Documentation

"Prevention is cheaper than a breach"

Hack Halt Inc.

Hack Halt Security 2.x Knowledge Base

Operator guide and complete settings map for every major Security 2.x section, module, and control surface.

9 sections documented 14 settings groups mapped 124 setting keys explained 14 CSP directives covered

Quick Start: Turn These On First

Apply this baseline first on new installs, then use the section map below for deeper tuning.

  1. Enable MFA for privileged roles

    Turn on: mfa_enabled , mfa_enforce_roles

    MFA is one of the highest-impact controls against account takeover.

    Where: Settings & Tools -> Security Controls -> Multifactor policy.

  2. Set the core runtime baseline

    Turn on: mode , log_admin , omit_owner_traffic_logging

    Guarded mode plus clean telemetry gives protection and useful investigations without high break risk.

    Where: Settings & Tools -> Security Controls.

  3. Turn on portal hardening essentials

    Turn on: lockdown_enabled , disable_xmlrpc , disable_file_editor , disable_user_enum , disable_rest_user_enum

    These remove common WordPress attack paths and reduce recon opportunities quickly.

    Where: Settings & Tools -> Portal settings.

  4. Move admin off default URLs

    Turn on: custom_admin_url_enabled , custom_admin_slug

    Hiding predictable admin/login routes cuts automated attack pressure.

    Where: Settings & Tools -> Portal settings.

  5. Enable intrusion prevention

    Turn on: ips_enabled , ips_score_threshold , ips_block_minutes

    IPS gives continuous behavior-based blocking against brute-force and abuse spikes.

    Where: Hack Halt -> Intrusion Protection -> Settings.

  6. Enable threat intel feed enforcement (licensed)

    Turn on: threat_intel_enabled , threat_intel_auto_sync , threat_intel_action

    Known bad indicators should be denied early and kept fresh automatically.

    Where: Hack Halt -> Firewall Policies -> Threat Intel Feeds.

  7. Enable honeypot deception + auto-block (premium)

    Turn on: honeypot_enabled , honeypot_auto_block , honeypot_email_alerts

    Deception catches hostile probing early and stops repeat offenders faster.

    Where: Hack Halt -> Live Traffic -> Honeypots.

  8. Turn on continuous scan and drift alerts

    Turn on: scanner_feed_enabled , scanner_daily_scan , fim_enabled , fim_email_alerts

    Vulnerability and file-drift coverage catches regressions and compromise signals quickly.

    Where: Hack Halt -> Vulnerability Scanner -> Policy and Hack Halt -> File Integrity -> Monitoring Policy.

Safety note: Only enable private-portal IP restriction after you have confirmed stable office or VPN static IP ranges in your allowlist. custom_admin_ip_restrict_enabled.

Locked Out? Quick Recovery

If a hardening setting blocks you from wp-admin, use this temporary safety switch to get back in and fix settings.

  1. Open your site's wp-config.php file.

  2. Add the line below above the "That's all, stop editing!" line.

  3. Save the file, then open wp-admin again. Security blocking is temporarily paused.

  4. Fix the setting that locked you out (usually private admin URL or IP restriction).

  5. Remove the line when done so full protection turns back on.

Important: This does not uninstall anything. It only gives you a safe way back into admin while you correct settings.

Dashboard

Menu path: Hack Halt -> Dashboard

Executive security posture, attack pressure, recommendations, and trend visibility.

  • Security score and posture cards.
  • Traffic, blocked ratio, and response KPI tiles.
  • Global traffic map and correlated threat signals.
  • Recommendations based on scanner, integrity, and runtime telemetry.

