above and beyond this requirement by having regular scans from two different PCI compliance vendors.  One vendor's scans are done quarterly.  The other's scans are done nightly.  This ensures that all potential PCI compliance issues are accurately identified and dealt with promptly.&lt;br /&gt;
&lt;br /&gt;
===Hostek.com PCI Compliance Report===&lt;br /&gt;
Hostek.com PCI DSS Compliance report: [[Media:Hostek-PCI-Compliance-040115.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==Datacenter==&lt;br /&gt;
The St. Louis, MO data center where the hostek.com equipment is housed maintains SOC 2 Certification.  This replaced the SSAE16 Certification.&lt;br /&gt;
&lt;br /&gt;
Certification: [[File:2014CyberconSoc2Cert.pdf]]&lt;br /&gt;
&lt;br /&gt;
Audit: [[File:2014CyberconSoc2Audit.pdf]]&lt;br /&gt;
&lt;br /&gt;
===Previous Certifications===&lt;br /&gt;
2011-12 - SSAE 16 Certification ([http://hostek.com/forms/SSAE-16_Letter_of_Cert.pdf audit report]).  This replaced the SAS 70 Type 2 Certification.&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 1: [[File:SOC2-2013_CYBERCON_Full_Report_PART-1.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 2: [[File:SOC2-2013_CYBERCON_Full_Report_PART-2.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Shared Servers==&lt;br /&gt;
&lt;br /&gt;
We support PCI compliance on our shared hosting servers.  If your PCI scan shows any issues that are not directly related to your web application, you can attach the report in a support ticket so that we can address any issues.&lt;br /&gt;
&lt;br /&gt;
===TLS 1.0===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable floatright&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 8.1  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 10 / Win Phone 8.0&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 11 / Win Phone 8.1 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Java 6u45  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 7u25&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 8u31 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 0.9.8y&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.1l  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.2  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 5.1.9 / OS X 10.6.8&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6 / iOS 6.0.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6.0.4 / OS X 10.8.4 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / iOS 7.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / OS X 10.9   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / iOS 8.1.2   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / OS X 10.10   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Yahoo Slurp Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| YandexBot Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;float: right; margin: 0 0 .5em .5em&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| Android 2.3.7&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.0.4&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.1.1&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.2.2&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.3&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.4.2&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Android 5.0.0&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Baidu Jan 2015&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| BingPreview Jan 2015&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Chrome 42 / OS X&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 31.3.0 ESR / Win 7 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 37 / OS X  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Googlebot Feb 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE 6 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 7 / Vista&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8-10 / Win 7 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 7   &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
We are disabling support for TLS 1.0 on our Shared Windows Servers.&lt;br /&gt;
&lt;br /&gt;
*This is now required for PCI DSS compliance.&lt;br /&gt;
*This is to ensure that any connection over HTTPS is secured against &amp;quot;eavesdropping&amp;quot; from Man-In-The-Middle(MITM) attacks.&lt;br /&gt;
*The majority of users will not notice this change because this will only affect outdated browsers and old mobile devices.&lt;br /&gt;
====Internet Explorer====&lt;br /&gt;
#After disabling this protocol '''Internet Explorer 11'''(only supported on '''Windows 7 and up''') will be the only version of Internet Explorer that can view HTTPS pages on the shared Windows servers.&lt;br /&gt;
#Users with '''Windows XP''' and '''Windows Vista''' will have an unsupported version of Internet Explorer.  In order to view HTTTPS pages these users will need to use an alternate browser (Example: Google Chrome, Mozilla FireFox, Safari, etc.).&lt;br /&gt;
&lt;br /&gt;
====Support/Unsupported Browsers/OS's====&lt;br /&gt;
*See table on the right&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear: both;&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Common PCI Compliance Resolutions==&lt;br /&gt;
&lt;br /&gt;
===SSL/TLS Protocol Initialization Vector Implementation Information Disclosure===&lt;br /&gt;
&lt;br /&gt;
aka: BEAST (Browser Exploit Against SSL/TLS) Vulnerability&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  If you are on a '''shared server''' or a '''managed VPS''', please submit a support ticket [http://support.hostek.com] and attach/include your PCI scan report.  The information below is for our non managed VPS customers.&lt;br /&gt;
&lt;br /&gt;
* Place the following text in a file named '''TLS.reg''' and execute the file.  It will add registry values to enable TLS 1.1 and TLS 1.2 support:&lt;br /&gt;
 Windows Registry Editor Version 5.00&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
&lt;br /&gt;
* After completing the above step, go to '''Start''' -&amp;gt; '''Run''' -&amp;gt; (type '''gpedit.msc''') -&amp;gt; (click '''OK''')&lt;br /&gt;
* Navigate to '''Computer Configuration''' -&amp;gt; '''Administrative Template''' -&amp;gt; '''Network''' -&amp;gt; '''SSL Configuration Settings'''&lt;br /&gt;
* Right click on '''SSL Cipher Suite Order''' and choose '''Edit''' (Windows 2008 R2) or '''Properties''' (Windows 2008)&lt;br /&gt;
* Select '''Enabled''' and replace the text in the textbox under '''SSL Cipher Suites'''(not to be confused with the '''Notes''' textbox) with the following long line of text(All on a single line - no line breaks or spaces):&lt;br /&gt;
TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_RC4_128_MD5,SSL_CK_RC4_128_WITH_MD5,TLS_RSA_WITH_NULL_SHA,TLS_RSA_WITH_NULL_MD5&lt;br /&gt;
* Click '''OK'''&lt;br /&gt;
* Reboot server&lt;br /&gt;
&lt;br /&gt;
===Disable SSLv2 &amp;amp; Strong Cyphers Only &amp;amp; Strong Protocols Only===&lt;br /&gt;
If you are on a shared server, please open a support ticket and attach the PCI scan report.&lt;br /&gt;
&lt;br /&gt;
For VPS's:  This generally applies to a Windows based server.  If you see one of these items on your PCI scan report, download this zip [http://hostek.com/wikifiles/disablessl2-strongcyphersonly-strongprotocolsonly.zip] and extract the appropriate .reg file and put that on your VPS and double click it to make the appropriate registry change to fix the issue.  Generally if one of these show on your report, we suggest running all three .reg files to fully take care of the issue at one time.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  You will need to reboot the server for these changes to take affect.&lt;br /&gt;
&lt;br /&gt;
====VPS-Windows 2008 Servers====&lt;br /&gt;
This free tool can be used to determine if vulnerable or weak protocols or cypers are enabled, and provides the option to disable them.&lt;br /&gt;
&lt;br /&gt;
https://www.nartac.com/Products/IISCrypto/Default.aspx&lt;br /&gt;
&lt;br /&gt;
Changes using this tool require a server reboot to complete them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Websites that allow testing for SSL Protocols and Cyphers:&lt;br /&gt;
&lt;br /&gt;
https://www.ssllabs.com/ssltest/index.html&lt;br /&gt;
&lt;br /&gt;
http://www.serversniff.net/sslcheck.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Visa E-commerce Security Checklist Questionaire==&lt;br /&gt;
&lt;br /&gt;
Click this link to Visa E-commerce Security Checklist Questionaire [[https://wiki.hostek.com/Visa_E-commerce_Security_Checklist_Questionaire]]&lt;br /&gt;
&lt;br /&gt;
==Cloud Assessment Questions==&lt;br /&gt;
 Q: Is your organization insured by a 3rd party for losses?&lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do your organization's service level agreements provide tenant renumeration for losses they may incur due to outages or losses experienced within your infrastructure?&lt;br /&gt;
 A: The Hostek.com SLA provides for a refund or credit limited to the dollar amount paid for the service during that monthly period.  The refund or credit amount is calculated based on amount paid for the monthly service / number of minutes in a month * number of down minutes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you collect capacity and utilization data for all relevant components of your cloud service offering?&lt;br /&gt;
 A: Yes.  Daily.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with capacity planning and utilization reports?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you have a documented procedure for responding to requests for tenant data from governments or third parties? &lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do you process, transmit or store any credit card related information on behalf Cisco?&lt;br /&gt;
 A: In our St. Louis facility, we do not use Cisco.  In our Dallas facility, we do.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation on policies and procedures for controls you have in place to protect tenant's intellectual property and sensitive data from unauthorized access.&lt;br /&gt;
 A: Utilization of IPS and IDS.  Customer has ability to lock down server access.  Internal access information is stored encrypted and only available via internal access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation and policies you have regarding how you may access, mine, utilize tenant data and/or metadata.&lt;br /&gt;
 A: We do not mine nor utilize tenant data.  Access to tenant data would occur if tenant asked for help in resolving a situation which may require such access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please specify any inspection technologies used for collecting or creating metadata about tenant data usage (search engines, etc.?).&lt;br /&gt;
 A: We do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to opt-out of having their data/metatdata accessed/mined via inspection technologies?&lt;br /&gt;
 A: N/A as we do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: Can you provide the physical location/geography of storage of a tenant’s data upon request?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to define acceptable geographical locations for data routing or resource instantiation?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to specify which of your geographic locations their data is allowed to traverse into/out of (to address legal jurisdictional considerations based on where data is stored vs. accessed?) &lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: What capability do you have to use system geographic location as an authentication factor?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 Q: Does legal counsel review all third party agreements?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you select and monitor outsourced providers in compliance with laws in the country where the data orignates, processed, stored and transmitted?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 Q: Have you established an Information Security Management Program (ISMP?)&lt;br /&gt;
 A: Our ISMP is being developed.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with a right to audit (tenant audit)?&lt;br /&gt;
 A: No, for security/confidential purposes.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to request deletion/removal of data as needed?&lt;br /&gt;
 Q: Provide the standards used for secure deletion of archived data upon request by tenants.&lt;br /&gt;
 Q: What is the process to sanitize all computing resource of tenant data once a customer has exited your environment.&lt;br /&gt;
 Q: What is time period that you retain customer data after explicit user deletion/removal?&lt;br /&gt;
 A: When a cloud tenant cancels, their virtual machine and backup data is deleted.  Data blocks are reused for new customers, which replace the old blocks.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you manage separate production and non production environments &amp;amp; what controls do you have in place to ensure that the production data in not copied to non-production environments?&lt;br /&gt;
 A: No.  We have a redundant production environment, which is replicated nightly from the primary environment.&lt;br /&gt;
&lt;br /&gt;
 Q: Are backups and archives of data using unique encryption keys for each tenant?&lt;br /&gt;
 A: Each tenant has their own uniquely retained archive.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the duration for keeping backed up data? And can you provide information about your backup rotations and rotation of your backup media?&lt;br /&gt;
 A: The backup duration depends on the plan selected.  By default this will range from 5-10 days.  The backups are full backups with a nightly differential, providing for a full 5-10 day restoration period.&lt;br /&gt;
&lt;br /&gt;
===Identity and Access Control===&lt;br /&gt;
&lt;br /&gt;
===Physical Security and Disaster Recovery===&lt;br /&gt;
&lt;br /&gt;
 Q: Do you require strong (multifactor) authentication options (card keys+PIN, biometric readers, etc.) for access to your physical facilities?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Are any of your datacenters located in places which have a high probability/occurrence of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes, etc.)?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you use 24X7 camera monitoring in all the access points of your datacenter and key locations within the datacenter? &lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you maintain liaisons and points of contact with local authorities in accordance with contracts and appropriate regulations?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Infrastructure]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2557</id>
		<title>PCI Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2557"/>
				<updated>2015-06-09T17:43:43Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Support/Unsupported Browsers/OS's */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
== Obtaining PCI Compliance ==&lt;br /&gt;
&lt;br /&gt;
You need PCI Compliance if your website/business: '''accepts, transmits or stores any cardholder data.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''If that is you:''' &lt;br /&gt;
&lt;br /&gt;
Find a Quality Security Accessor such as [https://www.securitymetrics.com SecurityMetrics] or [https://trustwave.com/ TrustWave], there are many such vendors. They will help you determine the type of compliance required for your business and provide the services to achieve and maintain compliance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How do I know what level / validation type?''' &lt;br /&gt;
&lt;br /&gt;
The Quality Security Accessor will help you determine this and based on PCI DSS Standards.&lt;br /&gt;
&lt;br /&gt;
*The level of &amp;quot;compliance&amp;quot; required (1-4) is based on transaction or monetary volume.&lt;br /&gt;
*The &amp;quot;Validation Type&amp;quot; determines the assessment requirements and is based on how much card data you store.&lt;br /&gt;
&lt;br /&gt;
A copy of the PCI DSS is available [https://www.pcisecuritystandards.org/security_standards/index.php here].&lt;br /&gt;
More general unofficial details can be found at [http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard here].&lt;br /&gt;
&lt;br /&gt;
=== How Hostek complements efforts for PCI compliance ===&lt;br /&gt;
&lt;br /&gt;
#Insuring PCI standards can be met and kept for our own systems.&lt;br /&gt;
#Providing firewall protection for all servers and the option for PCI compliant firewall rules to be applied to customers environment. &lt;br /&gt;
#Providing VPN for customers to securely connect and manage environment remotely.&lt;br /&gt;
#Providing VLAN (virtual private network) for customers environment with multiple servers so their database server is completely isolated from public access.&lt;br /&gt;
#Including or offering Anti-Virus scanning on VPS and/or Shared Hosting servers.&lt;br /&gt;
#Protecting physical access to network and servers. Data centers are managed &amp;amp; monitored 24x7 by security cameras and on-site staff. &lt;br /&gt;
&lt;br /&gt;
== Hostek.com ==&lt;br /&gt;
&lt;br /&gt;
PCI compliance requires quarterly scans from a PCI compliance vendor.  Hostek.com goes above and beyond this requirement by having regular scans from two different PCI compliance vendors.  One vendor's scans are done quarterly.  The other's scans are done nightly.  This ensures that all potential PCI compliance issues are accurately identified and dealt with promptly.&lt;br /&gt;
&lt;br /&gt;
===Hostek.com PCI Compliance Report===&lt;br /&gt;
Hostek.com PCI DSS Compliance report: [[Media:Hostek-PCI-Compliance-040115.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==Datacenter==&lt;br /&gt;
The St. Louis, MO data center where the hostek.com equipment is housed maintains SOC 2 Certification.  This replaced the SSAE16 Certification.&lt;br /&gt;
&lt;br /&gt;
Certification: [[File:2014CyberconSoc2Cert.pdf]]&lt;br /&gt;
&lt;br /&gt;
Audit: [[File:2014CyberconSoc2Audit.pdf]]&lt;br /&gt;
&lt;br /&gt;
===Previous Certifications===&lt;br /&gt;
2011-12 - SSAE 16 Certification ([http://hostek.com/forms/SSAE-16_Letter_of_Cert.pdf audit report]).  This replaced the SAS 70 Type 2 Certification.&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 1: [[File:SOC2-2013_CYBERCON_Full_Report_PART-1.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 2: [[File:SOC2-2013_CYBERCON_Full_Report_PART-2.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Shared Servers==&lt;br /&gt;
&lt;br /&gt;
We support PCI compliance on our shared hosting servers.  If your PCI scan shows any issues that are not directly related to your web application, you can attach the report in a support ticket so that we can address any issues.&lt;br /&gt;
&lt;br /&gt;
===TLS 1.0===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable floatright&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 8.1  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 10 / Win Phone 8.0&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 11 / Win Phone 8.1 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Java 6u45  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 7u25&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 8u31 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 0.9.8y&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.1l  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.2  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 5.1.9 / OS X 10.6.8&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6 / iOS 6.0.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6.0.4 / OS X 10.8.4 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / iOS 7.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / OS X 10.9   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / iOS 8.1.2   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / OS X 10.10   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Yahoo Slurp Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| YandexBot Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;float: right; margin: 0 0 .5em .5em&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| Android 2.3.7&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.0.4&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.1.1&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.2.2&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.3&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.4.2&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Android 5.0.0&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Baidu Jan 2015&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| BingPreview Jan 2015&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Chrome 42 / OS X&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 31.3.0 ESR / Win 7 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 37 / OS X  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Googlebot Feb 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE 6 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 7 / Vista&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8-10 / Win 7 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 7   &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
We are disabling support for TLS 1.0 on our Shared Windows Servers.&lt;br /&gt;
&lt;br /&gt;
*This is now required for PCI DSS compliance.&lt;br /&gt;
*This is to ensure that any connection over HTTPS is secured against &amp;quot;eavesdropping&amp;quot; from Man-In-The-Middle(MITM) attacks.&lt;br /&gt;
*The majority of users will not notice this change because this will only affect outdated browsers and old mobile devices.&lt;br /&gt;
====Internet Explorer====&lt;br /&gt;
#After disabling this Protocol '''Internet Explorer v.11''' [which is only supported on '''Windows 7 and up'''] will be the only version of IE that can view HTTPS Pages on the Shared Windows Servers.&lt;br /&gt;
#Users with '''Windows XP''' and '''Windows Vista''' will have an unsupported version of Internet Explorer, so in order to view HTTTPS Pages they will need to use an alternate browser (i.e. Google Chrome, Mozilla FireFox, Safari, etc.).&lt;br /&gt;
====Support/Unsupported Browsers/OS's====&lt;br /&gt;
*See table on the right&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear: both;&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Common PCI Compliance Resolutions==&lt;br /&gt;
&lt;br /&gt;
===SSL/TLS Protocol Initialization Vector Implementation Information Disclosure===&lt;br /&gt;
&lt;br /&gt;
aka: BEAST (Browser Exploit Against SSL/TLS) Vulnerability&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  If you are on a '''shared server''' or a '''managed VPS''', please submit a support ticket [http://support.hostek.com] and attach/include your PCI scan report.  The information below is for our non managed VPS customers.&lt;br /&gt;
&lt;br /&gt;
* Place the following text in a file named '''TLS.reg''' and execute the file.  It will add registry values to enable TLS 1.1 and TLS 1.2 support:&lt;br /&gt;
 Windows Registry Editor Version 5.00&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
&lt;br /&gt;
* After completing the above step, go to '''Start''' -&amp;gt; '''Run''' -&amp;gt; (type '''gpedit.msc''') -&amp;gt; (click '''OK''')&lt;br /&gt;
* Navigate to '''Computer Configuration''' -&amp;gt; '''Administrative Template''' -&amp;gt; '''Network''' -&amp;gt; '''SSL Configuration Settings'''&lt;br /&gt;
* Right click on '''SSL Cipher Suite Order''' and choose '''Edit''' (Windows 2008 R2) or '''Properties''' (Windows 2008)&lt;br /&gt;
* Select '''Enabled''' and replace the text in the textbox under '''SSL Cipher Suites'''(not to be confused with the '''Notes''' textbox) with the following long line of text(All on a single line - no line breaks or spaces):&lt;br /&gt;
TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_RC4_128_MD5,SSL_CK_RC4_128_WITH_MD5,TLS_RSA_WITH_NULL_SHA,TLS_RSA_WITH_NULL_MD5&lt;br /&gt;
* Click '''OK'''&lt;br /&gt;
* Reboot server&lt;br /&gt;
&lt;br /&gt;
===Disable SSLv2 &amp;amp; Strong Cyphers Only &amp;amp; Strong Protocols Only===&lt;br /&gt;
If you are on a shared server, please open a support ticket and attach the PCI scan report.&lt;br /&gt;
&lt;br /&gt;
For VPS's:  This generally applies to a Windows based server.  If you see one of these items on your PCI scan report, download this zip [http://hostek.com/wikifiles/disablessl2-strongcyphersonly-strongprotocolsonly.zip] and extract the appropriate .reg file and put that on your VPS and double click it to make the appropriate registry change to fix the issue.  Generally if one of these show on your report, we suggest running all three .reg files to fully take care of the issue at one time.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  You will need to reboot the server for these changes to take affect.&lt;br /&gt;
