This HSTS tester is for checking whether a site is actually returning the Strict-Transport-Security header and whether the policy looks plausible for the URL you are testing. That matters in security reviews, deployment validation, CDN or reverse-proxy changes, and post-migration checks where HTTPS should be enforced consistently.
The page is not a full security audit. It is a focused browser-side header check for one important security policy. That narrow scope is useful because HSTS mistakes are often simple: the header is missing, the max-age is too short, subdomains are not included, or the behavior differs between environments.
A good practice is to test the exact hostname users hit, not just an origin server you happen to know. Security headers often change across proxies and delivery layers.
The page requests the target URL and inspects the returned headers for Strict-Transport-Security. The useful result is not only whether the header exists, but whether the visible directives align with the intended HTTPS policy.
That distinction matters because partial HSTS coverage can create a false sense of completion. A site may serve HTTPS correctly while still missing the header on the hostname or path you actually care about.
Post-deployment verification
A security ticket says HSTS was enabled in production. Use the page to confirm the header is actually being returned from the live hostname.
Environment comparison
A staging site and production site should behave the same way, but one may still be missing a header after a proxy change. Testing both quickly reveals the gap.
Change management check
After a CDN or certificate rollout, use a focused HSTS test before closing the task so the browser-side policy was not accidentally dropped.
What does HSTS do?
HSTS tells supporting browsers to use HTTPS for a site and avoid falling back to insecure HTTP after the policy has been seen.
What should I look for in the result?
Start with whether the header exists at all, then review whether the directive values match the policy your team intends to enforce.
Does this page replace a full security scan?
No. It is a focused header check for HSTS, not a full website security assessment.
What should I use next if I need more detail?
Use HTTP Header Checker for broader header inspection and HTTP Response Codes for status-code interpretation.
Don’t document the problem, fix it.
…
…