Learn the best Securewp settings to protect a WordPress website. This guide shows what to enable, what to test carefully, and how to configure hardening, login security, firewall rules, Cloudflare sync, vulnerability alerts, malware scanning, and notifications without breaking your site.

2. Recommended WordPress Login Security Settings

The WordPress login page is one of the most attacked parts of a website. Bots continuously test leaked passwords, default usernames, and common login paths.

Go to Securewp → Hardening → Login Security.

securewp login security

Recommended login form protection

SettingRecommended valueUse this because
Limit Login AttemptsOnStops unlimited password guessing.
Failed attempts per IP5Blocks aggressive brute force attempts without being too strict.
Failed attempts per user5-10Protects accounts while reducing accidental lockouts.
Detection window15 minutesGood balance for most real-world login attacks.
Lockout duration30 minutesSlows bots without creating long support issues for real users.
Bot Detection / CAPTCHAEnable when login bots are activeBlocks automated login attempts before they become lockouts.
Restrict Login IdentifierEmail only for most business sitesReduces username-based guessing.
Block Default Admin UsernameOn if no real user uses adminBlocks one of the most common brute force usernames.
Obfuscate Login Error MessagesOnPrevents attackers from confirming valid usernames.

Recommended default: 5 failed attempts per IP, 5-10 per user, 15-minute detection window, and 30-minute lockout duration.

For WooCommerce, LMS, and membership sites

Do not make login protection too aggressive on day one. Customers, members, and students forget passwords. Start with moderate lockout settings, monitor lockouts, then tighten if needed.

If CAPTCHA is enabled, test the login page, registration page, password reset page, WooCommerce My Account page, checkout flow, and any custom login form.

3. Should You Enable a Custom Login URL?

Securewp can replace the default WordPress login URL with a private login path. This reduces noise from bots that attack /wp-login.php and /wp-admin.

Go to Securewp → Hardening → Login Security → Custom Login URL.

Recommended setting

Enable Custom Login URL if you have recovery access, the new URL is documented, and login-related pages have been tested.

OptionRecommendation
Login slugUse a private, non-obvious slug.
Register slugKeep default registration behavior only if public registration is needed.
Default wp-login.php responseUse 403 or 404.
RedirectAvoid unless you have a specific reason.

Good login slug examples

  • /team-entry-472
  • /client-access
  • /private-dashboard-entry

Avoid obvious slugs

  • /login
  • /admin
  • /secure-login
  • /wp-login-new

Do not enable this blindly. If your site uses WooCommerce, membership plugins, LMS plugins, custom login pages, or frontend account dashboards, test those flows before relying on a renamed login URL.

4. Recommended Password Policy Settings

Strong passwords are still one of the simplest ways to reduce account compromise. Securewp helps block weak, reused, and breached passwords.

Go to Securewp → Hardening → Login Security → Password Policies.
securewp password policy settings

SettingRecommended valueWhy
Breached Password DetectionOnBlocks passwords already exposed in public data leaks.
Enforce Strong PasswordsOnPrevents weak passwords during password changes.
Prevent Password ReuseOn for business, ecommerce, and agency sitesStops users from returning to the same compromised password.
Require Password Change on Role PromotionOnProtects accounts when users become Administrator or Editor.
Password Expiration PolicyOff for most sitesUse only when internal policy or compliance requires rotation.

For most WordPress websites, breached password detection and strong password enforcement provide better day-to-day security than forcing every user to rotate passwords frequently.

5. Recommended Two-Factor Authentication Settings

Two-factor authentication is one of the highest-value settings in Securewp. It protects the site even if an admin password is stolen, reused, guessed, or phished.

Go to Securewp → Hardening → Two-Factor (2FA).
securewp 2fa setting

Recommended 2FA enforcement

User roleRecommended 2FA setting
AdministratorRequired
EditorRequired for business, publishing, ecommerce, and agency-managed sites
Shop ManagerRequired if WooCommerce is active
AuthorOptional, required for high-risk publishing sites
SubscriberOptional unless accounts contain sensitive data

Recommended 2FA methods

  • Authenticator App: best default for administrators and developers.
  • Email Code: useful fallback for non-technical users.
  • Recovery Codes: must be saved by every administrator.
2FA optionRecommended value
Allowed methodsAuthenticator App and Email Code
Grace period3 to 7 days for teams
Remember device7 to 30 days

Do not force 2FA for every subscriber unless your users access private, financial, medical, educational, or membership-protected data. For most public websites, require 2FA for privileged users first.