&lt;br /&gt;
====VPS-Windows 2008 Servers====&lt;br /&gt;
This free tool can be used to determine if vulnerable or weak protocols or cypers are enabled, and provides the option to disable them.&lt;br /&gt;
&lt;br /&gt;
https://www.nartac.com/Products/IISCrypto/Default.aspx&lt;br /&gt;
&lt;br /&gt;
Changes using this tool require a server reboot to complete them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Websites that allow testing for SSL Protocols and Cyphers:&lt;br /&gt;
&lt;br /&gt;
https://www.ssllabs.com/ssltest/index.html&lt;br /&gt;
&lt;br /&gt;
http://www.serversniff.net/sslcheck.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Visa E-commerce Security Checklist Questionaire==&lt;br /&gt;
&lt;br /&gt;
Click this link to Visa E-commerce Security Checklist Questionaire [[https://wiki.hostek.com/Visa_E-commerce_Security_Checklist_Questionaire]]&lt;br /&gt;
&lt;br /&gt;
==Cloud Assessment Questions==&lt;br /&gt;
 Q: Is your organization insured by a 3rd party for losses?&lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do your organization's service level agreements provide tenant renumeration for losses they may incur due to outages or losses experienced within your infrastructure?&lt;br /&gt;
 A: The Hostek.com SLA provides for a refund or credit limited to the dollar amount paid for the service during that monthly period.  The refund or credit amount is calculated based on amount paid for the monthly service / number of minutes in a month * number of down minutes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you collect capacity and utilization data for all relevant components of your cloud service offering?&lt;br /&gt;
 A: Yes.  Daily.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with capacity planning and utilization reports?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you have a documented procedure for responding to requests for tenant data from governments or third parties? &lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do you process, transmit or store any credit card related information on behalf Cisco?&lt;br /&gt;
 A: In our St. Louis facility, we do not use Cisco.  In our Dallas facility, we do.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation on policies and procedures for controls you have in place to protect tenant's intellectual property and sensitive data from unauthorized access.&lt;br /&gt;
 A: Utilization of IPS and IDS.  Customer has ability to lock down server access.  Internal access information is stored encrypted and only available via internal access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation and policies you have regarding how you may access, mine, utilize tenant data and/or metadata.&lt;br /&gt;
 A: We do not mine nor utilize tenant data.  Access to tenant data would occur if tenant asked for help in resolving a situation which may require such access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please specify any inspection technologies used for collecting or creating metadata about tenant data usage (search engines, etc.?).&lt;br /&gt;
 A: We do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to opt-out of having their data/metatdata accessed/mined via inspection technologies?&lt;br /&gt;
 A: N/A as we do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: Can you provide the physical location/geography of storage of a tenant’s data upon request?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to define acceptable geographical locations for data routing or resource instantiation?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to specify which of your geographic locations their data is allowed to traverse into/out of (to address legal jurisdictional considerations based on where data is stored vs. accessed?) &lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: What capability do you have to use system geographic location as an authentication factor?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 Q: Does legal counsel review all third party agreements?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you select and monitor outsourced providers in compliance with laws in the country where the data orignates, processed, stored and transmitted?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 Q: Have you established an Information Security Management Program (ISMP?)&lt;br /&gt;
 A: Our ISMP is being developed.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with a right to audit (tenant audit)?&lt;br /&gt;
 A: No, for security/confidential purposes.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to request deletion/removal of data as needed?&lt;br /&gt;
 Q: Provide the standards used for secure deletion of archived data upon request by tenants.&lt;br /&gt;
 Q: What is the process to sanitize all computing resource of tenant data once a customer has exited your environment.&lt;br /&gt;
 Q: What is time period that you retain customer data after explicit user deletion/removal?&lt;br /&gt;
 A: When a cloud tenant cancels, their virtual machine and backup data is deleted.  Data blocks are reused for new customers, which replace the old blocks.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you manage separate production and non production environments &amp;amp; what controls do you have in place to ensure that the production data in not copied to non-production environments?&lt;br /&gt;
 A: No.  We have a redundant production environment, which is replicated nightly from the primary environment.&lt;br /&gt;
&lt;br /&gt;
 Q: Are backups and archives of data using unique encryption keys for each tenant?&lt;br /&gt;
 A: Each tenant has their own uniquely retained archive.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the duration for keeping backed up data? And can you provide information about your backup rotations and rotation of your backup media?&lt;br /&gt;
 A: The backup duration depends on the plan selected.  By default this will range from 5-10 days.  The backups are full backups with a nightly differential, providing for a full 5-10 day restoration period.&lt;br /&gt;
&lt;br /&gt;
===Identity and Access Control===&lt;br /&gt;
&lt;br /&gt;
===Physical Security and Disaster Recovery===&lt;br /&gt;
&lt;br /&gt;
 Q: Do you require strong (multifactor) authentication options (card keys+PIN, biometric readers, etc.) for access to your physical facilities?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Are any of your datacenters located in places which have a high probability/occurrence of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes, etc.)?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you use 24X7 camera monitoring in all the access points of your datacenter and key locations within the datacenter? &lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you maintain liaisons and points of contact with local authorities in accordance with contracts and appropriate regulations?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Infrastructure]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2556</id>
		<title>PCI Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2556"/>
				<updated>2015-06-09T17:41:08Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
== Obtaining PCI Compliance ==&lt;br /&gt;
&lt;br /&gt;
You need PCI Compliance if your website/business: '''accepts, transmits or stores any cardholder data.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''If that is you:''' &lt;br /&gt;
&lt;br /&gt;
Find a Quality Security Accessor such as [https://www.securitymetrics.com SecurityMetrics] or [https://trustwave.com/ TrustWave], there are many such vendors. They will help you determine the type of compliance required for your business and provide the services to achieve and maintain compliance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How do I know what level / validation type?''' &lt;br /&gt;
&lt;br /&gt;
The Quality Security Accessor will help you determine this and based on PCI DSS Standards.&lt;br /&gt;
&lt;br /&gt;
*The level of &amp;quot;compliance&amp;quot; required (1-4) is based on transaction or monetary volume.&lt;br /&gt;
*The &amp;quot;Validation Type&amp;quot; determines the assessment requirements and is based on how much card data you store.&lt;br /&gt;
&lt;br /&gt;
A copy of the PCI DSS is available [https://www.pcisecuritystandards.org/security_standards/index.php here].&lt;br /&gt;
More general unofficial details can be found at [http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard here].&lt;br /&gt;
&lt;br /&gt;
=== How Hostek complements efforts for PCI compliance ===&lt;br /&gt;
&lt;br /&gt;
#Insuring PCI standards can be met and kept for our own systems.&lt;br /&gt;
#Providing firewall protection for all servers and the option for PCI compliant firewall rules to be applied to customers environment. &lt;br /&gt;
#Providing VPN for customers to securely connect and manage environment remotely.&lt;br /&gt;
#Providing VLAN (virtual private network) for customers environment with multiple servers so their database server is completely isolated from public access.&lt;br /&gt;
#Including or offering Anti-Virus scanning on VPS and/or Shared Hosting servers.&lt;br /&gt;
#Protecting physical access to network and servers. Data centers are managed &amp;amp; monitored 24x7 by security cameras and on-site staff. &lt;br /&gt;
&lt;br /&gt;
== Hostek.com ==&lt;br /&gt;
&lt;br /&gt;
PCI compliance requires quarterly scans from a PCI compliance vendor.  Hostek.com goes above and beyond this requirement by having regular scans from two different PCI compliance vendors.  One vendor's scans are done quarterly.  The other's scans are done nightly.  This ensures that all potential PCI compliance issues are accurately identified and dealt with promptly.&lt;br /&gt;
&lt;br /&gt;
===Hostek.com PCI Compliance Report===&lt;br /&gt;
Hostek.com PCI DSS Compliance report: [[Media:Hostek-PCI-Compliance-040115.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==Datacenter==&lt;br /&gt;
The St. Louis, MO data center where the hostek.com equipment is housed maintains SOC 2 Certification.  This replaced the SSAE16 Certification.&lt;br /&gt;
&lt;br /&gt;
Certification: [[File:2014CyberconSoc2Cert.pdf]]&lt;br /&gt;
&lt;br /&gt;
Audit: [[File:2014CyberconSoc2Audit.pdf]]&lt;br /&gt;
&lt;br /&gt;
===Previous Certifications===&lt;br /&gt;
2011-12 - SSAE 16 Certification ([http://hostek.com/forms/SSAE-16_Letter_of_Cert.pdf audit report]).  This replaced the SAS 70 Type 2 Certification.&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 1: [[File:SOC2-2013_CYBERCON_Full_Report_PART-1.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 2: [[File:SOC2-2013_CYBERCON_Full_Report_PART-2.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Shared Servers==&lt;br /&gt;
&lt;br /&gt;
We support PCI compliance on our shared hosting servers.  If your PCI scan shows any issues that are not directly related to your web application, you can attach the report in a support ticket so that we can address any issues.&lt;br /&gt;
&lt;br /&gt;
===TLS 1.0===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable floatright&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 8.1  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 10 / Win Phone 8.0&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 11 / Win Phone 8.1 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Java 6u45  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 7u25&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 8u31 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 0.9.8y&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.1l  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.2  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 5.1.9 / OS X 10.6.8&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6 / iOS 6.0.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6.0.4 / OS X 10.8.4 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / iOS 7.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / OS X 10.9   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / iOS 8.1.2   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / OS X 10.10   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Yahoo Slurp Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| YandexBot Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;float: right; margin: 0 0 .5em .5em&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| Android 2.3.7&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.0.4&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.1.1&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.2.2&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.3&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.4.2&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Android 5.0.0&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Baidu Jan 2015&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| BingPreview Jan 2015&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Chrome 42 / OS X&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 31.3.0 ESR / Win 7 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 37 / OS X  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Googlebot Feb 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE 6 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 7 / Vista&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8-10 / Win 7 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 7   &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
We are disabling support for TLS 1.0 on our Shared Windows Servers.&lt;br /&gt;
&lt;br /&gt;
*This is now required for PCI DSS compliance.&lt;br /&gt;
*This is to ensure that any connection over HTTPS is secured against &amp;quot;eavesdropping&amp;quot; from Man-In-The-Middle(MITM) attacks.&lt;br /&gt;
*The majority of users will not notice this change because this will only affect outdated browsers and old mobile devices.&lt;br /&gt;
====Internet Explorer====&lt;br /&gt;
#After disabling this Protocol '''Internet Explorer v.11''' [which is only supported on '''Windows 7 and up'''] will be the only version of IE that can view HTTPS Pages on the Shared Windows Servers.&lt;br /&gt;
#Users with '''Windows XP''' and '''Windows Vista''' will have an unsupported version of Internet Explorer, so in order to view HTTTPS Pages they will need to use an alternate browser (i.e. Google Chrome, Mozilla FireFox, Safari, etc.).&lt;br /&gt;
====Support/Unsupported Browsers/OS's====&lt;br /&gt;
*See table on the right&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Common PCI Compliance Resolutions==&lt;br /&gt;
&lt;br /&gt;
===SSL/TLS Protocol Initialization Vector Implementation Information Disclosure===&lt;br /&gt;
&lt;br /&gt;
aka: BEAST (Browser Exploit Against SSL/TLS) Vulnerability&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  If you are on a '''shared server''' or a '''managed VPS''', please submit a support ticket [http://support.hostek.com] and attach/include your PCI scan report.  The information below is for our non managed VPS customers.&lt;br /&gt;
&lt;br /&gt;
* Place the following text in a file named '''TLS.reg''' and execute the file.  It will add registry values to enable TLS 1.1 and TLS 1.2 support:&lt;br /&gt;
 Windows Registry Editor Version 5.00&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
&lt;br /&gt;
* After completing the above step, go to '''Start''' -&amp;gt; '''Run''' -&amp;gt; (type '''gpedit.msc''') -&amp;gt; (click '''OK''')&lt;br /&gt;
* Navigate to '''Computer Configuration''' -&amp;gt; '''Administrative Template''' -&amp;gt; '''Network''' -&amp;gt; '''SSL Configuration Settings'''&lt;br /&gt;
* Right click on '''SSL Cipher Suite Order''' and choose '''Edit''' (Windows 2008 R2) or '''Properties''' (Windows 2008)&lt;br /&gt;
* Select '''Enabled''' and replace the text in the textbox under '''SSL Cipher Suites'''(not to be confused with the '''Notes''' textbox) with the following long line of text(All on a single line - no line breaks or spaces):&lt;br /&gt;
TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_RC4_128_MD5,SSL_CK_RC4_128_WITH_MD5,TLS_RSA_WITH_NULL_SHA,TLS_RSA_WITH_NULL_MD5&lt;br /&gt;
* Click '''OK'''&lt;br /&gt;
* Reboot server&lt;br /&gt;
&lt;br /&gt;
===Disable SSLv2 &amp;amp; Strong Cyphers Only &amp;amp; Strong Protocols Only===&lt;br /&gt;
If you are on a shared server, please open a support ticket and attach the PCI scan report.&lt;br /&gt;
&lt;br /&gt;
For VPS's:  This generally applies to a Windows based server.  If you see one of these items on your PCI scan report, download this zip [http://hostek.com/wikifiles/disablessl2-strongcyphersonly-strongprotocolsonly.zip] and extract the appropriate .reg file and put that on your VPS and double click it to make the appropriate registry change to fix the issue.  Generally if one of these show on your report, we suggest running all three .reg files to fully take care of the issue at one time.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  You will need to reboot the server for these changes to take affect.&lt;br /&gt;
&lt;br /&gt;
====VPS-Windows 2008 Servers====&lt;br /&gt;
This free tool can be used to determine if vulnerable or weak protocols or cypers are enabled, and provides the option to disable them.&lt;br /&gt;
&lt;br /&gt;
https://www.nartac.com/Products/IISCrypto/Default.aspx&lt;br /&gt;
&lt;br /&gt;
Changes using this tool require a server reboot to complete them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Websites that allow testing for SSL Protocols and Cyphers:&lt;br /&gt;
&lt;br /&gt;
https://www.ssllabs.com/ssltest/index.html&lt;br /&gt;
&lt;br /&gt;
http://www.serversniff.net/sslcheck.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Visa E-commerce Security Checklist Questionaire==&lt;br /&gt;
&lt;br /&gt;
Click this link to Visa E-commerce Security Checklist Questionaire [[https://wiki.hostek.com/Visa_E-commerce_Security_Checklist_Questionaire]]&lt;br /&gt;
&lt;br /&gt;
==Cloud Assessment Questions==&lt;br /&gt;
 Q: Is your organization insured by a 3rd party for losses?&lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do your organization's service level agreements provide tenant renumeration for losses they may incur due to outages or losses experienced within your infrastructure?&lt;br /&gt;
 A: The Hostek.com SLA provides for a refund or credit limited to the dollar amount paid for the service during that monthly period.  The refund or credit amount is calculated based on amount paid for the monthly service / number of minutes in a month * number of down minutes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you collect capacity and utilization data for all relevant components of your cloud service offering?&lt;br /&gt;
 A: Yes.  Daily.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with capacity planning and utilization reports?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you have a documented procedure for responding to requests for tenant data from governments or third parties? &lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do you process, transmit or store any credit card related information on behalf Cisco?&lt;br /&gt;
 A: In our St. Louis facility, we do not use Cisco.  In our Dallas facility, we do.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation on policies and procedures for controls you have in place to protect tenant's intellectual property and sensitive data from unauthorized access.&lt;br /&gt;
 A: Utilization of IPS and IDS.  Customer has ability to lock down server access.  Internal access information is stored encrypted and only available via internal access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation and policies you have regarding how you may access, mine, utilize tenant data and/or metadata.&lt;br /&gt;
 A: We do not mine nor utilize tenant data.  Access to tenant data would occur if tenant asked for help in resolving a situation which may require such access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please specify any inspection technologies used for collecting or creating metadata about tenant data usage (search engines, etc.?).&lt;br /&gt;
 A: We do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to opt-out of having their data/metatdata accessed/mined via inspection technologies?&lt;br /&gt;
 A: N/A as we do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: Can you provide the physical location/geography of storage of a tenant’s data upon request?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to define acceptable geographical locations for data routing or resource instantiation?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to specify which of your geographic locations their data is allowed to traverse into/out of (to address legal jurisdictional considerations based on where data is stored vs. accessed?) &lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: What capability do you have to use system geographic location as an authentication factor?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 Q: Does legal counsel review all third party agreements?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you select and monitor outsourced providers in compliance with laws in the country where the data orignates, processed, stored and transmitted?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 Q: Have you established an Information Security Management Program (ISMP?)&lt;br /&gt;
 A: Our ISMP is being developed.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with a right to audit (tenant audit)?&lt;br /&gt;
 A: No, for security/confidential purposes.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to request deletion/removal of data as needed?&lt;br /&gt;
 Q: Provide the standards used for secure deletion of archived data upon request by tenants.&lt;br /&gt;
 Q: What is the process to sanitize all computing resource of tenant data once a customer has exited your environment.&lt;br /&gt;
 Q: What is time period that you retain customer data after explicit user deletion/removal?&lt;br /&gt;
 A: When a cloud tenant cancels, their virtual machine and backup data is deleted.  Data blocks are reused for new customers, which replace the old blocks.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you manage separate production and non production environments &amp;amp; what controls do you have in place to ensure that the production data in not copied to non-production environments?&lt;br /&gt;
 A: No.  We have a redundant production environment, which is replicated nightly from the primary environment.&lt;br /&gt;
&lt;br /&gt;
 Q: Are backups and archives of data using unique encryption keys for each tenant?&lt;br /&gt;
 A: Each tenant has their own uniquely retained archive.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the duration for keeping backed up data? And can you provide information about your backup rotations and rotation of your backup media?&lt;br /&gt;
 A: The backup duration depends on the plan selected.  By default this will range from 5-10 days.  The backups are full backups with a nightly differential, providing for a full 5-10 day restoration period.&lt;br /&gt;
&lt;br /&gt;
===Identity and Access Control===&lt;br /&gt;
&lt;br /&gt;
===Physical Security and Disaster Recovery===&lt;br /&gt;
&lt;br /&gt;
 Q: Do you require strong (multifactor) authentication options (card keys+PIN, biometric readers, etc.) for access to your physical facilities?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Are any of your datacenters located in places which have a high probability/occurrence of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes, etc.)?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you use 24X7 camera monitoring in all the access points of your datacenter and key locations within the datacenter? &lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you maintain liaisons and points of contact with local authorities in accordance with contracts and appropriate regulations?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Infrastructure]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2555</id>
		<title>PCI Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2555"/>
				<updated>2015-06-09T17:39:09Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Shared Servers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
