Do you want to make sure your site is really protected? Do you want to be sure that your security plugin works well? Do you want relaxed sleep?
“KC Admin area Monitor” (or KCAM) does exactly what it says, literally. This is your "security camera" in your dashboard. You may set security plugins, but did they really works? This plugin don't try to protect you, just gives you clear vision on what happens in your dashboard. Plus gives you info about plugins what are vulnerable.
This plugin is a "security camera" only, passive registering tool, not a "guard", active protection tool. Whitelisting blocks only messages to you, not the work of your site, theme and plugins.
When anybody sends a request to your WordPress dashboard, you will get a mail. There in mail will be all the info about this request: call stack, _REQUEST and _SERVER arrays, and a message from the plugin. Messages will be only two: "KCAM options saving" or "Alert".
Note, it sends emails on EVERY request, include your activity in the admin area and saving his own options. That is because plugin can not recognise "you". To not be flooded with emails, you must set the whitelist. Means, copy some unique string (in "Usage" section you will find examples) from the email you got from it, put in whitelist and you will not get emails that have this string inside.
In the screenshot I set (row by row) my IP, a marker from another tool of mine, my mobile user agent (as it can have lot of IPs, can not set them all), "action" from the logging plugin, several actions from intruders, all they mimic plugins I don't run, so they are not menace for me, and finally, my server's IP, sometimes wp_cron uses it.
Now I get only alerts about some plugins, that allow cracking, or when some intruders try some URLs, without to know the structure of my site. With that info I can do something to protect my site. I ban IPs of "most motivated" intruders, change plugins, even consult others what plugins to avoid and find viruses in other people computers just because they saw some pages on my site and viruses run scanning on the site right away, without their knowing.
_________REQUEST__________ !reauth! -> !1!<br> !redirect_to! -> !http://krumch.com/blog/wp-admin/!<br> _________Environment Variables__________ !DOCUMENT_ROOT! -> !/var/www/vhosts/krumch.com/httpdocs!<br> !FCGI_ROLE! -> !RESPONDER!<br> !GATEWAY_INTERFACE! -> !CGI/1.1!<br> !HTTP_ACCEPT! -> !*/*!<br> !HTTP_ACCEPT_CHARSET! -> !ISO-8859-1,utf-8;q=0.7,*;q=0.7!<br> !HTTP_ACCEPT_ENCODING! -> !gzip,deflate,identity!<br> !HTTP_ACCEPT_LANGUAGE! -> !en-us,en;q=0.5!<br> !HTTP_CACHE_CONTROL! -> !max-age=0!<br> !HTTP_CONNECTION! -> !close!<br> !HTTP_COOKIE! -> !PHPSESSID=4adii70f2r25e5s6ai1bh7m2b0!<br> !HTTP_HOST! -> !krumch.com!<br> !HTTP_USER_AGENT! -> !Mechanize/2.7.3 Ruby/1.9.3p551 (http://github.com/sparklemotion/mechanize/)!<br> !PATH! -> !/sbin:/usr/sbin:/bin:/usr/bin!<br> !PHP_SELF! -> !/blog/wp-login.php!<br> !PP_CUSTOM_PHP_INI! -> !/var/www/vhosts/krumch.com/etc/php.ini!<br> !QUERY_STRING! -> !redirect_to=http%3A%2F%2Fkrumch.com%2Fblog%2Fwp-admin%2F&reauth=1!<br> !REMOTE_ADDR! -> !220.127.116.11!<br> !REMOTE_PORT! -> !44030!<br> !REQUEST_METHOD! -> !GET!<br> !REQUEST_TIME! -> !1476619690!<br> !REQUEST_URI! -> !/blog/wp-login.php?redirect_to=http%3A%2F%2Fkrumch.com%2Fblog%2Fwp-admin%2F&reauth=1!<br> !SCRIPT_FILENAME! -> !/var/www/vhosts/krumch.com/httpdocs/blog/wp-login.php!<br> !SCRIPT_NAME! -> !/blog/wp-login.php!<br> !SERVER_ADDR! -> !18.104.22.168!<br> !SERVER_ADMIN! -> !email@example.com!<br> !SERVER_NAME! -> !krumch.com!<br> !SERVER_PORT! -> !80!<br> !SERVER_PROTOCOL! -> !HTTP/1.1!<br> !SERVER_SIGNATURE! -> !<address>Apache Server at krumch.com Port 80</address> !<br> !SERVER_SOFTWARE! -> !Apache!<br> _________MESSAGE__________ !<pre>Alert</pre>!
Looks scary? Nope, that is only the info of a HTTP request. Someone scans my site for some old bug... This is the full list of data, what the server knows about the request.
If you want to avoid emails like this, created by your activity on the site, you must set your IP in the whitelist. That is easy: copy the row:
!REMOTE_ADDR! -> !22.214.171.124!
If you want to stop alerts for the request, what have "reauth" parameter equal to "1", grab this row:
!reauth! -> !1!
and put it in the whitelist. Note that there can be lot of requests with this parameter, and this will hide all of them.
This way you create your whitelist (each string/rule alone on a row). Set unique strings for each action you want to skip the alert, to be sure you will mute the exactly action you know that is not a problem for your site. Avoid HTML tags - they will be deleted. Please check my own settings at "Screenshot" tab bellow.
If you do a mistake, save wrong row or so, you won't do any harm on your site. All the requests will be executed, not suspended, in any case. This plugin is a "security camera" only, passive registering tool, not a "guard", active protection tool. You block only messages to you, not the work of your site, theme and plugins. It will work well with any plugin, include your security plugins. Actually, you can check how well works your security plugins, using this tool.
In the screenshot I set (row by row) my IP, a marker from another tool of mine, my mobile user agent (as it can have lot of IPs, can not set them all) on 3 rows, "action" from the logging plugin, several actions from intruders, all they mimic plugins I don't run, so they are not menace for me, and finally, my server's IP, sometimes wp_cron uses it.