{"id":314741,"date":"2021-12-14T15:24:08","date_gmt":"2021-12-14T15:24:08","guid":{"rendered":"https:\/\/webkul.com\/blog\/?p=314741"},"modified":"2026-01-27T07:02:01","modified_gmt":"2026-01-27T07:02:01","slug":"prestashop-security-suite-user-guide","status":"publish","type":"post","link":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/","title":{"rendered":"Prestashop Security Suite {User-Guide}"},"content":{"rendered":"\n<p>Protect your website from hacker attacks and malicious activities with <a href=\"https:\/\/store.webkul.com\/prestashop-security-firewall-2fa-content-protection.html\">Prestashop Security Suite Extension<\/a>.<\/p>\n\n\n\n<p>Two-factor authentication to add an extra level of protection to your admin panel. <\/p>\n\n\n\n<p>Ensure protection against SQL, cross-site scripting (XSS), Shell, and HTML injection attacks with Web Application Firewall.<\/p>\n\n\n\n<p><strong>Note: Prestashop Security Suite module is compatible with PrestaShop multi-store feature.<\/strong><\/p>\n\n\n\n<div class=\"wk-index-wrap\"><div class=\"block-wrap\">\n<h3 class=\"wp-block-heading index-title\">Features of <meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\">Prestashop Security Suite<\/h3>\n<\/div><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Disable cut, copy, paste, and text selection  to prevent text theft.<\/li>\n\n\n\n<li>Disable right clicks to prevent your images from being copied or saved.<\/li>\n\n\n\n<li>Also, you can disable View Page Source and Inspect Element.<\/li>\n\n\n\n<li>Enable security headers to protect your store against XSS, clickjacking, and content sniffing attacks.<\/li>\n\n\n\n<li>Enable 2-factor authentication to protect your back office from unauthorized access.<\/li>\n\n\n\n<li>The overall security of the website\u2019s data is taken care of by Web Application Firewall and it protects your site from XSS, SQL, SHELL, and HTML injection attacks.<\/li>\n\n\n\n<li>Exclude Two-Factor Authentication (2FA) for Specific IPs.<\/li>\n<\/ul>\n\n\n\n<div class=\"wk-index-wrap\"><div class=\"block-wrap\">\n<h3 class=\"wp-block-heading index-title\"><meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\">How to Install Prestashop Security Suite Module<\/h3>\n<\/div><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\">Firstly, go to the module manager in the back office and click on \u2018upload a module\u2019.<\/li>\n\n\n\n<li>After that, drag and drop the module file or select the file from the system.<\/li>\n\n\n\n<li>In this way, the module installation will be successful.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5-1200x334.png\" alt=\"easypost shipping installation\" loading=\"lazy\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/10\/2-3-1200x424.png\" alt=\"easypost shipping installation\" loading=\"lazy\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/10\/3-2-1200x391.png\" alt=\"easypost shipping installation\" loading=\"lazy\" \/><\/figure>\n\n\n\n<div class=\"wk-index-wrap\"><div class=\"block-wrap\">\n<h3 class=\"wp-block-heading index-title\">Custom Hooks Information<\/h3>\n<\/div><\/div>\n\n\n\n<p>In Prestashop versions 1.7.x, and 8.x.x the admin needs to add two custom hooks in the below files:<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\">{hook h=&#039;displayWkAdminLoginForm&#039;}<\/pre>\n\n\n\n<p>Add this hook in the &#8220;&lt;YOUR_ADMIN_FOLDER&gt;\/themes\/default\/template\/controller<strong>s<\/strong>\/login\/content.tpl&#8221; below password input field, in id=&#8221;login_form&#8221;, where &lt;div class=&#8221;form-group&#8221;&gt; close<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1035\" height=\"612\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/login_tpl.png\" alt=\"login_tpl\" class=\"wp-image-315385\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/login_tpl.png 1035w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/login_tpl-300x177.png 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/login_tpl-250x148.png 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/login_tpl-768x454.png 768w\" sizes=\"(max-width: 1035px) 100vw, 1035px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<pre class=\"EnlighterJSRAW\">Hook::exec(&#039;actionWkAdminLoginControllerSubmit&#039;, array(&#039;controller&#039; =&gt; $this));<\/pre>\n\n\n\n<p>Add this hook in the &#8220;controllers\/admin\/AdminLoginController.php&#8221; in function processLogin() just above line &#8220;if (!count($this-&gt;errors)) {&#8220;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"985\" height=\"590\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/login_controller.png\" alt=\"login_controller\" class=\"wp-image-315391\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/login_controller.png 985w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/login_controller-300x180.png 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/login_controller-250x150.png 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/login_controller-768x460.png 