Table of Contents
WP Ghost is a hack-prevention security solution for your WordPress site. Together with the WordFence plugin, it will boost your website security by stopping hacker bot attacks, spammers, and viruses and preventing data loss.
Advantages
- Both plugins have complementary features that will boost your website security.
- Both plugins load fast and work with SEO and Cache plugins.
- Both plugins work on all server types (Apache, Nginx, IIS, LiteSpeed, etc).
- WP Ghost is a hack-prevention security and prevents hacker bots from accessing vulnerable files, plugins, and themes.
- Wordfence works like a firewall to prevent Brute Force attacks, integrity scan, malware scan and more.
HMWP Ghost will complement the Wordfence plugin by offering an extra layer of protection that the other doesn’t provide.
Wordfence
Wordfence firewall leverages user identity information in over 85% of the firewall rules, something cloud firewalls don’t have access to. And unlike cloud solutions, the firewall doesn’t need to break end-to-end encryption.
WP Ghost
Activate Security Features
Security features that you should activate in WP Ghost when both plugins are active
Features | WP Ghost | Wordfence |
---|---|---|
Change/Hide wp-admin Path | ✅ | ❌ |
Change/Hide wp-login Path | ✅ | ✅ |
Change/Hide Lost Password Path | ✅ | ❌ |
Change/Hide Register Path | ✅ | ❌ |
Change/Hide Activation Path | ✅ | ❌ |
Change/Hide Logout Path | ✅ | ❌ |
Change/Hide Ajax Path | ✅ | ❌ |
Change/Hide wp-content Path | ✅ | ❌ |
Change/Hide wp-includes Path | ✅ | ❌ |
Change/Hide uploads Path | ✅ | ❌ |
Change/Hide wp-comments-post Path | ✅ | ❌ |
Change/Hide Plugins Path | ✅ | ❌ |
Custom Plugins Name | ✅ | ❌ |
Change/Hide Themes Path | ✅ | ❌ |
Custom Themes Name | ✅ | ❌ |
Change/Hide Rest API Path | ✅ | ❌ |
Hide WordPress Common Paths | ✅ | ❌ |
Hide WordPress Common Files | ✅ | ❌ |
Disable Pinback & XML-RPC access | ✅ | ✅ |
Change Paths in Sitemap and Robots | ✅ | ❌ |
Hide Admin Toolbar | ✅ | ❌ |
Login/Logout Custom Redirects | ✅ | ❌ |
Disable Clicks and Keys | ✅ | ❌ |
Text Mapping | ✅ | ❌ |
URL Mapping | ✅ | ❌ |
CDN Mapping | ✅ | ❌ |
Firewall | ||
7G and 8G Firewall | ✅ | ❌ |
Firewall Against SQL/Script Injection | ✅ | ✅ |
Header Security | ✅ | ✅ |
Country Blocking | ✅ | ✅ |
Blacklist IPs and Paths | ✅ | ✅ |
Whitelist IPs and Paths | ✅ | ✅ |
Two-Factor Authentication Code | ✅ | ✅ |
Two-Factor Authentication Email | ✅ | ❌ |
Temporary Logins | ✅ | ❌ |
Magic Link Login | ✅ | ❌ |
Brute Force Protection | ||
Math reCaptcha | ✅ | ❌ |
Google reCaptcha V2 | ✅ | ✅ |
Google reCaptcha V3 | ✅ | ✅ |
Limit Login Fail Attempts | ✅ | ✅ |
Lost Password Form Protection | ✅ | ❌ |
Register Form Protection | ✅ | ❌ |
Comment Forms Protection | ✅ | ❌ |
WooCommerce Login Protection | ✅ | ✅ |
Configurable Lockout Time | ✅ | ✅ |
Manage Blocked IPs | ✅ | ✅ |
Events and Actions Log | ||
Log Suspect User Activity | ✅ | ✅ |
Cloud Events Log Report | ✅ | ❌ |
Security Email Alerts | ✅ | ✅ |
Notification Email Address | ✅ | ✅ |
Malware and Virus Scanning | ❌ | ✅ |