Table of Contents
|
|
- Luke Jefferson
- 5 years ago
- Views:
Transcription
1
2 Table of Contents Introduction License What is Gophish? Installation Getting Started Documentation Changing User Settings Groups Templates Landing Pages Sending Profiles Campaigns Using the API Reporting Building Your First Campaign Introducing the Morning Catch Corporation Creating the Sending Profile Importing Groups Creating the Template Creating the Landing Page Launching the Campaign Template Reference Additional References
3 Introduction Welcome to Gophish! Current Version: 0.3-dev Gophish is a powerful, easy-to-use, open-source phishing toolkit meant to help pentesters and businesses conduct real-world phishing simulations. This user guide introduces Gophish and shows how to use the software, building a complete campaign from start to finish. 3
4 License License Gophish - Open-Source Phishing Framework The MIT License (MIT) Copyright (c) Jordan Wright Permission is hereby granted, free of charge, to any person obtaining a copy of this software ("Gophish Community Edition") and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. 4
5 What is Gophish? What is Gophish? What is Gophish? Gophish is a phishing framework that makes the simulation of real-world phishing attacks dead-simple. The idea behind gophish is simple make industry-grade phishing training available to everyone. Available in this case means two things Affordable Gophish is open-source software that is completely free for anyone to use. Accessible Gophish is written in the Go programming language. This has the benefit that gophish releases are compiled binaries with no dependencies. In a nutshell, this makes installation as simple as "download and run"! 5
6 Installation Installation Installing Gophish Using Pre-Built Binaries Gophish is provided as a pre-built binary for most operating systems. With this being the case, installation is as simple as downloading the ZIP file containing the binary that is built for your OS and extracting the contents. Installing Gophish from Source One of the major benefits of having written gophish in the Go programming language is that it is extremely simple to build from source. All you will need is the Go language and a C compiler (such as gcc). To install gophish, simply run go get github.com/gophish/gophish. This downloads gophish into your $GOPATH. Next, navigate to $GOPATH/src/github.com/gophish/gophish and run the command go build. This builds a gophish binary in the current directory. Understanding the config.json There are some settings that are configurable via a file called config.json, located in the gophish root directory. Here are some of the options that you can set to your preferences: Key Value (Default) Description admin_server.listen_url :3333 IP/Port of gophish admin server admin_server.use_tls false Use TLS for admin server? admin_server.cert_path example.crt Path to SSL Cert admin_server.key_path example.key Path to SSL Private Key phish_server.listen_url :80 IP/Port of the phishing server - this is where landing pages are hosted. Exposing Gophish to the Internet 6
7 Installation By default, the phish_server.listen_url is configured to listen on all interfaces. This means that if the host Gophish is running on is exposed to the Internet (such as running on a VPS), the phishing server will be exposed to the Internet. If you also want the admin server to be accessible over the Internet, you will need to change the entry for the admin_server.listen_url to :3333. Creating SSL Certificate and Private Keys Note: As of 0.3, Gophish will by default create a self-signed certificate for the admin panel, so this steps would be optional. It s a good idea to have the admin server available over HTTPS. While automatic SSL cert/key generation will be included in a later release, for now let s take a look at how we can leverage openssl to generate our cert and key for use with gophish (this assumes you already have openssl installed!) We can start the certificate and key generation process with the following command: openssl req -newkey rsa:2048 -nodes -keyout gophish.key -x509 -days 365 -out gophish.c rt Then, all we have to do is answer the CSR process that asks for details such as country, state, etc. Since this is a local self-signed cert, these won t matter too much to us. This creates two files, gophish.key and gophish.crt. After moving these files into the gophish root directory (in the same folder as config.json), we can have the following in our config.json file: "admin_server" : { "listen_url" : " :3333", "use_tls" : true, "cert_path" : "gophish.crt", "key_path" : "gophish.key" } Now when we launch gophish, you ll connect to the admin server over HTTPS and accept the self-signed certificate warning. Using MySQL 7
