Guard Dog Super Security Plugin
Guard Dog Super Security Plugin
This plugin is a comprehensive solution designed to shield your website from 99% of online attacks, offering an array of features that provide robust protection.
At the core of this plugin is its Site Lock, a unique feature not available in any other plugin. This powerful functionality allows you to completely lock down your website, restricting access to unauthorized users and preventing any malicious activity. Whether you’re working on updates or simply want to enhance security during off-peak times, Full Site Lock ensures that only trusted users can view or interact with your site.
Secure your site from 99% of online attacks…
Guard Dog gives you the highest level of security on your site.
Below are the security options included:
⭐ Site Lock (not available anywhere else)
⭐ Move the Login Page
⭐ User Registration Lock Down
⭐ Enable Security Headers
⭐ Disable Hacker Entry Points
⭐ Download PDF Security Report
⭐ Automated Security Report Emails
⭐ Customize Plugin & Report Branding
CUSTOMERS LOVE THIS
CUSTOMERS LOVE THIS
I’ve been using this security plugin for the past few months, and I have to say, it’s been a total game-changer for my website. One of the standout features is the Site Lock, which is something I haven’t seen in any other plugin before.
It lets me completely lock down my website, and this has been a lifesaver, especially during maintenance and updates. I can rest easy knowing that no unauthorized users can access my site while I’m making changes. It’s also perfect for times when I need extra security during off-hours.
If you’re looking for a plugin that offers robust protection and unique features like Site Lock, this is it. Highly recommend it for anyone who wants serious protection without all the fuss!
– Lorie
RAVING CRITICS
Sites That Brag About This
SITE LOCK UNIQUE FEATURE
The “Site Lock” feature provides robust security for a WordPress website by restricting file writing on the server, which serves as a protective barrier against various forms of cyberattacks. Below is a detailed breakdown of its key elements:
Site Lock Security Feature
- Purpose: This feature restricts the ability to write, modify, or upload files on the server. It targets the critical WordPress folders that are common entry points for malicious activity.
- Security Enhancements: By limiting file writing, this feature enhances security in multiple ways:
- Prevents Unauthorized Access: Hackers can’t inject or upload files without write permissions, which drastically reduces the risk of unauthorized changes.
- Malware Protection: Prevents the introduction of malware, such as scripts or back doors, by blocking any file modifications.
- Data Integrity: Maintains the integrity of your files, ensuring that no malicious code is added or existing files are tampered with.
- Exploitation Mitigation: Reduces the chances of known and unknown vulnerabilities being exploited through file changes.
Activate Site Lock
- Functionality: Once enabled, this setting “locks down” the entire site from any file adds or edits.
- Result: This effectively provides full-proof security by ensuring no changes can be made to core files, themes, or plugins without first disabling the lock.
- Restriction Scope: It includes blocking file updates, software updates, and any file-based changes until the lock is lifted.
This combination of features ensures that once activated, your website remains fully protected from unauthorized file edits and malicious activity, offering a robust security layer.
SITE LOCK UNIQUE FEATURE
The “Site Lock” feature provides robust security for a WordPress website by restricting file writing on the server, which serves as a protective barrier against various forms of cyberattacks.
Below is a detailed breakdown of its key elements:
Site Lock Security Feature
- Purpose: This feature restricts the ability to write, modify, or upload files on the server. It targets the critical WordPress folders that are common entry points for malicious activity.
- Security Enhancements: By limiting file writing, this feature enhances security in multiple ways:
- Prevents Unauthorized Access: Hackers can’t inject or upload files without write permissions, which drastically reduces the risk of unauthorized changes.
- Malware Protection: Prevents the introduction of malware, such as scripts or back doors, by blocking any file modifications.
- Data Integrity: Maintains the integrity of your files, ensuring that no malicious code is added or existing files are tampered with.
- Exploitation Mitigation: Reduces the chances of known and unknown vulnerabilities being exploited through file changes.
Activate Site Lock
- Functionality: Once enabled, this setting “locks down” the entire site from any file adds or edits.
- Result: This effectively provides full-proof security by ensuring no changes can be made to core files, themes, or plugins without first disabling the lock.