768w\" sizes=\"(max-width: 985px) 100vw, 985px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>For Prestashop versions 9.x.x, The admin needs to add custom hooks in the files below:<\/p>\n\n\n\n<p>1) src\/PrestaShopBundle\/Controller\/Admin\/LoginController.php<\/p>\n\n\n\n<p>Need to put the code below in <code>loginAction<\/code> method after <code>$requestPasswordResetForm = $requestResetPasswordFormHandler-&gt;getForm();<\/code> line:<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\">if ($request-&gt;getSession()-&gt;has(&#039;wk_auth_error&#039;)) {\n    $this-&gt;addFlash(&#039;error&#039;, $request-&gt;getSession()-&gt;get(&#039;wk_auth_error&#039;));\n    $request-&gt;getSession()-&gt;remove(&#039;wk_auth_error&#039;);\n}<\/pre>\n\n\n\n<p>2) src\/PrestaShopBundle\/Form\/Admin\/Login\/LoginType.php<\/p>\n\n\n\n<p>Replace the code below in <code>buildForm<\/code> method before <code>-&gt;add('stay_logged_in', CheckboxType::class, [<\/code>: after line 59:<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\">-&gt;add(&#039;passwd&#039;, PasswordType::class, &#091;\n     &#039;label&#039; =&gt; $this-&gt;translator-&gt;trans(&#039;Password&#039;, &#091;], &#039;Admin.Global&#039;),\n ]);\n \\Hook::exec(&#039;displayWkAdminLoginForm&#039;, &#091;&#039;builder&#039; =&gt; $builder]);\n\n $builder-&gt;add(&#039;submit_login&#039;, SubmitType::class, &#091;\n     &#039;label&#039; =&gt; $this-&gt;translator-&gt;trans(&#039;Log in&#039;, &#091;], &#039;Admin.Login.Feature&#039;),\n ])<\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Reference Image<\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"920\" height=\"600\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/code-block.webp\" alt=\"login_form_code\" class=\"wp-image-513542\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/code-block.webp 920w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/code-block-300x196.webp 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/code-block-250x163.webp 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/code-block-768x501.webp 768w\" sizes=\"(max-width: 920px) 100vw, 920px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>3) vendor\/symfony\/security-http\/Authentication\/AuthenticatorManager.php<\/p>\n\n\n\n<p>Put the code below in the executeAuthenticator method just after try {:<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\">\\Hook::exec(&#039;actionWkAdminLoginControllerSubmit&#039;, &#091;&#039;request&#039; =&gt; $request])<\/pre>\n\n\n\n<div class=\"wk-index-wrap\"><div class=\"block-wrap\">\n<h3 class=\"wp-block-heading index-title\">Module Configuration<\/h3>\n<\/div><\/div>\n\n\n\n<p><meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\">After the successful installation of the module, you need to configure it.<\/p>\n\n\n\n<p>You will have to configure the Content Protection, Security Headers, HTTP Authentication, 2-Step Verification, and Web Application Firewall tabs. <\/p>\n\n\n\n<p>Let us take a deep dive into each tab configuration, individually.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Content Protection<\/strong><\/h4>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1200\" height=\"737\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image1-1200x737.webp\" alt=\"configuration module image\" class=\"wp-image-514799\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image1-1200x737.webp 1200w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image1-300x184.webp 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image1-250x153.webp 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image1-768x471.webp 768w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image1-1536x943.webp 1536w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image1.webp 1629w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p><strong>Disable Copy:<\/strong> Enable this field to disallow users to copy the content from the website. This option allows you to disable the ctrl+c command on your website.<\/p>\n\n\n\n<p><strong>Disable Cut:<\/strong> Enable this field to disallow the use of the ctrl+x command in the Prestashop store.<\/p>\n\n\n\n<p><strong>Disable Paste:<\/strong> This option allows you to disable the use of the Ctrl+V command on your website.<\/p>\n\n\n\n<p><strong>View Page Source:<\/strong> Disallow customers from using the Ctrl+U command on the website to view the page source.<\/p>\n\n\n\n<p><strong>Save page source:<\/strong> Disallow the use of Ctrl+S command on the website.<\/p>\n\n\n\n<p><strong>Disable Right Click:<\/strong> Enable this field to disallow the use of right-click using the mouse in the store.<\/p>\n\n\n\n<p><strong>Disable Text Selection:<\/strong> Enable this field to disallow users from selecting text in the store.<\/p>\n\n\n\n<p><strong>Inspect Element<\/strong>: Disallow users to inspect using the Ctrl+Shift+i command.<\/p>\n\n\n\n<p><strong>Display JavaScript Disable Warning:<\/strong> This option lets you display a warning when JavaScript is disabled or not supported in the browser.