Core Engine Controls

Option store: hackhalt_settings

10 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
mode Protection mode
Runtime mode: observe, guarded, or lockdown.
This is your global protection dial. It controls how aggressively Hack Halt reacts to suspicious traffic.
Observe = log only. Guarded = selective blocking around sensitive areas. Lockdown = strict sitewide blocking.
Guarded
Strong day-to-day protection with lower break-risk than full lockdown.
Settings & Tools -> Security Controls.
log_admin Log admin and login traffic
Includes wp-admin/wp-login request telemetry.
Plain English: Includes wp-admin/wp-login request telemetry.
Changing this updates how Hack Halt applies this control at runtime.
Enabled
You need admin/login visibility for account-attack investigations.
Settings & Tools -> Security Controls.
omit_owner_traffic_logging Omit owner traffic
Suppresses admin-self noise in traffic telemetry.
Plain English: Suppresses admin-self noise in traffic telemetry.
Changing this updates how Hack Halt applies this control at runtime.
Enabled
Keeps telemetry cleaner by reducing self-generated admin noise.
Settings & Tools -> Security Controls.
trust_proxy_headers Trust proxy headers
Uses forwarded headers for real visitor IP detection behind CDN/proxy.
Use this when your site is behind Cloudflare/CDN/reverse proxy so Hack Halt sees real visitor IPs.
If off behind a proxy, blocks may target proxy IPs instead of attackers. If on without trusted proxy, IP spoof risk increases.
Enable only if using Cloudflare/CDN/reverse proxy
Correct real-IP detection behind proxies; unsafe to force on direct-host sites.
Settings & Tools -> Security Controls.
allow_search_crawlers Always allow trusted crawlers
Prevents indexing bots from being blocked on public surfaces.
Plain English: Prevents indexing bots from being blocked on public surfaces.
Changing this updates how Hack Halt applies this control at runtime.
Enabled
Protects SEO indexing while other controls stay active.
Settings & Tools -> Security Controls.
allow_search_crawlers_strict_verify Strict crawler verification
Adds reverse/forward DNS validation to crawler trust checks.
This is an on/off switch. Adds reverse/forward DNS validation to crawler trust checks.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Disabled initially
Safer compatibility baseline; enable later if crawler spoofing is observed.
Settings & Tools -> Security Controls.
edge_ip_block_enabled Mirror manual blocks to .htaccess
Applies manual IP blocklist at Apache edge when writable.
This is an on/off switch. Applies manual IP blocklist at Apache edge when writable.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled on Apache (.htaccess writable)
Blocks manual denylist IPs earlier in the request chain.
Settings & Tools -> Security Controls.
debug_log Debug logging
Writes additional diagnostics to uploads/hack-halt-logs.
Plain English: Writes additional diagnostics to uploads/hack-halt-logs.
Changing this updates how Hack Halt applies this control at runtime.
Disabled
Use only when troubleshooting to avoid noisy diagnostic logs.
Settings & Tools -> Security Controls.
log_retention_days Log retention days
Days before automatic telemetry pruning; 0 disables pruning.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
30
Good balance of forensic history and DB size.
Settings & Tools -> Security Controls.
uninstall_purge_data Uninstall purge flag
Controls whether plugin data is removed on uninstall.
This is an on/off switch. Controls whether plugin data is removed on uninstall.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Disabled
Prevents accidental loss of security history when removing plugin.
Plugins delete flow + DB tools lifecycle.

Live Traffic (IP Reports)

Menu path: Hack Halt -> Live Traffic

Real-time request intelligence and response workflow for active incidents.

  • Overview runtime and trend widgets.
  • Live request stream with filters and quick actions.
  • Incident command chains for repeated hostile activity.
  • Honeypot telemetry and deception controls (premium gate aware).

Honeypot Deception

Option store: hackhalt_settings

3 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
honeypot_enabled Enable deception module
Activates decoy responses and honeypot signal collection.
This is an on/off switch. Activates decoy responses and honeypot signal collection.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled (if premium)
Captures attacker behavior early and improves incident visibility.
Live Traffic -> Honeypots.
honeypot_email_alerts Honeypot email alerts
Sends notifications for honeypot incident creation.
This controls where alerts or communication are sent.
Wrong value means important alerts/reports may go to the wrong inbox or be missed.
Enabled
Ensures incidents are noticed quickly.
Live Traffic -> Honeypots.
honeypot_auto_block Auto-block on honeypot ticket
Automatically blocks hostile IPs when honeypot incident chains trigger.
This is an on/off switch. Automatically blocks hostile IPs when honeypot incident chains trigger.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Stops repeated probes faster once deception triggers.
Live Traffic -> Honeypots.

Firewall Policies

Menu path: Hack Halt -> Firewall Policies

IP lists, country controls, and premium threat-intelligence policy engine.

  • Manual blocklist and allowlist operations.
  • Frontend and admin geo access modes with country token selectors.
  • Interactive risk map for bulk geo policy edits.
  • Threat-intel feed selection, sync cadence, and verification tools.

Geo Country Policy

Option store: hackhalt_settings

6 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
geo_mode_frontend Frontend country mode
Policy strategy for public frontend traffic (all_except or only).
This selects a behavior profile for the feature.
Different modes trade off safety, strictness, and compatibility.
all_except
Safer default so legitimate global traffic is not accidentally blocked.
Firewall Policies -> Country Risk Command.
geo_allowed_frontend Frontend allowed countries
ISO country allow list used by mode logic.
This is a list-based control that decides what is included, trusted, blocked, or enforced.
Items you add become active policy inputs. Items you remove stop influencing decisions.
Only include what you explicitly trust or need
List controls directly shape access, enforcement, and noise levels.
Firewall Policies -> Country Risk Command.
geo_blocked_frontend Frontend blocked countries
ISO country deny list used by mode logic.
This is a list-based control that decides what is included, trusted, blocked, or enforced.
Items you add become active policy inputs. Items you remove stop influencing decisions.
Only include what you explicitly trust or need
List controls directly shape access, enforcement, and noise levels.
Firewall Policies -> Country Risk Command.
geo_mode_admin Login/admin country mode
Policy strategy for wp-login/wp-admin traffic.
This selects a behavior profile for the feature.
Different modes trade off safety, strictness, and compatibility.
only
Restrict admin/login access to your operating countries.
Firewall Policies -> Country Risk Command.
geo_allowed_admin Login/admin allowed countries
ISO allow list for admin/login access policy.
This is a list-based control that decides what is included, trusted, blocked, or enforced.
Items you add become active policy inputs. Items you remove stop influencing decisions.
Only include what you explicitly trust or need
List controls directly shape access, enforcement, and noise levels.
Firewall Policies -> Country Risk Command.
geo_blocked_admin Login/admin blocked countries
ISO block list for admin/login access policy.
This is a list-based control that decides what is included, trusted, blocked, or enforced.
Items you add become active policy inputs. Items you remove stop influencing decisions.
Only include what you explicitly trust or need
List controls directly shape access, enforcement, and noise levels.
Firewall Policies -> Country Risk Command.

