Guard Dog Security Plugin

Guard Dog Security Plugin

Guard Dog Super Security Plugin

Guard Dog Super Security Plugin

WordPress Guard Dog Security

This plugin is a comprehensive solution designed to shield your website from 99% of online attacks, offering an array of features that provide robust protection.

At the core of this plugin is its Site Lock, a unique feature not available in any other plugin. This powerful functionality allows you to completely lock down your website, restricting access to unauthorized users and preventing any malicious activity. Whether you’re working on updates or simply want to enhance security during off-peak times, Full Site Lock ensures that only trusted users can view or interact with your site.

Secure your site from 99% of online attacks

Guard Dog gives you the highest level of security on your site.

Below are the security options included:

⭐ Site Lock (not available anywhere else)
Move the Login Page
⭐ User Registration Lock Down
Enable Security Headers
Disable Hacker Entry Points
Download PDF Security Report
Automated Security Report Emails
Customize Plugin & Report Branding

WordPress Blacklist Removal
Guard Dog Options 1 1
lorie
new review

CUSTOMERS LOVE THIS

CUSTOMERS LOVE THIS

RAVING CRITICS

Sites That Brag About This

rsz woocommerce
et
Lcms Ogo
Duct Tape Marketing Logo
Main Wp
Raison Logo

SITE LOCK UNIQUE FEATURE

The “Site Lock” feature provides robust security for a WordPress website by restricting file writing on the server, which serves as a protective barrier against various forms of cyberattacks. Below is a detailed breakdown of its key elements:

Site Lock Security Feature

  • Purpose: This feature restricts the ability to write, modify, or upload files on the server. It targets the critical WordPress folders that are common entry points for malicious activity.
  • Security Enhancements: By limiting file writing, this feature enhances security in multiple ways:
    • Prevents Unauthorized Access: Hackers can’t inject or upload files without write permissions, which drastically reduces the risk of unauthorized changes.
    • Malware Protection: Prevents the introduction of malware, such as scripts or back doors, by blocking any file modifications.
    • Data Integrity: Maintains the integrity of your files, ensuring that no malicious code is added or existing files are tampered with.
    • Exploitation Mitigation: Reduces the chances of known and unknown vulnerabilities being exploited through file changes.

Activate Site Lock

  • Functionality: Once enabled, this setting “locks down” the entire site from any file adds or edits.
    • Result: This effectively provides full-proof security by ensuring no changes can be made to core files, themes, or plugins without first disabling the lock.
    • Restriction Scope: It includes blocking file updates, software updates, and any file-based changes until the lock is lifted.

This combination of features ensures that once activated, your website remains fully protected from unauthorized file edits and malicious activity, offering a robust security layer.

site lock off
Site Lock
Site Lock On
plugin disabler

SITE LOCK UNIQUE FEATURE

The “Site Lock” feature provides robust security for a WordPress website by restricting file writing on the server, which serves as a protective barrier against various forms of cyberattacks.

Below is a detailed breakdown of its key elements:

Site Lock Security Feature

  • Purpose: This feature restricts the ability to write, modify, or upload files on the server. It targets the critical WordPress folders that are common entry points for malicious activity.
  • Security Enhancements: By limiting file writing, this feature enhances security in multiple ways:
    • Prevents Unauthorized Access: Hackers can’t inject or upload files without write permissions, which drastically reduces the risk of unauthorized changes.
    • Malware Protection: Prevents the introduction of malware, such as scripts or back doors, by blocking any file modifications.
    • Data Integrity: Maintains the integrity of your files, ensuring that no malicious code is added or existing files are tampered with.
    • Exploitation Mitigation: Reduces the chances of known and unknown vulnerabilities being exploited through file changes.

Activate Site Lock

  • Functionality: Once enabled, this setting “locks down” the entire site from any file adds or edits.
    • Result: This effectively provides full-proof security by ensuring no changes can be made to core files, themes, or plugins without first disabling the lock.
    • Restriction Scope: It includes blocking file updates, software updates, and any file-based changes until the lock is lifted.

This combination of features ensures that once activated, your website remains fully protected from unauthorized file edits and malicious activity, offering a robust security layer.