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Security Headers<\/strong><\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1632\" height=\"756\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2.webp\" alt=\"module configuration\" class=\"wp-image-514800\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2.webp 1632w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-300x139.webp 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-1200x556.webp 1200w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-250x116.webp 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-768x356.webp 768w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-1536x712.webp 1536w\" sizes=\"(max-width: 1632px) 100vw, 1632px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1200\" height=\"490\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-5-1200x490.webp\" alt=\"module configuration\" class=\"wp-image-514808\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-5-1200x490.webp 1200w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-5-300x122.webp 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-5-250x102.webp 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-5-768x313.webp 768w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-5-1536x627.webp 1536w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image2-5.webp 1615w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p><strong>X-XSS Protection<\/strong><\/p>\n\n\n\n<p>Enable this option to protect your website from cross-site scripting (XSS) attacks. <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Disable:<\/strong> If selected disable, then the module will not block the XSS attacks that occur on the website.<\/li>\n\n\n\n<li><strong>Enable with page sanitization: <\/strong>If a cross-site scripting attack is detected, then the module will sanitize the page and then render.<\/li>\n\n\n\n<li><strong>Enable with prevent rendering of page:<\/strong> If a cross-site scripting attack is detected, then the module will prevent rendering of the page.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Click-jack Protection<\/strong><\/h4>\n\n\n\n<p>The option lets you tell the browser whether you want to allow your site to frame or not. Defend your site against attacks like clickjacking by preventing a browser from framing your site.<\/p>\n\n\n\n<p><strong>Content Sniffing<\/strong><\/p>\n\n\n\n<p>Stop a browser from trying to MIME-sniff the content type and force it to stick with the declared content type.<\/p>\n\n\n\n<p><strong>HTTP Strict Transport Security (HSTS)<\/strong><\/p>\n\n\n\n<p>The HSTS header enforces the use of HTTPS only on your site and strengthens your implementation of TLS.<\/p>\n\n\n\n<p><strong>HSTS Max Age<\/strong><\/p>\n\n\n\n<p>In this field, you need to specify the time (in seconds). It tells a browser to enable HSTS for that exact domain or subdomain, and to remember it for a given number of seconds.<\/p>\n\n\n\n<p><strong>Referrer policy<\/strong><\/p>\n\n\n\n<p>This header allows a website to control how much information the browser includes with navigations away from a document and should be set by all sites.<\/p>\n\n\n\n<p><strong>Permission Policy<\/strong><\/p>\n\n\n\n<p>This header allows you to control which features and APIs can be used in the browser.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Certificate Transparency<\/strong><\/h4>\n\n\n\n<p>This header allows sites to opt in to reporting and or enforcement of Certificate Transparency requirements to prevent the use of misissued certificates for that site from going unnoticed.&nbsp;<\/p>\n\n\n\n<p><strong>CT Max Age<\/strong><\/p>\n\n\n\n<p>Specify the number of seconds after the reception of the Expect-CT header field during which the user agent should regard the host of the received message as a Known Expect-CT host.<\/p>\n\n\n\n<p><strong>CT Enforce<\/strong><\/p>\n\n\n\n<p>The header Signals to the user agent that compliance with the Certificate Transparency policy should be enforced (rather than only reporting compliance). <\/p>\n\n\n\n<p>And the user agent should refuse future connections that violate its Certificate Transparency policy.<\/p>\n\n\n\n<p><strong>CT Report URI<\/strong><\/p>\n\n\n\n<p>Specify the URI where the user agent should report Expect-CT failures.