Threat Intelligence Feeds

Option store: hackhalt_settings

10 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
threat_intel_enabled Enable threat intelligence
Turns feed matching and enforcement path on when licensed.
This is an on/off switch. Turns feed matching and enforcement path on when licensed.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled (if licensed)
Adds high-signal threat IP intelligence to perimeter decisions.
Firewall Policies -> Threat Intel Feeds.
threat_intel_auto_sync Automatic feed refresh
Runs scheduled sync jobs based on refresh interval.
This is an on/off switch. Runs scheduled sync jobs based on refresh interval.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Keeps indicators current without manual refresh burden.
Firewall Policies -> Threat Intel Feeds.
threat_intel_action Threat match action
Either block immediately or observe-only logging.
What to do when an IP matches a known threat feed.
Block = stop traffic immediately. Observe = allow traffic but log matches for review.
block
Immediate deny is preferred for known bad indicators.
Firewall Policies -> Threat Intel Feeds.
threat_intel_refresh_hours Refresh interval hours
How frequently selected feeds are refreshed.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
6
Frequent enough for freshness without excessive churn.
Firewall Policies -> Threat Intel Feeds.
threat_intel_max_indicators_per_feed Per-feed indicator cap
Safety cap for stored indicators per feed source.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
15000
Solid coverage while keeping local dataset size manageable.
Firewall Policies -> Threat Intel Feeds.
threat_intel_selected_feeds Selected feed keys
Exact feed IDs chosen for sync and matching.
This is a list-based control that decides what is included, trusted, blocked, or enforced.
Items you add become active policy inputs. Items you remove stop influencing decisions.
Select all high-confidence curated feeds
Maximizes protection coverage with lower false-positive risk.
Firewall Policies -> Threat Intel Feeds.
threat_intel_abuseipdb_api_key AbuseIPDB API key
Optional provider credential when gated feeds require it.
This stores a credential key used to connect to licensed or provider-backed services.
If missing/invalid, related premium or provider features will stay disabled or fail validation.
Enter your valid production key
Empty/invalid credentials keep the related feature locked or inactive.
Firewall Policies -> Threat Intel Feeds.
threat_intel_otx_api_key AlienVault OTX API key
Optional provider credential when gated feeds require it.
This stores a credential key used to connect to licensed or provider-backed services.
If missing/invalid, related premium or provider features will stay disabled or fail validation.
Enter your valid production key
Empty/invalid credentials keep the related feature locked or inactive.
Firewall Policies -> Threat Intel Feeds.
threat_intel_license_key Premium license key
Stored entitlement key used for server validation.
Your premium entitlement key used to unlock feed controls.
Invalid or missing key keeps premium feed operations locked.
Enter your valid production key
Empty/invalid credentials keep the related feature locked or inactive.
Settings & Tools -> License tab.
threat_intel_selected_feeds_marker Feed marker flag
Internal helper used to detect explicit feed selection submissions.
This is a list-based control that decides what is included, trusted, blocked, or enforced.
Items you add become active policy inputs. Items you remove stop influencing decisions.
Only include what you explicitly trust or need
List controls directly shape access, enforcement, and noise levels.
Internal save marker (auto-managed).

Intrusion Protection

Menu path: Hack Halt -> Intrusion Protection

Behavioral scoring, signature controls, and adaptive temporary block enforcement.

  • Dashboard tab for IPS event flow and pressure.
  • Signatures tab for per-rule enable/observe/score tuning.
  • Settings tab for global thresholds and lock windows.
  • Operational event history with reason labels and action outcomes.

Intrusion Protection Engine

Option store: hackhalt_settings

7 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
ips_enabled Enable IPS engine
Turns intrusion scoring and signature enforcement on.
This is an on/off switch. Turns intrusion scoring and signature enforcement on.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Core intrusion scoring should run continuously.
Intrusion Protection -> Settings.
ips_requests_per_minute Rate limit threshold
Requests-per-minute threshold used in scoring.
Plain English: Requests-per-minute threshold used in scoring.
Changing this updates how Hack Halt applies this control at runtime.
120
Balanced baseline for typical SMB WordPress traffic.
Intrusion Protection -> Settings.
ips_rate_limit_score Rate-limit score weight
Score contribution when rate threshold is exceeded.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
8
Good pressure weighting without over-penalizing short spikes.
Intrusion Protection -> Settings.
ips_score_threshold Block score threshold
Minimum score required to trigger temporary block.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
12
Reasonable threshold to reduce false blocks while remaining defensive.
Intrusion Protection -> Settings.
ips_block_minutes Temporary block duration
Minutes an IP stays blocked after IPS trigger.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
30
Long enough to disrupt automated attacks without excessive lockouts.
Intrusion Protection -> Settings.
ips_login_fail_threshold Login fail threshold
Failed login count before temporary block applies.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
5
Common secure baseline for brute-force resistance.
Intrusion Protection -> Settings.
ips_login_window_minutes Login fail window
Rolling minute window for login-failure counting.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
10
Captures concentrated credential-stuffing patterns.
Intrusion Protection -> Settings.