- Restriction Scope: It includes blocking file updates, software updates, and any file-based changes until the lock is lifted.
This combination of features ensures that once activated, your website remains fully protected from unauthorized file edits and malicious activity, offering a robust security layer.
LOGIN CONTROL THAT IS EASY
The “WordPress login security plays a critical role in safeguarding your website because it represents the first line of defense against unauthorized access. The login page is a primary target for attackers who may attempt to gain entry using various techniques, such as:
- Brute-force attacks: Attackers use automated tools to guess your login credentials by systematically trying different username-password combinations.
- Credential stuffing: This method uses previously leaked credentials to attempt logins across multiple websites.
- Exploiting vulnerabilities: Attackers may look for weaknesses in the login page or outdated software that can be exploited to gain access.
Enhancing login security helps prevent these attacks, reducing the risk of your site being compromised. If unauthorized access is gained, it can result in:
- Data breaches: Sensitive data stored on your website could be exposed.
- Website defacement: Attackers could alter the content, damage the site’s reputation, or leave malicious content.
- Complete loss of control: You may lose administrative access, leading to a full takeover of your site, potentially resulting in site downtime or even deletion.
Custom Login URL
One effective way to enhance login security is by setting a Custom Login URL. For example, changing the default login page URL (/wp-custom
or /wp-login.php
) to something unique like /eat
or /custom-login
makes it harder for attackers to locate the login page and launch automated attacks. This obscures the login page from bots and attackers targeting default URLs, adding an extra layer of security.
New User Creation: Registration Locked
An additional security feature is the ability to lock new user registration, which prevents unauthorized users from creating accounts. By enabling “Registration Locked,” you stop all new user registrations, ensuring that only the website administrator has control over who can access the site. This is especially useful if you don’t want public registration enabled, or if you’re facing a surge in registration attempts by bots or attackers.
Together, these measures fortify your WordPress login security, helping to safeguard your site from common access-related threats., your website remains fully protected from unauthorized file edits and malicious activity, offering a robust security layer.
LOGIN CONTROL THAT IS EASY
The “Site Lock” feature provides robust security for a WordWordPress login security plays a critical role in safeguarding your website because it represents the first line of defense against unauthorized access. The login page is a primary target for attackers who may attempt to gain entry using various techniques, such as:
- Brute-force attacks: Attackers use automated tools to guess your login credentials by systematically trying different username-password combinations.
- Credential stuffing: This method uses previously leaked credentials to attempt logins across multiple websites.
- Exploiting vulnerabilities: Attackers may look for weaknesses in the login page or outdated software that can be exploited to gain access.
Enhancing login security helps prevent these attacks, reducing the risk of your site being compromised. If unauthorized access is gained, it can result in:
- Data breaches: Sensitive data stored on your website could be exposed.
- Website defacement: Attackers could alter the content, damage the site’s reputation, or leave malicious content.
- Complete loss of control: You may lose administrative access, leading to a full takeover of your site, potentially resulting in site downtime or even deletion.
Custom Login URL
One effective way to enhance login security is by setting a Custom Login URL. For example, changing the default login page URL (/wp-admin
or /wp-login.php
) to something unique like /custom
or /custom-login
makes it harder for attackers to locate the login page and launch automated attacks. This obscures the login page from bots and attackers targeting default URLs, adding an extra layer of security.
New User Creation: Registration Locked
An additional security feature is the ability to lock new user registration, which prevents unauthorized users from creating accounts. By enabling “Registration Locked,” you stop all new user registrations, ensuring that only the website administrator has control over who can access the site. This is especially useful if you don’t want public registration enabled, or if you’re facing a surge in registration attempts by bots or attackers.
Together, these measures fortify your WordPress login security, helping to safeguard your site from common access-related threats.fully protected from unauthorized file edits and malicious activity, offering a robust security l
LOCK DOWN SECURITY HEADERS
Security headers are essential HTTP response headers that strengthen your WordPress site’s defenses by mitigating various web-based attacks and reducing exposure to potential vulnerabilities.
By configuring security headers correctly, you create an extra layer of protection that complements other security measures, helping to safeguard your website from some of the most common forms of malicious activity.