6. Recommended WordPress Obscurity Settings

WordPress obscurity settings do not replace updates, scanning, or firewall protection. Their job is to reduce unnecessary information exposure and make automated targeting harder.

Go to Securewp → Hardening → WordPress Obscurity.

securewp wordpress hardening settings

SettingRecommended valueWhy
Hide WordPress VersionOnReduces version fingerprinting in public output.
Clean WordPress HeadOn for most sitesRemoves unnecessary metadata and discovery links.
Prevent Username in Author SlugOnStops author URLs from exposing login usernames.
Block User EnumerationOnBlocks common username discovery methods.
Disable Theme & Plugin EditorOnPrevents attackers from editing PHP files through wp-admin.
Disable Application PasswordsOn unless requiredRemoves an authentication method many sites do not use.
Restrict REST API AccessTest firstUseful, but can break forms, checkout, apps, headless sites, and integrations.

Safe to enable on most sites

  • Hide WordPress Version
  • Prevent Username in Author Slug
  • Block User Enumeration
  • Disable Theme & Plugin Editor

Test before enabling

  • Disable Application Passwords if you use API clients, mobile publishing, or automation tools.
  • Restrict REST API Access if your site uses WooCommerce, forms, headless WordPress, page builders, search filters, or custom integrations.

7. Recommended Server Hardening Settings

Server hardening protects common file paths and execution points attackers abuse after finding a weakness.

Go to Securewp → Hardening → Server Hardening.

securewp hardening settings

SettingRecommended valueWhy
Disable Directory ListingOnStops visitors from browsing folders and finding files that should not be public.
Block PHP Execution in UploadsOnPrevents uploaded PHP backdoors and web shells from running.
Block Direct PHP Access in PluginsOn for most sitesStops direct execution of plugin PHP files by URL.
Block Direct PHP Access in ThemesOn for most sitesStops direct execution of theme PHP files by URL.
Block Sensitive File AccessOnBlocks public access to dotfiles, debug logs, Git metadata, backups, and config fragments.
XML-RPCFully Disabled if not neededReduces brute force and pingback abuse.

Recommended XML-RPC setting

Use Fully Disabled unless your site depends on Jetpack, a mobile app, or a legacy publishing tool. If XML-RPC is required, use Disable Pingbacks Only to reduce abuse while keeping compatibility.

High-value baseline: Disable Directory Listing, Block PHP Execution in Uploads, and Block Sensitive File Access should be enabled on almost every production WordPress website.

8. Recommended Security Header Settings

Security headers help browsers protect visitors from clickjacking, MIME sniffing, referrer leakage, insecure loading, and some script injection risks.

Go to Securewp → Hardening → Security Headers.

Recommended header baseline

HeaderRecommended settingImportant note
X-Content-Type-OptionsEnableSafe for most sites.
X-Frame-OptionsSAMEORIGINUse DENY only if the site never needs iframe embedding.
Referrer-Policystrict-origin-when-cross-originGood privacy and compatibility balance.
Permissions-PolicyDisable browser features you do not useBe careful with payment, fullscreen, camera, microphone, and geolocation features.
Strict-Transport-SecurityEnable only after HTTPS is fully verifiedDo not enable preload until every subdomain is ready.
Content-Security-PolicyStart with Report OnlyTest before enforcing because CSP can break scripts, checkout, ads, maps, and embeds.

Recommended CSP rollout

  1. Run header analysis.
  2. Start Content-Security-Policy in Report Only.
  3. Test your homepage, login page, forms, checkout, account pages, analytics, ads, maps, videos, and embeds.
  4. Add required trusted domains.
  5. Keep Skip CSP on Admin Pages enabled unless you have tested wp-admin carefully.
  6. Switch to Enforce only after real testing.

Recommended HSTS rollout

Enable HSTS only after your site works perfectly over HTTPS. Be extra careful with Include Subdomains and Preload. Those settings are powerful, but they can cause long-term access issues if any subdomain still has broken SSL.

10. IP Detection & Trusted IPs

IP detection tells Securewp which visitor IP is real. This is essential for firewall accuracy.

Go to Securewp → Firewall → Advanced → IP Detection.