Intrusion Signature Tuning

Option store: hackhalt_settings

5 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
ips_signature_settings.<signature_key>.enabled Signature enabled
Turns an individual signature rule on or off.
Plain English: Turns an individual signature rule on or off.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Intrusion Protection -> Signatures.
ips_signature_settings.<signature_key>.observe_only Observe-only signature mode
Logs signature matches without blocking.
This selects a behavior profile for the feature.
Different modes trade off safety, strictness, and compatibility.
Use safer middle mode first, then tighten after monitoring
Mode changes have broad compatibility and enforcement impact.
Intrusion Protection -> Signatures.
ips_signature_settings.<signature_key>.score Signature score weight
Per-signature score contribution to overall IPS decision.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
Use documented default
Tuned defaults reduce false positives unless your traffic profile is unusual.
Intrusion Protection -> Signatures.
ips_signature_settings.<signature_key>.exclude_paths Path exclusions
Request paths ignored for a given signature.
This is a list-based control that decides what is included, trusted, blocked, or enforced.
Items you add become active policy inputs. Items you remove stop influencing decisions.
Only include what you explicitly trust or need
List controls directly shape access, enforcement, and noise levels.
Intrusion Protection -> Signatures.
ips_signature_settings.<signature_key>.exclude_ips IP/CIDR exclusions
Trusted source IP ranges excluded for a given signature.
Plain English: Trusted source IP ranges excluded for a given signature.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Intrusion Protection -> Signatures.

Vulnerability Scanner

Menu path: Hack Halt -> Vulnerability Scanner

Definition-driven scans, server-side vulnerability matching, and remediation workflow.

  • Overview and live engine visibility.
  • Policy tab for schedule, dataset matching, and definition selection.
  • Findings tab with severity and remediation paths.
  • History tab for previous run results and cleanup controls.

Vulnerability Scanner Policy

Option store: hackhalt_settings

6 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
scanner_daily_scan Daily scheduled scan
Enables scheduled scanner execution (premium-gated).
This is an on/off switch. Enables scheduled scanner execution (premium-gated).
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled if premium; otherwise run manual weekly
Regular scanning catches regressions early.
Vulnerability Scanner -> Policy.
scanner_feed_enabled Server vulnerability matching
Enables Hack Halt server dataset lookup during scans.
This is an on/off switch. Enables Hack Halt server dataset lookup during scans.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Ensures installed software is matched against known vulnerability intelligence.
Vulnerability Scanner -> Policy.
scanner_feed_refresh_hours Feed refresh interval
Hours between vulnerability dataset refresh checks.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
12
Reliable refresh cadence for most SMB patch windows.
Vulnerability Scanner -> Policy.
scanner_feed_max_findings Max findings cap
Maximum vulnerability matches returned per run.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
500
Enough room for meaningful output without oversized reports.
Vulnerability Scanner -> Policy.
scanner_include_informational Include informational findings
Includes no-CVSS informational rows in results.
Plain English: Includes no-CVSS informational rows in results.
Changing this updates how Hack Halt applies this control at runtime.
Disabled
Keeps reports focused on actionable risk first.
Vulnerability Scanner -> Policy.
scanner_definitions Enabled scanner definitions
Selected definition keys executed in scanner workflows.
Selects which scan checks are included when the scanner runs.
More definitions = broader coverage but longer scan time.
Only include what you explicitly trust or need
List controls directly shape access, enforcement, and noise levels.
Vulnerability Scanner -> Policy.

CSP

Menu path: Hack Halt -> CSP

Content Security Policy builder with learning mode, quick discovery scan, and violation logs.

  • Module enable and mode selection (learning or enforced).
  • Header hardening options including HSTS and Referrer-Policy.
  • Directive source lists with per-directive tuning.
  • Quick scan/apply loop and live violation triage queue.

