Documentation
Everything you need to know about installing, configuring, and using WP Folder Shield - the complete WordPress security solution with 30+ protection features.
Installation
WP Folder Shield can be installed like any other WordPress plugin. Follow these steps to get started:
Method 1: Upload via WordPress Admin
- Download the plugin ZIP file from your Customer Portal or purchase confirmation email
- Log in to your WordPress admin dashboard
- Navigate to Plugins → Add New → Upload Plugin
- Click Choose File and select the downloaded ZIP file
- Click Install Now and wait for the installation to complete
- Click Activate Plugin
Method 2: Upload via FTP
- Extract the plugin ZIP file on your computer
- Connect to your server using an FTP client (FileZilla, etc.)
- Navigate to
/wp-content/plugins/ - Upload the
wp-folder-shieldfolder - Go to Plugins in WordPress admin and activate WP Folder Shield
License Activation
After installation, you need to activate your license to enable all security features and receive updates.
- Go to WP Folder Shield → License in your WordPress admin
- Enter your license key (found in your purchase confirmation email)
- Click Activate License
- You should see a success message confirming activation
License Types
| Plan | Sites | Features |
|---|---|---|
| Personal | 1 site | All security features |
| Professional | 5 sites | All features + Priority support + Multisite |
| Agency | Up to 100 | All features + Priority support + Multisite + White-label ready |
Setup Wizard NEW
The Setup Wizard guides new users through initial configuration with security presets that match your needs.
Wizard Steps
- Welcome - Overview of WP Folder Shield features
- License Activation - Enter and validate your license key
- Protection Level - Choose from three security presets
- Login Security - Configure 2FA, custom login URL, notifications
- Firewall Options - Enable WAF, headers, upload scanner, threat intel
- Complete - View your security score and start protecting
Security Presets
- Uploads protection
- Basic firewall
- Login protection
- Version hiding
- Everything in Essential
- wp-includes protection
- Two-factor authentication
- Auto-blocking
- Security headers
- Bot blocking
- Everything in Recommended
- Admin assets protection
- File editing disabled
- File monitoring
- REST API restriction
- Upload scanner
- Threat intelligence
Security Score Dashboard NEW
Get a comprehensive view of your site's security health with the Security Score feature. The score is calculated based on 7 security categories and provides actionable recommendations.
Score Categories & Weights
| Category | Weight | Checks |
|---|---|---|
| License & Updates | 10% | Valid license, plugin up-to-date |
| Login Security | 20% | Brute force, 2FA, custom URL, reCAPTCHA, auto-block |
| Firewall & WAF | 15% | Firewall enabled, bot blocking, country blocking |
| WordPress Hardening | 15% | XML-RPC, version hiding, file editing, headers, REST API |
| File Protection | 15% | Uploads protected, upload scanner, core monitoring |
| Monitoring & Alerts | 15% | Email alerts, login notifications, traffic monitor, threat intel |
| Advanced Features | 10% | Form protection, Cloudflare, session timeout |
Grade Scale
Directory Protection
The core feature of WP Folder Shield prevents PHP execution in directories that should only contain uploads and static files.
Protected Directories
wp-content/uploads- Blocks PHP malware in uploadswp-content/cache- Protects cache directorieswp-includes- Prevents direct access to core fileswp-admin/css- Protects admin CSS directorywp-admin/js- Protects admin JS directorywp-admin/images- Protects admin images directory
How It Works
WP Folder Shield adds .htaccess rules that block PHP execution while allowing legitimate file types (images, CSS, JS) to be served normally.
# Example .htaccess rule added by WP Folder Shield
<Files *.php>
Order Deny,Allow
Deny from all
</Files>
Web Application Firewall (WAF)
The WAF inspects incoming requests and blocks malicious traffic before it reaches your WordPress installation. It includes 30+ attack patterns and 26 known malicious bot signatures.