Login Security

LOGIN CONTROL THAT IS EASY

The “WordPress login security plays a critical role in safeguarding your website because it represents the first line of defense against unauthorized access. The login page is a primary target for attackers who may attempt to gain entry using various techniques, such as:

  • Brute-force attacks: Attackers use automated tools to guess your login credentials by systematically trying different username-password combinations.
  • Credential stuffing: This method uses previously leaked credentials to attempt logins across multiple websites.
  • Exploiting vulnerabilities: Attackers may look for weaknesses in the login page or outdated software that can be exploited to gain access.

Enhancing login security helps prevent these attacks, reducing the risk of your site being compromised. If unauthorized access is gained, it can result in:

  • Data breaches: Sensitive data stored on your website could be exposed.
  • Website defacement: Attackers could alter the content, damage the site’s reputation, or leave malicious content.
  • Complete loss of control: You may lose administrative access, leading to a full takeover of your site, potentially resulting in site downtime or even deletion.

Custom Login URL

One effective way to enhance login security is by setting a Custom Login URL. For example, changing the default login page URL (/wp-custom or /wp-login.php) to something unique like /eat or /custom-login makes it harder for attackers to locate the login page and launch automated attacks. This obscures the login page from bots and attackers targeting default URLs, adding an extra layer of security.

New User Creation: Registration Locked

An additional security feature is the ability to lock new user registration, which prevents unauthorized users from creating accounts. By enabling “Registration Locked,” you stop all new user registrations, ensuring that only the website administrator has control over who can access the site. This is especially useful if you don’t want public registration enabled, or if you’re facing a surge in registration attempts by bots or attackers.

Together, these measures fortify your WordPress login security, helping to safeguard your site from common access-related threats., your website remains fully protected from unauthorized file edits and malicious activity, offering a robust security layer.

Infection Insurance

LOGIN CONTROL THAT IS EASY

The “Site Lock” feature provides robust security for a WordWordPress login security plays a critical role in safeguarding your website because it represents the first line of defense against unauthorized access. The login page is a primary target for attackers who may attempt to gain entry using various techniques, such as:

  • Brute-force attacks: Attackers use automated tools to guess your login credentials by systematically trying different username-password combinations.
  • Credential stuffing: This method uses previously leaked credentials to attempt logins across multiple websites.
  • Exploiting vulnerabilities: Attackers may look for weaknesses in the login page or outdated software that can be exploited to gain access.

Enhancing login security helps prevent these attacks, reducing the risk of your site being compromised. If unauthorized access is gained, it can result in:

  • Data breaches: Sensitive data stored on your website could be exposed.
  • Website defacement: Attackers could alter the content, damage the site’s reputation, or leave malicious content.
  • Complete loss of control: You may lose administrative access, leading to a full takeover of your site, potentially resulting in site downtime or even deletion.

Custom Login URL

One effective way to enhance login security is by setting a Custom Login URL. For example, changing the default login page URL (/wp-admin or /wp-login.php) to something unique like /custom or /custom-login makes it harder for attackers to locate the login page and launch automated attacks. This obscures the login page from bots and attackers targeting default URLs, adding an extra layer of security.

New User Creation: Registration Locked

An additional security feature is the ability to lock new user registration, which prevents unauthorized users from creating accounts. By enabling “Registration Locked,” you stop all new user registrations, ensuring that only the website administrator has control over who can access the site. This is especially useful if you don’t want public registration enabled, or if you’re facing a surge in registration attempts by bots or attackers.

Together, these measures fortify your WordPress login security, helping to safeguard your site from common access-related threats.fully protected from unauthorized file edits and malicious activity, offering a robust security l

LOCK DOWN SECURITY HEADERS

Security headers are essential HTTP response headers that strengthen your WordPress site’s defenses by mitigating various web-based attacks and reducing exposure to potential vulnerabilities.

By configuring security headers correctly, you create an extra layer of protection that complements other security measures, helping to safeguard your website from some of the most common forms of malicious activity.

Here’s a breakdown of key security headers and their importance:

1. X-Content-Type-Options

  • Purpose: This header prevents the browser from MIME type sniffing, which occurs when browsers try to detect the file type from content instead of relying on the declared MIME type.
  • Importance: Preventing MIME type sniffing reduces the risk of drive-by download attacks, where malicious files are delivered and executed as a trusted type of file (e.g., running a script disguised as an image).

