Advanced security logger comes with multiple different security features. It allows you to look at live logs of your website and lets you detect malicious activities of both users and admins. There are multiple security features of this plugin that you can explore. You can also hide your WordPress with this security plugin.
Features of Advanced Security Logger
- Hide WordPress Login
Hiding your WordPress login page will help you avoid malicious attacks on your website. Usually, hackers try to brute force these login pages to gain access to your dashboard.
- Advanced Log System
The live log system allows you to look into the activities of the users and admins.
- Alert Feature
Typical security plugins will have their classic way of detecting malicious payloads and blocking them but we understand how hackers operate and how they change their techniques with time. That's why using our plugin you can set your own set of payloads that will generate alerts for you which gives you a massive advantage over the hackers.
For example, you know that
"%3Chack%3E" is a malicious payload and hackers can use it to exploit your website. So you can set it as an alert, and whenever someone tries to access it you will get notified. You can easily block those IPs afterward.
Alert Menu:
-
All provided payloads should be URL encoded
-
Block IPs
If you find malicious logs from an IP or multiple IPs you can select all and block them.
If you are still not satisfied with your website's security and looking for support from the experts then let us help you with
penetration testing. Contact us through email and one of our team members will reach out to you.
If you find any security issues in our plugin, please reach out to us - hello@pentest7.io
This section describes how to install the plugin and get it working.
e.g.
- Upload the plugin files to the
/wp-content/plugins/plugin-name
directory, or install the plugin through the WordPress plugins screen directly.
- Activate the plugin through the 'Plugins' screen in WordPress
- Use the Settings->Plugin Name screen to configure the plugin
- (Make your instructions match the desired user flow for activating and installing your plugin. Include any steps that might be needed for explanatory purposes)