Site setupRecommended IP detection setting
Normal hosting, no proxyAutomatic
CloudflareAutomatic, then apply Cloudflare preset if prompted
CDN or reverse proxyAutomatic first, Manual only if needed
Direct server connection onlyAutomatic or Disabled if you are certain no proxy/CDN is used

Trusted IPs recommendation

Trusted IPs bypass firewall rules, so keep this list short and intentional.

Good Trusted IP examples

  • Office static IP
  • Agency VPN IP
  • Developer VPN IP
  • Known uptime monitoring service
  • Required integration provider

Bad Trusted IP examples

  • Unknown contractor IP
  • Residential IP that changes often
  • Shared public VPN exit node
  • Large IP ranges you do not control

If you add your current IP, confirm it is stable. Otherwise, that allow rule may become useless later or accidentally trust someone else after your ISP changes the IP.

11. Recommended Firewall Protection Settings

Go to Securewp → Firewall → Protection.

securewp bot policy settings

Firewall settingRecommended valueWhy
Bot & Crawler PolicyBalancedBest default for blocking hacking tools, data scrapers, and automated scripts.
Detect & Block ScannersOnBlocks probes for backups, config files, version metadata, and sensitive paths.
Scanner threshold3 to 5 failed probesBlocks obvious scanners without being too sensitive.
Observation window10 to 15 minutesGood default for repeated probing behavior.
Community IP BlocklistOnBlocks known malicious IPs seen across the Securewp network.
Rate LimitingOn, moderate valuesReduces traffic spikes, scraping, and repeated 404 probes.

Bot & Crawler Policy recommendation

PolicyUse when
BasicYou want the lightest protection or are testing a new site with many integrations.
BalancedRecommended for most WordPress websites.
MaximumUse during active attacks, heavy scraping, or aggressive bot traffic.

For most sites, use Balanced. Move to Maximum during active abuse, then review the Traffic Log for false positives.

Detect & Block Scanners recommendation

Enable this on almost every production site. Scanner bots commonly request files like:

  • .env
  • .git/config
  • debug.log
  • wp-config.php.bak
  • backup.zip
  • old plugin paths
  • version files

These requests are not normal visitor behavior. Blocking repeat offenders protects the site and reduces server noise.

Rate limiting recommendation

Rate limiting should be enabled, but not too aggressively on dynamic sites.

Website typeRecommended rate limit approach
Business websiteModerate limits
WooCommerceModerate limits; test cart, checkout, account pages, filters, and payment callbacks
Membership or LMSModerate to higher limits because logged-in users generate more requests
Under attackTemporarily tighten limits, then relax after traffic normalizes

12. How to Use the Securewp Firewall Rule Builder

Go to Securewp → Firewall → Rules.
securewp firewall rules

The rule builder lets you block or allow traffic by IP Address, Country, or Bot / Crawler. This is where Securewp becomes practical for real-world abuse: blocking repeat attackers, allowing trusted services, restricting high-risk regions, or stopping aggressive crawlers.

IP Address Rules

Use IP rules when you know exactly who should be blocked or trusted.

Block an IP when:

  • The IP repeatedly fails login attempts.
  • The IP probes sensitive files.
  • The IP causes repeated 404 errors.
  • The IP appears repeatedly in the Traffic Log.
  • The IP is scraping or attacking the site.

Allow an IP when:

  • It belongs to your office.
  • It belongs to your agency or developer VPN.
  • It belongs to a trusted monitoring service.
  • It belongs to a payment, shipping, or integration provider.
SituationRecommended duration
Temporary login attack1 day or 7 days
Repeated scanner IP30 days
Known malicious server90 days or Permanent
Office or agency VPNPermanent allow rule, only if IP is stable

Do not overuse allow rules. Allowed IPs bypass firewall rules. Only allowlist IPs you control or fully trust.

Country Rules

Country blocking can be useful, but it should be used carefully. It is not the first setting to enable unless your business has a clear geographic audience.

Country policyRecommended use
Block selected countriesUse when firewall logs show repeated abuse from countries you do not serve.
Allow only selected countriesUse only for local businesses, private portals, internal sites, or region-specific services.

Use country blocking when:

  • Your business serves only specific countries.
  • You see repeated attacks from specific regions.
  • Your website is a local business site.
  • Your site is a private portal or internal tool.

Avoid strict country blocking when:

  • You sell internationally.
  • Your customers travel.
  • Your team works remotely.
  • You rely on global payment gateways or shipping services.
  • You are not sure where legitimate visitors come from.

Allow-only country mode is strict. It can block legitimate visitors, VPN users, remote workers, travelers, and unknown-country traffic.