2. X-Frame-Options

  • Purpose: This header protects your site from clickjacking attacks by controlling whether your website can be displayed within an iframe on another site.
  • Importance: Clickjacking can trick users into performing unintended actions on your website by overlaying invisible or misleading interfaces. Preventing your site from being embedded in iframes mitigates this risk.

3. Permissions-Policy

  • Purpose: This header restricts which features and APIs the browser is allowed to use when displaying your site.
  • Importance: By controlling browser features like geolocation, camera, and microphone access, you limit the exposure of sensitive data and reduce the chances of malicious exploitation of these browser capabilities.

4. Strict-Transport-Security (HSTS)

  • Purpose: Enforces the use of HTTPS by telling the browser to only communicate with your site over secure, encrypted connections.
  • Importance: By enabling HSTS, you protect your site from man-in-the-middle (MITM) attacks where attackers intercept communication between the user and the website, potentially stealing sensitive information. It ensures that visitors always use a secure connection when accessing your site.

5. Referrer-Policy

  • Purpose: Controls how much referrer information is sent along with requests when users navigate between different sites.
  • Importance: Limiting the amount of referrer information helps prevent sensitive data, such as URL query parameters or personal details, from being exposed to external websites when users click on links from your site.

6. Content-Security-Policy (CSP)

  • Purpose: Defines which content sources (such as scripts, stylesheets, or images) are considered safe to load and execute on your site.
  • Importance: CSP prevents cross-site scripting (XSS) attacks and other forms of code injection by only allowing content from trusted sources to be executed. This is one of the most effective measures against code injection vulnerabilities.

Implementing security headers significantly enhances your WordPress site’s resilience to common attack vectors such as XSS, clickjacking, and MITM attacks. These headers protect your site from potentially severe threats that can lead to data theft, compromised user accounts, or malicious code execution.

By enforcing strict security policies at the browser level, security headers ensure that only safe and expected content is executed, safeguarding both the website and its users.

Security Headers 1
6616256 encryption protection security shield icon

LOCK DOWN SECURITY HEADERS

Security headers are essential HTTP response headers that strengthen your WordPress site’s defenses by mitigating various web-based attacks and reducing exposure to potential vulnerabilities.

By configuring security headers correctly, you create an extra layer of protection that complements other security measures, helping to safeguard your website from some of the most common forms of malicious activity.

Here’s a breakdown of key security headers and their importance:

1. X-Content-Type-Options

  • Purpose: This header prevents the browser from MIME type sniffing, which occurs when browsers try to detect the file type from content instead of relying on the declared MIME type.
  • Importance: Preventing MIME type sniffing reduces the risk of drive-by download attacks, where malicious files are delivered and executed as a trusted type of file (e.g., running a script disguised as an image).

2. X-Frame-Options

  • Purpose: This header protects your site from clickjacking attacks by controlling whether your website can be displayed within an iframe on another site.
  • Importance: Clickjacking can trick users into performing unintended actions on your website by overlaying invisible or misleading interfaces. Preventing your site from being embedded in iframes mitigates this risk.

3. Permissions-Policy

  • Purpose: This header restricts which features and APIs the browser is allowed to use when displaying your site.
  • Importance: By controlling browser features like geolocation, camera, and microphone access, you limit the exposure of sensitive data and reduce the chances of malicious exploitation of these browser capabilities.

4. Strict-Transport-Security (HSTS)

  • Purpose: Enforces the use of HTTPS by telling the browser to only communicate with your site over secure, encrypted connections.
  • Importance: By enabling HSTS, you protect your site from man-in-the-middle (MITM) attacks where attackers intercept communication between the user and the website, potentially stealing sensitive information. It ensures that visitors always use a secure connection when accessing your site.

5. Referrer-Policy

  • Purpose: Controls how much referrer information is sent along with requests when users navigate between different sites.
  • Importance: Limiting the amount of referrer information helps prevent sensitive data, such as URL query parameters or personal details, from being exposed to external websites when users click on links from your site.