8 Installation The default database in Gophish is SQLite. This is perfectly functional, but some environments may benefit from leveraging a more robust database such as MySQL. Support for Mysql has been added as of 0.3-dev. To setup Gophish for Mysql, a couple extra steps are needed. Update config.json First, change the entries in config.json to match your deployment: Example: "db_name" : "mysql", "db_path" : "root:@(:3306)/gophish?charset=utf8&parsetime=true&loc=local", The format for the db_path entry is username:password@(host:port)/database? charset=utf8&parsetime=true&loc=local. Create the Database The last step you'll need to do to leverage Mysql is to create the gophish database. To do this, log into mysql and run the command CREATE DATABASE gophish;. After that, you'll be good to go! Running Gophish Now that you have gophish installed, you re ready to run the software. To launch gophish, simply open a command shell and navigate to the directory the gophish binary is located. Then, execute the gophish binary. You will see some informational output showing both the admin and phishing web servers starting up, as well as the database being created. This output will tell you the port numbers you can use to connect to the web interfaces. gophish@gophish.dev:~/src/github.com/gophish/gophish$./gophish 2016/01/10 23:13:42 worker.go:34: Background Worker Started Successfully - Waiting fo r Campaigns 2016/01/10 23:13:42 models.go:64: Database not found... creating db at gophish.db 2016/01/10 23:13:42 gophish.go:49: Admin server started at /01/10 23:13:42 gophish.go:51: Phishing server started at 8
9 Installation Running Gophish as a Service Linux Distributions To run Gophish as a service in Linux distributions, you will need to setup a service script. You can refer to this Github issue for an example implementation. Windows To run Gophish as a service in Windows, you can use nssm. 9
10 Getting Started Getting Started Running Gophish Now that you have gophish installed, you re ready to run the software. To launch gophish, simply open a command shell and navigate to the directory the gophish binary is located. Then, execute the gophish binary. You will see some informational output showing both the admin and phishing web servers starting up, as well as the database being created. This output will tell you the port numbers you can use to connect to the web interfaces. gophish@gophish.dev:~/src/github.com/gophish/gophish$./gophish 2016/01/10 23:13:42 worker.go:34: Background Worker Started Successfully - Waiting fo r Campaigns 2016/01/10 23:13:42 models.go:64: Database not found... creating db at gophish.db 2016/01/10 23:13:42 gophish.go:49: Admin server started at /01/10 23:13:42 gophish.go:51: Phishing server started at Logging In After Gophish starts up, you can open a browser and navigate to :3333 to reach the login page. The default credentials are: Username: admin Password: gophish 10
11 Getting Started 11
12 Documentation 12
13 Changing User Settings Changing User Settings Registering a New User By navigating to your_site/register you can register a new user: Logging in When you first launch gophish, you will be taken to the login page. The default credentials are admin:gophish. Once logged in, it's encouraged to change your password. Changing Your Password & Updating Settings 13
14 Changing User Settings By clicking the "Settings" tab, you will navigate to the settings page. This page allows you to change your password, as well as update your API key. To change your password, simply submit your current password, as well as the new password you would like to use, and click "Save". Any errors will be indicated on the page. This page also provides the ability to reset your API key, which is strongly recommended when logging in for the first time. To reset your API key, simply click the "Reset" button next to the existing API key. You might need to refresh the page before continuing to use gophish. This should be fixed soon. 14
15 Groups Groups Gophish lets you manage groups of users targeted in campaigns. Creating Groups To create a group, first navigate to the "Users & Groups" page in the navigation menu and click the button. You will see the following dialog appear: To add a group, you need to specify a unique group name, as well as at least one recipient. Adding Users to the Group You can add the users to the group in two ways: 15
16 Groups Manually Adding Users To add users manually, fill in the text boxes for "First Name", "Last Name", " ", and "Position" and click the "Add" button. Bulk Uploading Users Adding users manually can be a pain. To fix this, Gophish lets you upload users in bulk from a CSV file. The CSV format gophish expects has the following header values: First Name Last Name Position To upload a CSV with user information, click the "Bulk Import Users" button and select the CSV you want to upload. Users are then uploaded and displayed in the dialog. To save the group, click "Save changes". 16
