Skip to content

Commit 6a97548

Browse files
authored
Merge pull request #83 from mgithb/patch-14
Update README.md
2 parents fe341a6 + 41ad913 commit 6a97548

File tree

1 file changed

+11
-2
lines changed

1 file changed

+11
-2
lines changed

docs/dashboard/README.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1134,20 +1134,29 @@ Click <span class="notranslate">_Save changes_</span> button on the bottom of th
11341134

11351135
#### WordPress Account Brute-force Protection
11361136

1137+
We have two protection features against brute-force - one, Weak Password Login Prevention - prevents any logins with a weak password (e.g. "1234"), and the other Compromised Account Login Detection redirects known compromised accounts to reset their passwords.
1138+
11371139
Server admin can enable an option to prevent access to WordPress accounts with well-known (trivial) passwords.
11381140
When the option is enabled, all end-users that are trying to log into the admin account with weak/trivial or well-known passwords from the dictionary used by brute-forcers will be taken to the special alert page with an appeal to change their current password.
11391141

11401142
This feature can be enabled by setting <span class="notranslate">`cms_account_compromise_prevention` to `true`</span> in MOD_SEC [config file section](/config_file_description/#config-file-description)
11411143

11421144
:::tip Note
1143-
This feature is implemented via modsec rule and could be partially [disabled on a per-domain basis](/command_line_interface/#rules) (the rule id is 33355)
1145+
This feature is implemented via modsec rule and could be [disabled on a per-domain basis](/command_line_interface/#rules) (the rule id is 33355)
11441146
:::
11451147

1146-
![](/images/WAF_Compromised_Account_Login_Prevention.png)
11471148
![](/images/WAF_Weak_Password_Login_Prevention.png)
11481149

11491150
The alert page supports localization and is displayed in the language of the browser (on an external Imunify domain).
11501151

1152+
The WordPress Compromised Account Detection works independently of the Weak Passwords Prevention feature utilizing Cloud Based heuristic analysis.
1153+
1154+
Our heuristics analyze suspicions actions of the accounts such as malware drops, malicious plugins installation, other account actions and deliver a verdict to the specific host that are considered compromised. When account tries to login on the host, it will be redirected to the reminder to change the password. This feature does not have a switch in our settings and will produce alerts until the breach is fixed.
1155+
1156+
It employs the RBL system, and there is currently no settings switch to enable/disable it.
1157+
1158+
![](/images/WAF_Compromised_Account_Login_Prevention.png)
1159+
11511160
#### CMS-specific WAF Rules
11521161

11531162
WAF Rules Auto-Configurator generates a set of rules on a per-domain basis, considering the Content Management System (CMS), that the website is running (WordPress, Joomla, Drupal etc).

0 commit comments

Comments
 (0)