Security Checkup

The Security Checkup page gives you a quick overview of your Authica login security configuration.

It reviews important Authica protection areas, shows which features are configured, and calculates a Login Protection Score based on enabled protections, access controls, threat detection, logging, alerts, and recovery tools.

This page is designed to help you quickly see what is already protected and what still needs attention.

Login Protection Score

The Login Protection Score shows your current protection level out of 100.

A higher score means more recommended Authica security checks are configured.

Example: 100 / 100

This means all scored checks are configured and no recommendations remain.

The score is based on active Authica features such as:

Email verification
Turnstile protection
Hidden login URL
Two-factor authentication
Brute force protection
IP restriction
WAF protection
Logging
Alerts
Backup and recovery readiness

Protection Status

Below the score, Authica shows a protection summary.

Example:

Excellent protection
13 of 13 scored checks are configured.
0 recommendations remaining.

This gives you a quick status without needing to review every setting manually.

Possible states may include lower protection levels if important features are disabled or incomplete.

Configured, Ready, and Review States

Each item on the page includes a status badge.

Configured

A Configured badge means the feature is active and counted toward the Login Protection Score.

Example:

Two-Factor Authentication: Configured

Ready

A Ready badge means the feature is available as a tool, but it may not directly add score points.

Example:

Emergency Lockout: Ready
Backup & Restore: Ready
Hardening: Ready

These tools are still important because they help with recovery, emergency access, and attack-surface reduction.

Core Protection

The Core Protection section covers the main login security features.

Email Verification

Requires users to confirm their email address before they can use the account.

This helps reduce fake accounts, mistyped email addresses, and unauthorized registration abuse.

Turnstile & Edge Security

Blocks automated login abuse using Cloudflare Turnstile and related edge security checks.

This helps reduce bot traffic, fake login attempts, and automated form abuse.

Hide WP Login

Moves the public WordPress login URL away from the default login path.

This reduces automated attacks against the standard WordPress login endpoint and can respond with a 404 or custom page on the old endpoint.

Two-Factor Authentication

Requires TOTP-based verification codes for administrators or selected user roles.

This adds an extra layer of login protection even if a password is compromised.

Login Methods

Covers stronger or smoother sign-in options such as passkeys, magic links, and social login.

These methods can improve both security and user experience depending on how your site is configured.

Access Control

The Access Control section covers who can access protected areas and how suspicious users are handled.

IP Restriction

Controls who can access the login page, admin area, and selected endpoint areas based on IP policy.

This helps limit access to trusted users, regions, networks, or individual IP addresses.

Redirect Rules

Defines safe login and logout destinations so users land where expected.

This helps prevent confusing redirects and keeps user flows predictable after authentication.

Brute Force Protection

Tracks failed login attempts and automatically blocks aggressive IP addresses.

When repeated failed attempts exceed your configured threshold, Authica can add the IP to the deny list.

Stealth 404 Escalation

Moves repeat offenders into stealth blocking after the configured threshold.

Instead of clearly telling attackers they are blocked, Authica can make protected areas appear unavailable.

Hardening

Provides tools to reduce unnecessary WordPress attack surface.

This can include disabling risky or abused authentication methods, XML-RPC access, pingbacks, or discovery hints depending on your configuration.

Threat Detection

The Threat Detection section focuses on active attack detection.

Web Application Firewall

Inspects requests for exploit patterns such as:

SQL Injection
Cross-Site Scripting
Path Traversal
Remote Code Execution
Scanner / Sensitive File Probe
Known Malicious User-Agent

When configured, the WAF helps stop suspicious requests before they reach sensitive WordPress functionality.

WAF Auto Deny

Optionally adds blocked WAF IPs to the IP Restriction Deny List.

This helps stop repeat WAF offenders from continuing to send malicious or suspicious requests.

Monitoring & Recovery

The Monitoring & Recovery section covers visibility, notifications, emergency access, and backup tools.

Logging

Records important login and security events for Recent Activities and Reports.

Logging helps you review what happened, when it happened, and which protections were involved.

Alerts

Sends notification emails for important login and security events.

Alerts help you respond faster when suspicious activity, lockouts, or important security events occur.

Emergency Lockout

Keeps an emergency lockout tool ready for temporary login or site lockdowns.

This is useful when you need to quickly restrict access during an active issue.

Backup & Restore

Lets you export, restore, or reset Authica settings before major configuration changes.

This is useful before testing new security settings, migrating sites, or making large changes.

Points

Some checks show a point value.

Example:

Two-Factor Authentication: 12 pts
IP Restriction: 8 pts
Alerts: 3 pts

Point values represent how much each configured feature contributes to the overall Login Protection Score.

Tools marked as Tool may not directly add points, but they still support security operations and recovery.

Review Buttons

The Review buttons take you directly to the related Authica settings page or tab.

Use Review when you want to change a feature’s configuration, confirm its setup, or fix a recommendation.

Examples:

Review IP Restriction
Review Web Application Firewall
Review Alerts
Review Brute Force Protection

Open Buttons

The Open buttons are used for supporting tools such as:

Hardening
Emergency Lockout
Backup & Restore

These tools may not be scored the same way as active protections, but they are important for maintenance, emergency response, and secure administration.

Recommended Usage

Use Security Checkup after installing Authica and after making major configuration changes.

Recommended workflow:

1. Review the Login Protection Score.

2. Check any missing or unconfigured items.

3. Use the Review buttons to open related settings.

4. Enable or configure recommended protections.

5. Return to Security Checkup and confirm the score improved.

For strong login protection, Authica recommends configuring:

Turnstile & Edge Security
Two-Factor Authentication
Hide WP Login
Brute Force Protection
IP Restriction
Web Application Firewall
Logging
Alerts
Backup & Restore

Important Notes

A perfect score does not mean a site is impossible to attack.

The score means the recommended Authica protections are configured. You should still keep WordPress, themes, plugins, PHP, and your hosting environment updated.

Security Checkup is best used as a configuration guide and visibility tool, not as the only measure of website security.