Attack Types Blocked
SQL Injection (9 patterns)
UNION SELECT, information_schema, exec sp_, stacked queries, and more
XSS Attacks (5 patterns)
<script> tags, javascript: URLs, event handlers like onclick=
File Inclusion (8 patterns)
Path traversal (../), /etc/passwd, PHP wrappers (php://filter, php://input)
Command Injection (6 patterns)
Shell metacharacters (;, |, backticks), cat, ls, $() expressions
WordPress Specific (3 patterns)
wp-config.php access, eval/assert functions, base64_decode calls
Bad Bots (26 types)
scanners (masscan, nikto, nmap), sqlmap, AI bots (gptbot, claudebot), SEO scrapers
Sensitive Files Protected
The firewall automatically blocks access to sensitive files:
- Configuration:
wp-config-sample.php,.htaccess,.htpasswd,.env - Version control:
.git,.svn - Package files:
composer.json,package.json - Debug files:
phpinfo.php,info.php,debug.php - WordPress:
readme.html,license.txt,wp-admin/install.php
Login Security
Comprehensive protection for your WordPress login page against brute force attacks and unauthorized access attempts.
Brute Force Protection
Automatically limit failed login attempts and block attackers:
| Setting | Default | Description |
|---|---|---|
| Max Login Attempts | 5 | Number of failed attempts before lockout |
| Lockout Duration | 30 minutes | How long the IP is locked out |
| Auto-Block Threshold | 10 attempts | Total attempts before automatic IP block |
| Auto-Block Duration | 24 hours | How long auto-blocked IPs stay blocked |
How Lockout Works
- Failed login attempt increments counter
- After 5 failures → temporary lockout (30 min)
- After 10 total failures → automatic IP block (24 hours)
- Blocked IPs reported to Threat Intelligence network
Custom Login URL
Hide your login page from automated attacks by changing the default wp-login.php URL:
- Go to WP Folder Shield → Settings → Login Security
- Enter your custom login slug (e.g., "my-secret-login")
- Save settings - your new login URL will be
yoursite.com/my-secret-login
Additional Features
- Hide Login Errors - Don't reveal whether username or password was wrong
- Login Activity Logging - Track all login attempts with IP, username, and timestamp
- Failed Login Notifications - Get email alerts for suspicious activity
- Disable XML-RPC - Block XML-RPC brute force attacks
- Restrict REST API - Require authentication for REST API access
Two-Factor Authentication
Add an extra layer of security with TOTP-based (Time-based One-Time Password) 2FA, compatible with all major authenticator apps.
Compatible Apps
- Google Authenticator - iOS and Android
- Microsoft Authenticator - iOS and Android
- Authy - iOS, Android, Desktop
- 1Password - Built-in TOTP support
- Any TOTP-compatible authenticator app
Technical Details
- Base32 encoding for secrets
- SHA-1 HMAC for code generation
- 30-second time window with ±1 window for clock drift
- 6-digit codes (000000-999999)
- Timing-safe verification (prevents timing attacks)
Setting Up 2FA
- Go to Users → Profile in WordPress admin
- Scroll to Two-Factor Authentication section
- Click Enable 2FA to generate your secret key
- Scan the QR code with your authenticator app
- Enter the 6-digit code displayed in your app to verify setup
- Save your 10 backup codes in a secure location
Backup Codes
When you enable 2FA, you'll receive 10 backup codes. Each code can only be used once:
- Store backup codes in a secure location (password manager, safe)
- Use a backup code if you lose access to your authenticator app
- Generate new backup codes anytime from your profile page
IP Manager
Manually control which IP addresses can access your site with whitelist and blacklist functionality.
IP Whitelist
Whitelisted IPs will never be blocked by the firewall, login security, or country blocking:
- Add your own IP address to prevent accidental lockouts
- Add office or VPN IP addresses for trusted access
- Supports individual IPs and CIDR notation (e.g., 192.168.1.0/24)
- Add notes to each entry for reference
IP Blacklist
Permanently block malicious IP addresses:
- Block individual IPs that are causing issues
- Block entire IP ranges using CIDR notation
- Blocked IPs receive a 403 Forbidden response
- Optionally sync blocks to Cloudflare
Auto-Blocking
WP Folder Shield automatically blocks IPs that trigger security rules:
- IPs blocked after exceeding failed login attempts
- IPs blocked for firewall rule violations
- Auto-blocks expire after 24 hours by default
- View and manage auto-blocked IPs in the Security Logs
192.168.1.0/24 to block/whitelist the entire range 192.168.1.0 - 192.168.1.255
Country Blocking
Block or allow traffic based on geographic location using GeoIP technology. Ideal for businesses that only serve specific regions.