Bot / Crawler Rules

Use bot rules when a specific crawler is wasting resources, scraping content, or hitting the site aggressively.

Block bot patterns like:

  • AhrefsBot
  • SemrushBot
  • MJ12bot
  • Known fake browser or scanner user agents

Trust bot patterns only when:

  • You fully trust the service.
  • The user-agent pattern is specific.
  • The crawler is required for business, SEO, monitoring, or integrations.

Avoid trusting broad patterns like bot, crawler, Mozilla, or Google. Broad trusted patterns can accidentally bypass firewall protections.

13. Recommended Cloudflare Sync Settings

If your website uses Cloudflare, Securewp can sync supported firewall rules to Cloudflare so bad traffic is blocked before it reaches your hosting server.

Configure Cloudflare in Securewp → Settings → Integrations → Cloudflare Connection, then manage sync in Securewp → Firewall → Cloudflare Sync.
securewp cloudflare integration

Cloudflare settingRecommended value
Auth methodAPI Token
Cloudflare SyncOn if the site uses Cloudflare
Push nowUse after major firewall rule changes
Automatic Edge BlocksEnable during active abuse or high-risk traffic
Edge block durationTemporary first, longer only for repeated abuse

Why Cloudflare Sync is valuable

Origin firewall rules block traffic at your server. Cloudflare edge rules can block traffic before it reaches WordPress, PHP, or the database. That helps reduce server load during brute force attacks, scanner storms, scraping, and repeated malicious requests.

Recommended automatic edge block approach

Start moderate. Do not set thresholds too low if your users may share the same IP, such as offices, schools, universities, public Wi-Fi networks, or corporate VPNs.

14. Recommended Malware Scanning Settings

After hardening and firewall protection are configured, run malware scans to detect infected files, unauthorized changes, suspicious code, database issues, exposed sensitive data, and other signs of compromise.

Go to Securewp → Scanner.

SituationRecommended scan
First scan after setupStandard Scan
Routine protectionStandard Scan
After plugin or theme updatesStandard Scan
Suspicious redirects, SEO spam, unknown admin users, or host malware warningDeep Scan
After malware cleanupDeep Scan, then Standard Scan for follow-up

Recommended scan schedule

Website typeRecommended schedule
Small business websiteWeekly
Low-change brochure siteWeekly or monthly
WooCommerce storeDaily or weekly
Membership or LMS siteDaily or weekly
Recently cleaned hacked siteDaily for a short monitoring period
Agency-managed sitesBased on client risk and maintenance plan

Scheduled scans are especially valuable for Pro users because they turn scanning from a manual task into continuous monitoring.

How to handle scan findings

  1. Fix Critical findings first.
  2. Fix High findings next.
  3. Review Medium findings during maintenance.
  4. Do not ignore findings unless you verified the reason.
  5. Run another scan after cleanup or repair.

Use Repair only when the file can be safely restored. Use Delete only when you know the file is malicious or unnecessary. Use Ignore only for verified false positives.

15. Recommended Vulnerability Scanner Settings

Many WordPress hacks happen because a known vulnerable plugin or theme remains installed after a patch is available. Securewp’s Vulnerability Scanner helps you monitor plugins, themes, and WordPress core for known CVEs and patch guidance.

Go to Securewp → Vulnerabilities.

Recommended workflow

  1. Click Check Now.
  2. Review Critical and High issues first.
  3. Update affected plugins and themes.
  4. Delete unused vulnerable plugins and inactive themes.
  5. Replace abandoned plugins with maintained alternatives.
  6. Run another vulnerability check after updates.
SeverityRecommended action
CriticalFix immediately. Update, disable, remove, or replace the affected component.
HighFix the same day and review firewall/audit logs for suspicious activity.
MediumFix during the next maintenance window.
LowFix during normal updates, but do not ignore forever.

Simple rule: If you are not using a plugin or theme, remove it. Inactive code can still become a security risk.

16. Recommended Security Notification Settings

Security alerts turn Securewp from a one-time setup tool into an active monitoring system. If nobody receives alerts, important findings can sit unnoticed.

Go to Securewp → Settings → Notifications.
securewp notifications settings

Recommended email recipients

  • Site owner
  • Developer
  • Agency support inbox
  • Security or technical admin mailbox

Recommended scan and vulnerability alerts

AlertRecommended value
Scan FindingsOn
New Vulnerability FoundOn
Scan FailedOn
Severity thresholdMedium and above for most sites; High and above for high-volume agency inboxes

Recommended firewall and login alerts

  • Firewall Block Summary: Daily for active sites, weekly for low-traffic sites.
  • Login Lockout: On.