CSP Module Core Settings

Option store: hackhalt_csp_settings

14 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
enabled Enable CSP module
Turns CSP header generation on.
Master on/off switch for the CSP security header system.
Off = no CSP headers sent. On = CSP headers are sent based on your policy.
Enabled
Keeps CSP protections available once policy is tuned.
Hack Halt -> CSP -> Policy tab.
mode CSP mode
learning (report-only) or enforce.
This chooses whether CSP is testing only or actively blocking browser content.
Learning mode reports violations without breaking pages. Enforce mode blocks disallowed scripts/styles.
learning (start), then enforce after review
Prevents accidental frontend breakage while policy is being tuned.
Hack Halt -> CSP -> Policy tab.
include_admin Apply CSP in admin
Applies policy on wp-admin pages.
This is an on/off switch. Applies policy on wp-admin pages.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Disabled initially
Admin screens often need extra sources; phase this in after testing.
Hack Halt -> CSP -> Policy tab.
include_login Apply CSP on login page
Applies policy on login endpoint.
This is an on/off switch. Applies policy on login endpoint.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Login page is high-risk and usually simpler to secure.
Hack Halt -> CSP -> Policy tab.
reporting_enabled Violation reporting
Enables report-uri style telemetry endpoint behavior.
This is an on/off switch. Enables report-uri style telemetry endpoint behavior.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Reporting helps tune CSP safely before strict enforcement.
Hack Halt -> CSP -> Policy tab.
security_headers_enabled Security headers bundle
Enables companion response security headers.
This is an on/off switch. Enables companion response security headers.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Companion security headers add defense-in-depth with low effort.
Hack Halt -> CSP -> Policy tab.
hsts_enabled HSTS enabled
Sends Strict-Transport-Security header.
This is an on/off switch. Sends Strict-Transport-Security header.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled (HTTPS-only sites)
Forces secure transport and prevents downgrade attacks.
Hack Halt -> CSP -> Policy tab.
hsts_max_age HSTS max-age
HSTS max-age seconds value (0-63072000).
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
31536000
Industry-standard one-year baseline for stable HTTPS sites.
Hack Halt -> CSP -> Policy tab.
hsts_include_subdomains HSTS include subdomains
Adds includeSubDomains to HSTS.
This is an on/off switch. Adds includeSubDomains to HSTS.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled only if all subdomains are HTTPS-ready
Can break subdomains that still serve non-HTTPS content.
Hack Halt -> CSP -> Policy tab.
hsts_preload HSTS preload
Adds preload token when using preload program requirements.
This is an on/off switch. Adds preload token when using preload program requirements.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Disabled unless preload requirements are fully met
Preload is hard to roll back and should be intentional.
Hack Halt -> CSP -> Policy tab.
x_content_type_options_enabled X-Content-Type-Options
Sends nosniff header when enabled.
This is an on/off switch. Sends nosniff header when enabled.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Low-risk hardening against MIME-type confusion.
Hack Halt -> CSP -> Policy tab.
referrer_policy_enabled Referrer-Policy enabled
Enables configurable referrer policy header.
This is an on/off switch. Enables configurable referrer policy header.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Limits metadata leakage to external sites.
Hack Halt -> CSP -> Policy tab.
referrer_policy Referrer policy mode
Selected referrer policy value.
This selects a behavior profile for the feature.
Different modes trade off safety, strictness, and compatibility.
strict-origin-when-cross-origin
Strong privacy with good analytics compatibility.
Hack Halt -> CSP -> Policy tab.
scanner_max_urls Quick scan max URLs
Crawl depth cap for CSP quick discovery scan.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
18
Good quick-scan depth for SMB sites without long crawls.
Hack Halt -> CSP -> Quick Scan tab.

CSP Directives

Option store: hackhalt_csp_settings

14 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
directives.default-src Directive source list
Allowed sources for default-src. Keep lists strict and explicit.
Plain English: Allowed sources for default-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.script-src Directive source list
Allowed sources for script-src. Keep lists strict and explicit.
Plain English: Allowed sources for script-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.style-src Directive source list
Allowed sources for style-src. Keep lists strict and explicit.
Plain English: Allowed sources for style-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.img-src Directive source list
Allowed sources for img-src. Keep lists strict and explicit.
Plain English: Allowed sources for img-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.font-src Directive source list
Allowed sources for font-src. Keep lists strict and explicit.
Plain English: Allowed sources for font-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.connect-src Directive source list
Allowed sources for connect-src. Keep lists strict and explicit.
Plain English: Allowed sources for connect-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.frame-src Directive source list
Allowed sources for frame-src. Keep lists strict and explicit.
Plain English: Allowed sources for frame-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.media-src Directive source list
Allowed sources for media-src. Keep lists strict and explicit.
Plain English: Allowed sources for media-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.object-src Directive source list
Allowed sources for object-src. Keep lists strict and explicit.
Plain English: Allowed sources for object-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.form-action Directive source list
Allowed sources for form-action. Keep lists strict and explicit.
Plain English: Allowed sources for form-action. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.base-uri Directive source list
Allowed sources for base-uri. Keep lists strict and explicit.
Plain English: Allowed sources for base-uri. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.frame-ancestors Directive source list
Allowed sources for frame-ancestors. Keep lists strict and explicit.
Plain English: Allowed sources for frame-ancestors. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.manifest-src Directive source list
Allowed sources for manifest-src. Keep lists strict and explicit.
Plain English: Allowed sources for manifest-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.
directives.worker-src Directive source list
Allowed sources for worker-src. Keep lists strict and explicit.
Plain English: Allowed sources for worker-src. Keep lists strict and explicit.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Hack Halt -> CSP -> Policy directives.

File Integrity

Menu path: Hack Halt -> File Integrity

Baseline lifecycle controls, drift alerts, and suspicious file signal workflow.

  • Policy controls for scanning, alerting, and upgrade suppression.
  • Trusted uploads plugin-path suppression tuning.
  • Manual run scan and rebuild baseline controls.
  • Alert review tables and suppression event history.