<\/p>\n\n\n\n<p>You can scan your website on <a href=\"https:\/\/securityheaders.com\/\">https:\/\/securityheaders.com\/<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1200\" height=\"536\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/8-1-1200x536.jpg\" alt=\"8-1\" class=\"wp-image-314979\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/8-1-1200x536.jpg 1200w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/8-1-300x134.jpg 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/8-1-250x112.jpg 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/8-1-768x343.jpg 768w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/8-1-604x270.jpg 604w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/8-1.jpg 1279w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1200\" height=\"583\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/07\/image-129-1200x583.png\" alt=\"image-129\" class=\"wp-image-391597\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/07\/image-129-1200x583.png 1200w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/07\/image-129-300x146.png 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/07\/image-129-250x121.png 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/07\/image-129-768x373.png 768w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/07\/image-129.png 1282w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>In the above two screenshots, you can review the security of your website before and after enabling the security headers.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>HTTP Authentication<\/strong><\/h4>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1200\" height=\"495\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image3-1200x495.webp\" alt=\"module configuration\" class=\"wp-image-514809\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image3-1200x495.webp 1200w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image3-300x124.webp 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image3-250x103.webp 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image3-768x317.webp 768w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image3-1536x634.webp 1536w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image3.webp 1635w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>Add an additional layer of security to the webstore with HTTP authentication. Under HTTP Authentication, the admin needs to specify username and password for back office and front office login.<\/p>\n\n\n\n<p>When someone tries to log in to the admin&#8217;s back office, a pop-up window appears where they need to specify the username and password to log in.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"863\" height=\"291\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/4-1.jpg\" alt=\"4-1\" class=\"wp-image-314813\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/4-1.jpg 863w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/4-1-300x101.jpg 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/4-1-250x84.jpg 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/4-1-768x259.jpg 768w\" sizes=\"(max-width: 863px) 100vw, 863px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>Similarly, when a customer tries to log in to the Prestashop store, a pop window appears where a customer needs <meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\">to specify the username and password to log in.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"855\" height=\"291\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/5.jpg\" alt=\"5\" class=\"wp-image-314815\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/5.jpg 855w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/5-300x102.jpg 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/5-250x85.jpg 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/5-768x261.jpg 768w\" sizes=\"(max-width: 855px) 100vw, 855px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2-Step Verification<\/strong><\/h4>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1200\" height=\"594\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image4-1200x594.webp\" alt=\"2-step-verification-configuration\" class=\"wp-image-514810\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image4-1200x594.webp 1200w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image4-300x149.webp 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image4-250x124.webp 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image4-768x380.webp 768w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image4-1536x761.webp 1536w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image4.webp 1631w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>Prestashop Security Suite extension facilitates the 2-factor authentication process for the admin. The store owner can use <meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\">2-factor authentication to protect his back office from unauthorized access.<\/p>\n\n\n\n<p>Admin needs to download the two-factor authentication app like Google Authenticator, Microsoft Authenticator, or any app that supports the TOTP algorithm.<\/p>\n\n\n\n<p>Admin needs to open the app and scan the QR code to receive the code on their phone.<\/p>\n\n\n\n<p>Once received, the admin needs to enter it in the code field to verify that 2-step verification is configured successfully.<\/p>\n\n\n\n<p>After successful verification, the code field gets disabled.<\/p>\n\n\n\n<p>Next time, when the admin tries to log in to the back office, an additional field will appear where he needs to specify the verification code that appears in the authenticator app.