Here’s a breakdown of key security headers and their importance:
1. X-Content-Type-Options
- Purpose: This header prevents the browser from MIME type sniffing, which occurs when browsers try to detect the file type from content instead of relying on the declared MIME type.
- Importance: Preventing MIME type sniffing reduces the risk of drive-by download attacks, where malicious files are delivered and executed as a trusted type of file (e.g., running a script disguised as an image).
2. X-Frame-Options
- Purpose: This header protects your site from clickjacking attacks by controlling whether your website can be displayed within an iframe on another site.
- Importance: Clickjacking can trick users into performing unintended actions on your website by overlaying invisible or misleading interfaces. Preventing your site from being embedded in iframes mitigates this risk.
3. Permissions-Policy
- Purpose: This header restricts which features and APIs the browser is allowed to use when displaying your site.
- Importance: By controlling browser features like geolocation, camera, and microphone access, you limit the exposure of sensitive data and reduce the chances of malicious exploitation of these browser capabilities.
4. Strict-Transport-Security (HSTS)
- Purpose: Enforces the use of HTTPS by telling the browser to only communicate with your site over secure, encrypted connections.
- Importance: By enabling HSTS, you protect your site from man-in-the-middle (MITM) attacks where attackers intercept communication between the user and the website, potentially stealing sensitive information. It ensures that visitors always use a secure connection when accessing your site.
5. Referrer-Policy
- Purpose: Controls how much referrer information is sent along with requests when users navigate between different sites.
- Importance: Limiting the amount of referrer information helps prevent sensitive data, such as URL query parameters or personal details, from being exposed to external websites when users click on links from your site.
6. Content-Security-Policy (CSP)
- Purpose: Defines which content sources (such as scripts, stylesheets, or images) are considered safe to load and execute on your site.
- Importance: CSP prevents cross-site scripting (XSS) attacks and other forms of code injection by only allowing content from trusted sources to be executed. This is one of the most effective measures against code injection vulnerabilities.
Implementing security headers significantly enhances your WordPress site’s resilience to common attack vectors such as XSS, clickjacking, and MITM attacks. These headers protect your site from potentially severe threats that can lead to data theft, compromised user accounts, or malicious code execution.
By enforcing strict security policies at the browser level, security headers ensure that only safe and expected content is executed, safeguarding both the website and its users.
LOCK DOWN SECURITY HEADERS
Security headers are essential HTTP response headers that strengthen your WordPress site’s defenses by mitigating various web-based attacks and reducing exposure to potential vulnerabilities.
By configuring security headers correctly, you create an extra layer of protection that complements other security measures, helping to safeguard your website from some of the most common forms of malicious activity.
Here’s a breakdown of key security headers and their importance:
1. X-Content-Type-Options
- Purpose: This header prevents the browser from MIME type sniffing, which occurs when browsers try to detect the file type from content instead of relying on the declared MIME type.
- Importance: Preventing MIME type sniffing reduces the risk of drive-by download attacks, where malicious files are delivered and executed as a trusted type of file (e.g., running a script disguised as an image).
2. X-Frame-Options
- Purpose: This header protects your site from clickjacking attacks by controlling whether your website can be displayed within an iframe on another site.
- Importance: Clickjacking can trick users into performing unintended actions on your website by overlaying invisible or misleading interfaces. Preventing your site from being embedded in iframes mitigates this risk.
3. Permissions-Policy
- Purpose: This header restricts which features and APIs the browser is allowed to use when displaying your site.
- Importance: By controlling browser features like geolocation, camera, and microphone access, you limit the exposure of sensitive data and reduce the chances of malicious exploitation of these browser capabilities.
4. Strict-Transport-Security (HSTS)
- Purpose: Enforces the use of HTTPS by telling the browser to only communicate with your site over secure, encrypted connections.
- Importance: By enabling HSTS, you protect your site from man-in-the-middle (MITM) attacks where attackers intercept communication between the user and the website, potentially stealing sensitive information. It ensures that visitors always use a secure connection when accessing your site.
5. Referrer-Policy
- Purpose: Controls how much referrer information is sent along with requests when users navigate between different sites.
- Importance: Limiting the amount of referrer information helps prevent sensitive data, such as URL query parameters or personal details, from being exposed to external websites when users click on links from your site.