6. Content-Security-Policy (CSP)

  • Purpose: Defines which content sources (such as scripts, stylesheets, or images) are considered safe to load and execute on your site.
  • Importance: CSP prevents cross-site scripting (XSS) attacks and other forms of code injection by only allowing content from trusted sources to be executed. This is one of the most effective measures against code injection vulnerabilities.

Implementing security headers significantly enhances your WordPress site’s resilience to common attack vectors such as XSS, clickjacking, and MITM attacks. These headers protect your site from potentially severe threats that can lead to data theft, compromised user accounts, or malicious code execution.

By enforcing strict security policies at the browser level, security headers ensure that only safe and expected content is executed, safeguarding both the website and its users.

Disable Options

DISABLE SETTINGS THAT ARE RISKY

Disabling specific WordPress features is a crucial step in fortifying your website against potential security risks.

By turning off the items below, you minimize the number of potential attack vectors, which helps in protecting your site from brute-force attacks, unauthorized access, and code injection vulnerabilities.

Here’s a closer look at what disabling these features accomplishes:

  • XML-RPC: This feature allows remote connections to your WordPress site, which can be exploited in brute-force attacks. Disabling XML-RPC reduces the risk of unauthorized login attempts.
  • User Registration: If your site doesn’t require public user registrations, turning off this option helps prevent spam account creation and reduces the possibility of attackers gaining access to sensitive areas.
  • File Editing: By default, WordPress allows administrators to edit theme and plugin files directly from the dashboard. Disabling this option prevents hackers from injecting malicious code if they gain access to your admin area.
  • REST API for Unauthenticated Users: While the REST API is useful for developers, it can expose sensitive data to unauthenticated users if not properly secured. Disabling this feature prevents unauthorized users from accessing your site’s data.
  • Commenting: If not required, turning off commenting reduces the chances of spam or malicious links being posted, as well as injection attacks via comment forms.
  • WordPress Version Display: Displaying your WordPress version publicly can help attackers target known vulnerabilities in specific versions. Disabling this feature hides your site’s version, making it harder for attackers to exploit any outdated components.

By implementing these disable options, you greatly enhance your WordPress site’s security, minimizing exposure to common threats and reducing the likelihood of exploitation. This proactive approach is key to maintaining a robust security posture for your site.

plugin filter

DISABLE SETTINGS THAT ARE RISKY

Disabling specific WordPress features is a crucial step in fortifying your website against potential security risks.

By turning off the items below, you minimize the number of potential attack vectors, which helps in protecting your site from brute-force attacks, unauthorized access, and code injection vulnerabilities.

Here’s a closer look at what disabling these features accomplishes:

  • XML-RPC: This feature allows remote connections to your WordPress site, which can be exploited in brute-force attacks. Disabling XML-RPC reduces the risk of unauthorized login attempts.
  • User Registration: If your site doesn’t require public user registrations, turning off this option helps prevent spam account creation and reduces the possibility of attackers gaining access to sensitive areas.
  • File Editing: By default, WordPress allows administrators to edit theme and plugin files directly from the dashboard. Disabling this option prevents hackers from injecting malicious code if they gain access to your admin area.
  • REST API for Unauthenticated Users: While the REST API is useful for developers, it can expose sensitive data to unauthenticated users if not properly secured. Disabling this feature prevents unauthorized users from accessing your site’s data.
  • Commenting: If not required, turning off commenting reduces the chances of spam or malicious links being posted, as well as injection attacks via comment forms.
  • WordPress Version Display: Displaying your WordPress version publicly can help attackers target known vulnerabilities in specific versions. Disabling this feature hides your site’s version, making it harder for attackers to exploit any outdated components.

By implementing these disable options, you greatly enhance your WordPress site’s security, minimizing exposure to common threats and reducing the likelihood of exploitation. This proactive approach is key to maintaining a robust security posture for your site.

DETAILED PDF SECURITY REPORT

The PDF security report generated by our Guard Dog Security plugin will provide a comprehensive overview of the site’s current security status, offering valuable insights into both secured aspects and areas requiring further attention. Below is a description of each item in the report and its value:

1. Items that Secured the Site

This section lists the security measures already in place on the site. These could include installed security plugins, specific configuration settings, or security features like login protections and file permission restrictions. This information reassures the site administrator that certain protections are already safeguarding the site.