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"664\" height=\"625\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image-1-1.png\" alt=\"image-1-1\" class=\"wp-image-318129\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image-1-1.png 664w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image-1-1-300x282.png 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image-1-1-250x235.png 250w\" sizes=\"(max-width: 664px) 100vw, 664px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>If the admin enables the 2-step verification feature from his end then the other employees can log in to the back office without entering the valid authentication code.<\/p>\n\n\n\n<p>Unless employees have configured their own 2FA settings.<\/p>\n\n\n\n<p><strong>NOTE:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>If admin\u2019s device is not accessible, then the admin can use a 2-FA recovery code to log in. To display 2-FA authentication code field on the back office login page, you must have to add both custom hooks specified previously in this blog.<\/strong><\/li>\n\n\n\n<li><strong>Employees can individually configure and manage their own 2FA Settings<\/strong> <strong>according to their preferences and security requirements<\/strong><\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Web Application Firewall<\/strong><\/h4>\n\n\n\n<p>Web Application Firewall helps you protect your website from attacks such as cross-site-scripting (XSS), SQL, Shell, and HTML injection.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1200\" height=\"584\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image5-1200x584.webp\" alt=\"module configuration\" class=\"wp-image-514811\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image5-1200x584.webp 1200w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image5-300x146.webp 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image5-250x122.webp 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image5-768x374.webp 768w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image5-1536x747.webp 1536w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image5.webp 1632w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p><strong>Protect SQL Injection<\/strong> &#8211; Enable this field to protect your website from malicious SQL statements inserted into an entry field for execution.<\/p>\n\n\n\n<p><strong>Protect XSS Injection<\/strong> &#8211; Protect your website from attackers who inject client-side scripts into web pages viewed by other users.<\/p>\n\n\n\n<p><strong>Log vulnerable requests<\/strong> &#8211; This option lets you log the details of attacks on your website. Also, you can choose to delete or download the log.<\/p>\n\n\n\n<p><strong>Protect SHELL Injection<\/strong> &#8211; <meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\">Enable this field to protect your website from attackers trying to execute arbitrary system commands on the attacked party&#8217;s host operating system.<\/p>\n\n\n\n<p><strong>Protect HTML Injection<\/strong> &#8211; Enable <meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\">this field to protect your website from the injection that enables the attacker to send a malicious HTML page to an end-user.<\/p>\n\n\n\n<p><strong>Google Re-Captcha Site Key<\/strong> &#8211; Add Google reCAPTCHA to your website pages for verification of any suspicious activity.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Exclude IP&#8217;s<\/h4>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1200\" height=\"347\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image6-1200x347.webp\" alt=\"module-configuration\" class=\"wp-image-514813\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image6-1200x347.webp 1200w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image6-300x87.webp 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image6-250x72.webp 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image6-768x222.webp 768w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image6-1536x444.webp 1536w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/12\/image6.webp 1627w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>Exclude Two-Factor Authentication (2FA) for Specific IPs.<\/p>\n\n\n\n<p>This was all about Prestashop Security Suite Module. I hope this document will help you in checking the functionality of the module in a better way. <\/p>\n\n\n\n<p>Also, do let us know about your views in the comments.