AegisShield Master User Guide
About this guide
This document is a consolidated, product-grade user guide for AegisShield Security. It is written for administrators who want visibility into what is happening on their WordPress site, plus practical defensive controls for common security risks (logins, file changes, insecure settings, missing security headers, and malware).
This guide is maintained as an active, continuously improved resource. As AegisBackup evolves, new capabilities, interface refinements, and optimization recommendations may be introduced. To ensure accuracy and reliability, instructions, definitions, and screenshots may be updated periodically. Always refer to the latest version of this guide for the most up-to-date information and recommended workflows.
Audience and scope
Who this is for
- Site owners and administrators who manage WordPress security settings
- Developers, agencies, and hosts who need audit trails and repeatable controls
- Operations teams who respond to security alerts and investigate incidents
What this guide covers
- Dashboard posture overview and module status indicators
- Activity Log (audit trail), filtering, retention, and exports
- Login Guard and MFA foundations
- File Integrity monitoring and change review
- Hardening recommendations
- Security Headers (including CSP presets and optional HSTS)
- Malware scanning and findings review
- Database Tools (health insights, table growth, prefix manager)
- Settings, licensing, and email/alert delivery basics
Safety, limitations, and responsibilities
Security is layered: AegisShield strengthens WordPress, but it does not replace hosting security, WAFs, backups, or safe operational practices.
Lockouts are real: Login protections (lockouts, rate limits, MFA policies) can block legitimate administrators. Always keep a recovery plan (hosting panel access, SFTP/SSH, database access) before enabling stricter policies.
Headers can break apps: CSP and HSTS can impact embedded scripts, CDNs, and browser behavior. Apply changes gradually, test on staging when possible, and roll back immediately if you see breakage.
File monitoring needs baselines: File Integrity is most useful after a clean baseline is established. Baseline on a known‑good site and re-baseline after large planned changes (core updates, theme rebuilds, major plugin installs).
Malware actions are destructive: Quarantine/removal can disable functionality. Review findings carefully and keep backups.
Core concepts
Modules are optional
- AegisShield is modular: you can enable only what you need.
- Each module has its own settings and health indicators.
- Modules are designed to be reversible: you can disable most controls without permanent site changes.
Security posture vs. incidents
- Posture = how secure your configuration is right now (headers, hardening, admin count, updates, DB health).
- Incidents = security-relevant events (failed logins, lockouts, file changes, malware findings).
- AegisShield’s dashboard and logs are built to help you connect posture to events.
Event logging
The Activity Log records security-relevant actions so you can answer “what changed, when, and by whom.” This includes logins, lockouts, configuration changes, and module actions.
- Use filtering to isolate the exact time window and category.
- Export to CSV/JSON for external review or incident documentation.
- Retention controls determine how long historical events are kept.
Alerts
Alerts are built on rules. Rules decide when an event becomes actionable (for example: repeated failed logins, lockouts, infected file detections, or high-risk configuration changes).
- Start with conservative alert rules to avoid noise.
- Expand to stricter rules as you learn what “normal” looks like for your site.
- Confirm email delivery and “from” settings before relying on alerts.
Quick start paths
Path A — Visibility first (recommended)
- Open AegisShield → Dashboard and review the overall score and “Needs attention” items.
- Go to Activity Log and confirm events are being recorded.
- Set a reasonable retention period and confirm export works (CSV/JSON).
- Enable basic alerting (email) for high-risk events (lockouts, infected files, integrity changes).
Goal: establish an audit trail and reduce blind spots before enforcing stricter controls.
Path B — Lock down admin access
- Open Login Guard and enable lockout protection.
- Turn on rate limiting for repeated failures.
- Enable MFA for administrator accounts first; verify recovery flows before broad enforcement.
- Optionally enable trusted devices (if available) to reduce friction.
Goal: reduce credential stuffing and brute-force risk without breaking normal admin workflows.
Path C — Protect browsers (headers)
- Open Security Headers and enable headers.
- Apply safe defaults first (X-Frame-Options, X-Content-Type-Options, Referrer-Policy).