6. Content-Security-Policy (CSP)
- Purpose: Defines which content sources (such as scripts, stylesheets, or images) are considered safe to load and execute on your site.
- Importance: CSP prevents cross-site scripting (XSS) attacks and other forms of code injection by only allowing content from trusted sources to be executed. This is one of the most effective measures against code injection vulnerabilities.
Implementing security headers significantly enhances your WordPress site’s resilience to common attack vectors such as XSS, clickjacking, and MITM attacks. These headers protect your site from potentially severe threats that can lead to data theft, compromised user accounts, or malicious code execution.
By enforcing strict security policies at the browser level, security headers ensure that only safe and expected content is executed, safeguarding both the website and its users.
DISABLE SETTINGS THAT ARE RISKY
Disabling specific WordPress features is a crucial step in fortifying your website against potential security risks.
By turning off the items below, you minimize the number of potential attack vectors, which helps in protecting your site from brute-force attacks, unauthorized access, and code injection vulnerabilities.
Here’s a closer look at what disabling these features accomplishes:
- XML-RPC: This feature allows remote connections to your WordPress site, which can be exploited in brute-force attacks. Disabling XML-RPC reduces the risk of unauthorized login attempts.
- User Registration: If your site doesn’t require public user registrations, turning off this option helps prevent spam account creation and reduces the possibility of attackers gaining access to sensitive areas.
- File Editing: By default, WordPress allows administrators to edit theme and plugin files directly from the dashboard. Disabling this option prevents hackers from injecting malicious code if they gain access to your admin area.
- REST API for Unauthenticated Users: While the REST API is useful for developers, it can expose sensitive data to unauthenticated users if not properly secured. Disabling this feature prevents unauthorized users from accessing your site’s data.
- Commenting: If not required, turning off commenting reduces the chances of spam or malicious links being posted, as well as injection attacks via comment forms.
- WordPress Version Display: Displaying your WordPress version publicly can help attackers target known vulnerabilities in specific versions. Disabling this feature hides your site’s version, making it harder for attackers to exploit any outdated components.
By implementing these disable options, you greatly enhance your WordPress site’s security, minimizing exposure to common threats and reducing the likelihood of exploitation. This proactive approach is key to maintaining a robust security posture for your site.
DISABLE SETTINGS THAT ARE RISKY
Disabling specific WordPress features is a crucial step in fortifying your website against potential security risks.
By turning off the items below, you minimize the number of potential attack vectors, which helps in protecting your site from brute-force attacks, unauthorized access, and code injection vulnerabilities.
Here’s a closer look at what disabling these features accomplishes:
- XML-RPC: This feature allows remote connections to your WordPress site, which can be exploited in brute-force attacks. Disabling XML-RPC reduces the risk of unauthorized login attempts.
- User Registration: If your site doesn’t require public user registrations, turning off this option helps prevent spam account creation and reduces the possibility of attackers gaining access to sensitive areas.
- File Editing: By default, WordPress allows administrators to edit theme and plugin files directly from the dashboard. Disabling this option prevents hackers from injecting malicious code if they gain access to your admin area.
- REST API for Unauthenticated Users: While the REST API is useful for developers, it can expose sensitive data to unauthenticated users if not properly secured. Disabling this feature prevents unauthorized users from accessing your site’s data.
- Commenting: If not required, turning off commenting reduces the chances of spam or malicious links being posted, as well as injection attacks via comment forms.
- WordPress Version Display: Displaying your WordPress version publicly can help attackers target known vulnerabilities in specific versions. Disabling this feature hides your site’s version, making it harder for attackers to exploit any outdated components.
By implementing these disable options, you greatly enhance your WordPress site’s security, minimizing exposure to common threats and reducing the likelihood of exploitation. This proactive approach is key to maintaining a robust security posture for your site.
DETAILED PDF SECURITY REPORT
The PDF security report generated by our Guard Dog Security plugin will provide a comprehensive overview of the site’s current security status, offering valuable insights into both secured aspects and areas requiring further attention. Below is a description of each item in the report and its value:
1. Items that Secured the Site
This section lists the security measures already in place on the site. These could include installed security plugins, specific configuration settings, or security features like login protections and file permission restrictions. This information reassures the site administrator that certain protections are already safeguarding the site.
