FREE: Not available. PRO: Available. What it does: Simulates prefix changes. How to use it properly: Review results carefully.
FREE: Not available. PRO: Available. What it does: Creates rule-based security alerts. How to use it properly: Focus on high-risk events only.
FREE: Not available. PRO: Available. What it does: Updates prefix-dependent keys. How to use it properly: Mandatory for prefix changes.
FREE: Not available. PRO: Available. What it does: Sends notifications when alerts trigger. How to use it properly: Route to monitored inboxes.
FREE: Not available. PRO: Available. What it does: Restores previous DB state. How to use it properly: Roll back immediately if issues occur.
FREE: Not available. PRO: Available. What it does: Correlates alerts across modules. How to use it properly: Prefer correlated alerts for higher confidence.
FREE: Not available. PRO: Available. What it does: Controls rows per page. How to use it properly: Increase during investigations.
FREE: Not available. PRO: Available. What it does: Displays active login sessions. How to use it properly: Review after suspicious access.
FREE: Not available. PRO: Available. What it does: Logs sensitive DB actions. How to use it properly: Use for auditing.
FREE: Not available. PRO: Available. What it does: Allows fine-tuned lockout thresholds. How to use it properly: Use stricter rules for admins.