Value: Demonstrates current security strengths and provides a baseline for future improvements.

2. Items that Can Secure the Site Further

This section highlights additional measures that could be implemented to enhance site security. These could include recommendations like enabling two-factor authentication, updating plugins/themes, or restricting file access.

Value: Helps prioritize actions that will bolster the overall security posture of the site, reducing vulnerabilities.

3. WordPress Version Installed and Running

Displays the version of WordPress currently active on the site. Running the latest WordPress version is essential for ensuring that all known security vulnerabilities have been patched.

Value: Ensures the site administrator is aware of any version discrepancies and reminds them to update if necessary for security purposes.

4. Active Plugins

Lists all currently active plugins on the site. Knowing what plugins are active is crucial, as each plugin could introduce potential vulnerabilities if not maintained.

Value: Provides insight into the active components that might affect performance or security and helps track plugin updates.

5. Inactive Plugins

Lists plugins that are installed but not currently in use. Inactive plugins can pose a risk if left outdated, as they can still be exploited by hackers.

Value: Encourages the administrator to either update or remove unused plugins to reduce potential attack vectors.

6. Outdated Plugins

Identifies plugins that have not been updated to their latest version. Outdated plugins can contain security vulnerabilities that are fixed in newer versions.

Value: Alerts the administrator to outdated plugins that need updating to minimize security risks.

7. Abandoned Plugins

Lists plugins that have not been updated in a long time, indicating they may no longer be maintained. Abandoned plugins are particularly risky, as they may no longer receive security patches.

Value: Highlights plugins that should be replaced or removed due to the potential security risks of using unmaintained software.

8. Active Theme

Displays the active theme in use on the site. It’s important to ensure the theme is up to date and well-maintained to avoid potential vulnerabilities.

Value: Provides assurance that the current theme is up to date or signals if it needs attention.

9. Inactive Themes

Lists themes installed on the site but not currently in use. Like inactive plugins, unused themes can pose a security risk if left outdated.

Value: Encourages the removal or update of unused themes to reduce unnecessary vulnerabilities.

10. Outdated Themes

Highlights themes that are not up to date. Just like plugins, themes need regular updates to fix security vulnerabilities and compatibility issues.

Value: Ensures the administrator knows which themes need attention to maintain site security.

11. Admin Users on the Site

Lists all users with administrative privileges on the site. Admin accounts with excessive access can be targeted in brute force attacks, so it’s important to keep track of who has access.

Value: Provides visibility into user access levels, helping to manage and restrict admin rights as needed to secure the site.

12. SSL Certificate Information

Displays details about the site’s SSL certificate, including whether it’s valid and up to date. An SSL certificate ensures that communications between the server and users are encrypted, protecting sensitive data.

Value: Confirms whether the site is properly encrypted and identifies any issues with SSL certificate validity.

13. Server PHP Version

Indicates the PHP version running on the server. Running the latest supported version of PHP is critical for performance and security, as outdated versions may have known vulnerabilities.

Value: Ensures the server is running a secure and supported version of PHP, helping to prevent security flaws in the site’s core infrastructure.

Automated Email Reports:

You have the ability to designate a single email address or multiple addresses to send out a full security report at a frequency of your choice which can be weekly, monthly or quarterly.

Overall Value of the Report:

This PDF report offers a holistic view of the site’s security status. It not only helps administrators identify which aspects of the site are secured but also highlights potential vulnerabilities and areas for improvement. This allows administrators to take proactive steps to enhance site security, ensuring the site’s resilience against potential threats.

VIEW SAMPLE REPORT BELOW:

Click the button below and see exactly how this report will look.

Guard Dog Report images 0
Guard Dog Report images 1
Guard Dog Report images 2 1
Guard Dog Report images 3
deliver
email
5885848 key license software valid icon

DETAILED PDF SECURITY REPORT

The PDF security report generated by our Guard Dog Security plugin will provide a comprehensive overview of the site’s current security status, offering valuable insights into both secured aspects and areas requiring further attention. Below is a description of each item in the report and its value:

1. Items that Secured the Site

This section lists the security measures already in place on the site. These could include installed security plugins, specific configuration settings, or security features like login protections and file permission restrictions. This information reassures the site administrator that certain protections are already safeguarding the site.

