All-inclusive
All-inclusive Security Solution by SiteGround

All-inclusive

Description

This all-inclusive security plugin, made by SiteGround web hosting company, gives you easy control over your website security. It’s packed with features that allow you in 1 click to enable or disable WordPress settings and prevent a number of threats such as brute-forcing, compromised login, code vulnerability attacks, data theft and leaks, and more.

  • Hides your WordPress Version out of the box
  • Enables advanced XSS Vulnerability Protection
  • Disables XML-RPC protocol to prevent many vulnerabilities and attacks
  • 1-click setting to Disable RSS and ATOM Feeds
  • Option to Lock and Protect System Folders by default
  • Disables “Admin” Username
  • Disables Themes & Plugins Editor
  • Option to enable Two-Factor Authentication
  • Limit Login Attempts setting

On top,?SiteGround Security?experts have curated a list of “Recommended Vulnerabilities Protection Settings”, which are featured on the plugin’s dashboard for your convenience. Prioritise those and you’re good to go!

LOGIN SETTINGS

Here you can use the tools we’ve developed to protect your login page from unauthorized visitors, bots, and other malicious behavior.

CUSTOM LOGIN URL

Change the default login url to prevent attacks and have an easily memorisable login URL. You can also change the default sign-up url if you have that option enabled for your website.

Important!

You can revert to the default login type by using the following snippet.

add_action( 'init', 'remove_custom_login_url' );
function remove_custom_login_url() {
    update_option( 'sg_security_login_type', 'default' );
}        

LOGIN ACCESS

Login Access allows you to limit the access of the login page to a specific IP’s or a range of IP’s to prevent malicious login attempts or brute-force attacks.

Important!

If you lock yourself out of your admin panel, you can add the following option to your theme’s function.php, reload the site and then remove it once you have gained access. Keep in mind that this will also remove all IP’s that are allowed to access the login page and a re-configuration will be needed:

add_action( 'init', 'remove_login_access_data' );
function remove_login_access_data() {
    update_option( 'sg_login_access', array() );
}        

TWO-FACTOR AUTHENTICATION

Two-factor Authentication for Admin User will force all admins to provide a token, generated from the Google Authentication application when logging in.

Important!

You can force other roles to use the Two-Factor authentication as well. Once enabled, you can add your filter as the following.

add_filter( 'sg_security_2fa_roles', 'add_user_roles_to_2fa' );
function add_user_roles_to_2fa( $roles ) {
    $roles[] = 'your_role';
    return $roles;
}        

You can change the location of the 2FA encryption key file using SGS_ENCRYPTION_KEY_FILE_PATH constant defined in wp-config.php file. Make sure to use the full path to the file. Example:

// Custom path to SG Security Encryption key file.
define ( 'SGS_ENCRYPTION_KEY_FILE_PATH', '/home/fullpathtofile/sgs_encrypt_key.php');        

DISABLE COMMON USERNAMES

Using common usernames like ‘admin’ is a security threat that often results in unauthorised access. By enabling this option we will disable the creation of common usernames and if you already have one more users with a weak username, we’ll ask you to provide new one(s).

LIMIT LOGIN ATTEMPTS

With Limit Login Attempts you can specify the number of times users can try to log in with incorrect credentials. If they reach a specific limit, the IP they are attempting to log from will be blocked for an hour. If they continue with unsuccessful attempts, they will be restricted for 24 hours and 7 days after that.

Important!

If you lock yourself out of your admin panel, you can add the following option to your theme’s function.php, reload the site and then remove it once you have gained access. Keep in mind that this will also remove the unsuccessful attempts block for all IP’s:

add_action( 'init', 'remove_unsuccessfull_attempts_block' );
function remove_unsuccessfull_attempts_block() {
    update_option( 'sg_security_unsuccessful_login', array() );
}        

SITE SECURITY

With this toolset you can harden your WordPress аpplication and keep it safe from malware, exploits and other malicious actions.

LOCK AND PROTECT SYSTEM FOLDERS

Lock and Protect System Folders allows you to block any malicious or unauthorized scripts to be executed in your applications system folders.

If the Lock and Protect System Folders option blocks a specific script used by another plugin on the website, you can easily whitelist the specific script by using the snippets provided below.