17 Templates Templates A "Template" is the content of the s that are sent to targets. They can be imported from an existing , or created from scratch. They also support sending attachments. Additionally, templates can contain tracking images so that gophish knows when the user opens the . Creating Templates To create a template, first navigate to the Templates page and click the New Template button. Using the HTML Editor 17
18 Templates A powerful feature of Gophish is the HTML editor. To switch between the HTML source code and the visual view, click the "Source" button. This is helpful to ensure that the received by the user is pixel-perfect. Importing a Site Gophish supports the ability to import an from the raw content. To do this, click the "Import " button and paste in the original content. This content is usually found through the "View Original" feature of many mail clients: 18
19 Templates 19
20 Landing Pages Landing Pages Landing pages are the actual HTML pages that are returned to the users when they click the phishing links they receive. Landing pages support templating, capturing credentials, and redirecting users to another website after they submit their credentials. To create a landing page, click on the "Landing Pages" entry in the sidebar and click the "New Page" button. The landing page modal supports the same HTML WYSIWYG editor shown in the Templates section. 20
21 Landing Pages Importing a Site From URL A powerful feature of Gophish is the ability to import a site from a URL. To import a site, click the "Import Site" button. After entering the URL and clicking "Import", you should see the HTML of the URL populated into the editor. Capturing Credentials Gophish makes it easy to capture credentials from the landing page. To capture credentials, simply select the checkbox that says "Capture Submitted Data". Note: Credentials are stored in plaintext. If you don't want to capture passwords, don't select the "Capture Passwords" checkbox. Gophish will still capture other text fields, such as usernames. Redirecting Users Red team assessments are all about preventing suspicion. To prevent users from becoming suspicious after entering credentials, you may want to redirect them to the original URL. Gophish makes it easy to redirect users after they submit credentials. To redirect users, enter a URL in the "Redirect To:" text field that appears after the "Capture Submitted Data" checkbox is selected. Note: Make sure to include the full URL (including the scheme such as or Otherwise, browsers may interpret the URL as being relative to the Gophish URL. Static Assets 21
22 Landing Pages There may be times that you want to store assets such as HTML pages, CSS/JS resources or other static files. To use these in Gophish, just move them under the static/endpoint directory. You can then reference them using the URL http[s]://phishing_server/static/filename. For more background, see this issue. 22
23 Sending Profiles Sending Profiles To send s, Gophish requires you to configure SMTP relay details called "Sending Profiles". To setup a sending profile, click the "Sending Profiles" navigation entry in the sidebar and click the "New Profile" button. Note: If you're looking for a good testing SMTP server, I've had good luck with Mailhog. It's important to make sure that your "From" address is a valid address format. Additionally, make sure you setup your "Host" in the full host:port format. To test your SMTP configuration, you can click the "Send Test " button: 23
24 Sending Profiles After entering the recipient details and clicking "Send", you should see a message indicating if the was sent successfully. 24
25 Campaigns Campaigns Gophish is centered around launching campaigns. This involves sending s to one or more groups and monitoring for opened s, clicked links, or submitted credentials. Launching a Campaign To configure and launch a campaign, click the "Campaigns" entry in the navigation sidebar. Most of the fields should be self-explanatory. Gophish has autocompletion setup for many of the fields that are selecting from existing objects (such as landing pages, templates, etc.). The URL field is what populates the {{.URL}} template value. This should be a URL or IP address that points to the Gophish phishing server and is reachable by the recipient. 25
26 Campaigns Since version 0.2, Gophish supports scheduling campaigns, making it easy to plan campaigns in advance. After you have the campaign configuration ready to go, click the "Launch Campaign" button, click through the confirmation message, and you're good to go! Viewing Campaign Results When a campaign is launched, you are automatically redirected to the campaign results screen: On the results page, you will see overview information on the campaign status as well as detailed results for each target. 26