== Obtaining PCI Compliance ==&lt;br /&gt;
&lt;br /&gt;
You need PCI Compliance if your website/business: '''accepts, transmits or stores any cardholder data.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''If that is you:''' &lt;br /&gt;
&lt;br /&gt;
Find a Quality Security Accessor such as [https://www.securitymetrics.com SecurityMetrics] or [https://trustwave.com/ TrustWave], there are many such vendors. They will help you determine the type of compliance required for your business and provide the services to achieve and maintain compliance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How do I know what level / validation type?''' &lt;br /&gt;
&lt;br /&gt;
The Quality Security Accessor will help you determine this and based on PCI DSS Standards.&lt;br /&gt;
&lt;br /&gt;
*The level of &amp;quot;compliance&amp;quot; required (1-4) is based on transaction or monetary volume.&lt;br /&gt;
*The &amp;quot;Validation Type&amp;quot; determines the assessment requirements and is based on how much card data you store.&lt;br /&gt;
&lt;br /&gt;
A copy of the PCI DSS is available [https://www.pcisecuritystandards.org/security_standards/index.php here].&lt;br /&gt;
More general unofficial details can be found at [http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard here].&lt;br /&gt;
&lt;br /&gt;
=== How Hostek complements efforts for PCI compliance ===&lt;br /&gt;
&lt;br /&gt;
#Insuring PCI standards can be met and kept for our own systems.&lt;br /&gt;
#Providing firewall protection for all servers and the option for PCI compliant firewall rules to be applied to customers environment. &lt;br /&gt;
#Providing VPN for customers to securely connect and manage environment remotely.&lt;br /&gt;
#Providing VLAN (virtual private network) for customers environment with multiple servers so their database server is completely isolated from public access.&lt;br /&gt;
#Including or offering Anti-Virus scanning on VPS and/or Shared Hosting servers.&lt;br /&gt;
#Protecting physical access to network and servers. Data centers are managed &amp;amp; monitored 24x7 by security cameras and on-site staff. &lt;br /&gt;
&lt;br /&gt;
== Hostek.com ==&lt;br /&gt;
&lt;br /&gt;
PCI compliance requires quarterly scans from a PCI compliance vendor.  Hostek.com goes above and beyond this requirement by having regular scans from two different PCI compliance vendors.  One vendor's scans are done quarterly.  The other's scans are done nightly.  This ensures that all potential PCI compliance issues are accurately identified and dealt with promptly.&lt;br /&gt;
&lt;br /&gt;
===Hostek.com PCI Compliance Report===&lt;br /&gt;
Hostek.com PCI DSS Compliance report: [[Media:Hostek-PCI-Compliance-040115.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==Datacenter==&lt;br /&gt;
The St. Louis, MO data center where the hostek.com equipment is housed maintains SOC 2 Certification.  This replaced the SSAE16 Certification.&lt;br /&gt;
&lt;br /&gt;
Certification: [[File:2014CyberconSoc2Cert.pdf]]&lt;br /&gt;
&lt;br /&gt;
Audit: [[File:2014CyberconSoc2Audit.pdf]]&lt;br /&gt;
&lt;br /&gt;
===Previous Certifications===&lt;br /&gt;
2011-12 - SSAE 16 Certification ([http://hostek.com/forms/SSAE-16_Letter_of_Cert.pdf audit report]).  This replaced the SAS 70 Type 2 Certification.&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 1: [[File:SOC2-2013_CYBERCON_Full_Report_PART-1.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 2: [[File:SOC2-2013_CYBERCON_Full_Report_PART-2.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Shared Servers==&lt;br /&gt;
&lt;br /&gt;
We support PCI compliance on our shared hosting servers.  If your PCI scan shows any issues that are not directly related to your web application, you can attach the report in a support ticket so that we can address any issues.&lt;br /&gt;
&lt;br /&gt;
===TLS 1.0===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable floatright&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 8.1  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 10 / Win Phone 8.0&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE Mobile 11 / Win Phone 8.1 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Java 6u45  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 7u25&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Java 8u31 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 0.9.8y&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.1l  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| OpenSSL 1.0.2  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 5.1.9 / OS X 10.6.8&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6 / iOS 6.0.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 6.0.4 / OS X 10.8.4 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / iOS 7.1   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 7 / OS X 10.9   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / iOS 8.1.2   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Safari 8 / OS X 10.10   &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Yahoo Slurp Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| YandexBot Jan 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;float: right; margin: 0 0 .5em .5em&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | Browser Support w/ TLS 1.0 Disabled&lt;br /&gt;
|-&lt;br /&gt;
| Browser / OS&lt;br /&gt;
| Status&lt;br /&gt;
|-&lt;br /&gt;
| Android 2.3.7&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.0.4&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.1.1&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.2.2&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.3&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| Android 4.4.2&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Android 5.0.0&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Baidu Jan 2015&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| BingPreview Jan 2015&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Chrome 42 / OS X&lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 31.3.0 ESR / Win 7 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Firefox 37 / OS X  &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| Googlebot Feb 2015 &lt;br /&gt;
| Supported&lt;br /&gt;
|-&lt;br /&gt;
| IE 6 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 7 / Vista&lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8 / XP   No FS 1  &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 8-10 / Win 7 &lt;br /&gt;
| Unsupported&lt;br /&gt;
|-&lt;br /&gt;
| IE 11 / Win 7   &lt;br /&gt;
| Supported&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
We are disabling support for TLS 1.0 on our Shared Windows Servers.&lt;br /&gt;
&lt;br /&gt;
*This is now required for PCI DSS compliance.&lt;br /&gt;
*This is to ensure that any connection over HTTPS is secured against &amp;quot;eavesdropping&amp;quot; from Man-In-The-Middle(MITM) attacks.&lt;br /&gt;
*The majority of users will not notice this change because this will only affect outdated browsers and old mobile devices.&lt;br /&gt;
====Internet Explorer====&lt;br /&gt;
#After disabling this Protocol '''Internet Explorer v.11''' [which is only supported on '''Windows 7 and up'''] will be the only version of IE that can view HTTPS Pages on the Shared Windows Servers.&lt;br /&gt;
#Users with '''Windows XP''' and '''Windows Vista''' will have an unsupported version of Internet Explorer, so in order to view HTTTPS Pages they will need to use an alternate browser (i.e. Google Chrome, Mozilla FireFox, Safari, etc.).&lt;br /&gt;
====Support/Unsupported Browsers/OS's====&lt;br /&gt;
*See table on the right&lt;br /&gt;
&lt;br /&gt;
==Common PCI Compliance Resolutions==&lt;br /&gt;
&lt;br /&gt;
===SSL/TLS Protocol Initialization Vector Implementation Information Disclosure===&lt;br /&gt;
&lt;br /&gt;
aka: BEAST (Browser Exploit Against SSL/TLS) Vulnerability&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  If you are on a '''shared server''' or a '''managed VPS''', please submit a support ticket [http://support.hostek.com] and attach/include your PCI scan report.  The information below is for our non managed VPS customers.&lt;br /&gt;
&lt;br /&gt;
* Place the following text in a file named '''TLS.reg''' and execute the file.  It will add registry values to enable TLS 1.1 and TLS 1.2 support:&lt;br /&gt;
 Windows Registry Editor Version 5.00&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
&lt;br /&gt;
* After completing the above step, go to '''Start''' -&amp;gt; '''Run''' -&amp;gt; (type '''gpedit.msc''') -&amp;gt; (click '''OK''')&lt;br /&gt;
* Navigate to '''Computer Configuration''' -&amp;gt; '''Administrative Template''' -&amp;gt; '''Network''' -&amp;gt; '''SSL Configuration Settings'''&lt;br /&gt;
* Right click on '''SSL Cipher Suite Order''' and choose '''Edit''' (Windows 2008 R2) or '''Properties''' (Windows 2008)&lt;br /&gt;
* Select '''Enabled''' and replace the text in the textbox under '''SSL Cipher Suites'''(not to be confused with the '''Notes''' textbox) with the following long line of text(All on a single line - no line breaks or spaces):&lt;br /&gt;
TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_RC4_128_MD5,SSL_CK_RC4_128_WITH_MD5,TLS_RSA_WITH_NULL_SHA,TLS_RSA_WITH_NULL_MD5&lt;br /&gt;
* Click '''OK'''&lt;br /&gt;
* Reboot server&lt;br /&gt;
&lt;br /&gt;
===Disable SSLv2 &amp;amp; Strong Cyphers Only &amp;amp; Strong Protocols Only===&lt;br /&gt;
If you are on a shared server, please open a support ticket and attach the PCI scan report.&lt;br /&gt;
&lt;br /&gt;
For VPS's:  This generally applies to a Windows based server.  If you see one of these items on your PCI scan report, download this zip [http://hostek.com/wikifiles/disablessl2-strongcyphersonly-strongprotocolsonly.zip] and extract the appropriate .reg file and put that on your VPS and double click it to make the appropriate registry change to fix the issue.  Generally if one of these show on your report, we suggest running all three .reg files to fully take care of the issue at one time.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  You will need to reboot the server for these changes to take affect.&lt;br /&gt;
&lt;br /&gt;
====VPS-Windows 2008 Servers====&lt;br /&gt;
This free tool can be used to determine if vulnerable or weak protocols or cypers are enabled, and provides the option to disable them.&lt;br /&gt;
&lt;br /&gt;
https://www.nartac.com/Products/IISCrypto/Default.aspx&lt;br /&gt;
&lt;br /&gt;
Changes using this tool require a server reboot to complete them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Websites that allow testing for SSL Protocols and Cyphers:&lt;br /&gt;
&lt;br /&gt;
https://www.ssllabs.com/ssltest/index.html&lt;br /&gt;
&lt;br /&gt;
http://www.serversniff.net/sslcheck.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Visa E-commerce Security Checklist Questionaire==&lt;br /&gt;
&lt;br /&gt;
Click this link to Visa E-commerce Security Checklist Questionaire [[https://wiki.hostek.com/Visa_E-commerce_Security_Checklist_Questionaire]]&lt;br /&gt;
&lt;br /&gt;
==Cloud Assessment Questions==&lt;br /&gt;
 Q: Is your organization insured by a 3rd party for losses?&lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do your organization's service level agreements provide tenant renumeration for losses they may incur due to outages or losses experienced within your infrastructure?&lt;br /&gt;
 A: The Hostek.com SLA provides for a refund or credit limited to the dollar amount paid for the service during that monthly period.  The refund or credit amount is calculated based on amount paid for the monthly service / number of minutes in a month * number of down minutes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you collect capacity and utilization data for all relevant components of your cloud service offering?&lt;br /&gt;
 A: Yes.  Daily.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with capacity planning and utilization reports?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you have a documented procedure for responding to requests for tenant data from governments or third parties? &lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do you process, transmit or store any credit card related information on behalf Cisco?&lt;br /&gt;
 A: In our St. Louis facility, we do not use Cisco.  In our Dallas facility, we do.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation on policies and procedures for controls you have in place to protect tenant's intellectual property and sensitive data from unauthorized access.&lt;br /&gt;
 A: Utilization of IPS and IDS.  Customer has ability to lock down server access.  Internal access information is stored encrypted and only available via internal access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation and policies you have regarding how you may access, mine, utilize tenant data and/or metadata.&lt;br /&gt;
 A: We do not mine nor utilize tenant data.  Access to tenant data would occur if tenant asked for help in resolving a situation which may require such access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please specify any inspection technologies used for collecting or creating metadata about tenant data usage (search engines, etc.?).&lt;br /&gt;
 A: We do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to opt-out of having their data/metatdata accessed/mined via inspection technologies?&lt;br /&gt;
 A: N/A as we do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: Can you provide the physical location/geography of storage of a tenant’s data upon request?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to define acceptable geographical locations for data routing or resource instantiation?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to specify which of your geographic locations their data is allowed to traverse into/out of (to address legal jurisdictional considerations based on where data is stored vs. accessed?) &lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: What capability do you have to use system geographic location as an authentication factor?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 Q: Does legal counsel review all third party agreements?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you select and monitor outsourced providers in compliance with laws in the country where the data orignates, processed, stored and transmitted?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 Q: Have you established an Information Security Management Program (ISMP?)&lt;br /&gt;
 A: Our ISMP is being developed.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with a right to audit (tenant audit)?&lt;br /&gt;
 A: No, for security/confidential purposes.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to request deletion/removal of data as needed?&lt;br /&gt;
 Q: Provide the standards used for secure deletion of archived data upon request by tenants.&lt;br /&gt;
 Q: What is the process to sanitize all computing resource of tenant data once a customer has exited your environment.&lt;br /&gt;
 Q: What is time period that you retain customer data after explicit user deletion/removal?&lt;br /&gt;
 A: When a cloud tenant cancels, their virtual machine and backup data is deleted.  Data blocks are reused for new customers, which replace the old blocks.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you manage separate production and non production environments &amp;amp; what controls do you have in place to ensure that the production data in not copied to non-production environments?&lt;br /&gt;
 A: No.  We have a redundant production environment, which is replicated nightly from the primary environment.&lt;br /&gt;
&lt;br /&gt;
 Q: Are backups and archives of data using unique encryption keys for each tenant?&lt;br /&gt;
 A: Each tenant has their own uniquely retained archive.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the duration for keeping backed up data? And can you provide information about your backup rotations and rotation of your backup media?&lt;br /&gt;
 A: The backup duration depends on the plan selected.  By default this will range from 5-10 days.  The backups are full backups with a nightly differential, providing for a full 5-10 day restoration period.&lt;br /&gt;
&lt;br /&gt;
===Identity and Access Control===&lt;br /&gt;
&lt;br /&gt;
===Physical Security and Disaster Recovery===&lt;br /&gt;
&lt;br /&gt;
 Q: Do you require strong (multifactor) authentication options (card keys+PIN, biometric readers, etc.) for access to your physical facilities?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Are any of your datacenters located in places which have a high probability/occurrence of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes, etc.)?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you use 24X7 camera monitoring in all the access points of your datacenter and key locations within the datacenter? &lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you maintain liaisons and points of contact with local authorities in accordance with contracts and appropriate regulations?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Infrastructure]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2553</id>
		<title>PCI Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2553"/>
				<updated>2015-06-09T16:58:30Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
== Obtaining PCI Compliance ==&lt;br /&gt;
&lt;br /&gt;
You need PCI Compliance if your website/business: '''accepts, transmits or stores any cardholder data.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''If that is you:''' &lt;br /&gt;
&lt;br /&gt;
Find a Quality Security Accessor such as [https://www.securitymetrics.com SecurityMetrics] or [https://trustwave.com/ TrustWave], there are many such vendors. They will help you determine the type of compliance required for your business and provide the services to achieve and maintain compliance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How do I know what level / validation type?''' &lt;br /&gt;
&lt;br /&gt;
The Quality Security Accessor will help you determine this and based on PCI DSS Standards.&lt;br /&gt;
&lt;br /&gt;
*The level of &amp;quot;compliance&amp;quot; required (1-4) is based on transaction or monetary volume.&lt;br /&gt;
*The &amp;quot;Validation Type&amp;quot; determines the assessment requirements and is based on how much card data you store.&lt;br /&gt;
&lt;br /&gt;
A copy of the PCI DSS is available [https://www.pcisecuritystandards.org/security_standards/index.php here].&lt;br /&gt;
More general unofficial details can be found at [http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard here].&lt;br /&gt;
&lt;br /&gt;
=== How Hostek complements efforts for PCI compliance ===&lt;br /&gt;
&lt;br /&gt;
#Insuring PCI standards can be met and kept for our own systems.&lt;br /&gt;
#Providing firewall protection for all servers and the option for PCI compliant firewall rules to be applied to customers environment. &lt;br /&gt;
#Providing VPN for customers to securely connect and manage environment remotely.&lt;br /&gt;
#Providing VLAN (virtual private network) for customers environment with multiple servers so their database server is completely isolated from public access.&lt;br /&gt;
#Including or offering Anti-Virus scanning on VPS and/or Shared Hosting servers.&lt;br /&gt;
#Protecting physical access to network and servers. Data centers are managed &amp;amp; monitored 24x7 by security cameras and on-site staff. &lt;br /&gt;
&lt;br /&gt;
== Hostek.com ==&lt;br /&gt;
&lt;br /&gt;
PCI compliance requires quarterly scans from a PCI compliance vendor.  Hostek.com goes above and beyond this requirement by having regular scans from two different PCI compliance vendors.  One vendor's scans are done quarterly.  The other's scans are done nightly.  This ensures that all potential PCI compliance issues are accurately identified and dealt with promptly.&lt;br /&gt;
&lt;br /&gt;
===Hostek.com PCI Compliance Report===&lt;br /&gt;
Hostek.com PCI DSS Compliance report: [[Media:Hostek-PCI-Compliance-040115.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==Datacenter==&lt;br /&gt;
The St. Louis, MO data center where the hostek.com equipment is housed maintains SOC 2 Certification.  This replaced the SSAE16 Certification.&lt;br /&gt;
&lt;br /&gt;
Certification: [[File:2014CyberconSoc2Cert.pdf]]&lt;br /&gt;
&lt;br /&gt;
Audit: [[File:2014CyberconSoc2Audit.pdf]]&lt;br /&gt;
&lt;br /&gt;
===Previous Certifications===&lt;br /&gt;
2011-12 - SSAE 16 Certification ([http://hostek.com/forms/SSAE-16_Letter_of_Cert.pdf audit report]).  This replaced the SAS 70 Type 2 Certification.&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 1: [[File:SOC2-2013_CYBERCON_Full_Report_PART-1.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 2: [[File:SOC2-2013_CYBERCON_Full_Report_PART-2.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Shared Servers==&lt;br /&gt;
&lt;br /&gt;
===TLS 1.0===&lt;br /&gt;
*We are disabling support for TLS 1.0 on our Shared Windows Servers.&lt;br /&gt;
*This is now required for PCI DSS compliance.&lt;br /&gt;
*This is to ensure that any connection over HTTPS is secured against &amp;quot;eavesdropping&amp;quot; commonly known as Man-In-The-Middle attacks.&lt;br /&gt;
#The majority of users won't even noticed this change because this should only affect deprecated browsers.&lt;br /&gt;
====Internet Explorer====&lt;br /&gt;
#After disabling this Protocol '''Internet Explorer v.11''' [which is only supported on '''Windows 7 and up'''] will be the only version of IE that can view HTTPS Pages on the Shared Windows Servers.&lt;br /&gt;
#Users with '''Windows XP''' and '''Windows Vista''' will have an unsupported version of Internet Explorer, so in order to view HTTTPS Pages they will need to use an alternate browser.&lt;br /&gt;
#*i.e. Google Chrome, Mozilla FireFox, Safari, etc.&lt;br /&gt;
====Support/Unsupported Browsers/OS's====&lt;br /&gt;
*Please a snapshot of this list here: https://wiki.hostek.com/images/c/c4/TLS_1.0_PCI_Compliance.PNG&lt;br /&gt;
&lt;br /&gt;
==Common PCI Compliance Resolutions==&lt;br /&gt;
&lt;br /&gt;
===SSL/TLS Protocol Initialization Vector Implementation Information Disclosure===&lt;br /&gt;
&lt;br /&gt;
aka: BEAST (Browser Exploit Against SSL/TLS) Vulnerability&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  If you are on a '''shared server''' or a '''managed VPS''', please submit a support ticket [http://support.hostek.com] and attach/include your PCI scan report.  The information below is for our non managed VPS customers.&lt;br /&gt;
&lt;br /&gt;
* Place the following text in a file named '''TLS.reg''' and execute the file.  It will add registry values to enable TLS 1.1 and TLS 1.2 support:&lt;br /&gt;
 Windows Registry Editor Version 5.00&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
&lt;br /&gt;
* After completing the above step, go to '''Start''' -&amp;gt; '''Run''' -&amp;gt; (type '''gpedit.msc''') -&amp;gt; (click '''OK''')&lt;br /&gt;
* Navigate to '''Computer Configuration''' -&amp;gt; '''Administrative Template''' -&amp;gt; '''Network''' -&amp;gt; '''SSL Configuration Settings'''&lt;br /&gt;
* Right click on '''SSL Cipher Suite Order''' and choose '''Edit''' (Windows 2008 R2) or '''Properties''' (Windows 2008)&lt;br /&gt;
* Select '''Enabled''' and replace the text in the textbox under '''SSL Cipher Suites'''(not to be confused with the '''Notes''' textbox) with the following long line of text(All on a single line - no line breaks or spaces):&lt;br /&gt;
TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_RC4_128_MD5,SSL_CK_RC4_128_WITH_MD5,TLS_RSA_WITH_NULL_SHA,TLS_RSA_WITH_NULL_MD5&lt;br /&gt;
* Click '''OK'''&lt;br /&gt;
* Reboot server&lt;br /&gt;
&lt;br /&gt;
===Disable SSLv2 &amp;amp; Strong Cyphers Only &amp;amp; Strong Protocols Only===&lt;br /&gt;
If you are on a shared server, please open a support ticket and attach the PCI scan report.&lt;br /&gt;
&lt;br /&gt;
For VPS's:  This generally applies to a Windows based server.  If you see one of these items on your PCI scan report, download this zip [http://hostek.com/wikifiles/disablessl2-strongcyphersonly-strongprotocolsonly.zip] and extract the appropriate .reg file and put that on your VPS and double click it to make the appropriate registry change to fix the issue.  Generally if one of these show on your report, we suggest running all three .reg files to fully take care of the issue at one time.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  You will need to reboot the server for these changes to take affect.&lt;br /&gt;