Blocking Modes
Blacklist Mode
Block specific countries while allowing all others. Use when you want to block a few high-risk countries.
Whitelist Mode
Only allow specific countries while blocking all others. Use when you only serve specific regions.
How It Works
- GeoIP lookup determines visitor's country from their IP address
- Results are cached for 24 hours to improve performance
- Blocked visitors see a customizable block message
- Whitelisted IPs bypass country blocking
Full Site Malware Scanner PRO
Comprehensive malware scanning of your entire WordPress installation with database-driven signatures and heuristic analysis.
Scan Types
Quick Scan
Fast scan of high-risk areas: plugins directory, uploads folder, and root directory. Best for routine checks.
Full Scan
Comprehensive scan of entire WordPress installation including themes, plugins, uploads, and core files.
Detection Methods
- Signature Matching - 200+ malware signatures synced from Threat Intelligence
- Heuristic Analysis - Detects unknown threats using behavior patterns
- Entropy Detection - Identifies heavily obfuscated code (5.5+ threshold)
- Encoding Detection - Finds multiple base64/gzip encoding layers
- Hidden PHP Detection - Catches PHP code hidden in image headers
Heuristic Checks
| Code | Detection |
|---|---|
| HEUR-001 | High entropy detection (obfuscated code) |
| HEUR-002 | Extremely long lines (5000+ characters) |
| HEUR-003 | Multiple encoding layers (3+ nested) |
| HEUR-004 | Unusual non-printable character ratio |
| HEUR-005 | PHP code hidden after image headers (GIF89a, PNG, JPEG) |
Quarantine System
Suspicious files can be quarantined rather than deleted:
- Files moved to protected
wp-content/wpfs-quarantine/directory - Original path and metadata preserved
- Files can be restored if needed
- Auto-quarantine available for high-threat files
Whitelist System
- Automatically excludes known security plugins
- Hash-based safe list (mark files as safe by MD5)
- Path-based whitelist for custom exclusions
- Own plugin directory automatically whitelisted
Root Directory Monitor PRO
Monitors your WordPress root directory for unauthorized PHP files that may be uploaded via FTP, SFTP, or exploits.
What It Detects
- Unauthorized PHP files not part of WordPress core
- Malicious code injected into legitimate core files
- Webshells (FilesMan, WSO, r57, c99, b374k, Cyborg)
- Backdoors hidden in seemingly innocent files
Threat Scoring System
| Category | Score | Examples |
|---|---|---|
| Critical | 80-100 | Known webshells (FilesMan, WSO, r57) |
| High | 50-79 | Code execution (eval, assert, create_function) |
| Medium | 30-49 | Obfuscation (base64_decode, gzinflate) |
| Low | 1-29 | Suspicious patterns, potential false positives |
Scan Frequency Options
- Every 15 minutes (high-security sites)
- Every 30 minutes
- Hourly (recommended)
- Daily
Configuration
- Auto-Quarantine - Automatically quarantine high-threat files
- Email Alerts - Receive notifications when threats detected
- Custom Whitelist - Exclude legitimate custom files
- Root .htaccess Hardening - Add PHP execution rules to root
Core File Integrity PRO
Monitors wp-admin and wp-includes directories for unauthorized files and verifies WordPress core files against official checksums.