File Integrity Monitoring Policy

Option store: hackhalt_settings

6 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
fim_enabled Enable integrity scans
Activates baseline drift scanning lifecycle.
This is an on/off switch. Activates baseline drift scanning lifecycle.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Filesystem drift detection is a high-value compromise signal.
File Integrity -> Monitoring Policy.
fim_auto_rebaseline_upgrade Auto-refresh baseline after upgrades
Rebaselines automatically when upgrade windows are detected.
Plain English: Rebaselines automatically when upgrade windows are detected.
Changing this updates how Hack Halt applies this control at runtime.
Enabled
Reduces false positives during legitimate update windows.
File Integrity -> Monitoring Policy.
fim_email_alerts Email drift alerts
Sends alert emails when suspicious drift is detected.
This controls where alerts or communication are sent.
Wrong value means important alerts/reports may go to the wrong inbox or be missed.
Enabled
Important to receive immediate integrity alerts.
File Integrity -> Monitoring Policy.
fim_alert_email Integrity alert recipient
Destination email for integrity alert notifications.
This controls where alerts or communication are sent.
Wrong value means important alerts/reports may go to the wrong inbox or be missed.
Use a monitored security inbox
Alerts are only useful if someone reliably receives and acts on them.
File Integrity -> Monitoring Policy.
fim_upgrade_grace_minutes Upgrade grace window
Suppresses noisy upgrade drift for configured minutes.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
90
Allows normal update churn to settle before alerting.
File Integrity -> Monitoring Policy.
fim_upload_php_trusted_paths Trusted uploads plugin paths
Trusted upload executable-path prefixes used for suppression tuning.
Trusted upload locations for plugins that legitimately use executable files in uploads.
Reduces false alerts for known-safe plugins, but over-trusting can hide real abuse in those paths.
Only known safe plugin upload paths
Minimizes false positives without hiding suspicious unknown paths.
File Integrity -> Monitoring Policy.

Settings & Tools

Menu path: Hack Halt -> Settings & Tools

Cross-module control plane with portal hardening, controls, feedback, license, and docs.

  • Portal settings tab for lockdown and private admin URL.
  • Security controls tab for core runtime, crawler, proxy, and MFA.
  • Feedback tab for bug report pipeline and ticket sync settings.
  • License and documentation tabs for premium activation and in-app manual.

Portal Hardening And Lockdown

Option store: hackhalt_settings

14 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
lockdown_enabled Global lockdown switch
Turns high-impact lockdown protections on across WordPress attack surfaces.
This is an on/off switch. Turns high-impact lockdown protections on across WordPress attack surfaces.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Settings & Tools -> Portal settings.
disable_xmlrpc Disable XML-RPC
Blocks XML-RPC endpoint usage.
This is an on/off switch. Blocks XML-RPC endpoint usage.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Settings & Tools -> Portal settings.
disable_file_editor Disable file editor
Disables in-dashboard theme/plugin editor vectors.
This is an on/off switch. Disables in-dashboard theme/plugin editor vectors.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Settings & Tools -> Portal settings.
disable_dir_listing Disable directory listing
Applies managed directory-listing suppression rules.
This is an on/off switch. Applies managed directory-listing suppression rules.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Settings & Tools -> Portal settings.
disable_comments_global Disable comments globally
Removes comment surfaces and capabilities site-wide.
This is an on/off switch. Removes comment surfaces and capabilities site-wide.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Settings & Tools -> Portal settings.
disable_user_enum Block user enumeration
Reduces account discovery via common query vectors.
Plain English: Reduces account discovery via common query vectors.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Settings & Tools -> Portal settings.
disable_rest_user_enum Block REST user enumeration
Restricts user listing through REST endpoints.
Plain English: Restricts user listing through REST endpoints.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Settings & Tools -> Portal settings.
custom_admin_url_enabled Private admin URL enabled
Activates custom portal route instead of default admin aliases.
This is an on/off switch. Activates custom portal route instead of default admin aliases.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
Hides default WordPress login/admin paths from common automated attacks.
Settings & Tools -> Portal settings.
custom_admin_slug Private portal slug
Custom path for admin access route.
Your private admin path. This is the hidden URL admins use instead of default login/admin paths.
Changing it moves your admin entrance. Use a memorable but private slug and share only with trusted admins.
Unique private slug (example: hh-portal-2026)
Predictable slugs are easier to guess; use a private route.
Settings & Tools -> Portal settings.
custom_admin_ip_restrict_enabled Private portal IP restriction
Requires source IP/CIDR to match allowlist for portal access.
Locks the private admin URL so only approved IP addresses can open it.
Very strong protection, but can lock you out if your IP changes and is not in the allowlist.
Disabled unless you have stable office/VPN static IP
Excellent control, but dynamic IP changes can lock admins out.
Settings & Tools -> Portal settings.
custom_admin_ip_allowlist Portal IP allowlist
Allowed static IPs/CIDR ranges for portal access.
List of approved IPs/CIDR ranges that can access your private admin portal.
Only listed IPs can enter. Keep this updated if office/VPN/residential IPs change.
Office/VPN static IPs or CIDR ranges only
Keeps portal reachable only from trusted networks.
Settings & Tools -> Portal settings.
portal_ip_restrict_add_current_ip Include current IP helper
Temporary helper checkbox used during save to add detected IP.
Plain English: Temporary helper checkbox used during save to add detected IP.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Settings & Tools -> Portal settings (save-time helper).
portal_ip_restrict_ack_static Static IP acknowledgement
Safety acknowledgement required before enabling portal IP restriction.
Plain English: Safety acknowledgement required before enabling portal IP restriction.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Settings & Tools -> Portal settings (save-time helper).
portal_ip_restrict_ack_lockout Lockout acknowledgement
Confirms operator understands lockout risk before enabling IP guard.
Plain English: Confirms operator understands lockout risk before enabling IP guard.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Settings & Tools -> Portal settings (save-time helper).

