Check whether the Strict-Transport-Security header is configured for forced HTTPS connections
This only checks HSTS. For a comprehensive analysis, use the full page check.
You can also audit your entire site. Duplicate titles and descriptions, orphan pages, broken links between sections, and other site-wide issues can only be found with a full site audit.
If you don't have an SEO specialist, we can help fix the errors found.
HSTS (HTTP Strict Transport Security) is a security mechanism that tells the browser: all subsequent connections to this site must use HTTPS only. The Strict-Transport-Security header is sent by the server in the HTTP response, and after receiving it, the browser automatically converts all HTTP requests to the domain into HTTPS without making an insecure connection.
Without HSTS, the first connection to a site may be made over HTTP, creating a window for a man-in-the-middle (MITM) attack. An attacker can intercept the unprotected request and redirect the user to a phishing site. HSTS eliminates this vulnerability — the browser will never send an HTTP request to a domain with an active HSTS policy.
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload";Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"hstspreload.org for inclusion in the browser preload listProper HSTS configuration indirectly improves SEO. It ensures search bots always access the HTTPS version of pages, eliminates content duplication between HTTP and HTTPS, and speeds up loading by removing HTTP-to-HTTPS redirects. Google considers HTTPS a ranking factor, and HSTS ensures its unconditional use.
max-age=0, and browsers will remove the HSTS policy for the domain. However, if the domain was added to the HSTS Preload List, removal takes significant time as it requires browser updates. So before enabling preload, make sure HTTPS is reliably configured.