What It Checks
- Unauthorized Files - Files in wp-admin/wp-includes not in WordPress checksums
- Modified Core Files - Files that don't match official checksums
- Missing Files - Core files that have been deleted
- Infected Files - Core files with malicious code injected
How Verification Works
- Downloads official checksums from WordPress.org API for your exact WordPress version
- Compares each file's MD5 hash against the official checksum
- Identifies any files not present in the official checksums (unauthorized)
- Scans unauthorized/modified files for malicious patterns
Actions Available
- Delete - Remove unauthorized files safely
- Restore - Reinstall modified core files from WordPress.org
- Whitelist - Mark custom files as safe (e.g., language files)
- Harden Permissions - Set core files to read-only (0444)
AI Scanner PRO
The AI Scanner uses machine learning to detect sophisticated malware that traditional signature-based scanners miss. Powered by Advanced AI Models and Agents for intelligent code analysis.
Available AI Models (Free)
| Model | Best For |
|---|---|
| Llama 3.3 70B Instruct | Highest quality analysis (GPT-4 level) |
| Gemini 2.5 Pro | Large context window (1M tokens) |
| DeepSeek Chat V3 | Fast and accurate |
| DeepSeek R1 | Advanced reasoning |
| DeepSeek R1 Distill 70B | Balanced quality/speed |
| NVIDIA Nemotron 8B | Lightweight and fast |
| Mistral Devstral | Code-focused analysis |
Analysis Types
- Malware Detection - Backdoors, webshells, cryptominers, code injection
- Vulnerability Analysis - SQL injection, XSS, CSRF, LFI/RFI, insecure deserialization
- Log Analysis - Attack pattern identification, threat actor profiling
- Security Reports - Human-readable summaries for non-technical users
How It Works
- Run Full Site Scanner or Vulnerability Scanner to detect findings
- Go to WP Folder Shield → AI Scanner
- Review flagged files and click Analyze with AI
- AI provides detailed analysis with fix suggestions
- Take action: quarantine, delete, or mark as safe
File Upload Scanner PRO
Real-time scanning of all file uploads before they are saved to your server. Prevents malicious files from ever reaching your site.
Protection Features
- Dangerous Extension Blocking - Blocks .php, .phtml, .php5, .phar, .pgif, and other executable files
- Double Extension Prevention - Catches tricks like image.php.jpg or shell.png.php
- Content Scanning - Scans file contents for malicious patterns
- PHP in Images - Detects PHP code hidden in image files
- AI Analysis - Optional deep analysis for suspicious uploads
Webshell Signatures Detected (25+)
Configuration
Go to Settings → Forms & Scanning to:
- Enable/disable real-time scanning
- Configure blocked file extensions
- Enable content scanning
- Enable AI analysis for images
Vulnerability Scanner
Scan your themes and plugins for known security vulnerabilities and suspicious code patterns.
What It Scans
- Plugin Vulnerabilities - Checks against known CVE database
- Theme Vulnerabilities - Scans for known theme security issues
- Suspicious Code - Detects potentially dangerous functions (eval, base64_decode, etc.)
- Outdated Software - Flags plugins/themes that need updates
Running a Scan
- Go to WP Folder Shield → Vulnerability Scanner
- Click Start Scan
- Review the results and severity levels
- Click Analyze with AI for fix suggestions
Live Traffic Monitor PRO
Real-time dashboard showing all website traffic with threat detection. Designed for zero performance impact.
Features
- Real-Time Updates - See traffic as it happens via AJAX polling
- Threat Detection - Automatic flagging of blocked requests
- Geographic Visualization - See visitor locations via GeoIP
- Request Details - View full request headers and parameters
- Quick Actions - Block IPs directly from the monitor
- CSV Export - Export traffic logs for analysis
Logging Modes
Security Mode (Default)
Only logs blocked requests and security events. Minimal storage usage.
All Traffic Mode
Logs all traffic with configurable exclusions (admin AJAX, cron, REST).
Performance Optimizations
- Async logging via WordPress shutdown hook
- Batch database writes (20 entries per flush)
- GeoIP processing deferred to hourly cron
- Automatic cleanup (100K entries max)
- Single IP cache lookup per request
Traffic Data Captured
- IP address and GeoIP (City/Country)
- Request method (GET/POST) and path
- User agent and HTTP status code
- Response time in milliseconds
- Threat type (if blocked)
Threat Intelligence PRO
Crowdsourced threat data from the WP Folder Shield network of 10,000+ installations. Get protected from known attackers before they reach your site.