27 Campaigns Exporting Campaign Results To export campaign results in CSV format, click the "Export CSV" format and select the type of results you want to export: Results - The current status for each target in the campaign. Contains the following fields: id, , first_name, last_name, position, status, ip, latitude, longitude Raw Events - Contains a stream of events as they occurred during the campaign. Completing a Campaign To complete a campaign, click the "Complete" button and confirm that you want to mark the campaign as completed. Deleting a Campaign To delete a campaign, click the "Delete" button and confirm that you want to delete the campaign. Note: This cannot be undone, so be careful when deleting a campaign! Viewing Result Details Gophish makes it easy to view the campaign results in a timeline format. To view the timeline for each recipient, expand the row with the recipient's name. 27
28 Campaigns 28
29 Using the API Using the API Gophish was designed to be API-first. This means that the UI is just a wrapper around a powerful JSON RESTful API. You can find our API documentation here. Python API Client The Gophish team maintains an official Python API client for easily interacting with the API. 29
30 Reporting Reporting Reporting is an important part of any Gophish campaign. To help facilitate generating reports, there are a few options you could consider: Using the Web UI The Gophish dashboard gives a quick overview showing the results for a particular campaign: In addition to providing the results in the dashboard, you have the option to export the raw logs from Gophish using the "Export CSV" button at the top of the page. You could then parse these CSV files using other software such as Excel or Google Sheets. Using GoReport Gophish has an incredible community that has built tools around the API to help make reporting easy. A great example of this is called GoReport. 30
31 Reporting GoReport, created by Github provides a really simple, clean way to generate reports for a given Gophish campaign. You can use this script to generate reports for the campaign in either CSV or DOCX format. Leveraging the API If you are wanting to make custom reports, perhaps for one or more campaigns, we strongly suggest you consider leveraging the extensive Gophish API. We have a Python API client that can help facilitate getting the data you need from the API. You can find the documentation for the Python API client here. 31
32 Introducing the Morning Catch Corporation Introducing the Morning Catch Corporation For this documentation, we will step through the process of setting up users, templates, and a full campaign from scratch for a fake company called Morning Catch. In this case, we are assuming the role of a security administrator of Morning Catch and have been given the authorization to perform this training. As a note, this fake company is based on a great VM used specifically for testing phishing frameworks that you can download here if you're interested. The fake company will consist of 3 users: Richard Bourne, Boyd Jenius, and Haiti Moreo. 32
33 Creating the Sending Profile Creating the Sending Profile Creating a sending profile is easy for this campaign. Navigate to the "Sending Profiles" page and click "New Profile". For my campaign, I'll be sending s from Boyd Jenius, the system administrator. I'll use his name and address in the "From" field. I have my Morning Catch VM listening for inbound on :25 so I will use that for my "Host". Remember: Always specify the port number when configuring a sending profile! Use the host:port format when specifying the Host. You should wind up with something that looks like this: 33
34 Creating the Sending Profile If you want, you can send a test to another recipient on the morningcatch.ph domain to ensure s are relayed correctly. After the settings are specified, click "Save Profile". 34
35 Importing Groups Importing Groups The first thing we need to do before we can launch a campaign is to figure out who to target. There are a ton of ways to gather/generate addresses for potential targets. You can either harvest addresses from public information using OSINT if you are aiming to simulate a realistic scenario. Now that we have our list of users, let s import them into gophish. To add a group, navigate to the Users & Groups page and click New Group : Since we are performing phishing simulation for Morning Catch, we can call our group Morning Catch Employees. Now we have to add the members. There are two ways to do this: Add each member s details one at a time using the form inputs Bulk import the group from a CSV file To save time (and typing!) let s go with the CSV option. 35
36 Importing Groups Importing from CSV The CSV format gophish expects has the following header values: First Name Last Name Position So, the CSV for Morning Catch would look like the following: First Name,Last Name,Position, Boyd,Jenius,Systems Haiti,Moreo,Sales & After uploading this CSV using the Bulk Import Users button, we see that our members were added automatically: After clicking Save changes, we see a confirmation message that our group was created. Tip: If you don t see the group show up right away, refresh the page and it should appear in the table. 36