- If you use CSP presets, start in report-only / monitor mode if available.
- Enable HSTS only after you confirm HTTPS is enforced everywhere (including subdomains you serve).
Path D — Detect tampering (integrity + malware)
- Open File Integrity and create a baseline on a known‑good site.
- Configure exclusions for folders that legitimately change often (caches, temp folders).
- Run an initial Malware Scan to establish a clean starting point.
- Enable alerts for suspicious changes and infected file detections.
Features
This section documents each AegisShield module, what it does, and how to use it. Use the navigation map above to locate the module inside WordPress Admin.
Dashboard
The Dashboard is your at-a-glance security posture view. It summarizes configuration risks, module health, and recent activity so you can quickly see what needs attention.
- Overall Security Score: a high-level indicator (for example, 77/100) that reflects posture checks such as pending updates, admin count, and database conditions.
- Core Health Metrics: WordPress version, PHP version, plugin/theme update counts, administrator accounts, database size, and DB prefix status.
- Pro Intelligence (if licensed): aggregated summaries across modules and premium indicators.
- Security events (last 24 hours): quick counts for logins, failures, lockouts, and admin account changes.
- Modules overview: jump buttons to each module (Activity Log, Login Guard, File Integrity, Hardening, Security Headers, Malware Tools, DB Tools).
AegisShield Pro Intelligence (Pro)
Enhanced System Health Metrics Pro
Provides expanded, security-focused health indicators beyond basic plugin status.
Use daily as a posture snapshot; investigate changes immediately.
Deep Scan Summaries (Integrity, Quick Scan, Attack Story) Pro
Summarizes integrity, malware, and incident data into a single view.
Review after scans to prioritize remediation.
Pro Module Indicators (CSP Builder, Attack Story, etc.) Pro
Confirms which advanced protection modules are active.
Verify after updates, migrations, or license changes.
Alert Rules Engine (UI + Logic) Pro
Creates rule-based security alerts.
Focus on high-risk events only.
Email Alerts Based on Event Rules Pro
Sends notifications when alerts trigger.
Route to monitored inboxes.
Alert Integrations (Login Guard, File Integrity, Malware, MFA) Pro
Correlates alerts across modules.
Prefer correlated alerts for higher confidence.
Attack Story (Timeline View) Pro
Displays a chronological attack timeline.
Use to identify entry points.
Activity Log
The Activity Log records important events so you can audit changes and investigate suspicious behavior.
Typical events captured
- Successful and failed logins
- Login lockouts and rate-limit actions
- Administrator account and role changes
- Module configuration changes (hardening, headers, monitoring settings)
- Security scanning actions (integrity and malware scans)
- Database tool actions (exports, optimizations, prefix operations) when enabled
How to investigate an incident
- Start with a time window: identify when the suspicious behavior happened.
- Filter by category (for example: logins, admin changes, file monitoring, malware).
- Open the event details and record key fields (user, IP if present, action, module).
- Export to CSV/JSON if you need to share the evidence or store it with an incident ticket.
Filtering, pagination, and retention
- Use advanced filtering to narrow to a specific user, event type, or severity.
- Adjust pagination (25 / 50 / 100) when reviewing high-volume sites.
- Set retention to balance audit needs vs. database size.
Login Guard
Login Guard protects your login form against brute-force and credential stuffing by monitoring failures, applying lockouts, and supporting MFA policies.
Recommended setup (safe defaults)
- Enable lockouts for repeated failed logins.
- Enable rate limiting to slow down repeated attempts.
- Turn on email alerts for lockouts (so you know when the site is being attacked).
- If available, configure trusted devices to reduce MFA prompts while keeping protection strong.
MFA foundations
AegisShield includes a modern MFA foundation with TOTP enrollment and recovery flows. When you enable MFA:
- Enroll one administrator first, verify that login works, and confirm recovery options.
- Document a recovery plan (hosting panel/SFTP access) before enforcing MFA for all admins.
- Apply a policy gradually: Admins → Editors → other roles, depending on your risk tolerance.
