Linux 软件免费装
Banner图

Vigilante - 100% Free Security Suite: Firewall, 2FA, Login, Headers, Scanner…

开发者 fernandot
ayudawp
更新时间 2026年2月17日 20:04
PHP版本: 7.4 及以上
WordPress版本: 6.9
版权: GPL v2 or later
版权网址: 版权信息

标签

security login protection firewall 2fa

下载

1.0.0 1.0.1 1.0.2 1.0.3 1.0.4 1.1.0

详情介绍:

Premium Security, Zero Cost Vigilante provides enterprise-level WordPress security features completely free. No premium version, no upsells, no hidden features behind paywalls. Protect your site with a complete security suite: firewall, two-factor authentication, brute force protection, security headers, file integrity monitoring, user management, activity logging, under attack mode and much more. Instant Protection Once activated, Vigilante immediately applies essential security measures: One-Click Security Presets Choose a preset and get protected instantly: Standard - Balanced security suitable for most websites. Enables all modules with sensible defaults that won't interfere with normal site operation. Maximum Security - Strictest settings for high-security sites. Tighter rate limits, stronger CSP rules, mandatory admin notifications. May require fine-tuning for some setups. You can always customize individual settings after applying a preset. Under Attack Mode Is your site under active attack? Activate Under Attack mode with one click and stop malicious traffic instantly: Under Attack mode works independently from your preset configuration. Your regular security settings are preserved and restored when the mode deactivates. Core Security Features Two-Factor Authentication (2FA) Add email-based verification to your WordPress login: Firewall Protection Block malicious requests before they reach WordPress: Login Security Stop unauthorized access attempts: User Security Comprehensive user account protection: Security Headers Achieve Grade A security ratings: File Integrity Monitoring Detect unauthorized changes to your files: Activity Log Track everything happening on your site: WordPress Hardening Additional security measures: REST API Security Control API access to your site: Security Tools Utilities included at no extra cost: Safe by Design Automatic Backup System Your existing .htaccess, wp-config.php, and robots.txt are automatically backed up before any modifications. Backups include integrity verification (MD5 checksums) and are stored safely in wp-content/vigilante-backups/, persisting through plugin updates. Clean Rollback When you deactivate Vigilante, all security rules are automatically removed and your original configuration files are restored. No leftover code, no broken sites.

安装:

  1. Upload the plugin files to /wp-content/plugins/vigilante/ or install directly from the WordPress plugin repository
  2. Activate the plugin through the 'Plugins' menu in WordPress
  3. Go to 'Vigilante' in the admin menu
  4. Apply a security preset or customize individual module settings
Requirements:

屏幕截图:

  • Two-Factor Authentication - Email-based 2FA with trusted devices
  • Login Security - Brute force protection, lockouts, and custom login URL
  • User Security - Complete user protection tools and settings
  • Password Expiration - Force periodic password changes with history
  • Registration Approval and Session Limits - Control new users and concurrent logins
  • File Integrity - Scanner settings and verification results
  • Activity Log - Filterable event viewer with export option

升级注意事项:

1.1.0 New Under Attack mode: One-click emergency protection with JavaScript challenge verification. Activate it from the Vigilante dashboard when your site is under attack. 1.0.4 File Integrity scanner improvements. Suspicious files in uploads are now detected reliably. 1.0.1 Important compatibility fix for plugins using REST API. After updating, go to Vigilante settings and save your Firewall settings to regenerate htaccess rules. 1.0.0 Initial release. Please backup your site before installing any security plugin.

常见问题:

Will this plugin slow down my site?

No. Vigilante is optimized for performance. The firewall uses efficient pattern matching, database queries are cached with transients, and .htaccess rules execute at server level before PHP even loads.

What happens when I activate the plugin?

Vigilante immediately creates a backup of your existing .htaccess and wp-config.php files, then applies default security settings. All modules are enabled with balanced defaults suitable for most sites.

What happens when I deactivate the plugin?

All security modifications are automatically reverted. The .htaccess rules are removed, wp-config.php constants are restored to their original values, and scheduled tasks are cleared. Your site returns to its pre-Vigilante state.

How does two-factor authentication work?