37 Importing Groups 37
38 Creating the Template Creating the Template To create the template we will use for our Morning Catch campaign, first navigate to the " Templates" page and click the "New Template" button. We notice that Morning Catch comes with a webmail portal. Let s craft a simple template that suggests the user needs to go reset their password. Obviously, this is a simple scenario, and by using the "Import " feature, you can import existing s directly into gophish for a greater effect. We'll use the following subject line: Password Reset for {{. }} 38
39 Creating the Template You'll notice we used the {{. }} template value. This will populate with the target's address when the s are sent. This is Gophish's way to tailor s to individuals to increase the chance of success. By clicking the "HTML" tab, we will see the editor we can use to create our HTML content: Since our content is pretty simple, we can just click the "Source" button and be taken to the more visual editor, which will be enough for our purposes: Our template will be simple for the sake of demonstration. I'll start by adding the message: {{.FirstName}}, The password for {{. }} has expired. Please reset your password here. Thanks, Morning Catch IT Team 39
40 Creating the Template Speaking of links, now we need to add our phishing link. Highlight the word "here" and click the chain icon in the menu, exposing the "Link" dialog. In this dialog, we'll set the link to {{.URL}}, another template value, so that our link is automatically created and inserted into the . Finally, make sure the "Add Tracking Image" checkbox is checked, and click "Save Template". 40
41 Creating the Landing Page Creating the Landing Page The Morning Catch corporation has a webmail portal that we will clone for our landing page. Start by navigating to the "Landing Pages" page and clicking the "New Page" button. To import a site by URL, click the "Import Site" button. The webmail portal is located at /mail/, so I will use as my import URL. After the import, you'll see the HTML populated into the editor. Clicking the "Source" button shows a preview of the page. 41
42 Creating the Landing Page Finally, we'll capture submitted data and passwords by checking both options, and we'll redirect users to the webmail portal after they submit credentials. Finally, click "Save Page" to save the landing page. 42
43 Launching the Campaign Launching the Campaign Now that we have all the pieces setup, we can launch the campaign! To create a new campaign, navigate to the Campaigns page and click the "New Campaign" button. Most of the settings should be self-explanatory. The only thing to look out for is the URL field. Since the IP address of our Gophish server is , that's what we'll use: Once all the settings filled, click "Launch Campaign" to start sending the s! Viewing the Results 43
44 Launching the Campaign After launching the campaign, you will be automatically redirected to the campaign results page. This will give you a realtime view as s are sent, opened, and links are clicked. Congrats on running your first campaign! 44
45 Template Reference Template Reference The following variables are available in templates and landing pages: Tip: Remember - Templates are case sensitive! Variable Description {{.FirstName}} {{.LastName}} {{.Position}} {{. }} {{.From}} {{.TrackingURL}} The target's first name The target's last name The target's position The target's address The spoofed sender The URL to the tracking handler {{.Tracker}} An alias for <img src=" {{.TrackingUrl}} "/> {{.URL}} The phishing URL 45
46 Additional References Simulated Phishing Educational Guide Github published a comprehensive guide on using Gophish to perform phishing awareness training. The reference, "Simulated Phishing Educational Guide", takes a deep-dive into setting up a production Gophish instance from scratch leveraging Amazon EC2. You can find the full guide here: 46
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
1. License The MIT License (MIT) Copyright (c) 2018 gamedna Ltd Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"),
More informationTWO-FACTOR AUTHENTICATION Version 1.1.0
TWO-FACTOR AUTHENTICATION Version 1.1.0 User Guide for Magento 1.9 Table of Contents 1..................... The MIT License 2.................... About JetRails 2FA 4................. Installing JetRails
More informationgit-pr Release dev2+ng5b0396a
git-pr Release 0.2.1.dev2+ng5b0396a Mar 20, 2017 Contents 1 Table Of Contents 3 1.1 Installation................................................ 3 1.2 Usage...................................................
