Security Check

Security Monitor – Weekly Cloud Scanning for WordPress

Automatically scan your WordPress sites every week from the cloud and get emailed when security issues are found. The Security Monitor runs in your WP Ghost Dashboard account. Add any connected site, and WP Ghost scans it weekly for exposed login paths, accessible WordPress files, visible source code paths, XML-RPC vulnerabilities, and other WordPress-specific issues. Results are shown in a cloud-hosted report with red/blue severity indicators and can be emailed to you or a different address per site. This is a Premium feature.

What Is the Security Monitor?

The Security Monitor is WP Ghost’s cloud-based scanning feature. It supplements the in-WordPress Security Check by running automated weekly scans from outside your server. This external perspective catches issues that internal scans might miss – like login paths that are accessible from the public internet even if they appear hidden from within the dashboard. Reports are stored in your WP Ghost Dashboard and optionally emailed to you.

Why Use the Security Monitor

The Security Monitor complements your hack prevention strategy by adding continuous, automated checking:

Automated weekly scans. The in-WordPress Security Check requires you to log in and click “Start Scan.” The Security Monitor runs automatically every week – you don’t need to remember to check.

External scanning perspective. The Monitor scans your site from outside, seeing exactly what bots see. If your login path is exposed, the Monitor finds it the same way an attacker would.

Email alerts for new issues. You receive the report in your inbox. If something breaks after a plugin update or hosting change, you know within a week instead of finding out when the site is already compromised.

How to Set Up the Security Monitor

  1. Log in to your WP Ghost Dashboard.
  2. Go to Security Monitor.
  1. Click +New.
  1. Select the website you want to monitor (only sites connected to your account via the WP Ghost plugin appear here).
  2. Enable or disable Email Notification for weekly reports.
  3. Click Submit.

The Security Monitor list shows all monitored sites with their URL, email notification status, date added (Created At), and last verification date.

To remove a website from monitoring, click the Trash icon next to it.

Reading the Security Report

View a report by clicking View Report next to any monitored site. If no report exists yet, click Run New Test to generate one on demand.

Reports use two severity levels:

Blue notifications – Informational insights. These don’t necessarily require action but show what the scanner detected (e.g., WordPress identity markers visible in source code).

Red notifications – Critical issues that need to be fixed. These represent active vulnerabilities that expose your site to attack (e.g., login path accessible, XML-RPC enabled).

You can re-run the scan at any time by clicking Run New Test. Use the Export button to download a copy of the report.

Report Warnings and How to Fix Them

Here are the warnings the Security Monitor can generate, what each means, and how to fix them:

“A path is visible. Brute Force attack is imminent!”

The default wp-login.php or wp-admin path is accessible. Bots can find and attack it. Fix: change and hide the login path. Also activate Brute Force Protection.

“WordPress XML-RPC Brute Force exploit detected!”

XML-RPC sends credentials in plaintext with every request. It’s no longer needed (WordPress uses the REST API). Fix: disable XML-RPC or restrict access via .htaccess.

“WordPress path is still accessible!”

The original wp-content/plugins and wp-content/themes paths still respond to requests. Bots target these to exploit vulnerable plugins. Fix: change and hide WordPress paths.

“WordPress readme.html is accessible!”

Root files like readme.html, license.txt, and wp-config.php contain WordPress version info, database details, and server paths. These are often the first files bots check. Fix: hide them via WP Ghost settings. Learn how: Hide WordPress Common Files.

“WordPress old paths are visible in the source code!”

wp-content/plugins, wp-content/themes, /wp-admin, and other default paths are visible in your HTML source. Bots crawl source code to identify WordPress sites and target known plugin paths. Fix: customize paths and enable source code path replacement in WP Ghost.

“WordPress Prefetch https://s.w.org is visible!”

The DNS prefetch meta tag for WordPress emojis identifies your CMS to scanners. Fix: hide the DNS prefetch.

“WordPress https://api.w.org/ is visible!”

The REST API discovery link in the page header identifies your site as WordPress. Not needed in production source code. Fix: hide the WordPress generator meta.

“WordPress ‘Powered by WordPress’ is visible!”

The footer text identifies your CMS to any visitor or bot. Fix: remove it via your theme’s customizer (Appearance > Customize) or theme settings. Also change the default tagline (“Just another WordPress site”) in Settings > General – it’s another direct WordPress identifier.

Email Notifications

Default notification email: Go to Profile > Settings in the WP Ghost Dashboard. Set the Default Notification Email address. This is where all Security Monitor reports and User Events email alerts are sent.

Per-site email: To send reports for specific sites to different email addresses, go to Connected Sites. Click the edit icon in the Alert Email column for the target site. Enter the custom email and click Submit. Per-site settings override the default notification email.

If no email is configured anywhere – neither in Profile Settings nor Connected Sites – reports are sent to the email address connected to your WP Ghost account.

Frequently Asked Questions

What’s the difference between Security Monitor and Security Check?

The Security Check runs inside your WordPress dashboard when you click “Start Scan” – it checks 39 server and WordPress configuration items. The Security Monitor runs automatically every week from the WP Ghost Cloud, scanning your site externally to check for exposed paths, accessible files, and visible WordPress markers. Use both: the Security Check for deep internal configuration, the Security Monitor for continuous external validation.

Is this a Premium feature?

Yes. The Security Monitor requires a WP Ghost Premium account and a connected site. The in-WordPress Security Check is available in the free version.

How often does it scan?

Automatically every week. You can also run a manual scan at any time by clicking Run New Test in the Security Monitor panel.

Does WP Ghost modify WordPress core files?

No. The Security Monitor scans your site from outside – it reads publicly accessible responses. It doesn’t modify any files, install anything, or require additional server-side configuration beyond the standard WP Ghost plugin connection.

Fix issues found by the Security Monitor:

John Darrel

Change the WordPress Database Prefix for Security

Replace the default wp_ database prefix with a random one to protect against SQL injection…

1 year

Customize WordPress Uploads Directory | WP Ghost

Change the WordPress uploads directory path with WP Ghost (rewrite rules, no files moved) or…

1 year

WP Ghost and WP Rocket Cache Setup Guide

Configure WP Ghost with WP Rocket cache. Enable file optimization, Change Paths in Cache Files.…

1 year

Why is website security important?

https://youtu.be/6ylhojSi-_E In this video, we’ll explore why website security matters and what can happen if…

1 year

Is WordPress Website Easily Hacked?

The security of your WordPress site depends on multiple factors, such as the strength of…

1 year

Set Up WordPress 2FA with Mobile Authenticator Apps

Step-by-step guides to connect WP Ghost 2FA with Google Authenticator, Authy, Microsoft Authenticator, or LastPass.…

1 year