Blog

New Database Connector in WP Security Audit Log 2.0

WordPress 2.0 includes a major change in the core of the plugin that will allow us to provide much more functionality in the future versions. It also makes the plugin to WordPress database connection much faster and more efficient.

Monitor WordPress Database Changes with WP Security Audit Log 1.6

Keep track of WordPress database changes that plugins, themes and other components might make with WP Security Audit Log. By keeping track of such WordPress database changes you ease the troubleshooting process should you encounter any technical problems, especially during upgrades or customizations.

Exclude WordPress Users & Roles from WordPress Monitoring

Version 1.5.0 of WP Security Audit Log, WordPress’ most popular user monitoring plugin is available for download. In this version we included new features such as the ability to exclude users, roles and custom fields from WordPress monitoring. Read this blog post for more information about what is new and improved in version 1.5.

WordPress Failed Logins Monitoring Improved in WP Security Audit Log 1.4

Version 1.4 of WP Security Audit Log is available for download. The major feature highlight for this new version is the much improved monitoring of WordPress failed logins, where the plugin reports the username being attacked allowing you, the WordPress administrator to take evasive actions and avoid having your WordPress hacked.

Monitor Custom Fields Changes in WordPress Posts, Pages and Custom Post Types

A new version of WP Security Audit Log, WordPress’ most popular monitoring and auditing plugin is available for download. The new version allows full monitoring of Custom fields activity in WordPress and WordPress multisite blog posts, pages and custom post types.

Enhanced Monitoring of WordPress Failed Logins with WP Security Audit Log Plugin

We just released a new version of WP Security Audit Log that has enhanced monitoring of WordPress failed logins, thus enabling WordPress and WordPress multisite administrators to keep track of all offending IP addresses during a brute force attack.