How It Works
- When any WP Folder Shield site blocks an attack, that IP is reported to the network
- Our servers aggregate data from multiple sources (Spamhaus, FireHOL, etc.)
- Your site receives blocklist updates automatically every 6 hours
- Known malicious IPs are blocked before they can attack your site
Data Sources & Confidence
| Source | Type | Confidence |
|---|---|---|
| Spamhaus DROP/EDROP | CIDR ranges | 95% |
| FireHOL Level 1 | Aggregated threats | 90% |
| Blocklist.de | Brute force attackers | 85% |
| Emerging Threats | Malware IPs | 88% |
| AbuseIPDB | Community reports | 80% |
| WP Folder Shield Network | User reports | 60-95% |
Threat Feed Includes
- IP Blocklist - 12,000+ known malicious IPs with confidence scoring
- CIDR Ranges - 350+ network ranges from known bad actors
- WAF Rules - Updated attack pattern signatures
- Malware Signatures - Latest webshell and backdoor patterns
Performance
- O(1) IP Lookup - Uses PHP hash file for instant IP checking
- Local Storage - Data stored in wp-content/uploads/wpfs-threat-data/
- No API Calls - All checks done locally after sync
- Sub-millisecond - Less than 1ms overhead per request
Security Headers
HTTP security headers protect your site from clickjacking, XSS, and other browser-based attacks.
Headers Applied
| Header | Value | Protection |
|---|---|---|
X-Frame-Options |
SAMEORIGIN | Prevents clickjacking attacks |
X-XSS-Protection |
1; mode=block | Enables browser XSS filter |
X-Content-Type-Options |
nosniff | Prevents MIME type sniffing |
Referrer-Policy |
strict-origin-when-cross-origin | Controls referrer information |
Permissions-Policy |
Customizable | Controls browser feature access |
Content-Security-Policy |
Optional/Customizable | Controls resource loading |
WordPress Hardening
Reduce your attack surface by disabling unnecessary WordPress features and hiding sensitive information.
Information Hiding
- Hide WordPress Version - Remove version from scripts, styles, feeds, and HTML
- Remove Generator Meta Tag - Hide WordPress identification in page source
- Remove RSD Link - Hide Really Simple Discovery endpoint
- Remove WLW Manifest - Hide Windows Live Writer endpoint
- Remove Shortlink Header - Remove X-Shortlink HTTP header
API & Remote Access
- Disable XML-RPC - Block remote publishing and brute force via XML-RPC
- Restrict REST API - Require authentication for REST API access
- Block User Enumeration - Prevent discovery of usernames via REST API or ?author=N
- Disable Application Passwords - Block WordPress 5.6+ application passwords
Remote Features
- Disable Pingbacks - Prevent DDoS amplification via pingbacks
- Disable Trackbacks - Block trackback spam and attacks
- Disable oEmbed - Remove oEmbed discovery and auto-embed functionality
File Security
- Disable File Editing - Remove Theme/Plugin Editor from WordPress admin
- Protect wp-config.php - Block direct access via .htaccess rules
- Disable Author Archives - Return 404 for author archive pages
Login Notifications PRO
Get email alerts when someone logs into your WordPress site from a new device, IP address, or location.
Detection Methods
- New Device - Uses daily-rotating browser cookie to recognize devices
- New IP Address - Tracks known IPs per user account
- New Location - GeoIP lookup for City/Region/Country changes
Email Alert Includes
- Username that logged in
- IP address and location
- Browser and device information
- Login timestamp
- Link to security settings
Configuration Options
- Notify on new device - Alert when unrecognized device logs in
- Notify on new IP - Alert when login from new IP address
- Notify admin on all logins - Admins receive all login alerts
- Per-user preferences - Users can manage their own notifications
Form Spam Protection PRO
Universal spam protection for all major WordPress form plugins. No configuration needed - just enable and it works.