Value: Demonstrates current security strengths and provides a baseline for future improvements.
2. Items that Can Secure the Site Further
This section highlights additional measures that could be implemented to enhance site security. These could include recommendations like enabling two-factor authentication, updating plugins/themes, or restricting file access.
Value: Helps prioritize actions that will bolster the overall security posture of the site, reducing vulnerabilities.
3. WordPress Version Installed and Running
Displays the version of WordPress currently active on the site. Running the latest WordPress version is essential for ensuring that all known security vulnerabilities have been patched.
Value: Ensures the site administrator is aware of any version discrepancies and reminds them to update if necessary for security purposes.
4. Active Plugins
Lists all currently active plugins on the site. Knowing what plugins are active is crucial, as each plugin could introduce potential vulnerabilities if not maintained.
Value: Provides insight into the active components that might affect performance or security and helps track plugin updates.
5. Inactive Plugins
Lists plugins that are installed but not currently in use. Inactive plugins can pose a risk if left outdated, as they can still be exploited by hackers.
Value: Encourages the administrator to either update or remove unused plugins to reduce potential attack vectors.
6. Outdated Plugins
Identifies plugins that have not been updated to their latest version. Outdated plugins can contain security vulnerabilities that are fixed in newer versions.
Value: Alerts the administrator to outdated plugins that need updating to minimize security risks.
7. Abandoned Plugins
Lists plugins that have not been updated in a long time, indicating they may no longer be maintained. Abandoned plugins are particularly risky, as they may no longer receive security patches.
Value: Highlights plugins that should be replaced or removed due to the potential security risks of using unmaintained software.
8. Active Theme
Displays the active theme in use on the site. It’s important to ensure the theme is up to date and well-maintained to avoid potential vulnerabilities.
Value: Provides assurance that the current theme is up to date or signals if it needs attention.
9. Inactive Themes
Lists themes installed on the site but not currently in use. Like inactive plugins, unused themes can pose a security risk if left outdated.
Value: Encourages the removal or update of unused themes to reduce unnecessary vulnerabilities.
10. Outdated Themes
Highlights themes that are not up to date. Just like plugins, themes need regular updates to fix security vulnerabilities and compatibility issues.
Value: Ensures the administrator knows which themes need attention to maintain site security.
11. Admin Users on the Site
Lists all users with administrative privileges on the site. Admin accounts with excessive access can be targeted in brute force attacks, so it’s important to keep track of who has access.
Value: Provides visibility into user access levels, helping to manage and restrict admin rights as needed to secure the site.
12. SSL Certificate Information
Displays details about the site’s SSL certificate, including whether it’s valid and up to date. An SSL certificate ensures that communications between the server and users are encrypted, protecting sensitive data.
Value: Confirms whether the site is properly encrypted and identifies any issues with SSL certificate validity.
13. Server PHP Version
Indicates the PHP version running on the server. Running the latest supported version of PHP is critical for performance and security, as outdated versions may have known vulnerabilities.
Value: Ensures the server is running a secure and supported version of PHP, helping to prevent security flaws in the site’s core infrastructure.
Automated Email Reports:
You have the ability to designate a single email address or multiple addresses to send out a full security report at a frequency of your choice which can be weekly, monthly or quarterly.
Overall Value of the Report:
This PDF report offers a holistic view of the site’s security status. It not only helps administrators identify which aspects of the site are secured but also highlights potential vulnerabilities and areas for improvement. This allows administrators to take proactive steps to enhance site security, ensuring the site’s resilience against potential threats.
VIEW SAMPLE REPORT BELOW:
Click the button below and see exactly how this report will look.
DETAILED PDF SECURITY REPORT
The PDF security report generated by our Guard Dog Security plugin will provide a comprehensive overview of the site’s current security status, offering valuable insights into both secured aspects and areas requiring further attention. Below is a description of each item in the report and its value:
1. Items that Secured the Site
This section lists the security measures already in place on the site. These could include installed security plugins, specific configuration settings, or security features like login protections and file permission restrictions. This information reassures the site administrator that certain protections are already safeguarding the site.