<\/p>\n\n\n\n<div class=\"wk-index-wrap\"><div class=\"block-wrap\">\n<h3 class=\"wp-block-heading index-title\">Support<\/h3>\n<\/div><\/div>\n\n\n\n<p><meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\">For any kind of technical assistance or query, please&nbsp;<a href=\"https:\/\/webkul.uvdesk.com\/en\/customer\/create-ticket\/\">raise a ticket<\/a>&nbsp;or send us a mail at&nbsp;<strong>support@webkul.com<\/strong><\/p>\n\n\n\n<p><meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\">Also, please explore our <a href=\"https:\/\/webkul.com\/prestashop-development\/\">Prestashop development services<\/a> and vast range of quality <a href=\"https:\/\/store.webkul.com\/PrestaShop-Extensions.html\">Prestashop addons<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protect your website from hacker attacks and malicious activities with Prestashop Security Suite Extension. Two-factor authentication to add an extra level of protection to your admin panel. Ensure protection against SQL, cross-site scripting (XSS), Shell, and HTML injection attacks with Web Application Firewall. Note: Prestashop Security Suite module is compatible with PrestaShop multi-store feature. In <a href=\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":165,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-314741","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Prestashop Security Suite | Prevent Hacker and Malicious Attacks<\/title>\n<meta name=\"description\" content=\"Shield your Prestashop site from hacker attacks and malicious threats with Prestashop Security Suite Extension.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prestashop Security Suite | Prevent Hacker and Malicious Attacks\" \/>\n<meta property=\"og:description\" content=\"Shield your Prestashop site from hacker attacks and malicious threats with Prestashop Security Suite Extension.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Webkul Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webkul\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-14T15:24:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T07:02:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5-1200x334.png\" \/>\n<meta name=\"author\" content=\"Ashish Sehgal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webkul\" \/>\n<meta name=\"twitter:site\" content=\"@webkul\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ashish Sehgal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/\"},\"author\":{\"name\":\"Ashish Sehgal\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/adc5483234a0096b5eba2c30924f652d\"},\"headline\":\"Prestashop Security Suite {User-Guide}\",\"datePublished\":\"2021-12-14T15:24:08+00:00\",\"dateModified\":\"2026-01-27T07:02:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/\"},\"wordCount\":1501,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/webkul.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5-1200x334.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/\",\"url\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/\",\"name\":\"Prestashop Security Suite | Prevent Hacker and Malicious Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/webkul.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5-1200x334.png\",\"datePublished\":\"2021-12-14T15:24:08+00:00\",\"dateModified\":\"2026-01-27T07:02:01+00:00\",\"description\":\"Shield your Prestashop site from hacker attacks and malicious threats with Prestashop Security Suite Extension.\",\"breadcrumb\":{\"@id\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#primaryimage\",\"url\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5.png\",\"contentUrl\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5.png\",\"width\":1284,\"height\":357},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/webkul.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prestashop Security Suite {User-Guide}\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webkul.com\/blog\/#website\",\"url\":\"https:\/\/webkul.com\/blog\/\",\"name\":\"Webkul Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/webkul.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webkul.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/webkul.com\/blog\/#organization\",\"name\":\"WebKul Software Private Limited\",\"url\":\"https:\/\/webkul.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png\",\"contentUrl\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png\",\"width\":380,\"height\":380,\"caption\":\"WebKul Software Private Limited\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webkul\/\",\"https:\/\/x.com\/webkul\",\"https:\/\/www.instagram.com\/webkul\/\",\"https:\/\/www.linkedin.com\/company\/webkul\",\"https:\/\/www.youtube.com\/user\/webkul\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/adc5483234a0096b5eba2c30924f652d\",\"name\":\"Ashish Sehgal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43aabebe0f1864b7173421f8f44f62fef06c07313c7f8c03735ee4b9bf377e6e?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43aabebe0f1864b7173421f8f44f62fef06c07313c7f8c03735ee4b9bf377e6e?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g\",\"caption\":\"Ashish Sehgal\"},\"description\":\"Ashish Sehgal is a Analyst with deep expertise in the PrestaShop platform offers strategic insights for e-commerce success. With a deep understanding of open-source platforms, he ensures tailored solutions. A skilled analyst, providing unique strategies for online businesses.\",\"url\":\"https:\/\/webkul.com\/blog\/author\/ashishsehgal-magento190\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prestashop Security Suite | Prevent Hacker and Malicious Attacks","description":"Shield your Prestashop site from hacker attacks and malicious threats with Prestashop Security Suite Extension.