MFA Policy

Option store: hackhalt_settings

2 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
mfa_enabled Enable MFA module
Turns Google Authenticator MFA enforcement on.
This is an on/off switch. Turns Google Authenticator MFA enforcement on.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
MFA is one of the highest-impact controls against account takeover.
Settings & Tools -> Security Controls -> Multifactor policy.
mfa_enforce_roles MFA-enforced roles
Role keys that require MFA enrollment and code challenge.
Which user roles must pass Google Authenticator MFA at login.
Broader role coverage improves security but requires more users to complete MFA setup.
administrator, editor
Covers high-privilege roles while limiting rollout friction.
Settings & Tools -> Security Controls -> Multifactor policy.

Feedback Settings

Option store: hackhalt_settings

2 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
feedback_screenshot_max_mb Screenshot size limit
Max upload size (MB) for bug-report screenshots.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
2
Large enough for clear evidence while controlling upload abuse.
Settings & Tools -> Feedback.
feedback_ticket_retention_days Ticket history retention
Days to keep synced feedback ticket history locally.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
45
Keeps recent support history without excessive data growth.
Settings & Tools -> Feedback.

Setup Wizard

Menu path: Hack Halt -> Setup Wizard (direct route)

Guided onboarding flow that writes module policies in a safe operational order.

  • MFA policy and enrollment kickoff.
  • Portal hardening and optional IP guard safety gates.
  • Geo policy starter configuration.
  • Scanner, File Integrity, and CSP first-run setup actions.

Setup Wizard Payload Keys

Option store: hh_setup (wizard request payload)