Custom rules
Use custom lockout rules and geo rules carefully. Always test with a non-primary admin account first to avoid self-lockout.
File Integrity
File Integrity monitoring detects unexpected changes to WordPress core files, plugins, and themes. It helps you spot tampering, malicious edits, or unauthorized uploads.
Baseline, then monitor
- Confirm the site is in a known‑good state (after updates, before experiments).
- Create a baseline scan.
- Enable monitoring and review new findings regularly.
Reviewing findings
- New: files that did not exist at baseline.
- Modified: files whose content changed compared to baseline.
- Deleted: files that existed at baseline but no longer exist.
Exclusions and alerting
- Exclude folders that change legitimately (cache directories, temporary folders).
- Enable email alerts for high-risk changes (core files, admin‑area plugins, authentication-related files).
- Use scan history to compare before/after changes. Delete old history entries only after you no longer need them for auditing.
Hardening
Hardening applies curated WordPress hardening toggles to reduce attack surface. Each control is designed to be understandable and reversible.
Examples of what hardening controls typically cover
- Reduce exposure of sensitive endpoints (where safe and compatible).
- Disable risky behaviors (where safe), such as unnecessary file edits via the dashboard.
- Strengthen defaults for common misconfigurations.
How to apply hardening safely
- Change one setting at a time.
- Test core flows: login, forms, checkout (if ecommerce), and critical pages.
- If something breaks, revert the last setting and retest.
- Document your chosen baseline hardening configuration.
Security Headers
Security Headers helps you apply modern browser protections that reduce common web attack classes (clickjacking, MIME sniffing, unsafe referrers, and more).
Safe starting set
- X-Frame-Options: reduces clickjacking risk.
- X-Content-Type-Options: reduces MIME sniffing issues.
- Referrer-Policy: limits referrer leakage.
HSTS (HTTP Strict Transport Security)
HSTS can improve HTTPS enforcement but can cause long-lived browser behavior. Enable only when:
- Your site always uses HTTPS
- You control all served subdomains if you enable subdomain rules
- You understand rollback impact (browsers remember HSTS for the configured duration)
Content Security Policy (CSP) builder & profiles (Pro)
CSP can dramatically reduce XSS risk but must be configured carefully. AegisShield includes CSP builder settings and security header profiles to help you apply policies safely.
- Start with a conservative preset.
- Test your site’s frontend and admin interfaces.
- Gradually tighten allowed sources as you identify required scripts and styles.
- Keep a rollback plan (disable CSP profile) if critical functionality breaks.
Malware Scan
Malware scanning detects suspicious patterns in PHP code and common indicators of compromise. It is designed for clarity: you review findings, understand the risk level, and decide the appropriate action.
Scan types
- Quick Scan: faster scan intended for frequent use.
- Deep Scan: more thorough scan intended for periodic review or after suspicious activity.
- Attack Story (Pro): correlates malware hits, file changes, and admin activity into a single timeline view.
Review workflow
- Run a scan.
- Sort findings by severity (High / Medium / Low).
- Open a finding and review why it was flagged (obfuscation, suspicious functions, unexpected payloads).
- Decide an action: ignore (if false positive), investigate, quarantine (if enabled), or restore from backup.
- After remediation, rerun a scan to confirm the site is clean.
Scheduling and metadata
Some builds include scan metadata (type, file count, suspect count) and scheduled scans. If your UI indicates “scheduler will be available in a future release,” use manual scans and operational checklists until scheduling is available.
Database Tools
Database Tools provides database visibility and safety features such as table growth monitoring, exports, and a guided DB prefix manager.
Health and growth monitoring
- Track database size and table growth. Sudden growth can indicate logging noise, spam, or malicious data injection.
- Use exports to review table summaries offline.
Prefix manager (advanced)
The DB prefix manager helps you change the WordPress table prefix in a guided way. This is an advanced operation: test on staging first.
- Review the preview/dry-run, if available, to understand what will change.
- Create a database backup snapshot before a prefix change.
- Run the prefix change and allow internal key updates (prefix-bound keys) to complete.
- Verify the site loads, logins work, and admin pages operate normally.