More informationpage_1a.png page_1b.png page_2.png page_4.png page_5.png PHISHING ADMIN GUIDE
page_1a.png page_1b.png page_2.png page_4.png page_5.png PHISHING ADMIN GUIDE 1 PHISHING RESOURCES 3 INTRODUCTION 3 GETTING STARTED 3 SETTING UP YOUR ACCOUNT 4 Adding Sub-Accounts 4 Adding Target Users
More informationMCAFEE THREAT INTELLIGENCE EXCHANGE RESILIENT THREAT SERVICE INTEGRATION GUIDE V1.0
MCAFEE THREAT INTELLIGENCE EXCHANGE RESILIENT THREAT SERVICE INTEGRATION GUIDE V1.0 Copyright IBM Corporation 2018 Permission is hereby granted, free of charge, to any person obtaining a copy of this software
More informationCheckbox Quick Start Guide
Checkbox 5.0 - Quick Start Guide This How-To Guide will guide you though the process of creating a survey and adding a survey item to a page. Contents: - Log-In - How to create a survey - How to add/change
More informationpuppet-diamond Documentation
puppet-diamond Documentation Release 0.3.0 Ian Dennis Miller Mar 21, 2017 Contents 1 Overview 3 2 Introduction 5 3 User Guide 9 4 About 15 i ii Puppet-Diamond is framework for creating and managing an
More informationGuest Book. The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
License Guest Book Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction,
More informationWeb Manual: Checkbox Surveys March 2014
March 2014 Suite 115, 1665 West Broadway, Vancouver, BC V6J 5A4 T. 1800.665.2262 F. 604.638.2916 www.divisionsbc.ca Table of Contents Getting Started... 3 Survey Checklist... 4 Group & User Management...
More informationRTXAGENDA v Use Manual. A program, free and easy to use, to modify your RT4, RT5 or RT6 phonebook, on PC.
RTXAGENDA v01.08 Use Manual A program, free and easy to use, to modify your RT4, RT5 or RT6 phonebook, on PC. mira308sw 18/04/2013 Summary Introduction... 3 Installation... 3 What it need, how use it...
More informationUser Guide. Version 8.0
User Guide Version 8.0 Contents 1 Getting Started... iii 1.1... About... iii 2 Logging In... 4 2.1... Choosing Security Questions... 4 3 The File Manager... 5 3.1... Uploading a file... 6 3.2... Downloading
More informationSQream Dashboard Version SQream Technologies
SQream Dashboard Version 1.1.0 SQream Technologies 2018-11-06 Table of Contents Overview................................................................................... 1 1. The SQream Dashboard...................................................................
More informationMigration Tool. Migration Tool (Beta) Technical Note
Migration Tool (Beta) Technical Note VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo
More informationWebAnalyzer Plus Getting Started Guide
WebAnalyzer Plus Getting Started Guide www.manageengine.com/web-analytics Contents 1 Introduction 4 2 3 4 5 WebAnalyzer Plus Overview Getting Started System Requirements Installation Starting and Accessing
More informationColgate, WI
Lions International District 27-A2 Technology Chair Lion Bill Meyers W290N9516 Deer Lane, Colgate, WI 53017 262.628.2940 27A2Tech@gmail.com Following is an explanation of the design basic of the free Lions
More informationPHPBasket 4 Administrator Documentation
PHPBasket 4 Please ensure you have the latest version of this document from http://www.phpbasket.com Contents CONTENTS 2 REQUIREMENTS 3 INSTALLATION 4 PREPARATION 4 UPLOAD 4 INSTALLATION 4 ADMINISTRATOR
More informationFirebase PHP SDK. Release
Firebase PHP SDK Release Jul 16, 2016 Contents 1 User Guide 3 1.1 Overview................................................. 3 1.2 Authentication.............................................. 3 1.3 Retrieving
More informationRTXAGENDA v Use Manual. A program, free and easy to use, to modify your RT4 phonebook, on PC.
RTXAGENDA v01.05 Use Manual A program, free and easy to use, to modify your RT4 phonebook, on PC. mira308sw 15/05/2011 Summary Introduction... 3 Installation... 3 What it need, how use it... 3 WARNING...