&lt;br /&gt;
====VPS-Windows 2008 Servers====&lt;br /&gt;
This free tool can be used to determine if vulnerable or weak protocols or cypers are enabled, and provides the option to disable them.&lt;br /&gt;
&lt;br /&gt;
https://www.nartac.com/Products/IISCrypto/Default.aspx&lt;br /&gt;
&lt;br /&gt;
Changes using this tool require a server reboot to complete them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Websites that allow testing for SSL Protocols and Cyphers:&lt;br /&gt;
&lt;br /&gt;
https://www.ssllabs.com/ssltest/index.html&lt;br /&gt;
&lt;br /&gt;
http://www.serversniff.net/sslcheck.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Visa E-commerce Security Checklist Questionaire==&lt;br /&gt;
&lt;br /&gt;
Click this link to Visa E-commerce Security Checklist Questionaire [[https://wiki.hostek.com/Visa_E-commerce_Security_Checklist_Questionaire]]&lt;br /&gt;
&lt;br /&gt;
==Cloud Assessment Questions==&lt;br /&gt;
 Q: Is your organization insured by a 3rd party for losses?&lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do your organization's service level agreements provide tenant renumeration for losses they may incur due to outages or losses experienced within your infrastructure?&lt;br /&gt;
 A: The Hostek.com SLA provides for a refund or credit limited to the dollar amount paid for the service during that monthly period.  The refund or credit amount is calculated based on amount paid for the monthly service / number of minutes in a month * number of down minutes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you collect capacity and utilization data for all relevant components of your cloud service offering?&lt;br /&gt;
 A: Yes.  Daily.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with capacity planning and utilization reports?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you have a documented procedure for responding to requests for tenant data from governments or third parties? &lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do you process, transmit or store any credit card related information on behalf Cisco?&lt;br /&gt;
 A: In our St. Louis facility, we do not use Cisco.  In our Dallas facility, we do.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation on policies and procedures for controls you have in place to protect tenant's intellectual property and sensitive data from unauthorized access.&lt;br /&gt;
 A: Utilization of IPS and IDS.  Customer has ability to lock down server access.  Internal access information is stored encrypted and only available via internal access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation and policies you have regarding how you may access, mine, utilize tenant data and/or metadata.&lt;br /&gt;
 A: We do not mine nor utilize tenant data.  Access to tenant data would occur if tenant asked for help in resolving a situation which may require such access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please specify any inspection technologies used for collecting or creating metadata about tenant data usage (search engines, etc.?).&lt;br /&gt;
 A: We do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to opt-out of having their data/metatdata accessed/mined via inspection technologies?&lt;br /&gt;
 A: N/A as we do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: Can you provide the physical location/geography of storage of a tenant’s data upon request?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to define acceptable geographical locations for data routing or resource instantiation?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to specify which of your geographic locations their data is allowed to traverse into/out of (to address legal jurisdictional considerations based on where data is stored vs. accessed?) &lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: What capability do you have to use system geographic location as an authentication factor?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 Q: Does legal counsel review all third party agreements?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you select and monitor outsourced providers in compliance with laws in the country where the data orignates, processed, stored and transmitted?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 Q: Have you established an Information Security Management Program (ISMP?)&lt;br /&gt;
 A: Our ISMP is being developed.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with a right to audit (tenant audit)?&lt;br /&gt;
 A: No, for security/confidential purposes.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to request deletion/removal of data as needed?&lt;br /&gt;
 Q: Provide the standards used for secure deletion of archived data upon request by tenants.&lt;br /&gt;
 Q: What is the process to sanitize all computing resource of tenant data once a customer has exited your environment.&lt;br /&gt;
 Q: What is time period that you retain customer data after explicit user deletion/removal?&lt;br /&gt;
 A: When a cloud tenant cancels, their virtual machine and backup data is deleted.  Data blocks are reused for new customers, which replace the old blocks.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you manage separate production and non production environments &amp;amp; what controls do you have in place to ensure that the production data in not copied to non-production environments?&lt;br /&gt;
 A: No.  We have a redundant production environment, which is replicated nightly from the primary environment.&lt;br /&gt;
&lt;br /&gt;
 Q: Are backups and archives of data using unique encryption keys for each tenant?&lt;br /&gt;
 A: Each tenant has their own uniquely retained archive.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the duration for keeping backed up data? And can you provide information about your backup rotations and rotation of your backup media?&lt;br /&gt;
 A: The backup duration depends on the plan selected.  By default this will range from 5-10 days.  The backups are full backups with a nightly differential, providing for a full 5-10 day restoration period.&lt;br /&gt;
&lt;br /&gt;
===Identity and Access Control===&lt;br /&gt;
&lt;br /&gt;
===Physical Security and Disaster Recovery===&lt;br /&gt;
&lt;br /&gt;
 Q: Do you require strong (multifactor) authentication options (card keys+PIN, biometric readers, etc.) for access to your physical facilities?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Are any of your datacenters located in places which have a high probability/occurrence of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes, etc.)?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you use 24X7 camera monitoring in all the access points of your datacenter and key locations within the datacenter? &lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you maintain liaisons and points of contact with local authorities in accordance with contracts and appropriate regulations?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Infrastructure]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2552</id>
		<title>PCI Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=PCI_Compliance&amp;diff=2552"/>
				<updated>2015-06-09T16:57:47Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
== Obtaining PCI Compliance ==&lt;br /&gt;
&lt;br /&gt;
You need PCI Compliance if your website/business: '''accepts, transmits or stores any cardholder data.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''If that is you:''' &lt;br /&gt;
&lt;br /&gt;
Find a Quality Security Accessor such as [https://www.securitymetrics.com SecurityMetrics] or [https://trustwave.com/ TrustWave], there are many such vendors. They will help you determine the type of compliance required for your business and provide the services to achieve and maintain compliance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How do I know what level / validation type?''' &lt;br /&gt;
&lt;br /&gt;
The Quality Security Accessor will help you determine this and based on PCI DSS Standards.&lt;br /&gt;
&lt;br /&gt;
*The level of &amp;quot;compliance&amp;quot; required (1-4) is based on transaction or monetary volume.&lt;br /&gt;
*The &amp;quot;Validation Type&amp;quot; determines the assessment requirements and is based on how much card data you store.&lt;br /&gt;
&lt;br /&gt;
A copy of the PCI DSS is available [https://www.pcisecuritystandards.org/security_standards/index.php here].&lt;br /&gt;
More general unofficial details can be found at [http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard here].&lt;br /&gt;
&lt;br /&gt;
=== How Hostek complements efforts for PCI compliance ===&lt;br /&gt;
&lt;br /&gt;
#Insuring PCI standards can be met and kept for our own systems.&lt;br /&gt;
#Providing firewall protection for all servers and the option for PCI compliant firewall rules to be applied to customers environment. &lt;br /&gt;
#Providing VPN for customers to securely connect and manage environment remotely.&lt;br /&gt;
#Providing VLAN (virtual private network) for customers environment with multiple servers so their database server is completely isolated from public access.&lt;br /&gt;
#Including or offering Anti-Virus scanning on VPS and/or Shared Hosting servers.&lt;br /&gt;
#Protecting physical access to network and servers. Data centers are managed &amp;amp; monitored 24x7 by security cameras and on-site staff. &lt;br /&gt;
&lt;br /&gt;
== Hostek.com ==&lt;br /&gt;
&lt;br /&gt;
PCI compliance requires quarterly scans from a PCI compliance vendor.  Hostek.com goes above and beyond this requirement by having regular scans from two different PCI compliance vendors.  One vendor's scans are done quarterly.  The other's scans are done nightly.  This ensures that all potential PCI compliance issues are accurately identified and dealt with promptly.&lt;br /&gt;
&lt;br /&gt;
===Hostek.com PCI Compliance Report===&lt;br /&gt;
Hostek.com PCI DSS Compliance report: [[Media:Hostek-PCI-Compliance-040115.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==Datacenter==&lt;br /&gt;
The St. Louis, MO data center where the hostek.com equipment is housed maintains SOC 2 Certification.  This replaced the SSAE16 Certification.&lt;br /&gt;
&lt;br /&gt;
Certification: [[File:2014CyberconSoc2Cert.pdf]]&lt;br /&gt;
&lt;br /&gt;
Audit: [[File:2014CyberconSoc2Audit.pdf]]&lt;br /&gt;
&lt;br /&gt;
===Previous Certifications===&lt;br /&gt;
2011-12 - SSAE 16 Certification ([http://hostek.com/forms/SSAE-16_Letter_of_Cert.pdf audit report]).  This replaced the SAS 70 Type 2 Certification.&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 1: [[File:SOC2-2013_CYBERCON_Full_Report_PART-1.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
2013 SOC2 Part 2: [[File:SOC2-2013_CYBERCON_Full_Report_PART-2.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Shared Servers&lt;br /&gt;
&lt;br /&gt;
===TLS 1.0===&lt;br /&gt;
*We are disabling support for TLS 1.0 on our Shared Windows Servers.&lt;br /&gt;
*This is now required for PCI DSS compliance.&lt;br /&gt;
*This is to ensure that any connection over HTTPS is secured against &amp;quot;eavesdropping&amp;quot; commonly known as Man-In-The-Middle attacks.&lt;br /&gt;
#The majority of users won't even noticed this change because this should only affect deprecated browsers.&lt;br /&gt;
====Internet Explorer====&lt;br /&gt;
#After disabling this Protocol '''Internet Explorer v.11''' [which is only supported on '''Windows 7 and up'''] will be the only version of IE that can view HTTPS Pages on the Shared Windows Servers.&lt;br /&gt;
#Users with '''Windows XP''' and '''Windows Vista''' will have an unsupported version of Internet Explorer, so in order to view HTTTPS Pages they will need to use an alternate browser.&lt;br /&gt;
#*i.e. Google Chrome, Mozilla FireFox, Safari, etc.&lt;br /&gt;
====Support/Unsupported Browsers/OS's====&lt;br /&gt;
*Please a snapshot of this list here: https://wiki.hostek.com/images/c/c4/TLS_1.0_PCI_Compliance.PNG&lt;br /&gt;
&lt;br /&gt;
==Common PCI Compliance Resolutions==&lt;br /&gt;
&lt;br /&gt;
===SSL/TLS Protocol Initialization Vector Implementation Information Disclosure===&lt;br /&gt;
&lt;br /&gt;
aka: BEAST (Browser Exploit Against SSL/TLS) Vulnerability&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  If you are on a '''shared server''' or a '''managed VPS''', please submit a support ticket [http://support.hostek.com] and attach/include your PCI scan report.  The information below is for our non managed VPS customers.&lt;br /&gt;
&lt;br /&gt;
* Place the following text in a file named '''TLS.reg''' and execute the file.  It will add registry values to enable TLS 1.1 and TLS 1.2 support:&lt;br /&gt;
 Windows Registry Editor Version 5.00&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.1\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2]&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Client]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
 &lt;br /&gt;
 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\TLS 1.2\Server]&lt;br /&gt;
 &amp;quot;DisabledByDefault&amp;quot;=dword:00000000&lt;br /&gt;
 &amp;quot;Enabled&amp;quot;=dword:00000001&lt;br /&gt;
&lt;br /&gt;
* After completing the above step, go to '''Start''' -&amp;gt; '''Run''' -&amp;gt; (type '''gpedit.msc''') -&amp;gt; (click '''OK''')&lt;br /&gt;
* Navigate to '''Computer Configuration''' -&amp;gt; '''Administrative Template''' -&amp;gt; '''Network''' -&amp;gt; '''SSL Configuration Settings'''&lt;br /&gt;
* Right click on '''SSL Cipher Suite Order''' and choose '''Edit''' (Windows 2008 R2) or '''Properties''' (Windows 2008)&lt;br /&gt;
* Select '''Enabled''' and replace the text in the textbox under '''SSL Cipher Suites'''(not to be confused with the '''Notes''' textbox) with the following long line of text(All on a single line - no line breaks or spaces):&lt;br /&gt;
TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_RC4_128_MD5,SSL_CK_RC4_128_WITH_MD5,TLS_RSA_WITH_NULL_SHA,TLS_RSA_WITH_NULL_MD5&lt;br /&gt;
* Click '''OK'''&lt;br /&gt;
* Reboot server&lt;br /&gt;
&lt;br /&gt;
===Disable SSLv2 &amp;amp; Strong Cyphers Only &amp;amp; Strong Protocols Only===&lt;br /&gt;
If you are on a shared server, please open a support ticket and attach the PCI scan report.&lt;br /&gt;
&lt;br /&gt;
For VPS's:  This generally applies to a Windows based server.  If you see one of these items on your PCI scan report, download this zip [http://hostek.com/wikifiles/disablessl2-strongcyphersonly-strongprotocolsonly.zip] and extract the appropriate .reg file and put that on your VPS and double click it to make the appropriate registry change to fix the issue.  Generally if one of these show on your report, we suggest running all three .reg files to fully take care of the issue at one time.&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  You will need to reboot the server for these changes to take affect.&lt;br /&gt;
&lt;br /&gt;
====VPS-Windows 2008 Servers====&lt;br /&gt;
This free tool can be used to determine if vulnerable or weak protocols or cypers are enabled, and provides the option to disable them.&lt;br /&gt;
&lt;br /&gt;
https://www.nartac.com/Products/IISCrypto/Default.aspx&lt;br /&gt;
&lt;br /&gt;
Changes using this tool require a server reboot to complete them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Websites that allow testing for SSL Protocols and Cyphers:&lt;br /&gt;
&lt;br /&gt;
https://www.ssllabs.com/ssltest/index.html&lt;br /&gt;
&lt;br /&gt;
http://www.serversniff.net/sslcheck.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Visa E-commerce Security Checklist Questionaire==&lt;br /&gt;
&lt;br /&gt;
Click this link to Visa E-commerce Security Checklist Questionaire [[https://wiki.hostek.com/Visa_E-commerce_Security_Checklist_Questionaire]]&lt;br /&gt;
&lt;br /&gt;
==Cloud Assessment Questions==&lt;br /&gt;
 Q: Is your organization insured by a 3rd party for losses?&lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do your organization's service level agreements provide tenant renumeration for losses they may incur due to outages or losses experienced within your infrastructure?&lt;br /&gt;
 A: The Hostek.com SLA provides for a refund or credit limited to the dollar amount paid for the service during that monthly period.  The refund or credit amount is calculated based on amount paid for the monthly service / number of minutes in a month * number of down minutes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you collect capacity and utilization data for all relevant components of your cloud service offering?&lt;br /&gt;
 A: Yes.  Daily.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with capacity planning and utilization reports?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you have a documented procedure for responding to requests for tenant data from governments or third parties? &lt;br /&gt;
 A: Yes&lt;br /&gt;
&lt;br /&gt;
 Q: Do you process, transmit or store any credit card related information on behalf Cisco?&lt;br /&gt;
 A: In our St. Louis facility, we do not use Cisco.  In our Dallas facility, we do.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation on policies and procedures for controls you have in place to protect tenant's intellectual property and sensitive data from unauthorized access.&lt;br /&gt;
 A: Utilization of IPS and IDS.  Customer has ability to lock down server access.  Internal access information is stored encrypted and only available via internal access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please provide any documentation and policies you have regarding how you may access, mine, utilize tenant data and/or metadata.&lt;br /&gt;
 A: We do not mine nor utilize tenant data.  Access to tenant data would occur if tenant asked for help in resolving a situation which may require such access.&lt;br /&gt;
&lt;br /&gt;
 Q: Please specify any inspection technologies used for collecting or creating metadata about tenant data usage (search engines, etc.?).&lt;br /&gt;
 A: We do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to opt-out of having their data/metatdata accessed/mined via inspection technologies?&lt;br /&gt;
 A: N/A as we do not inspect tenant data.&lt;br /&gt;
&lt;br /&gt;
 Q: Can you provide the physical location/geography of storage of a tenant’s data upon request?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to define acceptable geographical locations for data routing or resource instantiation?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you allow tenants to specify which of your geographic locations their data is allowed to traverse into/out of (to address legal jurisdictional considerations based on where data is stored vs. accessed?) &lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: What capability do you have to use system geographic location as an authentication factor?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 Q: Does legal counsel review all third party agreements?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you select and monitor outsourced providers in compliance with laws in the country where the data orignates, processed, stored and transmitted?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
 Q: Have you established an Information Security Management Program (ISMP?)&lt;br /&gt;
 A: Our ISMP is being developed.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you provide tenants with a right to audit (tenant audit)?&lt;br /&gt;
 A: No, for security/confidential purposes.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the process for tenants to request deletion/removal of data as needed?&lt;br /&gt;
 Q: Provide the standards used for secure deletion of archived data upon request by tenants.&lt;br /&gt;
 Q: What is the process to sanitize all computing resource of tenant data once a customer has exited your environment.&lt;br /&gt;
 Q: What is time period that you retain customer data after explicit user deletion/removal?&lt;br /&gt;
 A: When a cloud tenant cancels, their virtual machine and backup data is deleted.  Data blocks are reused for new customers, which replace the old blocks.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you manage separate production and non production environments &amp;amp; what controls do you have in place to ensure that the production data in not copied to non-production environments?&lt;br /&gt;
 A: No.  We have a redundant production environment, which is replicated nightly from the primary environment.&lt;br /&gt;
&lt;br /&gt;
 Q: Are backups and archives of data using unique encryption keys for each tenant?&lt;br /&gt;
 A: Each tenant has their own uniquely retained archive.&lt;br /&gt;
&lt;br /&gt;
 Q: What is the duration for keeping backed up data? And can you provide information about your backup rotations and rotation of your backup media?&lt;br /&gt;
 A: The backup duration depends on the plan selected.  By default this will range from 5-10 days.  The backups are full backups with a nightly differential, providing for a full 5-10 day restoration period.&lt;br /&gt;
&lt;br /&gt;
===Identity and Access Control===&lt;br /&gt;
&lt;br /&gt;
===Physical Security and Disaster Recovery===&lt;br /&gt;
&lt;br /&gt;
 Q: Do you require strong (multifactor) authentication options (card keys+PIN, biometric readers, etc.) for access to your physical facilities?&lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Are any of your datacenters located in places which have a high probability/occurrence of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes, etc.)?&lt;br /&gt;
 A: No.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you use 24X7 camera monitoring in all the access points of your datacenter and key locations within the datacenter? &lt;br /&gt;
 A: Yes.&lt;br /&gt;
&lt;br /&gt;
 Q: Do you maintain liaisons and points of contact with local authorities in accordance with contracts and appropriate regulations?&lt;br /&gt;
 A: N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Infrastructure]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=Pattern_Based_DDOS_Blocking&amp;diff=2103</id>
		<title>Pattern Based DDOS Blocking</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=Pattern_Based_DDOS_Blocking&amp;diff=2103"/>
				<updated>2014-04-14T16:37:49Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article will cover pattern-based ddos blocking in a Windows IIS environment.&lt;br /&gt;
&lt;br /&gt;
==Identifying Patterns==&lt;br /&gt;
&lt;br /&gt;
If you suspect that your site may be under a DDOS attack, the first place to look will be the HTTP logs.  This is where the web server records information for each request made to a site.  For domains added using our control panel, the default log directory will be:&lt;br /&gt;
 C:\home\domainname.com\logs\W3SVC##&lt;br /&gt;
For sites added to IIS manually, the default log directory will be:&lt;br /&gt;
 C:\inetpub\logs\LogFiles\W3SVC##&lt;br /&gt;
NOTE:  ## represents the site's ID number as shown in IIS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After finding the log directory, check the log with the date of the attack or the log for today if the attack is still in progress.  First, glance over the log file to determine if there is truly an attack in progress.  If you can identify traffic that you are certain is not normal traffic, check for patterns in that traffic that we can use to block it.  Specifically, look for any combination of the following that are the same for every bad request:&lt;br /&gt;
 URL&lt;br /&gt;
 REQUEST METHOD&lt;br /&gt;
 QUERY STRING&lt;br /&gt;
 USER-AGENT&lt;br /&gt;
&lt;br /&gt;
If you can identify enough of the above request details that are the same for every bad request without blocking normal site traffic, then continue to the next section to add the blocking rule.&lt;br /&gt;
&lt;br /&gt;
==Creating Block Rule(s)==&lt;br /&gt;
&lt;br /&gt;
In IIS, browse to the site that is being hit by the attacks, and open the URL Rewrite tool.  Add a new 'Blank rule'.  Enter a name and set the 'Action type' to 'Abort Request'.  The rest of the options you use will depend on which request details are being matched.  Below are some guidelines:&lt;br /&gt;
&lt;br /&gt;
* '''URL''': The URL is specified in the 'Pattern' field.&lt;br /&gt;
* '''REQUEST METHOD''': Add a condition with the following details:&lt;br /&gt;
 Condition input: {REQUEST_METHOD}&lt;br /&gt;
 Pattern: GET (or POST or HEAD or whichever request method is being used in the attack)&lt;br /&gt;
* '''QUERY STRING''': Add a condition with the following details:&lt;br /&gt;
 Condition input: {QUERY_STRING}&lt;br /&gt;
 Pattern: ** query string pattern **&lt;br /&gt;