Value: Demonstrates current security strengths and provides a baseline for future improvements.
2. Items that Can Secure the Site Further
This section highlights additional measures that could be implemented to enhance site security. These could include recommendations like enabling two-factor authentication, updating plugins/themes, or restricting file access.
Value: Helps prioritize actions that will bolster the overall security posture of the site, reducing vulnerabilities.
3. WordPress Version Installed and Running
Displays the version of WordPress currently active on the site. Running the latest WordPress version is essential for ensuring that all known security vulnerabilities have been patched.
Value: Ensures the site administrator is aware of any version discrepancies and reminds them to update if necessary for security purposes.
4. Active Plugins
Lists all currently active plugins on the site. Knowing what plugins are active is crucial, as each plugin could introduce potential vulnerabilities if not maintained.
Value: Provides insight into the active components that might affect performance or security and helps track plugin updates.
5. Inactive Plugins
Lists plugins that are installed but not currently in use. Inactive plugins can pose a risk if left outdated, as they can still be exploited by hackers.
Value: Encourages the administrator to either update or remove unused plugins to reduce potential attack vectors.
6. Outdated Plugins
Identifies plugins that have not been updated to their latest version. Outdated plugins can contain security vulnerabilities that are fixed in newer versions.
Value: Alerts the administrator to outdated plugins that need updating to minimize security risks.
7. Abandoned Plugins
Lists plugins that have not been updated in a long time, indicating they may no longer be maintained. Abandoned plugins are particularly risky, as they may no longer receive security patches.
Value: Highlights plugins that should be replaced or removed due to the potential security risks of using unmaintained software.
8. Active Theme
Displays the active theme in use on the site. It’s important to ensure the theme is up to date and well-maintained to avoid potential vulnerabilities.
Value: Provides assurance that the current theme is up to date or signals if it needs attention.
9. Inactive Themes
Lists themes installed on the site but not currently in use. Like inactive plugins, unused themes can pose a security risk if left outdated.
Value: Encourages the removal or update of unused themes to reduce unnecessary vulnerabilities.
10. Outdated Themes
Highlights themes that are not up to date. Just like plugins, themes need regular updates to fix security vulnerabilities and compatibility issues.
Value: Ensures the administrator knows which themes need attention to maintain site security.
11. Admin Users on the Site
Lists all users with administrative privileges on the site. Admin accounts with excessive access can be targeted in brute force attacks, so it’s important to keep track of who has access.
Value: Provides visibility into user access levels, helping to manage and restrict admin rights as needed to secure the site.
12. SSL Certificate Information
Displays details about the site’s SSL certificate, including whether it’s valid and up to date. An SSL certificate ensures that communications between the server and users are encrypted, protecting sensitive data.
Value: Confirms whether the site is properly encrypted and identifies any issues with SSL certificate validity.
13. Server PHP Version
Indicates the PHP version running on the server. Running the latest supported version of PHP is critical for performance and security, as outdated versions may have known vulnerabilities.
Value: Ensures the server is running a secure and supported version of PHP, helping to prevent security flaws in the site’s core infrastructure.
Overall Value of the Report:
This PDF report offers a holistic view of the site’s security status. It not only helps administrators identify which aspects of the site are secured but also highlights potential vulnerabilities and areas for improvement.
This allows administrators to take proactive steps to enhance site security, ensuring the site’s resilience against potential threats.
VIEW SAMPLE REPORT BELOW:
Click the button below and see exactly how this report will look.
YOUR BRAND NOT OURS
The white label settings allow users to customize various aspects of the Guard Dog Security plugin, creating a unique and branded experience tailored to your organization. These options ensure that the plugin fits seamlessly within your site’s overall branding and workflow.
Plugin Name
This option allows you to rename the Guard Dog Security plugin to something more aligned with your brand. This custom name will appear throughout the WordPress admin dashboard, providing a more integrated and personalized feel.
Admin Menu Name
This setting lets you customize the name that appears in the WordPress admin menu. It allows you to match the security plugin’s presence in the admin panel to your company’s branding, giving a more cohesive user interface.
Company Name
Enter your company name here to ensure that all references within the plugin’s settings and reports reflect your organization. This is useful for maintaining brand consistency across the site and any client interactions.