Value: Demonstrates current security strengths and provides a baseline for future improvements.

2. Items that Can Secure the Site Further

This section highlights additional measures that could be implemented to enhance site security. These could include recommendations like enabling two-factor authentication, updating plugins/themes, or restricting file access.

Value: Helps prioritize actions that will bolster the overall security posture of the site, reducing vulnerabilities.

3. WordPress Version Installed and Running

Displays the version of WordPress currently active on the site. Running the latest WordPress version is essential for ensuring that all known security vulnerabilities have been patched.

Value: Ensures the site administrator is aware of any version discrepancies and reminds them to update if necessary for security purposes.

4. Active Plugins

Lists all currently active plugins on the site. Knowing what plugins are active is crucial, as each plugin could introduce potential vulnerabilities if not maintained.

Value: Provides insight into the active components that might affect performance or security and helps track plugin updates.

5. Inactive Plugins

Lists plugins that are installed but not currently in use. Inactive plugins can pose a risk if left outdated, as they can still be exploited by hackers.

Value: Encourages the administrator to either update or remove unused plugins to reduce potential attack vectors.

6. Outdated Plugins

Identifies plugins that have not been updated to their latest version. Outdated plugins can contain security vulnerabilities that are fixed in newer versions.

Value: Alerts the administrator to outdated plugins that need updating to minimize security risks.

7. Abandoned Plugins

Lists plugins that have not been updated in a long time, indicating they may no longer be maintained. Abandoned plugins are particularly risky, as they may no longer receive security patches.

Value: Highlights plugins that should be replaced or removed due to the potential security risks of using unmaintained software.

8. Active Theme

Displays the active theme in use on the site. It’s important to ensure the theme is up to date and well-maintained to avoid potential vulnerabilities.

Value: Provides assurance that the current theme is up to date or signals if it needs attention.

9. Inactive Themes

Lists themes installed on the site but not currently in use. Like inactive plugins, unused themes can pose a security risk if left outdated.

Value: Encourages the removal or update of unused themes to reduce unnecessary vulnerabilities.

10. Outdated Themes

Highlights themes that are not up to date. Just like plugins, themes need regular updates to fix security vulnerabilities and compatibility issues.

Value: Ensures the administrator knows which themes need attention to maintain site security.

11. Admin Users on the Site

Lists all users with administrative privileges on the site. Admin accounts with excessive access can be targeted in brute force attacks, so it’s important to keep track of who has access.

Value: Provides visibility into user access levels, helping to manage and restrict admin rights as needed to secure the site.

12. SSL Certificate Information

Displays details about the site’s SSL certificate, including whether it’s valid and up to date. An SSL certificate ensures that communications between the server and users are encrypted, protecting sensitive data.

Value: Confirms whether the site is properly encrypted and identifies any issues with SSL certificate validity.

13. Server PHP Version

Indicates the PHP version running on the server. Running the latest supported version of PHP is critical for performance and security, as outdated versions may have known vulnerabilities.

Value: Ensures the server is running a secure and supported version of PHP, helping to prevent security flaws in the site’s core infrastructure.

Overall Value of the Report:

This PDF report offers a holistic view of the site’s security status. It not only helps administrators identify which aspects of the site are secured but also highlights potential vulnerabilities and areas for improvement.

This allows administrators to take proactive steps to enhance site security, ensuring the site’s resilience against potential threats.

VIEW SAMPLE REPORT BELOW:

Click the button below and see exactly how this report will look.

White Label

YOUR BRAND NOT OURS

The white label settings allow users to customize various aspects of the Guard Dog Security plugin, creating a unique and branded experience tailored to your organization. These options ensure that the plugin fits seamlessly within your site’s overall branding and workflow.

Plugin Name

This option allows you to rename the Guard Dog Security plugin to something more aligned with your brand. This custom name will appear throughout the WordPress admin dashboard, providing a more integrated and personalized feel.

Admin Menu Name

This setting lets you customize the name that appears in the WordPress admin menu. It allows you to match the security plugin’s presence in the admin panel to your company’s branding, giving a more cohesive user interface.