* '''USER-AGENT''': Add a condition with the following details:&lt;br /&gt;
 Condition input: {HTTP_USER_AGENT}&lt;br /&gt;
 Pattern: ** user-agent string **&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  The 'Pattern' input fields are entered as Regular Expressions.  If you are not familiar with using Regular Expressions, you may need to request assistance with setting up the proper rule.&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 11:37, 14 April 2014 (CDT)&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows-VPS]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=Pattern_Based_DDOS_Blocking&amp;diff=2102</id>
		<title>Pattern Based DDOS Blocking</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=Pattern_Based_DDOS_Blocking&amp;diff=2102"/>
				<updated>2014-04-14T16:37:14Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: Created page with &amp;quot;This article will cover pattern-based ddos blocking in a Windows IIS environment.  ==Identifying Patterns==  If you suspect that your site may be under a DDOS attack, the firs...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article will cover pattern-based ddos blocking in a Windows IIS environment.&lt;br /&gt;
&lt;br /&gt;
==Identifying Patterns==&lt;br /&gt;
&lt;br /&gt;
If you suspect that your site may be under a DDOS attack, the first place to look will be the HTTP logs.  This is where the web server records information for each request made to a site.  For domains added using our control panel, the default log directory will be:&lt;br /&gt;
 C:\home\domainname.com\logs\W3SVC##&lt;br /&gt;
For sites added to IIS manually, the default log directory will be:&lt;br /&gt;
 C:\inetpub\logs\LogFiles\W3SVC##&lt;br /&gt;
NOTE:  ## represents the site's ID number as shown in IIS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After finding the log directory, check the log with the date of the attack or the log for today if the attack is still in progress.  First, glance over the log file to determine if there is truly an attack in progress.  If you can identify traffic that you are certain is not normal traffic, check for patterns in that traffic that we can use to block it.  Specifically, look for any combination of the following that are the same for every bad request:&lt;br /&gt;
 URL&lt;br /&gt;
 REQUEST METHOD&lt;br /&gt;
 QUERY STRING&lt;br /&gt;
 USER-AGENT&lt;br /&gt;
&lt;br /&gt;
If you can identify enough of the above request details that are the same for every bad request without blocking normal site traffic, then continue to the next section to add the blocking rule.&lt;br /&gt;
&lt;br /&gt;
==Creating Block Rule(s)==&lt;br /&gt;
&lt;br /&gt;
In IIS, browse to the site that is being hit by the attacks, and open the URL Rewrite tool.  Add a new 'Blank rule'.  Enter a name and set the 'Action type' to 'Abort Request'.  The rest of the options you use will depend on which request details are being matched.  Below are some guidelines:&lt;br /&gt;
&lt;br /&gt;
* '''URL''': The URL is specified in the 'Pattern' field.&lt;br /&gt;
* '''REQUEST METHOD''': Add a condition with the following details:&lt;br /&gt;
 Condition input: {REQUEST_METHOD}&lt;br /&gt;
 Pattern: GET (or POST or HEAD or whichever request method is being used in the attack)&lt;br /&gt;
* '''QUERY STRING''': Add a condition with the following details:&lt;br /&gt;
 Condition input: {QUERY_STRING}&lt;br /&gt;
 Pattern: ** query string pattern **&lt;br /&gt;
* '''USER-AGENT''': Add a condition with the following details:&lt;br /&gt;
 Condition input: {HTTP_USER_AGENT}&lt;br /&gt;
 Pattern: ** user-agent string **&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  The 'Pattern' input fields are entered as Regular Expressions.  If you are not familiar with using Regular Expressions, you may need to request assistance with setting up the proper rule.&lt;br /&gt;
&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 11:37, 14 April 2014 (CDT)&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows VPS]]&lt;br /&gt;
[[Category:VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=WCP_(Windows_based_Control_Panel)&amp;diff=1998</id>
		<title>WCP (Windows based Control Panel)</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=WCP_(Windows_based_Control_Panel)&amp;diff=1998"/>
				<updated>2014-02-19T16:15:25Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==How To Login To My WCP Control Panel==&lt;br /&gt;
#To manage your domain, login to the WCP Control Panel, using the details below&lt;br /&gt;
#URL: '''https://wcp.hostek.com'''/&lt;br /&gt;
#Username: &lt;br /&gt;
#Password: ** same as your cp.hostek.com password **&lt;br /&gt;
*You can also login to the control panel through your billing control panel https://cp.hostek.com/clientarea.php&lt;br /&gt;
#Click on  ''''My Services'''' 'Click the '''small Green arrow''' on the the notepad to the right'&lt;br /&gt;
#Now click the '''Login to Control Panel''' Icon'''&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
&lt;br /&gt;
==Custom URL for the WCP Control Panel==&lt;br /&gt;
The WCP can als be accessed by wcp.your_domain.com&lt;br /&gt;
&lt;br /&gt;
Setup wcp.your_domain.com as an A record for &amp;quot;184.175.108.65&amp;quot; or as a CName record for &amp;quot;wcp.ezhostingserver.com&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===Resellers and VPS - WCP White label Settings===&lt;br /&gt;
Resellers and VPS customers can setup their logo in their Reseller control panel, however those additional features will only be avaialble when using the specific domain they configured in the reseller setttings. The reseller settings will be available using ANY url, and as mentioned within these settings the reseller &amp;quot;URL&amp;quot; can be setup and other whitelabel options making WCP the ultimate Windows Control Panel&lt;br /&gt;
&lt;br /&gt;
[[Category: Windows VPS]]&lt;br /&gt;
[[Category:Resellers]]&lt;br /&gt;
&lt;br /&gt;
==Adding Additional Control Panel Logins==&lt;br /&gt;
*This will allow you to set up additional control panel logins for you or for others involved in editing or managing your account. You can limit the Permissions or options available for them to manage.&lt;br /&gt;
#Login to the WCP Control Panel, using the details below&lt;br /&gt;
#URL: '''https://wcp.hostek.com'''/&lt;br /&gt;
#Username: &lt;br /&gt;
#Password: ** same as your cp.hostek.com password **&lt;br /&gt;
#Click on the '''Control panel Logins''' tab, then click on the '''Add''' icon.&lt;br /&gt;
#Put the &amp;quot;Username, Password and if you want them to have Limited Permission.&lt;br /&gt;
#If you want them to have Limited Permission then check the '''Limited Permission''' box. This will load a dropdown where you can select what privlages they have to manage.&lt;br /&gt;
#Once you are done click the '''Save''' icon at the bottom of the screen.&lt;br /&gt;
#Once it has been added you or they can login by going to https://wcp.hostek.com/Login.aspx and using the username and password that you set for it.&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
&lt;br /&gt;
==Unlimited Plans - Add Additional Domains==&lt;br /&gt;
Use these steps to add additional domains under your Windows Unlimited account.&lt;br /&gt;
&lt;br /&gt;
#Login to your WCP control panel&lt;br /&gt;
#*Windows Unlimited: For adding a third (or more) domain select any domain from the upper right hand corner dropdown box &amp;quot;Domains&amp;quot;.&lt;br /&gt;
#Within the &amp;quot;Domains&amp;quot; box click the &amp;quot;Addon Domains&amp;quot; icon.&lt;br /&gt;
#Click &amp;quot;Add&amp;quot; and enter the following:&lt;br /&gt;
#*Domain Name&lt;br /&gt;
#*Username&lt;br /&gt;
#*Password&lt;br /&gt;
#Click &amp;quot;Save&amp;quot;&lt;br /&gt;
#To manage the domain, you can now select it from the domains list dropdown box.&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
&lt;br /&gt;
==Site Details==&lt;br /&gt;
We recommend you review the &amp;quot;Site Settings&amp;quot; which includes many important details about your domain including:&lt;br /&gt;
&lt;br /&gt;
WCP (login and select domain) &amp;gt; Website Settings &amp;gt; '''Site Details'''&lt;br /&gt;
&lt;br /&gt;
*Testing URL&lt;br /&gt;
*Primary and Secondary DNS&lt;br /&gt;
*Site IP&lt;br /&gt;
*Web Root Path&lt;br /&gt;
*FTP Root Path&lt;br /&gt;
===IIS Version &amp;amp; ColdFusion Version (if applicable)===&lt;br /&gt;
To get your domain's IIS Version and ColdFusion Version (if applicable) log in to WCP and under the Settings section, click on the Site Details option.&lt;br /&gt;
&lt;br /&gt;
==FTP Accounts==&lt;br /&gt;
*Adding or editing FTP accounts.&lt;br /&gt;
#click on the '''FTP Accounts''' tab.&lt;br /&gt;
#To edit one click on the little '''Pencil Icon''' to the left, to add one click on the '''Add FTP User''' tab.&lt;br /&gt;
#If you are adding one you will set the Username:, Password: and folder then click the #Click on the '''Save''' Icon.&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
&lt;br /&gt;
==File Manager== &lt;br /&gt;
*Basic File Operations, file uploading and editing now supported- Zip, GZip, and Tar Archive support.&lt;br /&gt;
#Click on the '''File Manager icon''', then the '''Login icon''' on the next screen.&lt;br /&gt;
#To create files or Directory's outside the WWW root folder right click and click on the '''Create File''' or '''Create Directory''' option.&lt;br /&gt;
#Click the '''Continue Icon''' to add this.&lt;br /&gt;
#To add/edit files in the WWWroot click on the '''wwwroot file'''.&lt;br /&gt;
#once you are in you can add, edit or delete by right clicking and clicking on the options given.&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
&lt;br /&gt;
==Password Protect Folders==&lt;br /&gt;
#Under the Files section click on '''Password Protect'''.&lt;br /&gt;
#Click on '''Manage Protected Folders'''.&lt;br /&gt;
#Browse to and click on the folder that you want to set this up on and check '''Enable Protection'''. &lt;br /&gt;
#Select a user from the list or click on '''Manage Users''', then click '''Add''', and enter username and password then Save. &lt;br /&gt;
&lt;br /&gt;
==IIS Settings==&lt;br /&gt;
*Setting up error pages, default pages, advanced settings, etc.&lt;br /&gt;
===Custom Error pages===&lt;br /&gt;
#Click on '''IIS Settings''' in your WCP&lt;br /&gt;
#Click the edit button next to the error page you want to change&lt;br /&gt;
#Uncheck the '''Use System Default''' checkbox &lt;br /&gt;
#Enter the path to your custom error page &lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
===Mime Types===&lt;br /&gt;
#Click on '''IIS Settings''' in your WCP&lt;br /&gt;
#Scroll to the bottom of the window and click '''Add Mime Type'''&lt;br /&gt;
#Enter the extension for the Mime Type&lt;br /&gt;
#Enter the Mime Type information&lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
*An example Mime Type is below:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Extension: .mp3&lt;br /&gt;
Mime Type: audio/mpeg&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
More information here: https://wiki.hostek.com/Mime_types&lt;br /&gt;
&lt;br /&gt;
===Default Docs===&lt;br /&gt;
*Select a default document and drag it to the top position to set it as top priority&lt;br /&gt;
*Click '''Add''' to add a default doc&lt;br /&gt;
*Click the red '''X''' to delete a default doc&lt;br /&gt;
*Click a default doc and change the name&lt;br /&gt;
*For example: change '''&amp;quot;index.htm&amp;quot;''' to '''&amp;quot;index.asp&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
===Advanced===&lt;br /&gt;
====Recycle Application Pool====&lt;br /&gt;
If you see a Service Unavailable message on your site, or have a general need to recycle a site's IIS Application Pool, you can do so through this section of WCP. &lt;br /&gt;
#Click the '''IIS Settings''' icon in WCP&lt;br /&gt;
#Click the '''Advanced''' tab in the '''IIS Settings''' section&lt;br /&gt;
#Click the '''Recycle''' button.&lt;br /&gt;
&lt;br /&gt;
==PHP Settings==&lt;br /&gt;
If you notice you need a different version of php or want to check what version you are using you can update it to that version if it is installed to the server or can enable custom php.ini settings to use specifically for your domain.&lt;br /&gt;
#Click the configuration for the domain or subdomain you want updated.&lt;br /&gt;
#Select the version you wish to use.&lt;br /&gt;
#Check the checkbox if you want to enable a custom php.ini file&lt;br /&gt;
#Click save to save the settings.&lt;br /&gt;
&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
&lt;br /&gt;
==DNS Editor==&lt;br /&gt;
'''READ FIRST''' When a new domain is added to WCP all DNS records are also created (in most cases). Clicking on the DNS Editor will open a window with these records, for editing, adding and deleting. Most times nothing needs to be done other than pointing your domain to the Primary and Secondary DNS Servers listed under [https://wiki.hostek.com/WCP_(Windows_based_Control_Panel)#Site_Details WCP Site Details].&lt;br /&gt;
&lt;br /&gt;
===Create a new DNS record===&lt;br /&gt;
#Click '''Add DNS''' Record button&lt;br /&gt;
#Enter Name for record (If DNS record name is your domain name please leave this Name - text box blank as the control panel will automatically add your domain name)&lt;br /&gt;
#Choose the Record type (A, CNAME, MX, NS, TXT, SPF, SRV)&lt;br /&gt;
#Enter Data Type&lt;br /&gt;
#Generally leave the TTL (Time To Live) as the default 86400&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===Update DNS records===&lt;br /&gt;
#To update an existing DNS record click the '''Pencil''' icon next to the record you would like to update.&lt;br /&gt;
#You will then be able to change the Name of the record, the Type of record, Data of the record, and Time to Live.&lt;br /&gt;
#Once updated Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===SVR Record Fields===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Name: _service._protocol&lt;br /&gt;
Type: SRV&lt;br /&gt;
Data: priority weight port address&lt;br /&gt;
TTL: 86400&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Name: _sip._udp&lt;br /&gt;
Type: SRV&lt;br /&gt;
Data: 10 5 4030 sip.mydomain.com&lt;br /&gt;
TTL: 86400&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===SPF Records===&lt;br /&gt;
An SPF Record (simply an entry into the DNS records) is used by mail servers to know if mail coming from an address at your domain is really allowed to be sent from the sending mail server.&lt;br /&gt;
&lt;br /&gt;
If you will be using our servers send email related to your domain, you would generally use an SPF record like the following:&amp;lt;pre&amp;gt;&amp;quot;v=spf1 a mx include:spf.hostek.com -all&amp;quot;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For our Resellers that don't want to use hostek.com, use an SPF Record like:&amp;lt;pre&amp;gt;&amp;quot;v=spf1 a mx include:spf.ezhostingserver.com -all&amp;quot;&amp;lt;/pre&amp;gt;&lt;br /&gt;
'''Steps to add an SPF Record to your domain:'''&lt;br /&gt;
Assuming that your DNS is managed with us:&lt;br /&gt;
#Log in to your hosting control panel at wcp.hostek.com&lt;br /&gt;
#Open the DNS Editor (DNS Manager) section&lt;br /&gt;
#Click on Add Record. &lt;br /&gt;
#Leave the Name field blank. &lt;br /&gt;
#For the Type, choose TXT&lt;br /&gt;
#For the Data enter the SPF Record detail as you need, using the sample provided above.&lt;br /&gt;
&lt;br /&gt;
'''Basic information related to some SPF Record options:'''&lt;br /&gt;
&lt;br /&gt;
The '''&amp;quot;-all&amp;quot;''' may be adjusted on a per customer basis to any of the following depending on their needs:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''-all''' = mail not sent from an address listed in the SPF record should be completely rejected (Hard Fail). Mail that IS sent from an address in the SPF record may be given a lower spam score by some servers.&lt;br /&gt;
&lt;br /&gt;
'''~all''' = mail not sent from an address listed in the SPF record should be given a higher spam score(Soft Fail). Mail that IS sent from an address in the SPF record may be given a lower spam score by some servers.&lt;br /&gt;
&lt;br /&gt;
'''?all''' = mail not sent from an address listed in the SPF record should be treated normally as if the domain did not have an spf record (Neutral). Mail that IS sent from an address in the SPF record may be given a lower spam score by some servers.&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
&lt;br /&gt;
==Sub Domains==&lt;br /&gt;
*A sub-domain is like an extension of your domain name. For example, if your domain name were myfamily.com, a sub-domain would be in the following form: dad.myfamily.com or mom.myfamily.com etc.&lt;br /&gt;
*You can have a sub-domain pointed to any folder within your web site. If a visitor goes directly to that sub-domain he will be taken to that folder, not to your site's main page.&lt;br /&gt;
#Click on the '''Sub Domains icon'''&lt;br /&gt;
#Click &amp;quot;'''Add'''&amp;quot; sub Domain button &lt;br /&gt;
#Enter sub domain name in Name text box. This will automatically populate the Folder text box to a folder with the same name as the subdomain.&lt;br /&gt;
#If you wish this Subdomain to point to a different folder you can click on the folder icon and choose the directory you would like your Sub Domain to point to.&lt;br /&gt;
#Click on the &amp;quot;'''Save'''&amp;quot; Icon.&lt;br /&gt;
#This will create the sub domain record within your domains DNS zone, &lt;br /&gt;
*If the domains name servers are not pointed to us you will need to manually create this record where your domains DNS is hosted.&lt;br /&gt;
[[Category:Control-Panels]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
&lt;br /&gt;
==Domain Alias==&lt;br /&gt;
*This will allow you to point 2 domains to the same website. How to create a Domain&lt;br /&gt;
#To create a domain alias you will click on the ''Domain Aliases icon''&lt;br /&gt;
#Click '''Add Domain Alias''' button&lt;br /&gt;
#Enter your Alias Name&lt;br /&gt;
#Click on the &amp;quot;'''Save'''&amp;quot; Icon.&lt;br /&gt;
*You will need to be sure that your Domain Alias has been registered and has the name servers pointed to the name servers found beneath the Site Details icon.&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
# Some helpful video tutorials showing how to install a select few applications easily within the WCP Control Panel are below:&lt;br /&gt;
&lt;br /&gt;
*Joomla - [http://hostek.com/tutorials/joomla_Installation_tutorial.html Installing Joomla Application]&lt;br /&gt;
&lt;br /&gt;
*Wordpress - [http://hostek.com/tutorials/wordpress_Installation_tutorial.html Installing Wordpress Application]&lt;br /&gt;
&lt;br /&gt;
*Mura - [http://hostek.com/tutorials/mura_Installation_tutorial.html Installing Mura Application]&lt;br /&gt;
&lt;br /&gt;
*Magento - [http://hostek.com/tutorials/magento_Installation_tutorial.html Installing Magento Application]&lt;br /&gt;
&lt;br /&gt;
*Oscommerce - [http://hostek.com/tutorials/oscommerce_Installation_tutorial.html Installing OsCommerce Application]&lt;br /&gt;
&lt;br /&gt;
==Email==&lt;br /&gt;
*Below is information on how to manage your email account within the WCP.&lt;br /&gt;
*'''FOR VPS''' You will also have &amp;quot;Admin&amp;quot; access to SmarterMail. Access webmail (click the webmail link in WCP) and login with user &amp;quot;admin&amp;quot; and the primary VPS password.&lt;br /&gt;
&lt;br /&gt;
==Email Users==&lt;br /&gt;
*Allows you to create Email users as well as log directly into users Webmail account&lt;br /&gt;
#Once you are logged into your WCP account, under the Email Section&lt;br /&gt;
#Click '''Users''' icon&lt;br /&gt;
#Click '''Add Email User''' button&lt;br /&gt;
#Enter email user name (Example: if you need the email address &amp;quot;admin@domain.com&amp;quot; enter the user &amp;quot;admin&amp;quot;)&lt;br /&gt;
#Enter password for Email user (**See note below regarding password requirements)&lt;br /&gt;
#Enter Display name (Usually set to the name of the person using the specific email account)&lt;br /&gt;
#Choose if you would like this user to have administrator rights&lt;br /&gt;
#Choose mail box size limit for this specific user&lt;br /&gt;
#Click on the '''Save'''&lt;br /&gt;
#'''NOTE Password requirements''' &lt;br /&gt;
*Minimum Length 6 Characters&lt;br /&gt;
*Must include Uppercase&lt;br /&gt;
*Must include Lowercase&lt;br /&gt;
*Must include Number&lt;br /&gt;
*Must include Special character&lt;br /&gt;
*Password cannot match username&lt;br /&gt;
&lt;br /&gt;
==Edit existing Email user==&lt;br /&gt;
#Once you are logged into your WCP account, under the Email Section&lt;br /&gt;
#Click '''Users''' icon&lt;br /&gt;
#Click '''pencil icon''' next to user to update&lt;br /&gt;
#Update information&lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
&lt;br /&gt;
==Web mail==&lt;br /&gt;
#Once you are logged into your WCP account, under the Email Section&lt;br /&gt;
#Click '''Login button''' next to user you would like access the mail for&lt;br /&gt;
*Web Mail Provides links to access the Webmail program as well as to access mail before domain propagation to our mail server&lt;br /&gt;
#Click '''Web Mail icon'''&lt;br /&gt;
#If domain is propagated and pointed to our mail server you can click the '''webmail''' link to access the SmarterMail webmail log in screen.&lt;br /&gt;
#If you domain has not yet propagated to our mail server click the &amp;quot;Pr-Propagation Web Mail&amp;quot; link to access the SmarterMail webmail log in screen.&lt;br /&gt;
&lt;br /&gt;
==Mail Forwarding==&lt;br /&gt;
#Once you are logged into your WCP account, under the Email Section&lt;br /&gt;
*Allows you to set up an email alias.&lt;br /&gt;
#Click on the '''Forwarding button'''&lt;br /&gt;
#Enter Alias name&lt;br /&gt;
#Enter address for email to this Alias to be forwarded to&lt;br /&gt;
#Click on the '''Save Icon'''&lt;br /&gt;
&lt;br /&gt;
==MySQL database==&lt;br /&gt;
*MySQL Allow you to create a MySQL database under your domain&lt;br /&gt;
#Click on '''MySQL icon'''&lt;br /&gt;
#To add new database click '''Add MySQL Database'''&lt;br /&gt;
#Enter Database Name&lt;br /&gt;
#Enter Username&lt;br /&gt;
#Enter Password&lt;br /&gt;
#(If you need a coldfusion DSN place check in check box and provide Coldfusion DSN name)&lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
&lt;br /&gt;
*To create new user for existing database&lt;br /&gt;
#Click '''MySQL icon'''&lt;br /&gt;
#Click '''Add new user button'''&lt;br /&gt;
#Enter Username&lt;br /&gt;
#Enter Password&lt;br /&gt;
#Place check mark in check box for each database you would like this user to have access to.&lt;br /&gt;
#To update the password on existing database user.&lt;br /&gt;
#Click '''MySQL icon'''&lt;br /&gt;
#Click '''pencil icon next to Username'''&lt;br /&gt;
#enter new password&lt;br /&gt;
#Click on the '''Save Icon'''.&lt;br /&gt;
&lt;br /&gt;
*To update the password on existing database user.&lt;br /&gt;
#Click '''MySQL icon'''&lt;br /&gt;
#Click pencil '''icon next to Username'''&lt;br /&gt;
#Enter new password&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
==PhpMyAdmin==&lt;br /&gt;
*Allows you to log directly into your MySQL database to manage.&lt;br /&gt;
#Click on '''PhpMyAdmin link'''&lt;br /&gt;
#If you are not logged directly into your MySQL database simply enter the server your database is located on (Can be found by clicking the MySQL icon) and enter your Username and Password.&lt;br /&gt;
#Once logged in your Databases will be displayed on the Left, click on '''database name''' to manage that database.&lt;br /&gt;
*Here is a Video that will show how to create a MySQL database and how to Backup / Restore the database through PhpMyAdmin: [http://hostek.com/tutorials/managing_mysql.html PhpMyAdmin Backup and Restore Video]&lt;br /&gt;
&lt;br /&gt;
==MSSQL==&lt;br /&gt;
===To create MSSQL databases and users===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#To add a new database click '''Add MSSQL''' database&lt;br /&gt;
#Enter Database Name&lt;br /&gt;
#Choose database size&lt;br /&gt;
#Enter or Choose existing Username&lt;br /&gt;
#Enter Password&lt;br /&gt;
#Choose '''Default Collation''' (Usually left as default)&lt;br /&gt;
#Choose '''Recovery Model''' (Usually left as Simple as we make daily full backups of all #databases which we keep for 7 days)&lt;br /&gt;
#Place a Check mark in the box for Coldfusion DataSource if ColdFusion DSN is needed.&lt;br /&gt;
#Enter ColdFusion DSN name.&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===To edit an existing MSSQL database===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#Click '''Pencil icon''' next to database name to edit&lt;br /&gt;
