What items are scanned by the website audit
The Audit currently performs 4 main functions:
1. Joomla configuration and best-practices detection
This part of the audit scans for many of the well-known Joomla best-practices such as:
- Removing administrator with known usernames
- Using strong passwords for Joomla users and for your database
- Disabling guest user registration
- Using random database prefixes
- Disabling Magic Quotes and Register Globals
- In total, 22 items are checked in this section.
2. Joomla Filesystem Integrity
This part of the audit scans checks of any of the core files distributed in the Joomla core package have been hacked.
3. File & Folder Permissions
This part of the audit scans every file and folder in your Joomla installation to make sure the permissions are safe.
4. Deep Malware Scanner
Unlike our long-available surface malware and blacklist scanner, the Malware Scanner in the Audit is a deep, inside-out scan that looks for common malware signatures and suspicious code.
- Configuring remote backups with Akeeba Backup
- How do I generate reports for my clients?
- How do I use the Site Audit?
- How do I use the Watchful REST API?
- How often does Watchful monitor my web sites?
- How to backup a site in Watchful
- How to create a Watchful App
- How to make add-on/extension updates compatible with Watchful
- Installing the Watchful client
- Managing admin access with Single Sign-on