Back

Installing & Uninstalling the SiteLock Wordpress Plugin

Installation Instructions

SiteLock Security can be installed in two ways:

  • Via the WordPress Admin Plugin Hub
  • Manually using a ZIP file

✅ Method 1: Install via WordPress Admin Plugin Hub

  1. Log in to your WordPress admin dashboard.
  2. Navigate to Plugins > Add New.
  3. In the search bar, type “SiteLock Security”.
  4. Locate the plugin in the search results and click Install Now.
  5. Once installation is complete, click Activate to enable the plugin.

⠀💡 After activation, follow the on-screen instructions to configure SiteLock and connect your account.

📦 Method 2: Manual Installation via ZIP File

  1. Download the plugin ZIP file from the official WordPress Plugin Directory.
  2. Log in to your WordPress admin dashboard.
  3. Go to Plugins > Add New, then click Upload Plugin at the top of the page.
  4. Click Choose File, select the downloaded ZIP file, and click Install Now.
  5. Once installed, click Activate Plugin.

⠀🔐 Ensure you have an active SiteLock subscription to take full advantage of the plugin’s features.

Uninstallation Instructions

If you need to remove the SiteLock Security plugin, follow these steps:

⚠️ We recommend backing up your site before making any manual changes to your database or file system.

🧭 Standard Uninstallation via WordPress Admin

  1. Log in to your WordPress admin dashboard.
  2. Navigate to Plugins > Installed Plugins.
  3. Locate SiteLock Security in the list.
  4. Click Deactivate to disable the plugin.
  5. Once deactivated, click Delete to remove it from your site.

💬 Need Help?

If you encounter any issues during installation or removal, our support team is here to help. If you have an active SiteLock subscription, please contact us directly via phone or chat so we can assist you. Otherwise, please visit the Wordpress plugin support page: https://wordpress.org/support/plugin/sitelock/

Reduce your website security risks

Get started with SiteLock today

SiteLock quickly removes threats, restores functionality, and helps prevent future attacks, all backed by continuous monitoring and support.