#Edit field necessary&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===Changing the MSSQL Transaction Log (Recovery Model) Settings===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#Click '''Pencil icon''' next to database name to edit&lt;br /&gt;
#Click the dropdown menu next to '''Recovery Model''' and select either '''Full''' or '''Simple'''&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===To edit password for existing MSSQL user===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#Click '''Pencil next''' to user to edit&lt;br /&gt;
#Update password&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===To add new MSSQL user===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#Click '''Add MSSQL''' User button&lt;br /&gt;
#Enter username&lt;br /&gt;
#Enter password&lt;br /&gt;
#Place checkmark next to each database this users needs access to&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===To make an MS SQL user the DB Owner===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#Click '''Pencil icon''' next to database name to edit&lt;br /&gt;
#Select the owner you wish to be the DB Owner&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
==MSSQL Tools (Shared Hosting)==&lt;br /&gt;
*Allows you to log directly into MyLittleAdmin to manage your MSSQL database or MyLittleBackup to backup or restore your MSSQL database.&lt;br /&gt;
#Click '''MSSQL Tools''' icon&lt;br /&gt;
#Select database to Manage/Backup/Restore&lt;br /&gt;
#Select User with access to database needed&lt;br /&gt;
#Choose myLittleAdmin button to manage your MSSQL database&lt;br /&gt;
#Choose myLittleBackup button to backup/restore your database&lt;br /&gt;
&lt;br /&gt;
==DataSources(DSN's)==&lt;br /&gt;
===Create a MySQL or MS SQL Server DSN===&lt;br /&gt;
*Allows to create a DSN for an existing database for your domain.&lt;br /&gt;
#To create a MySQL or MSSQL DataSource&lt;br /&gt;
#Click '''DataSources''' (DSN's) icon&lt;br /&gt;
#Choose MySQL or MSSQL from drop down depending on the database this is connecting to&lt;br /&gt;
#Click '''Add DSN'''&lt;br /&gt;
#Choose DSN type Access/MySQL/MSSQL&lt;br /&gt;
#Enter DSN name&lt;br /&gt;
#Enter Database name DSN will be connecting to&lt;br /&gt;
#Enter Server (Can by found by viewing database DSN is for)&lt;br /&gt;
#Enter Username for database DSN is connecting to&lt;br /&gt;
#Enter Password for database DSN is connecting to&lt;br /&gt;
#Choose if it is a ColdFusion DSN&lt;br /&gt;
#Choose if you need Unicode Support&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
===Create an Access DSN===&lt;br /&gt;
*To create an Access DataSource&lt;br /&gt;
#Click '''DataSources''' (DSN's) icon&lt;br /&gt;
#Choose '''Access''' from drop down menu&lt;br /&gt;
#Enter DSN Name&lt;br /&gt;
#Click on Folder icon to choose correct directory Access Database is located in&lt;br /&gt;
#Enter Username (If one is set for your Access Database, if not this can be left blank)&lt;br /&gt;
#Enter Password (If one is protecting your Database, if not this can be left blank)&lt;br /&gt;
#Choose if it needs to be a ColdFusion DSN&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
===Editing DSNs===&lt;br /&gt;
*To edit existing DSN&lt;br /&gt;
#Click '''DataSources''' (DSN's) icon&lt;br /&gt;
#Click pencil next to DSN to edit&lt;br /&gt;
#Update information&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
==Railo Web Administrator==&lt;br /&gt;
The Railo Web Administrator gives you access to Railo-specific settings for your account such as Railo Datasources and other configuration options.&lt;br /&gt;
===Create a Railo Datasource (DSN)===&lt;br /&gt;
#From within your control panel, click on the &amp;quot;Railo Web Administrator&amp;quot; icon&lt;br /&gt;
#Inside the Railo Web Administrator click the &amp;quot;Datasources&amp;quot; link from the lefthand navigation menu. &lt;br /&gt;
#Select the database type, enter a name, and click ''Create''.&lt;br /&gt;
#Configure your datasource with all the correct server, username and password. &lt;br /&gt;
#*'''IMPORTANT''': If using MySQL also make sure the option for '''Alias Handling''' is enabled.&lt;br /&gt;
#Click the ''Create'' button, and your DSN will be available for use on your site.&lt;br /&gt;
&lt;br /&gt;
==Security and SSL==&lt;br /&gt;
Installing a new certificate, or re-keying an existing certificate.&lt;br /&gt;
&lt;br /&gt;
===Dedicated SSL===&lt;br /&gt;
'''VPS Hosting''' Request a static IP for sites added to your server which require SSL, we will provision the IP on the server and assign it in WCP for use with installing a Dedicated SSL.&lt;br /&gt;
&lt;br /&gt;
'''Shared Hosting''' If ordering a new certificate from Hostek.com you will be assigned a static IP, if importing from another provider you will need to request a static IP be assigned before the certificate can be activated.&lt;br /&gt;
&lt;br /&gt;
#Login to WCP, (select the domain, in some cases), Security and SSL, '''Dedicated SSL (click)'''&lt;br /&gt;
#Click '''Generate CSR (Certificate Signing Request)'''&lt;br /&gt;
#Fill in the requested information.&lt;br /&gt;
#Click Create&lt;br /&gt;
#Copy the '''Certificate Signing Request (CSR)''', which should be used when placing a new SSL order or re-keying an existing certificate.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Shared SSL(shared hosting)===&lt;br /&gt;
#Login to WCP, (select the domain, in some cases), Security and SSL, '''Shared SSL (click)'''&lt;br /&gt;
#Click '''Enable'''&lt;br /&gt;
#The URL for your sites shared SSL will be provided. &lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
To view your account's quotas and how much resources you have available:&lt;br /&gt;
#Log in to WCP&lt;br /&gt;
#Click the '''Usage''' icon&lt;br /&gt;
&lt;br /&gt;
Here you can see the limits and amount used for the following resources: '''Site Disk Space, Site Bandwidth, Mail Disk Space, MySQL Disk Space,''' and '''MS SQL Disk Space''' (if applicable)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==VPS Manager (VPS Accounts)==&lt;br /&gt;
&lt;br /&gt;
Overview of the '''VPS Manager''' section in the control panel.&lt;br /&gt;
&lt;br /&gt;
===Service Groups===&lt;br /&gt;
&lt;br /&gt;
The service groups section allows you to specify which services a domain should use when being created or when databases are added to the domain.  If you only have a single VPS server, the default service group will usually be used for everything.  However, if you have multiple servers, you can use this section to allow new domains to use services on both servers (I.E. Use one server for the website and another for the database).  It is also possible to create service groups that offers fewer services in-case you want to create domains with no dns, no mail, or no website.&lt;br /&gt;
&lt;br /&gt;
Options overview:&lt;br /&gt;
* '''Name''': A name you will use to reference this group of services when creating or modifying a domain&lt;br /&gt;
* '''Site Service''': The server on which the website for this domain will be created.&lt;br /&gt;
* '''Mail Service''': The server on which the mail account for this domain will be created.&lt;br /&gt;
* '''DNS Service''': The server on which the DNS zone for this domain will be created.&lt;br /&gt;
* '''MSSQL Service''': The server on which new MSSQL databases will be created.&lt;br /&gt;
* '''MySQL Service''': The server on which new MySQL databases will be created.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Server Details===&lt;br /&gt;
&lt;br /&gt;
This page gives a brief overview of resource resource usage on the server and the server's 'Computer Name' as configured in Windows.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Firewall Management===&lt;br /&gt;
&lt;br /&gt;
This page allows you to manage the Windows Firewall rules for some common ports.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Service Manager===&lt;br /&gt;
&lt;br /&gt;
This page allows you to start, restart, or stop some common services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Add Domain===&lt;br /&gt;
&lt;br /&gt;
This page allows you to add new VPS domains.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===List Domains===&lt;br /&gt;
&lt;br /&gt;
This page lists existing VPS domains and allows you to remove or modify them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Control-Panels]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
[[Category:ColdFusion-VPS]]&lt;br /&gt;
[[Category:Railo-VPS]]&lt;br /&gt;
[[Category:Windows-VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=WCP_(Windows_based_Control_Panel)&amp;diff=1997</id>
		<title>WCP (Windows based Control Panel)</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=WCP_(Windows_based_Control_Panel)&amp;diff=1997"/>
				<updated>2014-02-19T15:58:12Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Unlimited Plans - Add Additional Domains */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==How To Login To My WCP Control Panel==&lt;br /&gt;
#To manage your domain, login to the WCP Control Panel, using the details below&lt;br /&gt;
#URL: '''https://wcp.hostek.com'''/&lt;br /&gt;
#Username: &lt;br /&gt;
#Password: ** same as your cp.hostek.com password **&lt;br /&gt;
*You can also login to the control panel through your billing control panel https://cp.hostek.com/clientarea.php&lt;br /&gt;
#Click on  ''''My Services'''' 'Click the '''small Green arrow''' on the the notepad to the right'&lt;br /&gt;
#Now click the '''Login to Control Panel''' Icon'''&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
&lt;br /&gt;
==Custom URL for the WCP Control Panel==&lt;br /&gt;
The WCP can als be accessed by wcp.your_domain.com&lt;br /&gt;
&lt;br /&gt;
Setup wcp.your_domain.com as an A record for &amp;quot;184.175.108.65&amp;quot; or as a CName record for &amp;quot;wcp.ezhostingserver.com&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===Resellers and VPS - WCP White label Settings===&lt;br /&gt;
Resellers and VPS customers can setup their logo in their Reseller control panel, however those additional features will only be avaialble when using the specific domain they configured in the reseller setttings. The reseller settings will be available using ANY url, and as mentioned within these settings the reseller &amp;quot;URL&amp;quot; can be setup and other whitelabel options making WCP the ultimate Windows Control Panel&lt;br /&gt;
&lt;br /&gt;
[[Category: Windows VPS]]&lt;br /&gt;
[[Category:Resellers]]&lt;br /&gt;
&lt;br /&gt;
==Adding Additional Control Panel Logins==&lt;br /&gt;
*This will allow you to set up additional control panel logins for you or for others involved in editing or managing your account. You can limit the Permissions or options available for them to manage.&lt;br /&gt;
#Login to the WCP Control Panel, using the details below&lt;br /&gt;
#URL: '''https://wcp.hostek.com'''/&lt;br /&gt;
#Username: &lt;br /&gt;
#Password: ** same as your cp.hostek.com password **&lt;br /&gt;
#Click on the '''Control panel Logins''' tab, then click on the '''Add''' icon.&lt;br /&gt;
#Put the &amp;quot;Username, Password and if you want them to have Limited Permission.&lt;br /&gt;
#If you want them to have Limited Permission then check the '''Limited Permission''' box. This will load a dropdown where you can select what privlages they have to manage.&lt;br /&gt;
#Once you are done click the '''Save''' icon at the bottom of the screen.&lt;br /&gt;
#Once it has been added you or they can login by going to https://wcp.hostek.com/Login.aspx and using the username and password that you set for it.&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
&lt;br /&gt;
==Unlimited Plans - Add Additional Domains==&lt;br /&gt;
Use these steps to add additional domains under your Windows Unlimited account.&lt;br /&gt;
&lt;br /&gt;
#Login to your WCP control panel&lt;br /&gt;
#*Windows Unlimited: For adding a third (or more) domain select any domain from the upper right hand corner dropdown box &amp;quot;Domains&amp;quot;.&lt;br /&gt;
#Within the &amp;quot;Domains&amp;quot; box click the &amp;quot;Addon Domains&amp;quot; icon.&lt;br /&gt;
#Click &amp;quot;Add&amp;quot; and enter the following:&lt;br /&gt;
#*Domain Name&lt;br /&gt;
#*Username&lt;br /&gt;
#*Password&lt;br /&gt;
#Click &amp;quot;Save&amp;quot;&lt;br /&gt;
#To manage the domain, you can now select it from the domains list dropdown box.&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
&lt;br /&gt;
==Site Details==&lt;br /&gt;
We recommend you review the &amp;quot;Site Settings&amp;quot; which includes many important details about your domain including:&lt;br /&gt;
&lt;br /&gt;
WCP (login and select domain) &amp;gt; Website Settings &amp;gt; '''Site Details'''&lt;br /&gt;
&lt;br /&gt;
*Testing URL&lt;br /&gt;
*Primary and Secondary DNS&lt;br /&gt;
*Site IP&lt;br /&gt;
*Web Root Path&lt;br /&gt;
*FTP Root Path&lt;br /&gt;
===IIS Version &amp;amp; ColdFusion Version (if applicable)===&lt;br /&gt;
To get your domain's IIS Version and ColdFusion Version (if applicable) log in to WCP and under the Settings section, click on the Site Details option.&lt;br /&gt;
&lt;br /&gt;
==FTP Accounts==&lt;br /&gt;
*Adding or editing FTP accounts.&lt;br /&gt;
#click on the '''FTP Accounts''' tab.&lt;br /&gt;
#To edit one click on the little '''Pencil Icon''' to the left, to add one click on the '''Add FTP User''' tab.&lt;br /&gt;
#If you are adding one you will set the Username:, Password: and folder then click the #Click on the '''Save''' Icon.&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
&lt;br /&gt;
==File Manager== &lt;br /&gt;
*Basic File Operations, file uploading and editing now supported- Zip, GZip, and Tar Archive support.&lt;br /&gt;
#Click on the '''File Manager icon''', then the '''Login icon''' on the next screen.&lt;br /&gt;
#To create files or Directory's outside the WWW root folder right click and click on the '''Create File''' or '''Create Directory''' option.&lt;br /&gt;
#Click the '''Continue Icon''' to add this.&lt;br /&gt;
#To add/edit files in the WWWroot click on the '''wwwroot file'''.&lt;br /&gt;
#once you are in you can add, edit or delete by right clicking and clicking on the options given.&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
&lt;br /&gt;
==Password Protect Folders==&lt;br /&gt;
#Under the Files section click on '''Password Protect'''.&lt;br /&gt;
#Click on '''Manage Protected Folders'''.&lt;br /&gt;
#Browse to and click on the folder that you want to set this up on and check '''Enable Protection'''. &lt;br /&gt;
#Select a user from the list or click on '''Manage Users''', then click '''Add''', and enter username and password then Save. &lt;br /&gt;
&lt;br /&gt;
==IIS Settings==&lt;br /&gt;
*Setting up error pages, default pages, advanced settings, etc.&lt;br /&gt;
===Custom Error pages===&lt;br /&gt;
#Click on '''IIS Settings''' in your WCP&lt;br /&gt;
#Click the edit button next to the error page you want to change&lt;br /&gt;
#Uncheck the '''Use System Default''' checkbox &lt;br /&gt;
#Enter the path to your custom error page &lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
===Mime Types===&lt;br /&gt;
#Click on '''IIS Settings''' in your WCP&lt;br /&gt;
#Scroll to the bottom of the window and click '''Add Mime Type'''&lt;br /&gt;
#Enter the extension for the Mime Type&lt;br /&gt;
#Enter the Mime Type information&lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
*An example Mime Type is below:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Extension: .mp3&lt;br /&gt;
Mime Type: audio/mpeg&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
More information here: https://wiki.hostek.com/Mime_types&lt;br /&gt;
&lt;br /&gt;
===Default Docs===&lt;br /&gt;
*Select a default document and drag it to the top position to set it as top priority&lt;br /&gt;
*Click '''Add''' to add a default doc&lt;br /&gt;
*Click the red '''X''' to delete a default doc&lt;br /&gt;
*Click a default doc and change the name&lt;br /&gt;
*For example: change '''&amp;quot;index.htm&amp;quot;''' to '''&amp;quot;index.asp&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
===Advanced===&lt;br /&gt;
====Recycle Application Pool====&lt;br /&gt;
If you see a Service Unavailable message on your site, or have a general need to recycle a site's IIS Application Pool, you can do so through this section of WCP. &lt;br /&gt;
#Click the '''IIS Settings''' icon in WCP&lt;br /&gt;
#Click the '''Advanced''' tab in the '''IIS Settings''' section&lt;br /&gt;
#Click the '''Recycle''' button.&lt;br /&gt;
&lt;br /&gt;
==PHP Settings==&lt;br /&gt;
If you notice you need a different version of php or want to check what version you are using you can update it to that version if it is installed to the server or can enable custom php.ini settings to use specifically for your domain.&lt;br /&gt;
#Click the configuration for the domain or subdomain you want updated.&lt;br /&gt;
#Select the version you wish to use.&lt;br /&gt;
#Check the checkbox if you want to enable a custom php.ini file&lt;br /&gt;
#Click save to save the settings.&lt;br /&gt;
&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
&lt;br /&gt;
==DNS Editor==&lt;br /&gt;
'''READ FIRST''' When a new domain is added to WCP all DNS records are also created (in most cases). Clicking on the DNS Editor will open a window with these records, for editing, adding and deleting. Most times nothing needs to be done other than pointing your domain to the Primary and Secondary DNS Servers listed under [https://wiki.hostek.com/WCP_(Windows_based_Control_Panel)#Site_Details WCP Site Details].&lt;br /&gt;
&lt;br /&gt;
===Create a new DNS record===&lt;br /&gt;
#Click '''Add DNS''' Record button&lt;br /&gt;
#Enter Name for record (If DNS record name is your domain name please leave this Name - text box blank as the control panel will automatically add your domain name)&lt;br /&gt;
#Choose the Record type (A, CNAME, MX, NS, TXT, SPF, SRV)&lt;br /&gt;
#Enter Data Type&lt;br /&gt;
#Generally leave the TTL (Time To Live) as the default 86400&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===Update DNS records===&lt;br /&gt;
#To update an existing DNS record click the '''Pencil''' icon next to the record you would like to update.&lt;br /&gt;
#You will then be able to change the Name of the record, the Type of record, Data of the record, and Time to Live.&lt;br /&gt;
#Once updated Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===SVR Record Fields===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Name: _service._protocol&lt;br /&gt;
Type: SRV&lt;br /&gt;
Data: priority weight port address&lt;br /&gt;
TTL: 86400&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Name: _sip._udp&lt;br /&gt;
Type: SRV&lt;br /&gt;
Data: 10 5 4030 sip.mydomain.com&lt;br /&gt;
TTL: 86400&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===SPF Records===&lt;br /&gt;
An SPF Record (simply an entry into the DNS records) is used by mail servers to know if mail coming from an address at your domain is really allowed to be sent from the sending mail server.&lt;br /&gt;
&lt;br /&gt;
If you will be using our servers send email related to your domain, you would generally use an SPF record like the following:&amp;lt;pre&amp;gt;&amp;quot;v=spf1 a mx include:spf.hostek.com -all&amp;quot;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For our Resellers that don't want to use hostek.com, use an SPF Record like:&amp;lt;pre&amp;gt;&amp;quot;v=spf1 a mx include:spf.ezhostingserver.com -all&amp;quot;&amp;lt;/pre&amp;gt;&lt;br /&gt;
'''Steps to add an SPF Record to your domain:'''&lt;br /&gt;
Assuming that your DNS is managed with us:&lt;br /&gt;
#Log in to your hosting control panel at wcp.hostek.com&lt;br /&gt;
#Open the DNS Editor (DNS Manager) section&lt;br /&gt;
#Click on Add Record. &lt;br /&gt;
#Leave the Name field blank. &lt;br /&gt;
#For the Type, choose TXT&lt;br /&gt;
#For the Data enter the SPF Record detail as you need, using the sample provided above.&lt;br /&gt;
&lt;br /&gt;
'''Basic information related to some SPF Record options:'''&lt;br /&gt;
&lt;br /&gt;
The '''&amp;quot;-all&amp;quot;''' may be adjusted on a per customer basis to any of the following depending on their needs:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''-all''' = mail not sent from an address listed in the SPF record should be completely rejected (Hard Fail). Mail that IS sent from an address in the SPF record may be given a lower spam score by some servers.&lt;br /&gt;
&lt;br /&gt;
'''~all''' = mail not sent from an address listed in the SPF record should be given a higher spam score(Soft Fail). Mail that IS sent from an address in the SPF record may be given a lower spam score by some servers.&lt;br /&gt;
&lt;br /&gt;
'''?all''' = mail not sent from an address listed in the SPF record should be treated normally as if the domain did not have an spf record (Neutral). Mail that IS sent from an address in the SPF record may be given a lower spam score by some servers.&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
&lt;br /&gt;
==Sub Domains==&lt;br /&gt;
*A sub-domain is like an extension of your domain name. For example, if your domain name were myfamily.com, a sub-domain would be in the following form: dad.myfamily.com or mom.myfamily.com etc.&lt;br /&gt;
*You can have a sub-domain pointed to any folder within your web site. If a visitor goes directly to that sub-domain he will be taken to that folder, not to your site's main page.&lt;br /&gt;
#Click on the '''Sub Domains icon'''&lt;br /&gt;
#Click &amp;quot;'''Add'''&amp;quot; sub Domain button &lt;br /&gt;
#Enter sub domain name in Name text box. This will automatically populate the Folder text box to a folder with the same name as the subdomain.&lt;br /&gt;
#If you wish this Subdomain to point to a different folder you can click on the folder icon and choose the directory you would like your Sub Domain to point to.&lt;br /&gt;
#Click on the &amp;quot;'''Save'''&amp;quot; Icon.&lt;br /&gt;
#This will create the sub domain record within your domains DNS zone, &lt;br /&gt;
*If the domains name servers are not pointed to us you will need to manually create this record where your domains DNS is hosted.&lt;br /&gt;
[[Category:Control-Panels]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
&lt;br /&gt;
==Domain Alias==&lt;br /&gt;
*This will allow you to point 2 domains to the same website. How to create a Domain&lt;br /&gt;
#To create a domain alias you will click on the ''Domain Aliases icon''&lt;br /&gt;
#Click '''Add Domain Alias''' button&lt;br /&gt;
#Enter your Alias Name&lt;br /&gt;
#Click on the &amp;quot;'''Save'''&amp;quot; Icon.&lt;br /&gt;
*You will need to be sure that your Domain Alias has been registered and has the name servers pointed to the name servers found beneath the Site Details icon.&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
# Some helpful video tutorials showing how to install a select few applications easily within the WCP Control Panel are below:&lt;br /&gt;
&lt;br /&gt;
*Joomla - [http://hostek.com/tutorials/joomla_Installation_tutorial.html Installing Joomla Application]&lt;br /&gt;
&lt;br /&gt;
*Wordpress - [http://hostek.com/tutorials/wordpress_Installation_tutorial.html Installing Wordpress Application]&lt;br /&gt;
&lt;br /&gt;
*Mura - [http://hostek.com/tutorials/mura_Installation_tutorial.html Installing Mura Application]&lt;br /&gt;
&lt;br /&gt;
*Magento - [http://hostek.com/tutorials/magento_Installation_tutorial.html Installing Magento Application]&lt;br /&gt;
&lt;br /&gt;
*Oscommerce - [http://hostek.com/tutorials/oscommerce_Installation_tutorial.html Installing OsCommerce Application]&lt;br /&gt;
&lt;br /&gt;
==Email==&lt;br /&gt;
*Below is information on how to manage your email account within the WCP.&lt;br /&gt;
*'''FOR VPS''' You will also have &amp;quot;Admin&amp;quot; access to SmarterMail. Access webmail (click the webmail link in WCP) and login with user &amp;quot;admin&amp;quot; and the primary VPS password.&lt;br /&gt;
&lt;br /&gt;
==Email Users==&lt;br /&gt;
*Allows you to create Email users as well as log directly into users Webmail account&lt;br /&gt;
#Once you are logged into your WCP account, under the Email Section&lt;br /&gt;
#Click '''Users''' icon&lt;br /&gt;
#Click '''Add Email User''' button&lt;br /&gt;
#Enter email user name (Example: if you need the email address &amp;quot;admin@domain.com&amp;quot; enter the user &amp;quot;admin&amp;quot;)&lt;br /&gt;
#Enter password for Email user (**See note below regarding password requirements)&lt;br /&gt;
#Enter Display name (Usually set to the name of the person using the specific email account)&lt;br /&gt;
#Choose if you would like this user to have administrator rights&lt;br /&gt;
