You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dashboard/README.md
+11-2Lines changed: 11 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1134,20 +1134,29 @@ Click <span class="notranslate">_Save changes_</span> button on the bottom of th
1134
1134
1135
1135
#### WordPress Account Brute-force Protection
1136
1136
1137
+
We have two protection features against brute-force - one, Weak Password Login Prevention - prevents any logins with a weak password (e.g. "1234"), and the other Compromised Account Login Detection redirects known compromised accounts to reset their passwords.
1138
+
1137
1139
Server admin can enable an option to prevent access to WordPress accounts with well-known (trivial) passwords.
1138
1140
When the option is enabled, all end-users that are trying to log into the admin account with weak/trivial or well-known passwords from the dictionary used by brute-forcers will be taken to the special alert page with an appeal to change their current password.
1139
1141
1140
1142
This feature can be enabled by setting <spanclass="notranslate">`cms_account_compromise_prevention` to `true`</span> in MOD_SEC [config file section](/config_file_description/#config-file-description)
1141
1143
1142
1144
:::tip Note
1143
-
This feature is implemented via modsec rule and could be partially [disabled on a per-domain basis](/command_line_interface/#rules) (the rule id is 33355)
1145
+
This feature is implemented via modsec rule and could be [disabled on a per-domain basis](/command_line_interface/#rules) (the rule id is 33355)
The alert page supports localization and is displayed in the language of the browser (on an external Imunify domain).
1150
1151
1152
+
The WordPress Compromised Account Detection works independently of the Weak Passwords Prevention feature utilizing Cloud Based heuristic analysis.
1153
+
1154
+
Our heuristics analyze suspicions actions of the accounts such as malware drops, malicious plugins installation, other account actions and deliver a verdict to the specific host that are considered compromised. When account tries to login on the host, it will be redirected to the reminder to change the password. This feature does not have a switch in our settings and will produce alerts until the breach is fixed.
1155
+
1156
+
It employs the RBL system, and there is currently no settings switch to enable/disable it.
WAF Rules Auto-Configurator generates a set of rules on a per-domain basis, considering the Content Management System (CMS), that the website is running (WordPress, Joomla, Drupal etc).
0 commit comments