Protect your Joomla 3 admin dashboard from Brute Force logins

The Admin Tools Joomla component can be used to protect your Joomla website against brute force attacks. In a snutshell, a brute force attack is when hackers repeatedly guess your Joomla password over and over again until they get it right and login to your dashboard.

Enabling the password-protect administrator feature within Admin Tools adds another layer of security to your Joomla dashboard, making it even harder for hackers to guess your secure password and get into your dashboard.

  1. Log into your Joomla 3 dashboard
  2. If you haven’t already, install the Admin Tools component
  3. In the top menu of your Joomla Dashboard, click Components and then click Admin Tools
  4. Find and click on the button that says Password-protect Administrator
  5. Enter a Username, enter a Password, and then Retype password.
  6. Click the Password-protect button.

    Password-proect Administrator popup

    As soon as you click the Password-protect button, your admin dashboard will be password protected. You will then be required to type in the username and password that you just setup.

    Your Joomla dashboard is now protected from brute force login attempts with an additional layer of security. If there are any bots attempting to guess your passwords, they will now need to guess two sets of username and passwords, making the task much more infeasible.

2 thoughts on “Protect your Joomla 3 admin dashboard from Brute Force logins

  1. It will not solve the problem. When the access is blocked, how can a person can log in to the site?


    You need to provide solution via c panel or some other solution



    1. Hello Sid,

      Thank you for your question. The official Admin Tools page states you can “gain access to your site’s administrator back-end is to remove the .htaccess and .htpasswd files from your administrator directory using an FTP application or the File Manager.”

      You do not need to login to the Joomla Dashboard to use FTP or File manager.
      If you have any further questions, feel free to post them below.
      Thank you,


Was this article helpful? Let us know!