WordPress Pete with coreruleset v3.3 out of the box and other good practices. You won’t have to worry about most hack attacks.
You can also disable or enable the mod_security firewall at your convenience if you are developing any feature of your site to avoid false positives. After this we recommend you activate it again
![hardening_wordpress_with_mod_security4](https://wordpresspete.com/wp-content/uploads/2022/12/hardening_wordpress_with_mod_security4-1024x875.jpg)
Pete also gives you the option to disable it completely or disable it per sites
![hardening_wordpress_with_mod_security1](https://wordpresspete.com/wp-content/uploads/2022/12/hardening_wordpress_with_mod_security1-1024x875.jpg)
You can also see in a table and easy to manage which rules were activated and the attacks that Pete’s mod_security constantly protects your site
![hardening_wordpress_with_mod_security2](https://wordpresspete.com/wp-content/uploads/2022/12/hardening_wordpress_with_mod_security2-2400x2050.jpg)
![hardening_wordpress_with_mod_security6](https://wordpresspete.com/wp-content/uploads/2022/12/hardening_wordpress_with_mod_security6-2400x2050.jpg)
In this example you can see how we disabled the mod_security firewall and you showed the result of that address that otherwise would have triggered a protection rule
![hardening_wordpress_with_mod_security3](https://wordpresspete.com/wp-content/uploads/2022/12/hardening_wordpress_with_mod_security3-2400x2050.jpg)
![hardening_wordpress_with_mod_security4](https://wordpresspete.com/wp-content/uploads/2022/12/hardening_wordpress_with_mod_security4-2400x2050.jpg)
![hardening_wordpress_with_mod_security5](https://wordpresspete.com/wp-content/uploads/2022/12/hardening_wordpress_with_mod_security5-2400x2050.jpg)