Supported Form Plugins
Protection Methods
- Honeypot Fields - Invisible traps that catch bots (daily-rotating field names)
- Time-Based Validation - Blocks instant bot submissions (minimum 3 seconds)
- Rate Limiting - Max 5 submissions per IP per 60 seconds
- Spam Keyword Filter - 40+ spam patterns (pharmaceutical, gambling, adult, crypto scams)
- Malicious URL Detection - Max 3 URLs, blocks suspicious TLDs (.tk, .xyz, etc.)
Blocked Spam Keywords
Configuration
| Setting | Default |
|---|---|
| Enable honeypot | On |
| Enable time check | On |
| Minimum time (seconds) | 3 |
| Enable rate limiting | On |
| Max submissions per window | 5 |
| Rate limit window (seconds) | 60 |
| Enable spam filter | On |
| Enable URL check | On |
| Max URLs per submission | 3 |
Comment Spam Protection
Comprehensive protection for WordPress comments, pingbacks, and trackbacks.
Features
- Pingback/Trackback Blocking - Blocks DDoS amplification vectors
- Author URL Validation - Detects spammy website URLs
- Comment Flood Protection - Rate limiting for comment submissions
- Disallowed Keys Integration - Uses WordPress built-in blocklist
- Trusted Commenter System - Skips checks for approved commenters
reCAPTCHA Integration
Add Google reCAPTCHA to your login, registration, and comment forms to block bots.
Supported Versions
reCAPTCHA v2 (Checkbox)
Shows "I'm not a robot" checkbox. User-friendly but requires interaction.
reCAPTCHA v3 (Invisible)
Runs invisibly in background. Scores visitors 0.0-1.0 based on behavior.
Setup Instructions
- Go to Google reCAPTCHA Admin and create a new site
- Choose reCAPTCHA v2 or v3 and add your domain
- Copy your Site Key and Secret Key
- In WP Folder Shield, go to Settings → Integrations
- Paste your keys and select which forms to protect
Protected Forms
- WordPress Login Form
- WordPress Registration Form
- Lost Password Form
- Comment Forms
Cloudflare Integration PRO
Sync your WP Folder Shield protections with Cloudflare for edge-level security.
Features
- IP Sync - Automatically sync blocked IPs to Cloudflare firewall
- Security Level Control - Change Cloudflare security level from WordPress (off to under_attack)
- Under Attack Mode - One-click enable/disable from dashboard
- IP Range Updates - Auto-update Cloudflare IP ranges for accurate visitor IP detection
- Firewall Rules - Manage Cloudflare rules directly
Security Levels
Setup
- Get your Cloudflare API Token from the Cloudflare dashboard (Zone:Firewall:Edit permission)
- Get your Zone ID from the Cloudflare dashboard (Overview page)
- Go to WP Folder Shield → Settings → Integrations
- Enter your API Token and Zone ID
- Enable IP syncing to push blocks to Cloudflare
WP-CLI Commands
Full command-line support for managing WP Folder Shield. Perfect for automation and managing multiple sites.
Available Commands
| Command | Description |
|---|---|
wp folder-shield status |
Show protection status and configuration |
wp folder-shield license |
Show license information |
wp folder-shield scan [--type=TYPE] |
Run security scan (quick, full, malware, core) |
wp folder-shield block <ip> |
Block an IP address |
wp folder-shield unblock <ip> |
Unblock an IP address |
wp folder-shield whitelist <ip> |
Add IP to whitelist |
wp folder-shield list-blocked |
List all blocked IPs |
wp folder-shield enable <module> |
Enable a security module |
wp folder-shield disable <module> |
Disable a security module |
wp folder-shield clear-logs |
Clear security logs |
wp folder-shield firewall-stats |
Show firewall statistics |
Module Names
Use these names with enable and disable commands:
firewalllogin-security2facountry-blockingform-protectioncloudflarexml-rpcrest-apiupload-scannertraffic-monitorthreat-intelExamples
# Check security status
wp folder-shield status --format=json
# Run a full malware scan
wp folder-shield scan --type=full
# Block an attacker with reason
wp folder-shield block 192.168.1.100 --reason="Brute force" --duration=48
# Enable firewall and threat intelligence
wp folder-shield enable firewall
wp folder-shield enable threat-intel
# List blocked IPs with limit
wp folder-shield list-blocked --limit=100
# Clear all firewall logs
wp folder-shield clear-logs --type=firewall
General Settings
Configure WP Folder Shield to match your security requirements. Settings are organized into 6 tabs for easy navigation.
