FREE: Not available. PRO: Available. What it does: Adds context to scan results. How to use it properly: Monitor trends.
FREE: Not available. PRO: Available. What it does: Summarizes integrity, malware, and incident data into a single view. How to use it properly: Review after scans to prioritize remediation.
FREE: Not available. PRO: Available. What it does: Correlates malware with integrity and alerts. How to use it properly: Prioritize correlated findings.
FREE: Not available. PRO: Available. What it does: Confirms which advanced protection modules are active. How to use it properly: Verify after updates, migrations, or license changes.
FREE: Not available. PRO: Available. What it does: Monitors abnormal DB growth. How to use it properly: Investigate spikes.
FREE: Not available. PRO: Available. What it does: Exports activity logs for audits and investigations. How to use it properly: Export during incidents or before retention cleanup.
FREE: Not available. PRO: Available. What it does: Changes WP DB prefix safely. How to use it properly: Always preview first.
FREE: Not available. PRO: Available. What it does: Enables granular filtering of security events. How to use it properly: Use filters to isolate high-signal events.
FREE: Not available. PRO: Available. What it does: Backs up DB before changes. How to use it properly: Verify backup exists.
FREE: Not available. PRO: Available. What it does: Retains logs for long-term forensics. How to use it properly: Enable for compliance or long-term investigations.