Recommended account activity alerts

  • Securewp Deactivated
  • Sensitive Tool Used
  • Two-Factor Authentication Change
  • Administrator Sign-In

These alerts matter because attackers often try to disable security tools, change 2FA settings, create admin access, or use sensitive tools after gaining access.

Webhook recommendation

Use Slack, Discord, or a generic JSON webhook if you manage multiple websites, run a client maintenance plan, or want alerts delivered to an operations channel instead of only email.

17. Audit Log & Ongoing Monitoring

The Audit Log helps answer the most important post-incident question: what changed, when, and by whom?

Go to Securewp → Settings → Advanced to enable audit logging, then review events in Securewp → Audit Log.

Audit settingRecommended value
Audit LoggingOn
Log LevelStandard for most sites
Log StorageDatabase + File if storage allows
RetentionLong enough to investigate incidents and client questions

Events worth watching

  • Administrator sign-ins
  • Failed login patterns
  • Password changes
  • New admin users
  • Plugin installs and activations
  • Theme changes
  • Hardening setting changes
  • Securewp deactivation
  • Sensitive tool usage

Simple weekly security routine

  1. Review Securewp scan findings.
  2. Check Vulnerability Scanner results.
  3. Review firewall blocked traffic and active rules.
  4. Check login lockouts.
  5. Review new administrator users.
  6. Remove unnecessary firewall allow rules.
  7. Update vulnerable plugins and themes.

18. Best Securewp Settings by Website Type

Small business website

HardeningEnable WordPress Obscurity and Server Hardening baseline.
Login SecurityEnable login limits, obfuscated errors, and 2FA for admins.
FirewallUse Balanced bot policy, scanner blocking, community blocklist, and moderate rate limiting.
ScanningWeekly Standard Scan.
AlertsEmail notifications for scan findings, vulnerabilities, and login lockouts.

WooCommerce store

HardeningEnable safe hardening, but test REST API and security headers carefully.
Login SecurityEnable login limits and 2FA for Administrators and Shop Managers.
FirewallUse Balanced bot policy; tune rate limits around cart, checkout, account pages, and payment callbacks.
CloudflareEnable Cloudflare Sync if the store uses Cloudflare.
ScanningDaily or weekly scans depending on order volume and risk.

Membership, LMS, or community website

Login SecurityUse moderate lockout settings to avoid locking out real users.
CAPTCHAEnable if fake registrations or login bots are active.
2FARequire for staff, instructors, admins, and editors; optional for regular members.
FirewallUse Balanced bot policy and monitor rate limiting carefully.
ScanningDaily or weekly depending on user activity.

Agency-managed client websites

BaselineUse the same Securewp hardening and firewall baseline across client sites.
2FARequire for all administrators.
AlertsSend notifications to agency support inbox or Slack/Discord webhook.
Audit LogEnable for accountability and incident review.
ScanningSchedule based on maintenance plan and client risk.

Headless or API-heavy WordPress website

REST APIDo not restrict until all frontend, app, and integration endpoints are tested.
Application PasswordsDisable only if no API clients rely on them.
FirewallEnable firewall and tune rate limits around API traffic.
Security HeadersTest CSP and connection rules carefully.
2FARequire for human administrators.

 

Conclusion: Secure WordPress by Configuring the Right Securewp Modules

The safest WordPress websites are not protected by one setting. They are protected by layers: hardening, login security, two-factor authentication, firewall protection, malware scanning, vulnerability monitoring, alerts, and audit logs.

With Securewp, the recommended baseline is clear: enable hardening, protect the login page, require 2FA for administrators, verify firewall IP detection, use Balanced bot protection, block scanners, enable the community blocklist, tune rate limiting, scan for malware, monitor vulnerabilities, and turn on alerts.

Then add stricter controls only when they match your website: country blocking for region-specific sites, Cloudflare Sync for Cloudflare-powered domains, CSP enforcement after testing, REST API restrictions after compatibility checks, and custom login URLs after recovery access is confirmed.

To check your site externally, run the Securewp Remote Security Scanner. To secure the site from inside WordPress, install the Securewp Security Plugin and use this guide as your recommended configuration checklist.