#Choose mail box size limit for this specific user&lt;br /&gt;
#Click on the '''Save'''&lt;br /&gt;
#'''NOTE Password requirements''' &lt;br /&gt;
*Minimum Length 6 Characters&lt;br /&gt;
*Must include Uppercase&lt;br /&gt;
*Must include Lowercase&lt;br /&gt;
*Must include Number&lt;br /&gt;
*Must include Special character&lt;br /&gt;
*Password cannot match username&lt;br /&gt;
&lt;br /&gt;
==Edit existing Email user==&lt;br /&gt;
#Once you are logged into your WCP account, under the Email Section&lt;br /&gt;
#Click '''Users''' icon&lt;br /&gt;
#Click '''pencil icon''' next to user to update&lt;br /&gt;
#Update information&lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
&lt;br /&gt;
==Web mail==&lt;br /&gt;
#Once you are logged into your WCP account, under the Email Section&lt;br /&gt;
#Click '''Login button''' next to user you would like access the mail for&lt;br /&gt;
*Web Mail Provides links to access the Webmail program as well as to access mail before domain propagation to our mail server&lt;br /&gt;
#Click '''Web Mail icon'''&lt;br /&gt;
#If domain is propagated and pointed to our mail server you can click the '''webmail''' link to access the SmarterMail webmail log in screen.&lt;br /&gt;
#If you domain has not yet propagated to our mail server click the &amp;quot;Pr-Propagation Web Mail&amp;quot; link to access the SmarterMail webmail log in screen.&lt;br /&gt;
&lt;br /&gt;
==Mail Forwarding==&lt;br /&gt;
#Once you are logged into your WCP account, under the Email Section&lt;br /&gt;
*Allows you to set up an email alias.&lt;br /&gt;
#Click on the '''Forwarding button'''&lt;br /&gt;
#Enter Alias name&lt;br /&gt;
#Enter address for email to this Alias to be forwarded to&lt;br /&gt;
#Click on the '''Save Icon'''&lt;br /&gt;
&lt;br /&gt;
==MySQL database==&lt;br /&gt;
*MySQL Allow you to create a MySQL database under your domain&lt;br /&gt;
#Click on '''MySQL icon'''&lt;br /&gt;
#To add new database click '''Add MySQL Database'''&lt;br /&gt;
#Enter Database Name&lt;br /&gt;
#Enter Username&lt;br /&gt;
#Enter Password&lt;br /&gt;
#(If you need a coldfusion DSN place check in check box and provide Coldfusion DSN name)&lt;br /&gt;
#Click '''Save'''&lt;br /&gt;
&lt;br /&gt;
*To create new user for existing database&lt;br /&gt;
#Click '''MySQL icon'''&lt;br /&gt;
#Click '''Add new user button'''&lt;br /&gt;
#Enter Username&lt;br /&gt;
#Enter Password&lt;br /&gt;
#Place check mark in check box for each database you would like this user to have access to.&lt;br /&gt;
#To update the password on existing database user.&lt;br /&gt;
#Click '''MySQL icon'''&lt;br /&gt;
#Click '''pencil icon next to Username'''&lt;br /&gt;
#enter new password&lt;br /&gt;
#Click on the '''Save Icon'''.&lt;br /&gt;
&lt;br /&gt;
*To update the password on existing database user.&lt;br /&gt;
#Click '''MySQL icon'''&lt;br /&gt;
#Click pencil '''icon next to Username'''&lt;br /&gt;
#Enter new password&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
==PhpMyAdmin==&lt;br /&gt;
*Allows you to log directly into your MySQL database to manage.&lt;br /&gt;
#Click on '''PhpMyAdmin link'''&lt;br /&gt;
#If you are not logged directly into your MySQL database simply enter the server your database is located on (Can be found by clicking the MySQL icon) and enter your Username and Password.&lt;br /&gt;
#Once logged in your Databases will be displayed on the Left, click on '''database name''' to manage that database.&lt;br /&gt;
*Here is a Video that will show how to create a MySQL database and how to Backup / Restore the database through PhpMyAdmin: [http://hostek.com/tutorials/managing_mysql.html PhpMyAdmin Backup and Restore Video]&lt;br /&gt;
&lt;br /&gt;
==MSSQL==&lt;br /&gt;
===To create MSSQL databases and users===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#To add a new database click '''Add MSSQL''' database&lt;br /&gt;
#Enter Database Name&lt;br /&gt;
#Choose database size&lt;br /&gt;
#Enter or Choose existing Username&lt;br /&gt;
#Enter Password&lt;br /&gt;
#Choose '''Default Collation''' (Usually left as default)&lt;br /&gt;
#Choose '''Recovery Model''' (Usually left as Simple as we make daily full backups of all #databases which we keep for 7 days)&lt;br /&gt;
#Place a Check mark in the box for Coldfusion DataSource if ColdFusion DSN is needed.&lt;br /&gt;
#Enter ColdFusion DSN name.&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===To edit an existing MSSQL database===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#Click '''Pencil icon''' next to database name to edit&lt;br /&gt;
#Edit field necessary&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===Changing the MSSQL Transaction Log (Recovery Model) Settings===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#Click '''Pencil icon''' next to database name to edit&lt;br /&gt;
#Click the dropdown menu next to '''Recovery Model''' and select either '''Full''' or '''Simple'''&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===To edit password for existing MSSQL user===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#Click '''Pencil next''' to user to edit&lt;br /&gt;
#Update password&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===To add new MSSQL user===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#Click '''Add MSSQL''' User button&lt;br /&gt;
#Enter username&lt;br /&gt;
#Enter password&lt;br /&gt;
#Place checkmark next to each database this users needs access to&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
===To make an MS SQL user the DB Owner===&lt;br /&gt;
#Click '''MSSQL icon'''&lt;br /&gt;
#Click '''Pencil icon''' next to database name to edit&lt;br /&gt;
#Select the owner you wish to be the DB Owner&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
==MSSQL Tools (Shared Hosting)==&lt;br /&gt;
*Allows you to log directly into MyLittleAdmin to manage your MSSQL database or MyLittleBackup to backup or restore your MSSQL database.&lt;br /&gt;
#Click '''MSSQL Tools''' icon&lt;br /&gt;
#Select database to Manage/Backup/Restore&lt;br /&gt;
#Select User with access to database needed&lt;br /&gt;
#Choose myLittleAdmin button to manage your MSSQL database&lt;br /&gt;
#Choose myLittleBackup button to backup/restore your database&lt;br /&gt;
&lt;br /&gt;
==DataSources(DSN's)==&lt;br /&gt;
===Create a MySQL or MS SQL Server DSN===&lt;br /&gt;
*Allows to create a DSN for an existing database for your domain.&lt;br /&gt;
#To create a MySQL or MSSQL DataSource&lt;br /&gt;
#Click '''DataSources''' (DSN's) icon&lt;br /&gt;
#Choose MySQL or MSSQL from drop down depending on the database this is connecting to&lt;br /&gt;
#Click '''Add DSN'''&lt;br /&gt;
#Choose DSN type Access/MySQL/MSSQL&lt;br /&gt;
#Enter DSN name&lt;br /&gt;
#Enter Database name DSN will be connecting to&lt;br /&gt;
#Enter Server (Can by found by viewing database DSN is for)&lt;br /&gt;
#Enter Username for database DSN is connecting to&lt;br /&gt;
#Enter Password for database DSN is connecting to&lt;br /&gt;
#Choose if it is a ColdFusion DSN&lt;br /&gt;
#Choose if you need Unicode Support&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
===Create an Access DSN===&lt;br /&gt;
*To create an Access DataSource&lt;br /&gt;
#Click '''DataSources''' (DSN's) icon&lt;br /&gt;
#Choose '''Access''' from drop down menu&lt;br /&gt;
#Enter DSN Name&lt;br /&gt;
#Click on Folder icon to choose correct directory Access Database is located in&lt;br /&gt;
#Enter Username (If one is set for your Access Database, if not this can be left blank)&lt;br /&gt;
#Enter Password (If one is protecting your Database, if not this can be left blank)&lt;br /&gt;
#Choose if it needs to be a ColdFusion DSN&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
===Editing DSNs===&lt;br /&gt;
*To edit existing DSN&lt;br /&gt;
#Click '''DataSources''' (DSN's) icon&lt;br /&gt;
#Click pencil next to DSN to edit&lt;br /&gt;
#Update information&lt;br /&gt;
#Click on the '''Save''' Icon.&lt;br /&gt;
&lt;br /&gt;
==Railo Web Administrator==&lt;br /&gt;
The Railo Web Administrator gives you access to Railo-specific settings for your account such as Railo Datasources and other configuration options.&lt;br /&gt;
===Create a Railo Datasource (DSN)===&lt;br /&gt;
#From within your control panel, click on the &amp;quot;Railo Web Administrator&amp;quot; icon&lt;br /&gt;
#Inside the Railo Web Administrator click the &amp;quot;Datasources&amp;quot; link from the lefthand navigation menu. &lt;br /&gt;
#Select the database type, enter a name, and click ''Create''.&lt;br /&gt;
#Configure your datasource with all the correct server, username and password. &lt;br /&gt;
#*'''IMPORTANT''': If using MySQL also make sure the option for '''Alias Handling''' is enabled.&lt;br /&gt;
#Click the ''Create'' button, and your DSN will be available for use on your site.&lt;br /&gt;
&lt;br /&gt;
==Security and SSL==&lt;br /&gt;
Installing a new certificate, or re-keying an existing certificate.&lt;br /&gt;
&lt;br /&gt;
===Dedicated SSL===&lt;br /&gt;
'''VPS Hosting''' Request a static IP for sites added to your server which require SSL, we will provision the IP on the server and assign it in WCP for use with installing a Dedicated SSL.&lt;br /&gt;
&lt;br /&gt;
'''Shared Hosting''' If ordering a new certificate from Hostek.com you will be assigned a static IP, if importing from another provider you will need to request a static IP be assigned before the certificate can be activated.&lt;br /&gt;
&lt;br /&gt;
#Login to WCP, (select the domain, in some cases), Security and SSL, '''Dedicated SSL (click)'''&lt;br /&gt;
#Click '''Generate CSR (Certificate Signing Request)'''&lt;br /&gt;
#Fill in the requested information.&lt;br /&gt;
#Click Create&lt;br /&gt;
#Copy the '''Certificate Signing Request (CSR)''', which should be used when placing a new SSL order or re-keying an existing certificate.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Shared SSL(shared hosting)===&lt;br /&gt;
#Login to WCP, (select the domain, in some cases), Security and SSL, '''Shared SSL (click)'''&lt;br /&gt;
#Click '''Enable'''&lt;br /&gt;
#The URL for your sites shared SSL will be provided. &lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
To view your account's quotas and how much resources you have available:&lt;br /&gt;
#Log in to WCP&lt;br /&gt;
#Click the '''Usage''' icon&lt;br /&gt;
&lt;br /&gt;
Here you can see the limits and amount used for the following resources: '''Site Disk Space, Site Bandwidth, Mail Disk Space, MySQL Disk Space,''' and '''MS SQL Disk Space''' (if applicable)&lt;br /&gt;
&lt;br /&gt;
[[Category:Control-Panels]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:ColdFusion]]&lt;br /&gt;
[[Category:Railo]]&lt;br /&gt;
[[Category:ColdFusion-VPS]]&lt;br /&gt;
[[Category:Railo-VPS]]&lt;br /&gt;
[[Category:Windows-VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=CLR_Support_-_MS_SQL&amp;diff=1760</id>
		<title>CLR Support - MS SQL</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=CLR_Support_-_MS_SQL&amp;diff=1760"/>
				<updated>2013-11-01T16:36:49Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page discusses support for the CLR in MSSQL.&lt;br /&gt;
&lt;br /&gt;
==What is the CLR==&lt;br /&gt;
&lt;br /&gt;
CLR stands for &amp;quot;Common Language Runtime&amp;quot;.  This is the runtime that executes .Net code.  The CLR integration within MSSQL allows functions written in .Net code to be integrated with your SQL queries and stored procedures.&lt;br /&gt;
&lt;br /&gt;
Using the built-in SQL language to form queries will generally give you better performance than using the CLR as MSSQL is highly optimized for use with SQL.  However, there are some table structures, such as hierarchies and XML, that can be complicated to work with using traditional SQL as compared with .Net.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Is the CLR supported?==&lt;br /&gt;
&lt;br /&gt;
The CLR is supported for Dedicated/VPS servers only.  We do not currently support the CLR on our shared hosting servers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==If I am using shared hosting, what options do I have?==&lt;br /&gt;
&lt;br /&gt;
Since we do not support the CLR in MS SQL on our shared servers, you will need to pull the data into a local dataset in your application code to run any .net code on it.  This can be less efficient for code that works on a large rowset since it has to bring those rows over the network from the SQL server to the web server, but it will give you similar capabilities for working with the data using the .Net runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 11:35, 1 November 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Databases-MSSQL]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=CLR_Support_-_MS_SQL&amp;diff=1759</id>
		<title>CLR Support - MS SQL</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=CLR_Support_-_MS_SQL&amp;diff=1759"/>
				<updated>2013-11-01T16:36:17Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page discusses support for the CLR in MSSQL.&lt;br /&gt;
&lt;br /&gt;
==What is the CLR==&lt;br /&gt;
&lt;br /&gt;
CLR stands for &amp;quot;Common Language Runtime&amp;quot;.  This is the runtime that executes .Net code.  The CLR integration within MSSQL allows functions written in .Net code to be integrated with your SQL queries and stored procedures.&lt;br /&gt;
&lt;br /&gt;
Using the built-in SQL language to form queries will generally give you better performance than using the CLR as MSSQL is highly optimized for use with SQL.  However, there are some table structures, such as hierarchies and XML, that can be complicated to work with using traditional SQL as compared with .Net.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Is the CLR supported?==&lt;br /&gt;
&lt;br /&gt;
The CLR is supported for Dedicated/VPS servers only.  We do not currently support the CLR on our shared hosting servers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==If I am using shared hosting, what options do I have?==&lt;br /&gt;
&lt;br /&gt;
Since we do not support the CLR in MS SQL on our shared servers, you will need to pull the data into a local dataset in your application code to run any .net code on it.  This can be less efficient for code that works on a large rowset since it has to bring those rows over the network from the SQL server to the web server, but it will give you similar capabilities for working with the data using the .Net runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 11:35, 1 November 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:MS SQL]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=CLR_Support_-_MS_SQL&amp;diff=1758</id>
		<title>CLR Support - MS SQL</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=CLR_Support_-_MS_SQL&amp;diff=1758"/>
				<updated>2013-11-01T16:36:05Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page discusses support for the CLR in MSSQL.&lt;br /&gt;
&lt;br /&gt;
==What is the CLR==&lt;br /&gt;
&lt;br /&gt;
CLR stands for &amp;quot;Common Language Runtime&amp;quot;.  This is the runtime that executes .Net code.  The CLR integration within MSSQL allows functions written in .Net code to be integrated with your SQL queries and stored procedures.&lt;br /&gt;
&lt;br /&gt;
Using the built-in SQL language to form queries will generally give you better performance than using the CLR as MSSQL is highly optimized for use with SQL.  However, there are some table structures, such as hierarchies and XML, that can be complicated to work with using traditional SQL as compared with .Net.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Is the CLR supported?==&lt;br /&gt;
&lt;br /&gt;
The CLR is supported for Dedicated/VPS servers only.  We do not currently support the CLR on our shared hosting servers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==If I am using shared hosting, what options do I have?==&lt;br /&gt;
&lt;br /&gt;
Since we do not support the CLR in MS SQL on our shared servers, you will need to pull the data into a local dataset in your application code to run any .net code on it.  This can be less efficient for code that works on a large rowset since it has to bring those rows over the network from the SQL server to the web server, but it will give you similar capabilities for working with the data using the .Net runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 11:35, 1 November 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:MS SQL]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=CLR_Support_-_MS_SQL&amp;diff=1757</id>
		<title>CLR Support - MS SQL</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=CLR_Support_-_MS_SQL&amp;diff=1757"/>
				<updated>2013-11-01T16:35:26Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: Created page with &amp;quot;This page discusses support for the CLR in MSSQL.  ==What is the CLR==  CLR stands for &amp;quot;Common Language Runtime&amp;quot;.  This is the runtime that executes .Net code.  The CLR integr...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page discusses support for the CLR in MSSQL.&lt;br /&gt;
&lt;br /&gt;
==What is the CLR==&lt;br /&gt;
&lt;br /&gt;
CLR stands for &amp;quot;Common Language Runtime&amp;quot;.  This is the runtime that executes .Net code.  The CLR integration within MSSQL allows functions written in .Net code to be integrated with your SQL queries and stored procedures.&lt;br /&gt;
&lt;br /&gt;
Using the built-in SQL language to form queries will generally give you better performance than using the CLR as MSSQL is highly optimized for use with SQL.  However, there are some table structures, such as hierarchies and XML, that can be complicated to work with using traditional SQL as compared with .Net.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Is the CLR supported?==&lt;br /&gt;
&lt;br /&gt;
The CLR is supported for Dedicated/VPS servers only.  We do not currently support the CLR on our shared hosting servers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==If I am using shared hosting, what options do I have?==&lt;br /&gt;
&lt;br /&gt;
Since we do not support the CLR in MS SQL on our shared servers, you will need to pull the data into a local dataset in your application code to run any .net code on it.  This can be less efficient for code that works on a large rowset since it has to bring those rows over the network from the SQL server to the web server, but it will give you similar capabilities for working with the data using the .Net runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 11:35, 1 November 2013 (CDT)&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=Ubuntu&amp;diff=1675</id>
		<title>Ubuntu</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=Ubuntu&amp;diff=1675"/>
				<updated>2013-10-04T18:45:40Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: Created page with &amp;quot;This article contains information related to common questions or issues related to Ubuntu VPS servers.  ==How to prevent '''sudo''' from prompting for a password==  These are ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article contains information related to common questions or issues related to Ubuntu VPS servers.&lt;br /&gt;
&lt;br /&gt;
==How to prevent '''sudo''' from prompting for a password==&lt;br /&gt;
&lt;br /&gt;
These are instructions to prevent '''sudo''' for prompting for a password each time it is used.&lt;br /&gt;
&lt;br /&gt;
===Step 1 - Update '''sudo''' configuration===&lt;br /&gt;
To prevent '''sudo''' from prompting for a password, you must modify the '''sudo''' configuration.  You can use the following command to edit the configuration:&lt;br /&gt;
 sudo visudo&lt;br /&gt;
&lt;br /&gt;
Modify the following line in the configuration:&lt;br /&gt;
&lt;br /&gt;
BEFORE:&lt;br /&gt;
 %sudo ALL=(ALL:ALL) ALL&lt;br /&gt;
&lt;br /&gt;
AFTER:&lt;br /&gt;
 %sudo ALL=NOPASSWD: ALL&lt;br /&gt;
&lt;br /&gt;
Save the configuration by entering: CTRL-X, Y&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Step 2 - Verify you are a member of the '''sudo''' group===&lt;br /&gt;
In order for this change to work for your user, you must also be a member of the '''sudo''' group.  Test running a command with sudo.  If you are still prompted for a password, then run the following command:&lt;br /&gt;
 useradd -G sudo YourUsername&lt;br /&gt;
(replace 'YourUsername' with your actual username)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Additional Information===&lt;br /&gt;
'''Sudo''' also has the ability to prompt for password on specific commands.  See the below documentation for details on advanced '''sudo''' configuration.&lt;br /&gt;
&lt;br /&gt;
Ubuntu documentation for '''sudo''':&lt;br /&gt;
&lt;br /&gt;
[https://help.ubuntu.com/community/Sudoers https://help.ubuntu.com/community/Sudoers]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 13:45, 4 October 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
[[Category:Linux VPS]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=Web_Deploy&amp;diff=1667</id>
		<title>Web Deploy</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=Web_Deploy&amp;diff=1667"/>
				<updated>2013-09-16T16:02:50Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* Using Web Deploy with Web Matrix */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article contains details for using Microsoft's Web Deploy on our servers.&lt;br /&gt;
&lt;br /&gt;
==What is Web Deploy==&lt;br /&gt;
&lt;br /&gt;
Microsoft's Web Matrix tool, as well as several other web publishing tools from Microsoft, use what is called &amp;quot;Web Deploy&amp;quot; for publishing sites. Web Deploy not only publishes your files, but also attempts to publish any IIS and database settings necessary for the application to work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Web Deploy is only available on our Windows 2008 and above servers with IIS 7 or above. You can check your server version by logging into the control panel at https://wcp.hostek.com/ and choosing Site Details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Creating a Web Deploy Enable User==&lt;br /&gt;
&lt;br /&gt;
Servers with Web Deploy enabled will have an additional option when adding/editing ftp users within the control panel.  Under the '''Advanced''' tab, the checkbox '''IIS Management''' will be visible.  Checking that option will enable the current FTP user to authenticate with the Web Deploy service.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Using Web Deploy with Web Matrix==&lt;br /&gt;
&lt;br /&gt;
In order to use Web Deploy, you must enable it for one of your FTP users.  You will then use that FTP user's credentials to authenticate when publishing with Web Deploy. You can do this by adding or editing an FTP user and checking the '''IIS Management''' check box under the '''Advanced''' tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When publishing with Web Matrix using Web Deploy, you should use the following settings:&lt;br /&gt;
&lt;br /&gt;
 Protocol: Web Deploy&lt;br /&gt;
 &lt;br /&gt;
 Server: secure##.ezhostingserver.com&lt;br /&gt;
 (The above is available in the 'Site Details' section in the control panel. Simply remove the 'http://domainname-com.' part from the server name.)&lt;br /&gt;
 &lt;br /&gt;
 User name: ** your FTP username **&lt;br /&gt;
 Password: ** your FTP password **&lt;br /&gt;
 &lt;br /&gt;
 Site name: domainname.com&lt;br /&gt;
  (Replace domainname.com with your actual domain - do not include the 'www' on the domain name.  If you are publishing to a sub-folder, add the sub-folder name to the end of the 'Site name'. Do not end with a trailing forward slash.)&lt;br /&gt;
 &lt;br /&gt;
 Destination URL: http://www.domainname.com&lt;br /&gt;
  (This will be the URL of the location to which you are publishing. If your domain name is not pointing to the site yet, use the full pre-propegation URL listed&lt;br /&gt;
   in the 'Site Details' section. If you are publishing to a sub-folder, add the sub-folder name to the end of the URL. Do not end the URL in a forward slash.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After entering the details, press the '''Validate Connection''' button to test the connection. If successful, you are ready to publish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 10:41, 26 August 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=ISAPI_Rewrite&amp;diff=1649</id>
		<title>ISAPI Rewrite</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=ISAPI_Rewrite&amp;diff=1649"/>
				<updated>2013-09-03T13:45:59Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: /* SSL */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
= ISAPI_Rewrites and Redirects Version 3 =&lt;br /&gt;
