The ones listed here:
http://www.cyberciti.biz/faq/rhel-fedora-centos-httpd-mod_security-configuration/

On 04/08/2014 03:45 PM, Felipe Costa wrote:
Hi There,

What configuration files are you missing?

- There is the Apache configuration, which loads ModSecuity.
- ModSecurity recommend configuration file, which is in the root of the repository: "modsecurity.conf-recommended".

For the rules, there are various options, including:
- http://spiderlabs.github.io/owasp-modsecurity-crs/
- http://www.modsecurity.org/projects/commercial/rules/

Br.,
Felipe "Zimmerle" Costa
Security Researcher, SpiderLabs

Trustwave | SMART SECURITY ON DEMAND
www.trustwave.com



On Apr 8, 2014, at 6:36 AM, Security Effect <securityeffect@outlook.com> wrote:

Hello everybody,

I installed mod_security 2.6.7 in RedHat 5, but although neither the "configure" nor the "make" nor the "make install" reported error, all the config files are missing.

Any idea why? First time setting up mod_security...
------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees_______________________________________________
mod-security-users mailing list
mod-security-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/mod-security-users
Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs:
http://www.modsecurity.org/projects/commercial/rules/
http://www.modsecurity.org/projects/commercial/support/




This transmission may contain information that is privileged, confidential, and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or use of the information contained herein (including any reliance thereon) is strictly prohibited. If you received this transmission in error, please immediately contact the sender and destroy the material in its entirety, whether in electronic or hard copy format.


------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees


_______________________________________________
mod-security-users mailing list
mod-security-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/mod-security-users
Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs:
http://www.modsecurity.org/projects/commercial/rules/
http://www.modsecurity.org/projects/commercial/support/