- If issues occur, use rollback/restore tools if available and restore from backup if needed.
Settings, License & Upgrades
This page centralizes licensing and global operational settings.
- License status: Active (Pro enabled), Inactive, or Expired.
- SMTP settings: configure outbound email delivery for alerts; send a test email to validate.
- Registration: connect the plugin to your Aegisify account (if applicable).
Before relying on alerts, always verify that your hosting environment can deliver email, and confirm the test email arrives in the inbox you expect.
Operational checklists
Daily (high-traffic or high-risk sites)
- Review Dashboard “Needs attention” items.
- Check Activity Log for unusual admin actions or spikes in failed logins.
- Review lockouts and ensure alerts are working.
Weekly
- Run a Quick Malware Scan; investigate High severity findings.
- Review File Integrity changes; confirm they match expected updates.
- Confirm WordPress core, plugin, and theme updates are applied on schedule.
Monthly
- Run a Deep Malware Scan (or equivalent thorough scan).
- Review Security Headers and validate key pages still function properly.
- Audit administrator accounts and remove unused accounts.
- Review database growth trends; investigate sudden table growth.
After major changes (updates, migrations, new themes)
- Re-baseline File Integrity if many legitimate files changed.
- Confirm Login Guard/MFA flows still work for at least two admin accounts.
- Re-test critical site functionality (forms, checkout, login, media upload).
Troubleshooting
I enabled strict login settings and got locked out
- Try logging in from a different trusted device/network if you use geo rules.
- If you have hosting panel access, temporarily disable AegisShield by renaming the plugin folder via SFTP/SSH, then log in and revert the risky setting.
- If the issue is MFA enforcement, disable MFA policy temporarily, confirm access, then re-enable with a staged rollout.
Always keep at least two administrator accounts and test policy changes with the non-primary admin first.
My site broke after enabling security headers
- Disable CSP profile/preset first (if enabled), then reload key pages.
- If you enabled HSTS, confirm your site and required subdomains all serve HTTPS correctly.
- Re-enable headers one-by-one to isolate the header causing breakage.
File Integrity shows many changes after an update
This is expected after legitimate updates.
- Confirm the changes correspond to known updates (WordPress core, theme, plugin updates).
- If the site is known‑good, create a new baseline.
- If changes are unexpected, investigate the specific files and correlate with Activity Log events.
Malware scan shows findings but I’m not sure what to do
- Start with High severity findings.
- Check whether the flagged file is a core/plugin/theme file or an unexpected file.
- Compare with File Integrity (was the file modified recently?).
- If you are unsure, restore the file from a known‑good backup instead of editing in place.
- Rerun the scan to confirm remediation.
Database Tools warns about default table prefix
Using a custom table prefix can reduce the value of automated attacks that assume default table names, but it is not a complete defense. Treat prefix changes as an advanced operation.
- Create a database backup snapshot first.
- Use the Prefix Manager preview/dry-run if available.
- Change prefix during a maintenance window, then test the site thoroughly.
Glossary
| Term | Meaning |
|---|---|
| MFA | Multi‑Factor Authentication. An additional login factor beyond a password (for example, a time-based one-time code). |
| TOTP | Time‑based One‑Time Password. A common MFA method used by authenticator apps that generates rotating codes. |
| Lockout | A temporary block on login attempts from a user or IP after suspicious behavior (for example, too many failures). |
| Rate limiting | Slowing down repeated requests to reduce brute-force effectiveness. |
| Baseline | A known-good reference point (for example, file hashes) used to detect later changes. |
| CSP | Content Security Policy. A browser security mechanism that restricts where scripts/styles/images can load from. |
| HSTS | HTTP Strict Transport Security. Instructs browsers to always use HTTPS for a site for a specified duration. |
| Clickjacking | A UI redress attack where a site is framed to trick users into clicking invisible elements. |
| Quarantine | Moving or isolating suspicious files so they cannot execute, while preserving them for analysis. |
| Table growth | Increase in database table size/rows over time; sudden spikes can indicate logging noise, spam, or compromise. |