25 keys
Setting key Technical control Plain-English explanation What happens if changed Small business recommended value Where to configure
mfa_enabled Wizard MFA enable
Wizard step writes MFA module state.
This is an on/off switch. Wizard step writes MFA module state.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Setup Wizard -> MFA step.
mfa_enforce_roles Wizard MFA roles
Wizard role selection for MFA enforcement.
This is a list-based control that decides what is included, trusted, blocked, or enforced.
Items you add become active policy inputs. Items you remove stop influencing decisions.
Only include what you explicitly trust or need
List controls directly shape access, enforcement, and noise levels.
Setup Wizard -> MFA step.
custom_admin_url_enabled Wizard portal URL enable
Wizard enables private admin portal routing.
This is an on/off switch. Wizard enables private admin portal routing.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Setup Wizard -> Portal URL step.
custom_admin_slug Wizard portal slug
Wizard private portal slug value.
This is a URL-friendly path value used to route traffic to a specific protected area.
Changing it changes where traffic is routed. Update bookmarks and internal docs after changes.
Set a unique private slug and document it internally
Predictable slugs reduce the security benefit of hidden endpoints.
Setup Wizard -> Portal URL step.
custom_admin_ip_restrict_enabled Wizard portal IP guard
Wizard toggle for private portal IP restriction.
This is an on/off switch. Wizard toggle for private portal IP restriction.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Setup Wizard -> Portal URL step.
custom_admin_ip_allowlist Wizard portal allowlist
Wizard allowlist rows for portal guard.
This is a list-based control that decides what is included, trusted, blocked, or enforced.
Items you add become active policy inputs. Items you remove stop influencing decisions.
Only include what you explicitly trust or need
List controls directly shape access, enforcement, and noise levels.
Setup Wizard -> Portal URL step.
portal_ip_restrict_add_current_ip Wizard add current IP
Wizard helper to append current IP at save.
Plain English: Wizard helper to append current IP at save.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Setup Wizard -> Portal URL step.
portal_ip_restrict_ack_static Wizard static-IP acknowledgement
Wizard safety confirmation for static IP expectation.
Plain English: Wizard safety confirmation for static IP expectation.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Setup Wizard -> Portal URL step.
portal_ip_restrict_ack_lockout Wizard lockout acknowledgement
Wizard safety confirmation for lockout awareness.
Plain English: Wizard safety confirmation for lockout awareness.
Changing this updates how Hack Halt applies this control at runtime.
Use plugin default
Defaults are a safe starting point for small-business deployments.
Setup Wizard -> Portal URL step.
geo_mode_frontend / geo_allowed_frontend / geo_blocked_frontend Wizard frontend geo policy
Wizard frontend country mode and country lists.
This is a grouped wizard shortcut that writes several related settings together.
Changing this in the wizard updates multiple controls in one step.
Use wizard defaults, then review each underlying setting in module pages
Grouped wizard keys are shortcuts, not long-term fine-tuning controls.
Setup Wizard -> Geo Policy step.
geo_mode_admin / geo_allowed_admin / geo_blocked_admin Wizard admin geo policy
Wizard login/admin country mode and country lists.
This is a grouped wizard shortcut that writes several related settings together.
Changing this in the wizard updates multiple controls in one step.
Use wizard defaults, then review each underlying setting in module pages
Grouped wizard keys are shortcuts, not long-term fine-tuning controls.
Setup Wizard -> Geo Policy step.
scanner_feed_enabled Wizard scanner intelligence toggle
Enables server dataset matching for scans.
This is an on/off switch. Enables server dataset matching for scans.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Setup Wizard -> Vulnerability Scanner step.
scanner_definitions Wizard scanner definitions
Definition keys selected during setup.
This is a list-based control that decides what is included, trusted, blocked, or enforced.
Items you add become active policy inputs. Items you remove stop influencing decisions.
Only include what you explicitly trust or need
List controls directly shape access, enforcement, and noise levels.
Setup Wizard -> Vulnerability Scanner step.
scanner_daily_scan Wizard daily scanner schedule
Scheduled scan toggle configured in wizard.
This is an on/off switch. Scheduled scan toggle configured in wizard.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Setup Wizard -> Vulnerability Scanner step.
scanner_run_now Wizard run scanner now
One-time action trigger for immediate scan.
One-time wizard action to immediately run a vulnerability scan.
Triggers a scan now; it does not permanently toggle scanner policy by itself.
Enable during onboarding; leave off for normal saves
These are one-time action triggers, not permanent policy states.
Setup Wizard -> Vulnerability Scanner step.
fim_enabled / fim_auto_rebaseline_upgrade / fim_email_alerts Wizard file-integrity toggles
Core file-integrity policy fields written by wizard.
This is a grouped wizard shortcut that writes several related settings together.
Changing this in the wizard updates multiple controls in one step.
Use wizard defaults, then review each underlying setting in module pages
Grouped wizard keys are shortcuts, not long-term fine-tuning controls.
Setup Wizard -> File Integrity step.
fim_alert_email Wizard integrity alert email
Alert destination set in wizard.
This controls where alerts or communication are sent.
Wrong value means important alerts/reports may go to the wrong inbox or be missed.
Use a monitored security inbox
Alerts are only useful if someone reliably receives and acts on them.
Setup Wizard -> File Integrity step.
fim_upgrade_grace_minutes Wizard integrity upgrade grace
Upgrade suppression window set in wizard.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
Use documented default
Minute windows are sensitivity controls; defaults are usually tested baselines.
Setup Wizard -> File Integrity step.
fim_build_baseline Wizard build baseline now
One-time baseline build action trigger.
One-time wizard action to create the initial file-integrity baseline snapshot.
Creates the comparison reference used for future drift detection.
Enable during onboarding; leave off for normal saves
These are one-time action triggers, not permanent policy states.
Setup Wizard -> File Integrity step.
fim_run_scan Wizard run integrity scan
One-time integrity scan action trigger.
This is an on/off switch. One-time integrity scan action trigger.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enable during onboarding; leave off for normal saves
These are one-time action triggers, not permanent policy states.
Setup Wizard -> File Integrity step.
csp_enabled / csp_mode Wizard CSP core toggles
CSP module state and mode set by wizard.
This is a grouped wizard shortcut that writes several related settings together.
Changing this in the wizard updates multiple controls in one step.
Use wizard defaults, then review each underlying setting in module pages
Grouped wizard keys are shortcuts, not long-term fine-tuning controls.
Setup Wizard -> CSP step.
csp_include_admin / csp_include_login Wizard CSP scope toggles
Admin/login CSP coverage toggles from wizard.
This is a grouped wizard shortcut that writes several related settings together.
Changing this in the wizard updates multiple controls in one step.
Use wizard defaults, then review each underlying setting in module pages
Grouped wizard keys are shortcuts, not long-term fine-tuning controls.
Setup Wizard -> CSP step.
csp_reporting_enabled Wizard CSP reporting toggle
CSP reporting endpoint behavior from wizard.
This is an on/off switch. CSP reporting endpoint behavior from wizard.
Turning it on activates this protection/behavior. Turning it off disables it completely.
Enabled
For small business deployments, secure-by-default toggles should usually stay on.
Setup Wizard -> CSP step.
csp_scanner_max_urls Wizard CSP scan max URLs
URL cap for wizard quick-scan action.
This is a numeric limit/timing value that tunes how sensitive or strict this feature is.
Higher values usually increase tolerance/volume; lower values usually increase strictness and faster enforcement.
Use documented default
Tuned defaults reduce false positives unless your traffic profile is unusual.
Setup Wizard -> CSP step.
csp_run_quick_scan Wizard CSP quick-scan action
One-time action trigger to run CSP discovery scan.
One-time wizard action to run CSP discovery crawl.
Builds policy suggestions; does not force them live unless you apply/save.
Enable during onboarding; leave off for normal saves
These are one-time action triggers, not permanent policy states.
Setup Wizard -> CSP step.
Scroll to top