&lt;br /&gt;
ISAPI_Rewrite Version 3 is a powerful URL manipulation engine based on regular expressions. Hostek.com has lots of experience with Isapi_Rewrite Hosting. Here are a couple of examples of using Isapi_Rewrite Version 3:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;NOTE:&amp;lt;/b&amp;gt; Place the rewrite rules in a file named .htaccess and place it at the web root (ie, /wwwroot folder)&amp;lt;br /&amp;gt;If you do not have a .htaccess file created already then use a text editor like Notpad and save the file as a .htaccess or use the File Manager in the hosting control panel to create the .htaccess file on the server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Simple Redirects and Rewrites ==&lt;br /&gt;
&lt;br /&gt;
==== Redirecting to a different domain ====&lt;br /&gt;
If you need to redirect your website to another website&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_HOST} ^(www\.)?domain\.com$ [NC]&lt;br /&gt;
RewriteRule ^(.*)$ http://www.newdomain.com/$1 [QSA,R=301]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Rewrite a Folder to another Folder ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteBase /&lt;br /&gt;
&lt;br /&gt;
RewriteRule ^oldfolder$ /correctfolder [NC,R=301,L] &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Redirect File Names ====&lt;br /&gt;
To have your index.htm page auto redirect to index.asp user this example&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
RewriteRule index.htm index.asp [I,O,R=301,L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Subfolder Rewrite ====&lt;br /&gt;
To redirect your domain to a subfolder of that domain example: www.domain.com to www.domain.com/folder&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
&lt;br /&gt;
# Exclude requests already going to /subfolder to avoid an infinite loop&lt;br /&gt;
RewriteRule ^subfolder.*$ - [NC,L]&lt;br /&gt;
&lt;br /&gt;
# Rewrite normal requests to /subfolder&lt;br /&gt;
RewriteRule ^(.*)$ /subfolder/$1 [L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== non-www. to www. Redirects ====&lt;br /&gt;
&lt;br /&gt;
Redirecting non-www version to www., example domain.com to www.domain.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_HOST} !^$&lt;br /&gt;
RewriteCond %{HTTP_HOST} !^www\. [NC]&lt;br /&gt;
RewriteCond %{HTTPS}s ^on(s)|&lt;br /&gt;
RewriteRule ^ http%1://www.%{HTTP_HOST}%{REQUEST_URI} [R=301,L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== URL Rewrite ====&lt;br /&gt;
&lt;br /&gt;
Suppose you have URL like www.example.com/foo.asp?a=A&amp;amp;b=B&amp;amp;c=C and you want to access it as www.example.com/foo.asp/a/A/b/B/c/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteRule ^(.*?\.asp)/([^/]*)/([^/]*)(/.+)? $1$4?$2=$3 [NC,LP,QSA&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== WordPress Permalinks ====&lt;br /&gt;
&lt;br /&gt;
WordPress Permalinks using mod_rewrite are for Linux, but ISAPI_Rewrite does offer the equivalent. If you want to have index.php not show in the url try using these in your .htaccess file.&lt;br /&gt;
&lt;br /&gt;
If your WordPress site is in the wwwroot folder.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
# BEGIN WordPress&lt;br /&gt;
&lt;br /&gt;
#Options +Followsymlinks&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
RewriteBase /&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-f&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-d&lt;br /&gt;
RewriteRule . /index.php [NC,L]&lt;br /&gt;
&lt;br /&gt;
# END WordPress&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If your WordPress site is in a subfolder.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
# BEGIN WordPress&lt;br /&gt;
&lt;br /&gt;
#Options +Followsymlinks&lt;br /&gt;
RewriteEngine On&lt;br /&gt;
RewriteBase /&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-f&lt;br /&gt;
RewriteCond %{REQUEST_FILENAME} !-d&lt;br /&gt;
RewriteRule . /subfolder/index.php [NC,L]&lt;br /&gt;
&lt;br /&gt;
# END WordPress&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== HTTP to HTTPS SSL Rewrites ==&lt;br /&gt;
&lt;br /&gt;
==== SSL ====&lt;br /&gt;
Suppose you have URL like http://shop.example.com and you want your visitors to be redirected to https://shop.example.com&lt;br /&gt;
&lt;br /&gt;
Here is example how to force SSL for certain folder. Simply put following rules into the .htaccess file in this folder:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
#Fix missing trailing slash char on folders&lt;br /&gt;
RewriteRule ^([^.?]+[^.?/])$ $1/ [R,L]&lt;br /&gt;
&lt;br /&gt;
#Redirect non-HTTPS to HTTPS&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{SERVER_PORT} !443&lt;br /&gt;
RewriteCond %{HTTP_HOST} ^(www\.)?(.+)$&lt;br /&gt;
RewriteRule ^(.*)$ https://%2/$1 [R,L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Non-www, non-HTTPS to www, HTTPS redirects====&lt;br /&gt;
 RewriteEngine on&lt;br /&gt;
 RewriteCond %{SERVER_PORT} !443&lt;br /&gt;
 RewriteCond %{HTTP_HOST} !^$&lt;br /&gt;
 RewriteCond %{HTTP_HOST} !^www\. [NC]&lt;br /&gt;
 RewriteCond %{HTTPS}s ^on(s)|&lt;br /&gt;
 RewriteRule ^(.*)$ https://www.%{HTTP_HOST}/$1 [R,L]&lt;br /&gt;
&lt;br /&gt;
==== Shared SSL ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
# handle non-www HTTPS redirects. Consecutive conditions are implicitly ANDed together.&lt;br /&gt;
RewriteCond %{SERVER_PORT} ^443$&lt;br /&gt;
RewriteCond  %{HTTP_HOST}  ^(?!www\.).*mywebsite\.com$&lt;br /&gt;
RedirectRule ^/(.*)$ https://secure#.ezhostingserver.com/mywebsite-com/$1 [R=301]&lt;br /&gt;
&lt;br /&gt;
# All requests arriving to this point either use www for the hostname, or use &lt;br /&gt;
# HTTP for the protocol. &lt;br /&gt;
&lt;br /&gt;
# handle non-www non-HTTPS redirects&lt;br /&gt;
RewriteCond  %{HTTP_HOST}  ^(?!www\.).*mywebsite\.com$&lt;br /&gt;
RedirectRule ^/(.*)$ http://www.mywebsite.com/$1 [R=301]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Site Crawlers ==&lt;br /&gt;
&lt;br /&gt;
Example on how to prevent certain spiders from crawling your site.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_USER_AGENT} ^Baiduspider.*$&lt;br /&gt;
RewriteRule .* /block.htm&lt;br /&gt;
&lt;br /&gt;
RewriteCond %{HTTP_USER_AGENT} ^Yandex.*$&lt;br /&gt;
RewriteRule .* /block.htm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Wild-Card Subdomains &amp;amp; Variables Rewrites ==&lt;br /&gt;
&lt;br /&gt;
Here is an example to show how to get the variables from positions 1 and 2 without it mattering how many items are in the URL. In other words, a good example for a rewrite rule for optional parameters.&lt;br /&gt;
&lt;br /&gt;
==== Variable URLs ====&lt;br /&gt;
Let's say you want to have a URL display like: http://your_domain.com/some-folder/34-77-some-key-word.html&lt;br /&gt;
But you want that to really process a query like:http://your_domain.com/folder/search.asp?country=34&amp;amp;city=77&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
RewriteEngine on&lt;br /&gt;
RewriteRule ^some-folder/([^-]+)-([^-]+)-.*$ /folder/search.asp?country=$1&amp;amp;city=$2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Wild-Card Subdomains ====&lt;br /&gt;
&lt;br /&gt;
Rewrite all wild-card sub-domain requests to a folder without affecting &amp;quot;your_domain.com&amp;quot; or &amp;quot;www.your_domain.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&lt;br /&gt;
white-space: -moz-pre-wrap;&lt;br /&gt;
white-space: -pre-wrap;&lt;br /&gt;
white-space: -o-pre-wrap;&lt;br /&gt;
word-wrap: break-word&amp;quot;&amp;gt;&lt;br /&gt;
# Ignore requests that are already rewritten &lt;br /&gt;
RewriteRule ^subdomainfolder/.*$ - [NC,L]&lt;br /&gt;
&lt;br /&gt;
# Rewrite all requests to non-www sub-domains to /subdomainfolder &lt;br /&gt;
RewriteCond %{HTTP_HOST} !^(www\.)?your_domain\.com$ [NC] &lt;br /&gt;
RewriteRule ^(.*)$ /subdomainfolder/$1 [L]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For more Examples and other uses please visit [http://www.helicontech.com/isapi_rewrite/doc/examples.htm#SEF Helicon Tech]&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:Tutorials]]&lt;br /&gt;
[[Category:ISAPI_Rewrite]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=Web_Deploy&amp;diff=1632</id>
		<title>Web Deploy</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=Web_Deploy&amp;diff=1632"/>
				<updated>2013-08-26T15:41:32Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article contains details for using Microsoft's Web Deploy on our servers.&lt;br /&gt;
&lt;br /&gt;
==What is Web Deploy==&lt;br /&gt;
&lt;br /&gt;
Microsoft's Web Matrix tool, as well as several other web publishing tools from Microsoft, use what is called &amp;quot;Web Deploy&amp;quot; for publishing sites. Web Deploy not only publishes your files, but also attempts to publish any IIS and database settings necessary for the application to work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Web Deploy is only available on our Windows 2008 and above servers with IIS 7 or above. You can check your server version by logging into the control panel at https://wcp.hostek.com/ and choosing Site Details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Creating a Web Deploy Enable User==&lt;br /&gt;
&lt;br /&gt;
Servers with Web Deploy enabled will have an additional option when adding/editing ftp users within the control panel.  Under the '''Advanced''' tab, the checkbox '''IIS Management''' will be visible.  Checking that option will enable the current FTP user to authenticate with the Web Deploy service.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Using Web Deploy with Web Matrix==&lt;br /&gt;
&lt;br /&gt;
In order to use Web Deploy, you must enable it for one of your FTP users.  You will then use that FTP user's credentials to authenticate when publishing with Web Deploy. You can do this by adding or editing an FTP user and checking the '''IIS Management''' check box under the '''Advanced''' tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When publishing with Web Matrix using Web Deploy, you should use the following settings:&lt;br /&gt;
&lt;br /&gt;
 Protocol: Web Deploy&lt;br /&gt;
 &lt;br /&gt;
 Server: secure##.ezhostingserver.com&lt;br /&gt;
 (The above is available in the 'Site Details' section in the control panel. Simply remove the 'http://domainname-com.' part from the server name.)&lt;br /&gt;
 &lt;br /&gt;
 User name: ** your FTP username **&lt;br /&gt;
 Password: ** your FTP password **&lt;br /&gt;
 &lt;br /&gt;
 Site name: domainname.com&lt;br /&gt;
 (replace domainname.com with your actual domain - do not include the 'www' on the domain name)&lt;br /&gt;
 &lt;br /&gt;
 Destination URL: http://www.domainname.com&lt;br /&gt;
  (This will be the URL of the location to which you are publishing. If your domain name is not pointing to the site yet, use the full pre-propegation URL listed&lt;br /&gt;
   in the 'Site Details' section. If you are publishing to a sub-folder, add the sub-folder name to the end of the URL. Do not end the URL in a forward slash.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After entering the details, press the '''Validate Connection''' button to test the connection. If successful, you are ready to publish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 10:41, 26 August 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=Web_Deploy&amp;diff=1631</id>
		<title>Web Deploy</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=Web_Deploy&amp;diff=1631"/>
				<updated>2013-08-26T15:40:38Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: Created page with &amp;quot;This article contains details for using Microsoft's Web Deploy on our servers.  ==What is Web Deploy==  Microsoft's Web Matrix tool, as well as several other web publishing to...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article contains details for using Microsoft's Web Deploy on our servers.&lt;br /&gt;
&lt;br /&gt;
==What is Web Deploy==&lt;br /&gt;
&lt;br /&gt;
Microsoft's Web Matrix tool, as well as several other web publishing tools from Microsoft, use what is called &amp;quot;Web Deploy&amp;quot; for publishing sites. Web Deploy not only publishes your files, but also attempts to publish any IIS and database settings necessary for the application to work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Web Deploy is only available on our Windows 2008 and above servers with IIS 7 or above. You can check your server version by logging into the control panel at https://wcp.hostek.com/ and choosing Site Details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Creating a Web Deploy Enable User==&lt;br /&gt;
&lt;br /&gt;
Servers with Web Deploy enabled will have an additional option when adding/editing ftp users within the control panel.  Under the '''Advanced''' tab, the checkbox '''IIS Management''' will be visible.  Checking that option will enable the current FTP user to authenticate with the Web Deploy service.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Using Web Deploy with Web Matrix==&lt;br /&gt;
&lt;br /&gt;
In order to use Web Deploy, you must enable it for one of your FTP users.  You will then use that FTP user's credentials to authenticate when publishing with Web Deploy. You can do this by adding or editing an FTP user and checking the '''IIS Management''' check box under the '''Advanced''' tab.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When publishing with Web Matrix using Web Deploy, you should use the following settings:&lt;br /&gt;
&lt;br /&gt;
 Protocol: Web Deploy&lt;br /&gt;
 &lt;br /&gt;
 Server: secure##.ezhostingserver.com&lt;br /&gt;
 (The above is available in the 'Site Details' section in the control panel. Simply remove the 'http://domainname-com.' part from the server name.)&lt;br /&gt;
 &lt;br /&gt;
 User name: ** your FTP username **&lt;br /&gt;
 Password: ** your FTP password **&lt;br /&gt;
 &lt;br /&gt;
 Site name: domainname.com&lt;br /&gt;
 (replace domainname.com with your actual domain - do not include the 'www' on the domain name)&lt;br /&gt;
 &lt;br /&gt;
 Destination URL: http://www.domainname.com&lt;br /&gt;
  (This will be the URL of the location to which you are publishing. If your domain name is not pointing to the site yet, use the full pre-propegation URL listed&lt;br /&gt;
   in the 'Site Details' section. If you are publishing to a sub-folder, add the sub-folder name to the end of the URL. Do not end the URL in a forward slash.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After entering the details, press the '''Validate Connection''' button to test the connection. If successful, you are ready to publish.&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows]&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	<entry>
		<id>https://wiki.hostek.com/index.php?title=PowerShell_Scripts&amp;diff=1623</id>
		<title>PowerShell Scripts</title>
		<link rel="alternate" type="text/html" href="https://wiki.hostek.com/index.php?title=PowerShell_Scripts&amp;diff=1623"/>
				<updated>2013-08-19T20:20:34Z</updated>
		
		<summary type="html">&lt;p&gt;Davidd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a repository of PowerShell Scripts for server management tasks.&lt;br /&gt;
&lt;br /&gt;
==Disk Usage Warning==&lt;br /&gt;
&lt;br /&gt;
This script allows you to send an e-mail if disk free-space is below a particular percentage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;powershell&amp;quot;&amp;gt;&lt;br /&gt;
 #SETTINGS&lt;br /&gt;
 $Computers = 'server1' # multiple servers should be formmated: 'server1', 'server2', 'server3'.  The user executing this script must have administrative access to all servers.&lt;br /&gt;
 $WarnPercentage = 15&lt;br /&gt;
 $SmtpHost = 'mail.domainname.com'&lt;br /&gt;
 $SmtpPort = 25&lt;br /&gt;
 $FromAddress = 'disk-monitor@domainname.com'&lt;br /&gt;
 $Recipients = 'admin@domainname.com' # multiple recipients should be separated with commas: 'user1@domainname.com,user2@domainname.com,user3@domainname.com'&lt;br /&gt;
 #SETTINGS&lt;br /&gt;
 &lt;br /&gt;
 #GET DISK OVERAGES&lt;br /&gt;
 $Overages = Get-WmiObject Win32_LogicalDisk -Filter &amp;quot;DriveType=3&amp;quot; -ComputerName $Computers| `&lt;br /&gt;
     Where { (100 * ($_.FreeSpace / $_.Size)) -le $WarnPercentage }| `&lt;br /&gt;
     Select SystemName, DeviceID, @{ Name=&amp;quot;FreeSpace(GB)&amp;quot;; Expression={&amp;quot;{0:N}&amp;quot; -f ($_.FreeSpace / 1GB) }}&lt;br /&gt;
 &lt;br /&gt;
 $OverageCount = @($Overages).Length&lt;br /&gt;
 #GET DISK OVERAGES&lt;br /&gt;
 &lt;br /&gt;
 if ($OverageCount -gt 0) {&lt;br /&gt;
     #SEND EMAIL&lt;br /&gt;
     $Subject = &amp;quot;$OverageCount drives are below $WarnPercentage% free space&amp;quot;&lt;br /&gt;
     $Body = &amp;quot;Warning, the following drives are below $WarnPercentage% free space:`r`n`r`n$($Overages|Out-String -Width 80)&amp;quot;&lt;br /&gt;
     $SmtpClient = New-Object System.Net.Mail.SmtpClient($SmtpHost, $SmtpPort)&lt;br /&gt;
     $SmtpClient.Send($FromAddress, $Recipients, $Subject, $Body)&lt;br /&gt;
     $SmtpClient.Dispose()&lt;br /&gt;
     #SEND EMAIL&lt;br /&gt;
 }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Example Usage:&lt;br /&gt;
&lt;br /&gt;
 powershell -File CheckDiskUsage.ps1&lt;br /&gt;
&lt;br /&gt;
==GZip All Files in Directory==&lt;br /&gt;
&lt;br /&gt;
This script will gzip compress all files within a folder.  The original file will be replaced with a .gz file starting with the same name.  This can be useful for compressing SQL backups or Log files on a schedule.&lt;br /&gt;
&lt;br /&gt;
Optional parameter '''Days''' specifies how many days old a file must be in order to be gzipped.  This is useful for log folders where you may want the last couple days to remain unzipped&lt;br /&gt;
&lt;br /&gt;
Option switch '''-Recurse''' allows the script to include all sub-directories.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;powershell&amp;quot;&amp;gt;&lt;br /&gt;
param(&lt;br /&gt;
    [string]$Directory = $(throw 'Parameter ''Directory'' is required.'),&lt;br /&gt;
    [int]$Days = 0,&lt;br /&gt;
    [switch]$Recurse = $false&lt;br /&gt;
)&lt;br /&gt;
&lt;br /&gt;
$Date = [System.DateTime]::Now.AddDays($Days * -1)&lt;br /&gt;
&lt;br /&gt;
if ($(Test-Path $Directory) -eq $false) {&lt;br /&gt;
    throw &amp;quot;Directory does not exist: $Directory&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
foreach ($file in $(Get-ChildItem -Path $Directory -File -Recurse:$Recurse|Where-Object {$_.Name -match '^(?!.*\.gz$)' -and $_.LastWriteTime -lt $Date})) {&lt;br /&gt;
    $fsFile = New-Object System.IO.FileStream ($file.FullName, [IO.FileMode]::Open, [IO.FileAccess]::Read, [IO.FileShare]::Read);&lt;br /&gt;
    $fsGZip = New-Object System.IO.FileStream (&amp;quot;$($file.FullName).gz&amp;quot;, [IO.FileMode]::CreateNew, [IO.FileAccess]::Write, [IO.FileShare]::None)&lt;br /&gt;
    $gzSream = New-Object System.IO.Compression.GzipStream ($fsGZip, [IO.Compression.CompressionMode]::Compress)&lt;br /&gt;
&lt;br /&gt;
    $gzipped = $false&lt;br /&gt;
&lt;br /&gt;
    try {&lt;br /&gt;
        &lt;br /&gt;
        $BUFFER_SIZE = 1024 * 256&lt;br /&gt;
        $buffer = New-Object byte[]($BUFFER_SIZE);&lt;br /&gt;
        $bytesRead = -1&lt;br /&gt;
&lt;br /&gt;
        while ($bytesRead -ne 0) {&lt;br /&gt;
            $bytesRead = $fsFile.Read($buffer, 0, $BUFFER_SIZE)&lt;br /&gt;
            $gzSream.Write($buffer, 0, $bytesRead)&lt;br /&gt;
        }&lt;br /&gt;
&lt;br /&gt;
        $gzipped = $true&lt;br /&gt;
    }&lt;br /&gt;
    finally {&lt;br /&gt;
        $gzSream.Dispose();&lt;br /&gt;
        $fsGZip.Dispose();&lt;br /&gt;
        $fsFile.Dispose();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    if ($gzipped) {&lt;br /&gt;
        Remove-Item $file.FullName&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Example Usage:&lt;br /&gt;
&lt;br /&gt;
 powershell -File GZipDirContents.ps1 C:\FULL\PATH\TO\DIRECTORY 1 -Recurse&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Scheduled Service Restart Script==&lt;br /&gt;
&lt;br /&gt;
This script can be used to restart a service via a scheduled task.  The script will kill the process if the service does not stop within 60 seconds, and it will send an e-mail notification if the service does not start back up within 120 seconds and continue attempting starts every 120 seconds and sending additional notifications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;powershell&amp;quot;&amp;gt;&lt;br /&gt;
$ServiceName = 'Name of Service' # NAME OF SERVICE TO RESTART&lt;br /&gt;
$ProcessName = 'ServiceProcessName.exe' # NAME OF PROCESS TO KILL IF SERVICE FAILS TO STOP&lt;br /&gt;
&lt;br /&gt;
$ServerName = 'svr1.servername.com'  # NAME OF SERVER FOR WARNING EMAIL IF SERVICE FAILS TO START&lt;br /&gt;
$EmailFrom = &amp;quot;autoservicerestart@$ServerName&amp;quot; # FROM ADDRESS FOR WARNING EMAIL IF SERVICE FAILS TO START&lt;br /&gt;
$EmailTo = 'address@your-mail-domain.com' # TO ADDRESS FOR WARNING EMAIL IF SERVICE FAILS TO START&lt;br /&gt;
&lt;br /&gt;
# GET SERVICE&lt;br /&gt;
$Service = Get-Service $ServiceName&lt;br /&gt;
&lt;br /&gt;
#VERIFY SERVICE IS RUNNING&lt;br /&gt;
if ($Service.Status -eq [System.ServiceProcess.ServiceControllerStatus]::Running) { &lt;br /&gt;
    &lt;br /&gt;
    #INITIATE SERVICE STOP&lt;br /&gt;
    $Service|Stop-Service&lt;br /&gt;
&lt;br /&gt;
    #WAIT UP TO 60 SECONDS FOR STOP&lt;br /&gt;
    $Service.WaitForStatus([System.ServiceProcess.ServiceControllerStatus]::Stopped, [System.TimeSpan]::Parse('00:01:00'))&lt;br /&gt;
&lt;br /&gt;
    #REFRESH SERVICE STATUS&lt;br /&gt;
    $Service.Refresh()&lt;br /&gt;
&lt;br /&gt;
    #CHECK IF SERVICE DID NOT SUCCESSFULLY STOP&lt;br /&gt;
    if ($Service.Status -ne [System.ServiceProcess.ServiceControllerStatus]::Stopped) {&lt;br /&gt;
        &lt;br /&gt;
        #KILL SERVICE PROCSES&lt;br /&gt;
        Stop-Process -Name $ProcessName -Force&lt;br /&gt;
&lt;br /&gt;
        #WAIT UP TO 5 SECONDS FOR SERVICE STATUS TO UPDATE&lt;br /&gt;
        $Service.WaitForStatus([System.ServiceProcess.ServiceControllerStatus]::Stopped, [System.TimeSpan]::Parse('00:00:05'))&lt;br /&gt;
&lt;br /&gt;
        #REFRESH SERVICE STATUS&lt;br /&gt;
        $Service.Refresh()&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    #ATTEMPT TO START SERVICE&lt;br /&gt;
    $Service.Start()&lt;br /&gt;
&lt;br /&gt;
    #WAIT UP TO 120 SECONDS FOR START&lt;br /&gt;
    $Service.WaitForStatus([System.ServiceProcess.ServiceControllerStatus]::Running, [System.TimeSpan]::Parse('00:02:00'))&lt;br /&gt;
&lt;br /&gt;
    #REFRESH SERVICE STATUS&lt;br /&gt;
    $Service.Refresh()&lt;br /&gt;
&lt;br /&gt;
    $smtp = $null&lt;br /&gt;
    #CHECK IF SERVICE HAS STARTED AND RUN THE FOLLOWING UNTIL IT HAS&lt;br /&gt;
    while ($Service.Status -ne [System.ServiceProcess.ServiceControllerStatus]::Running) {&lt;br /&gt;
        if ($smtp -eq $null) {&lt;br /&gt;
            $smtp = new-object Net.Mail.SmtpClient('localhost')&lt;br /&gt;
        }&lt;br /&gt;
&lt;br /&gt;
        $smtp.Send($EmailFrom, $EmailTo, &amp;quot;Automated Service Restart Warning: $ServiceName&amp;quot;, &amp;quot;Service '$ServiceName' has been configured to automatically restart on a schedule.  It failed to start back up at $([System.DateTime]::Now) during the scheduled restart.  Please check the service and verify that it starts back up.&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
        #ATTEMPT TO START SERVICE&lt;br /&gt;
        $Service.Start()&lt;br /&gt;
&lt;br /&gt;
        #WAIT UP TO 120 SECONDS FOR START&lt;br /&gt;
        $Service.WaitForStatus([System.ServiceProcess.ServiceControllerStatus]::Running, [System.TimeSpan]::Parse('00:02:00'))&lt;br /&gt;
&lt;br /&gt;
        #REFRESH SERVICE STATUS&lt;br /&gt;
        $Service.Refresh()&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Example Usage:&lt;br /&gt;
 powershell -File Restart-Service.ps1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Task Scheduling Commands==&lt;br /&gt;
&lt;br /&gt;
===Schedule to run at 2:00 AM daily===&lt;br /&gt;
 schtasks /create /tn &amp;quot;Task Name&amp;quot; /tr &amp;quot;PowerShell -File C:\Scripts\Script.ps1&amp;quot; /sc daily /st 02:00:00 /RU System&lt;br /&gt;
&lt;br /&gt;
===Schedule to run at 2:00 AM Sunday mornings===&lt;br /&gt;
 schtasks /create /tn &amp;quot;Task Name&amp;quot; /tr &amp;quot;PowerShell -File C:\Scripts\Script.ps1&amp;quot; /sc weekly /d SUN /st 02:00:00 /RU System&lt;br /&gt;
----&lt;br /&gt;
[[User:Davidd|Davidd]] ([[User talk:Davidd|talk]]) 15:17, 10 June 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
[[Category:VPS]]&lt;br /&gt;
__FORCETOC__&lt;/div&gt;</summary>
		<author><name>Davidd</name></author>	</entry>

	</feed>