Company Logo
Add your company’s logo to the plugin interface and the PDF reports generated by the Guard Dog Security plugin. This makes the plugin appear as a part of your own suite of services, reinforcing your brand.
- Upload Logo: Use this option to upload a custom logo that will appear on all pages where the plugin is displayed and within generated reports.
- Remove Logo: If you wish to revert back to the default settings or remove the logo from the plugin interface and reports, you can use this option to delete the custom logo.
Security Report File Name
This option allows you to specify a custom file name for the exported security report PDFs. It ensures that all reports generated by the plugin carry a branded or easily identifiable name, such as including your company’s name in the file name.
Color Scheme
The color scheme settings allow you to customize the appearance of the plugin interface and reports with your brand’s colors. These options ensure that the plugin blends into the site’s branding and presents a professional look.
- Select Custom Colors: Activate this option to define custom colors for the plugin’s interface.
- Main Color: Choose a primary color that will be used throughout the plugin for key elements such as buttons and headers.
- Secondary Color: Choose a secondary color for accent elements, ensuring your interface feels consistent with your overall design.
- Pre-selected Color Schemes: If you prefer not to define custom colors, you can choose from several pre-selected color schemes via a convenient drop-down. These color schemes are designed to provide visually appealing and balanced options, allowing you to quickly select a professional look without needing to configure colors manually.
These white label options ensure that the Guard Dog Security plugin can be tailored to meet your branding needs, allowing for a more professional and cohesive presentation. Whether you’re customizing the plugin for internal use or deploying it across client sites, these settings will make the plugin feel like a natural extension of your brand.
YOUR BRAND NOT OURS
The white label settings allow users to customize various aspects of the Guard Dog Security plugin, creating a unique and branded experience tailored to your organization. These options ensure that the plugin fits seamlessly within your site’s overall branding and workflow.
Plugin Name
This option allows you to rename the Guard Dog Security plugin to something more aligned with your brand. This custom name will appear throughout the WordPress admin dashboard, providing a more integrated and personalized feel.
Admin Menu Name
This setting lets you customize the name that appears in the WordPress admin menu. It allows you to match the security plugin’s presence in the admin panel to your company’s branding, giving a more cohesive user interface.
Company Name
Enter your company name here to ensure that all references within the plugin’s settings and reports reflect your organization. This is useful for maintaining brand consistency across the site and any client interactions.
Company Logo
Add your company’s logo to the plugin interface and the PDF reports generated by the Guard Dog Security plugin. This makes the plugin appear as a part of your own suite of services, reinforcing your brand.
- Upload Logo: Use this option to upload a custom logo that will appear on all pages where the plugin is displayed and within generated reports.
- Remove Logo: If you wish to revert back to the default settings or remove the logo from the plugin interface and reports, you can use this option to delete the custom logo.
Security Report File Name
This option allows you to specify a custom file name for the exported security report PDFs. It ensures that all reports generated by the plugin carry a branded or easily identifiable name, such as including your company’s name in the file name.
Color Scheme
The color scheme settings allow you to customize the appearance of the plugin interface and reports with your brand’s colors. These options ensure that the plugin blends into the site’s branding and presents a professional look.
- Select Custom Colors: Activate this option to define custom colors for the plugin’s interface.
- Main Color: Choose a primary color that will be used throughout the plugin for key elements such as buttons and headers.
- Secondary Color: Choose a secondary color for accent elements, ensuring your interface feels consistent with your overall design.
- Pre-selected Color Schemes: If you prefer not to define custom colors, you can choose from several pre-selected color schemes via a convenient drop-down. These color schemes are designed to provide visually appealing and balanced options, allowing you to quickly select a professional look without needing to configure colors manually.
Conclusion
These white label options ensure that the Guard Dog Security plugin can be tailored to meet your branding needs, allowing for a more professional and cohesive presentation. Whether you’re customizing the plugin for internal use or deploying it across client sites, these settings will make the plugin feel like a natural extension of your brand.
Guard Dog
Security Plugin
FULL PROOF FULL SITE SECURITY
Guard Dog Security Plugin
FULL PROOF FULL SITE SECURITY