Company Name

Enter your company name here to ensure that all references within the plugin’s settings and reports reflect your organization. This is useful for maintaining brand consistency across the site and any client interactions.

Company Logo

Add your company’s logo to the plugin interface and the PDF reports generated by the Guard Dog Security plugin. This makes the plugin appear as a part of your own suite of services, reinforcing your brand.

  • Upload Logo: Use this option to upload a custom logo that will appear on all pages where the plugin is displayed and within generated reports.
  • Remove Logo: If you wish to revert back to the default settings or remove the logo from the plugin interface and reports, you can use this option to delete the custom logo.

Security Report File Name

This option allows you to specify a custom file name for the exported security report PDFs. It ensures that all reports generated by the plugin carry a branded or easily identifiable name, such as including your company’s name in the file name.

Color Scheme

The color scheme settings allow you to customize the appearance of the plugin interface and reports with your brand’s colors. These options ensure that the plugin blends into the site’s branding and presents a professional look.

  • Select Custom Colors: Activate this option to define custom colors for the plugin’s interface.
  • Main Color: Choose a primary color that will be used throughout the plugin for key elements such as buttons and headers.
  • Secondary Color: Choose a secondary color for accent elements, ensuring your interface feels consistent with your overall design.
  • Pre-selected Color Schemes: If you prefer not to define custom colors, you can choose from several pre-selected color schemes via a convenient drop-down. These color schemes are designed to provide visually appealing and balanced options, allowing you to quickly select a professional look without needing to configure colors manually.

These white label options ensure that the Guard Dog Security plugin can be tailored to meet your branding needs, allowing for a more professional and cohesive presentation. Whether you’re customizing the plugin for internal use or deploying it across client sites, these settings will make the plugin feel like a natural extension of your brand.

5885811 business documents process settings icon

YOUR BRAND NOT OURS

The white label settings allow users to customize various aspects of the Guard Dog Security plugin, creating a unique and branded experience tailored to your organization. These options ensure that the plugin fits seamlessly within your site’s overall branding and workflow.

Plugin Name

This option allows you to rename the Guard Dog Security plugin to something more aligned with your brand. This custom name will appear throughout the WordPress admin dashboard, providing a more integrated and personalized feel.

Admin Menu Name

This setting lets you customize the name that appears in the WordPress admin menu. It allows you to match the security plugin’s presence in the admin panel to your company’s branding, giving a more cohesive user interface.

Company Name

Enter your company name here to ensure that all references within the plugin’s settings and reports reflect your organization. This is useful for maintaining brand consistency across the site and any client interactions.

Company Logo

Add your company’s logo to the plugin interface and the PDF reports generated by the Guard Dog Security plugin. This makes the plugin appear as a part of your own suite of services, reinforcing your brand.

  • Upload Logo: Use this option to upload a custom logo that will appear on all pages where the plugin is displayed and within generated reports.
  • Remove Logo: If you wish to revert back to the default settings or remove the logo from the plugin interface and reports, you can use this option to delete the custom logo.

Security Report File Name

This option allows you to specify a custom file name for the exported security report PDFs. It ensures that all reports generated by the plugin carry a branded or easily identifiable name, such as including your company’s name in the file name.

Color Scheme

The color scheme settings allow you to customize the appearance of the plugin interface and reports with your brand’s colors. These options ensure that the plugin blends into the site’s branding and presents a professional look.

  • Select Custom Colors: Activate this option to define custom colors for the plugin’s interface.
  • Main Color: Choose a primary color that will be used throughout the plugin for key elements such as buttons and headers.
  • Secondary Color: Choose a secondary color for accent elements, ensuring your interface feels consistent with your overall design.
  • Pre-selected Color Schemes: If you prefer not to define custom colors, you can choose from several pre-selected color schemes via a convenient drop-down. These color schemes are designed to provide visually appealing and balanced options, allowing you to quickly select a professional look without needing to configure colors manually.

Conclusion

These white label options ensure that the Guard Dog Security plugin can be tailored to meet your branding needs, allowing for a more professional and cohesive presentation. Whether you’re customizing the plugin for internal use or deploying it across client sites, these settings will make the plugin feel like a natural extension of your brand.

QUESTIONS