After entering your username and password, you receive a 6-digit verification code via email. Enter this code to complete login. You can optionally mark your device as trusted to skip 2FA for 30 days on that browser.

What if I don't receive the 2FA code?

Check your spam folder first. You can click "Resend code" on the verification form. Codes expire after 10 minutes by default. If issues persist, an administrator can temporarily disable 2FA from the plugin settings.

Which user roles require 2FA?

By default, 2FA is enforced for administrators and editors. You can customize which roles require 2FA in the Login Security settings, or exclude specific users.

How do I recover if I'm locked out?

Access your site via FTP/SFTP and either rename the plugin folder to disable it temporarily, or delete the vigilante_login_attempts table rows for your IP address in the database.

Will the firewall block legitimate users?

The firewall is configured to allow normal WordPress operations, including the block editor, REST API, and popular page builders. If you experience issues, you can whitelist specific IPs or adjust rate limiting thresholds.

Can I use this with other security plugins?

While Vigilante works standalone, running multiple security plugins can cause conflicts. We recommend testing in a staging environment first if you need to combine security solutions.

Does this work with caching plugins?

Yes. Vigilante is compatible with popular caching plugins. The firewall runs before cache layers, and .htaccess rules don't interfere with caching mechanisms.

Does this work with WooCommerce?

Yes. Vigilante includes compatibility settings for WooCommerce. The REST API security module automatically allows WooCommerce endpoints, and the firewall won't block payment gateway connections.

How do I test my security headers?

Use the built-in header testing tool in the Security Headers tab, or visit securityheaders.com with your site URL to get a security grade.

What is password expiration?

You can require users to change their passwords after a set number of days (30, 60, 90, etc.). Users receive warnings before expiration and are forced to change their password on next login when it expires. Password history prevents reusing recent passwords.

What is registration approval?

When enabled, new user registrations require manual approval by an administrator before the account becomes active. Pending users cannot log in until approved. You can configure auto-rejection after a set number of days.

What does email verification do?

New users must verify their email address by clicking a link before their account becomes active. This prevents fake registrations and ensures valid contact information.

How do session limits work?

You can limit how many concurrent sessions each user can have. When the limit is reached, either the new login is blocked or the oldest session is terminated, depending on your configuration.

Can I export the activity log?

Yes. The activity log can be exported to CSV format for external analysis or compliance reporting. You can also filter logs by event type, user, or date range before exporting.

What files does the integrity scanner check?

The scanner compares WordPress core files, plugin files, and theme files against official checksums from WordPress.org. It also scans the uploads directory for suspicious PHP files and detects common malware patterns.

How often does the file integrity scan run?

You can configure automatic scans to run hourly, daily, or weekly. You can also run manual scans at any time. When changes are detected, you can receive email notifications.

What is the difference between Standard and Maximum presets?

Standard applies balanced settings suitable for most sites. Maximum applies stricter rules: lower rate limits, tighter CSP policies, required admin notifications, session limits, and more aggressive hardening. Maximum may require adjustments for sites with complex functionality.

Where are backups stored?

Backups are stored in wp-content/vigilante-backups/. This location persists through plugin updates. The directory is protected with .htaccess rules to prevent direct access.

What is Under Attack mode?

Under Attack mode is an emergency feature you can activate when your site is experiencing an active attack. It adds a JavaScript challenge that real browsers solve automatically in a few seconds, while bots and automated scripts are blocked completely. It also applies aggressive rate limiting, blocks restricted HTTP methods, and restricts API access.

Will Under Attack mode affect my logged-in users?

No. Logged-in users, admin pages, cron jobs, AJAX requests, and the login page are all excluded from the JavaScript challenge. Only unauthenticated frontend visitors see the verification page.

What if I forget to turn off Under Attack mode?

It automatically deactivates after 4 hours. You will also receive an email notification when it activates and deactivates.

Does Under Attack mode change my regular security settings?

No. It operates independently from your preset configuration (Standard or Maximum). Your regular settings are untouched and continue working normally after Under Attack mode deactivates.

更新日志:

1.1.0 1.0.4 1.0.3 1.0.2 1.0.1 1.0.0