Use this one to whitelist a file in the wp_includes folder:

add_filter( 'sgs_whitelist_wp_includes' , 'whitelist_file_in_wp_includes' );
function whitelist_file_in_wp_includes( $whitelist ) {

    $whitelist[] = 'file_name.php';
    $whitelist[] = 'another_file_name.php';

    return $whitelist;
}        

Use this one to whitelist a file in the wp_uploads folder:

add_filter( 'sgs_whitelist_wp_uploads' , 'whitelist_file_in_wp_uploads' );
function whitelist_file_in_wp_uploads( $whitelist ) {
    $whitelist[] = 'file_name.php';
    $whitelist[] = 'another_file_name.php';

    return $whitelist;
}        

Use this one the whitelist a file in the wp_content folder:

add_filter( 'sgs_whitelist_wp_content' , 'whitelist_file_in_wp_content' );
function whitelist_file_in_wp_content( $whitelist ) {
    $whitelist[] = 'file_name.php';
    $whitelist[] = 'another_file_name.php';

    return $whitelist;
}        

HIDE WORDPRESS VERSION

When using Hide WordPress Version you can avoid being marked for mass attacks due to version specific vulnerabilities.

DISABLE THEMES & PLUGINS EDITOR

Disable Themes & Plugins Editor in the WordPress admin to prevent potential coding errors or unauthorized access through the WordPress editor.

DISABLE XML-RPC

You can Disable XML-RPC protocol which was recently used in a number of exploits. Keep in mind that when disabled, it will prevent WordPress from communicating with third-party systems. We recommend using this, unless you specifically need it.

DISABLE RSS AND ATOM FEEDS

Disable RSS and ATOM Feeds to prevent content scraping and specific attacks against your site. It’s recommended to use this at all times, unless you have readers using your site via RSS readers.

ADVANCED XSS PROTECTION

By enabling Advanced XSS Protection you can add an additional layer of protection against XSS attacks.

DELETE THE DEFAULT README.TXT

When you Delete the Default Readme.txt which contains information about your website, you reduce the chances of it ending in a potentially vulnerable sites list, used by hackers.

ACTIVITY LOG

Here you can monitor in detail the activity of registered, unknown and blocked visitors. If your site is being hacked, a user or a plugin was compromised, you can always use the quick tools to block their future actions.

Important!

You can set a custom log lifetime ( in days ), using the following filter we have provided for that purpose.

add_filter( 'sgs_set_activity_log_lifetime', 'set_custom_log_lifetime' );
function set_custom_log_lifetime() {
    return 'your-custom-log-lifetime-in-days';
}        

If you need to disable the activity log, you can use the following filter. Keep in mind that this will also disable the Weekly Activity Log Emails.

add_action( 'init', 'deactivate_activity_log' );
function deactivate_activity_log() {
    update_option( 'sg_security_disable_activity_log', 1 );
}        

In case you have disabled the native WordPress Cron Job, and using UNIX cron setup instead, you can add the following rule to your website wp-config.php file in order to have the logs cleared on time:

define( 'SG_UNIX_CRON', true );        

POST-HACK ACTIONS

REINSTALL ALL FREE PLUGINS

If your website was hacked, you can always try to reduce the harm by using Reinstall All Free Plugins. This will reinstall all of your free plugins, reducing the chance of another exploit or the re-use of malicious code.

LOG OUT ALL USERS

You can Log Out All Users to prevent any further actions done by them or use.

FORCE PASSWORD RESET

Force Password Reset to force all users to change their password upon their next login. This will also log-out all current users instantly.

要查看或添加评论,请登录

M. Kawish Abbasi的更多文章

  • Advanced Access Manager

    Advanced Access Manager

    FEW QUICK FACTS The only plugin that gives you the absolute freedom to define the most granular access to any aspect of…

  • Clear Cache for Me

    Clear Cache for Me

    Description: W3 Total Cache and WP Super Cache are great caching plugins, but they do not know when a widget is…

  • Advanced Custom Fields (ACF)

    Advanced Custom Fields (ACF)

    Description Advanced Custom Fields (ACF) turns WordPress sites into a fully-fledged content management system by giving…

    1 条评论
  • Matomo Analytics

    Matomo Analytics

    Description Already Matomo On-Premise or Matomo Cloud user? You need to use the WP-Matomo plugin instead of this…

  • WPZOOM Social Feed

    WPZOOM Social Feed

    WPZOOM Social Feed Widget gives you a WordPress Widget that you can place anywhere you want to display your Instagram…

  • File Organizer

    File Organizer

    Description: FileOrganizer is a lightweight and easy-to-use file management plugin for WordPress. Organize and manage…

  • Booster for WooCommerce

    Booster for WooCommerce

    Description The only WooCommerce bundle you’ll ever need. Replace all those WooCommerce plugins with one single plugin…

  • API KEY for Google Maps

    API KEY for Google Maps

    Description Retroactively add Google Maps API KEY to any theme or plugin. Simply activate, go to Settings>Google API…

  • Export All Posts

    Export All Posts

    Description Unlock Seamless Import-Export with WP CSV Ultimate Importer & Exporter Plugins Now! WordPress export is a…

    1 条评论
  • Postman

    Postman

    What is Postman? Postman is an API platform for building and using APIs. Postman simplifies each step of the API…

社区洞察

其他会员也浏览了