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/","og_locale":"en_US","og_type":"article","og_title":"Prestashop Security Suite | Prevent Hacker and Malicious Attacks","og_description":"Shield your Prestashop site from hacker attacks and malicious threats with Prestashop Security Suite Extension.","og_url":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/","og_site_name":"Webkul Blog","article_publisher":"https:\/\/www.facebook.com\/webkul\/","article_published_time":"2021-12-14T15:24:08+00:00","article_modified_time":"2026-01-27T07:02:01+00:00","og_image":[{"url":"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5-1200x334.png","type":"","width":"","height":""}],"author":"Ashish Sehgal","twitter_card":"summary_large_image","twitter_creator":"@webkul","twitter_site":"@webkul","twitter_misc":{"Written by":"Ashish Sehgal","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#article","isPartOf":{"@id":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/"},"author":{"name":"Ashish Sehgal","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/adc5483234a0096b5eba2c30924f652d"},"headline":"Prestashop Security Suite {User-Guide}","datePublished":"2021-12-14T15:24:08+00:00","dateModified":"2026-01-27T07:02:01+00:00","mainEntityOfPage":{"@id":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/"},"wordCount":1501,"commentCount":0,"publisher":{"@id":"https:\/\/webkul.com\/blog\/#organization"},"image":{"@id":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5-1200x334.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/","url":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/","name":"Prestashop Security Suite | Prevent Hacker and Malicious Attacks","isPartOf":{"@id":"https:\/\/webkul.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#primaryimage"},"image":{"@id":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5-1200x334.png","datePublished":"2021-12-14T15:24:08+00:00","dateModified":"2026-01-27T07:02:01+00:00","description":"Shield your Prestashop site from hacker attacks and malicious threats with Prestashop Security Suite Extension.","breadcrumb":{"@id":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#primaryimage","url":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5.png","contentUrl":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/10\/1-5.png","width":1284,"height":357},{"@type":"BreadcrumbList","@id":"https:\/\/webkul.com\/blog\/prestashop-security-suite-user-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/webkul.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Prestashop Security Suite {User-Guide}"}]},{"@type":"WebSite","@id":"https:\/\/webkul.com\/blog\/#website","url":"https:\/\/webkul.com\/blog\/","name":"Webkul Blog","description":"","publisher":{"@id":"https:\/\/webkul.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webkul.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/webkul.com\/blog\/#organization","name":"WebKul Software Private Limited","url":"https:\/\/webkul.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png","contentUrl":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png","width":380,"height":380,"caption":"WebKul Software Private Limited"},"image":{"@id":"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webkul\/","https:\/\/x.com\/webkul","https:\/\/www.instagram.com\/webkul\/","https:\/\/www.linkedin.com\/company\/webkul","https:\/\/www.youtube.com\/user\/webkul\/"]},{"@type":"Person","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/adc5483234a0096b5eba2c30924f652d","name":"Ashish Sehgal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43aabebe0f1864b7173421f8f44f62fef06c07313c7f8c03735ee4b9bf377e6e?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43aabebe0f1864b7173421f8f44f62fef06c07313c7f8c03735ee4b9bf377e6e?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g","caption":"Ashish Sehgal"},"description":"Ashish Sehgal is a Analyst with deep expertise in the PrestaShop platform offers strategic insights for e-commerce success. With a deep understanding of open-source platforms, he ensures tailored solutions. A skilled analyst, providing unique strategies for online businesses.","url":"https:\/\/webkul.com\/blog\/author\/ashishsehgal-magento190\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/314741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/comments?post=314741"}],"version-history":[{"count":54,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/314741\/revisions"}],"predecessor-version":[{"id":523623,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/314741\/revisions\/523623"}],"wp:attachment":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/media?parent=314741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/categories?post=314741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/tags?post=314741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}