Skip to content
Learn Self Defense – A FightJourney.org website Logo
  • Home
  • Mission
  • Values
  • Volunteer
  • Scan Metadata (Type, File Count, Suspect Count)

    FREE: Not available. PRO: Available. What it does: Adds context to scan results. How to use it properly: Monitor trends.

    Read More
  • Deep Scan Summaries (Integrity, Quick Scan, Attack Story)

    FREE: Not available. PRO: Available. What it does: Summarizes integrity, malware, and incident data into a single view. How to use it properly: Review after scans to prioritize remediation.

    Read More
  • Malware Integrations (File Integrity + Alert Engine)

    FREE: Not available. PRO: Available. What it does: Correlates malware with integrity and alerts. How to use it properly: Prioritize correlated findings.

    Read More
  • Pro Module Indicators (CSP Builder, Attack Story, etc.)

    FREE: Not available. PRO: Available. What it does: Confirms which advanced protection modules are active. How to use it properly: Verify after updates, migrations, or license changes.

    Read More
  • Table Growth Monitoring

    FREE: Not available. PRO: Available. What it does: Monitors abnormal DB growth. How to use it properly: Investigate spikes.

    Read More
  • Export Logs (CSV / JSON)

    FREE: Not available. PRO: Available. What it does: Exports activity logs for audits and investigations. How to use it properly: Export during incidents or before retention cleanup.

    Read More
  • Database Prefix Manager

    FREE: Not available. PRO: Available. What it does: Changes WP DB prefix safely. How to use it properly: Always preview first.

    Read More
  • Advanced Filtering

    FREE: Not available. PRO: Available. What it does: Enables granular filtering of security events. How to use it properly: Use filters to isolate high-signal events.

    Read More
  • Database Backup Before Prefix Change

    FREE: Not available. PRO: Available. What it does: Backs up DB before changes. How to use it properly: Verify backup exists.

    Read More
  • Extended Retention

    FREE: Not available. PRO: Available. What it does: Retains logs for long-term forensics. How to use it properly: Enable for compliance or long-term investigations.

    Read More
12Next

© 2026 - A program of Fight Journey Organization - Visit us at https://fightjourney.org

Page load link
Go to Top