Settings Tabs
- Protection - Directory protection, firewall, bot blocking
- Login Security - Brute force, 2FA, custom URL, lockout settings
- API & Hardening - XML-RPC, REST API, headers, version hiding
- Forms & Scanning - Form protection, upload scanner, malware scanning
- Integrations - Cloudflare, reCAPTCHA, threat intelligence
- Advanced - Traffic monitor, notifications, logging, debug
Key Settings
- Email Notifications - Configure email addresses for security alerts
- Logging - Set log retention period (days)
- Auto-Updates - Enable automatic plugin updates
- Trusted Proxies - Configure if behind Cloudflare, load balancer, etc.
Settings Protection
Protect your security settings from unauthorized changes:
- Settings Lock - Require password to modify security settings
- Audit Logging - Track all setting changes with timestamps and user
Multisite Support PRO
WP Folder Shield fully supports WordPress Multisite networks with network-wide management.
License Modes
Network License
Single license covers entire network. All subsites share one activation.
Per-Site License
Each subsite requires separate activation. Good for client sites.
Network Features
- Network Dashboard - View security status across all sites
- Propagate Settings - Push settings to all subsites at once
- Auto-Protect New Sites - Automatically protect new subsites
- Site Exclusions - Exclude specific sites from network settings
- Sunrise.php Support - Early loading for maximum protection
- MU-Plugin Support - Must-use plugin for early security
Cache Plugin Compatibility
WP Folder Shield automatically detects and protects cache directories from 15+ popular caching plugins.
Supported Caching Plugins
How It Works
WP Folder Shield automatically:
- Detects which caching plugins you're using
- Identifies all cache directories created by those plugins
- Adds .htaccess protection to block PHP execution in cache folders
Common Issues
Images not loading after enabling protection
This usually indicates a misconfigured .htaccess. Go to Directory Protection and click "Repair" to regenerate the rules.
Plugin conflicts
Some caching or security plugins may conflict with WP Folder Shield. Go to WP Folder Shield → Conflicts to see detected conflicts and recommendations.
Security alert persists after deleting files
If you've deleted unauthorized files but still see the security alert, click "Verify Core Files" to rescan and clear the cache. This was fixed in version 5.7.7.
2FA codes not working
- Ensure your phone's time is correct (TOTP is time-based)
- Try a code from ±30 seconds (clock drift tolerance)
- Use a backup code if available
- Check that you're scanning the correct QR code for this site
Threat Intelligence not syncing
- Ensure your license is active and valid
- Check that WordPress cron is running (some hosts disable it)
- Click "Force Sync" on the Threat Intelligence page
- Check your server can reach wpfoldershield.com
Locked Out?
If you're locked out of your WordPress site, follow these steps:
Method 1: Wait for lockout to expire
Lockouts typically expire after 30 minutes by default. Auto-blocks expire after 24 hours.
Method 2: FTP/File Manager
- Connect to your site via FTP or hosting file manager
- Navigate to
/wp-content/plugins/ - Rename
wp-folder-shieldtowp-folder-shield-disabled - Log in to WordPress
- Whitelist your IP address in WP Folder Shield settings
- Rename the folder back to
wp-folder-shield
Method 3: Database (for custom login URL)
If you forgot your custom login URL:
- Access phpMyAdmin via your hosting panel
- Find the
wp_optionstable - Search for
wpfs_custom_login_url - Delete or edit that row
- Access wp-login.php normally
Method 4: 2FA Recovery
If you've lost access to your authenticator app:
- Use one of your 10 backup codes
- If no backup codes: access database and delete
wpfs_2fa_secretfrom wp_usermeta for your user