More informationSpecialty Contractor User Manual. Table of Contents. Specialty Contractor User Manual Version 1 11/16/15
Specialty Contractor User Manual Welcome to the C3 Training Database for Construction Career Collaborative! This software is where you keep track of your employees' training and safety credentials, project
More informationX Generic Event Extension. Peter Hutterer
X Generic Event Extension Peter Hutterer X Generic Event Extension Peter Hutterer X Version 11, Release 7.7 Version 1.0 Copyright 2007 Peter Hutterer Permission is hereby granted, free of charge, to any
More informationPassword Reset PRO INSTALLATION GUIDE
Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. January 2009
More informationGo to the Directory at and click on the Login link.
Welcome to Terra Dotta s Study Abroad Directory! Creating your programs for the directory is a simple task. These instructions will outline how to create, activate and update your program brochures. Logging
More informationabstar Documentation Release Bryan Briney
abstar Documentation Release 0.3.1 Bryan Briney Apr 26, 2018 Contents 1 Getting Started 3 2 Usage 7 3 About 13 4 Related Projects 15 5 Index 17 i ii AbStar is a core component of the Ab[x] Toolkit for
More informationFeed Cache for Umbraco Version 2.0
Feed Cache for Umbraco Version 2.0 Copyright 2010, Ferguson Moriyama Limited. All rights reserved Feed Cache for Umbraco 2.0 Page 1 Introduction... 3 Prerequisites... 3 Requirements... 3 Downloading...
More informationOctober J. Polycom Cloud Services Portal
October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or
More informationSwitching to Sheets from Microsoft Excel Learning Center gsuite.google.com/learning-center
Switching to Sheets from Microsoft Excel 2010 Learning Center gsuite.google.com/learning-center Welcome to Sheets Now that you've switched from Microsoft Excel to G Suite, learn how to use Google Sheets
More informationRECOMIND USER GUIDE 1
RECOMIND USER GUIDE 1 Table of Contents About Recomind 3 1.Email Campaigns 3 1.1New Campaign 3 1.1.1Unique Campaign Name 3 1.1.2Selecting/Uploading Customer DB 8 1.1.3Build/Upload HTML 13 1.1.4Internal
More informationJMP to LSAF Add-in. User Guide v1.1
JMP to LSAF Add-in User Guide v1.1 Table of Contents Terms and Conditions... 3 System Requirements... 3 Installation... 3 Configuration... 4 API Setup... 4 Java Configuration... 5 Logging In... 5 Launching
More informationMoodle. Moodle. Deployment Guide
Moodle Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
More informationEucalyptus User Console Guide
Eucalyptus 3.4.1 User Console Guide 2013-12-11 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...5 Install the Eucalyptus User Console...6 Install on Centos / RHEL 6.3...6 Configure
More informationIBM emessage Version 9 Release 1 February 13, User's Guide
IBM emessage Version 9 Release 1 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 471. This edition applies to version
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationdeepatari Documentation
deepatari Documentation Release Ruben Glatt July 29, 2016 Contents 1 Help 3 1.1 Installation guide............................................. 3 2 API reference 5 2.1 Experiment Classes........................................
More informationGetting Started with the Ed-Fi ODS and Ed-Fi ODS API
Getting Started with the Ed-Fi ODS and Ed-Fi ODS API Ed-Fi ODS and Ed-Fi ODS API Version 2.0 - Technical Preview January 2015 2014-2015 Ed-Fi Alliance, LLC. All rights reserved. Ed-Fi is a registered trademark
More informationSmart Bulk SMS & Voice SMS Marketing Script with 2-Way Messaging. Quick-Start Manual
Mobiketa Smart Bulk SMS & Voice SMS Marketing Script with 2-Way Messaging Quick-Start Manual Overview Mobiketa Is a full-featured Bulk SMS and Voice SMS marketing script that gives you control over your
More informationStorageCraft Cloud Backup
User Guide v1.3 (June 2017) StorageCraft Copyright Declaration StorageCraft ImageManager, StorageCraft ShadowProtect, StorageCraft Cloud, and StorageCraft Cloud Services, together with any associated logos,
More informationOverview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Types...
Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Email Types... 6 Understanding Programs and Campaign Scheduling... 6 Welcome
More informationFB Image Contest. Users Manual
FB Image Contest Users Manual Table of contents Description.. 3 Step by step installation... 5 The administration interface.. 10 Creating a new contest... 13 Creating a Facebook Application.. 19 Adding
More informationStyle Report Enterprise Edition
INTRODUCTION Style Report Enterprise Edition Welcome to Style Report Enterprise Edition! Style Report is a report design and interactive analysis package that allows you to explore, analyze, monitor, report,
More informationBrainCert Enterprise LMS. Learning Management System (LMS) documentation Administrator Guide Version 3.0
BrainCert Enterprise LMS Learning Management System (LMS) documentation Administrator Guide Version 3.0 1 P a g e Table of Contents... 3... 3... 4... 4... 5... 5... 6... 6... 8... 8... 9... 9... 10...
More informationUser Manual. (updated March 27, 2014) Information in this document is subject to change without notice.
User Manual (updated March 27, 2014) Information in this document is subject to change without notice. Copyright 2013-2014, Exacq Technologies, Inc. All rights reserved. Exacq Technologies is a trademark
More informationOracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service
http://docs.oracle.com Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service Configuration Guide 2018 Oracle Corporation. All rights reserved 07-Jun-2018 Contents 1 HIPAA 3 1.0.1 What is HIPAA?
More informationMailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 1.41 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
More informationCLEO VLTrader Made Simple Guide
CLEO VLTrader Made Simple Guide Table of Contents Quick Reference... 3 Miscellaneous Technical Notes... 3 CLEO VLTrader at a Glance... 3 Introduction... 5 Application Page Layout... 5 Preconfigured Hosts...
More informationCircuitPython with Jupyter Notebooks
CircuitPython with Jupyter Notebooks Created by Brent Rubell Last updated on 2018-08-22 04:08:47 PM UTC Guide Contents Guide Contents Overview What's a Jupyter Notebook? The Jupyter Notebook is an open-source
More informationPyCon APAC 2014 Documentation
PyCon APAC 2014 Documentation Release 2014-01-12 Keith Yang July 06, 2014 Contents 1 PyCon APAC 2014 3 1.1 Getting Started.............................................. 3 1.2 Setting up the database..........................................
More informationMail Merge for Gmail v2.0
The Mail Merge with HTML Mail program will help you send personalized email messages in bulk using your Gmail account. What can Mail Merge for Gmail do? You can send messages in rich HTML, the message
More informationConcord Print2Fax. Complete User Guide. Table of Contents. Version 3.0. Concord Technologies
Concord Print2Fax Complete User Guide Table of Contents Version 3.0 Concord Technologies 2018 1 Concord Technologies concordfax.com premiumsupport@concordfax.com Copyright 2017 CONCORD Technologies. All
More informationGetting Started Guide
Getting Started Guide for education accounts Setup Manual Edition 7 Last updated: September 15th, 2016 Note: Click on File and select Make a copy to save this to your Google Drive, or select Print, to
More informationState Association Website User Manual. (For Website Administrators)
State Association Website User Manual (For Website Administrators) BASICS There have been some basic changes to the layout of the new NAMSS website. Three major changes have occurred: 1. Login Process
More informationIntegrate Microsoft Office 365. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect
More informationEukleia LMS Tenant administrator guide
Eukleia LMS Tenant administrator guide Version 1.1 Date published 4 January 2017 This guide will occasionally be updated. It is advisable not to download a copy, and instead access it from the LMS each
More informationSetting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager
Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation
More informationProfessional Edition User Guide
Professional Edition User Guide Pronto, Visualizer, and Dashboards 2.0 Birst Software Version 5.28.6 Documentation Release Thursday, October 19, 2017 i Copyright 2015-2017 Birst, Inc. Copyright 2015-2017
More informationSplunk. Splunk. Deployment Guide
Deployment Guide VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationIntroduction to application management
Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to
More informationUSING DRUPAL. Hampshire College Website Editors Guide https://drupal.hampshire.edu
USING DRUPAL Hampshire College Website Editors Guide 2014 https://drupal.hampshire.edu Asha Kinney Hampshire College Information Technology - 2014 HOW TO GET HELP Your best bet is ALWAYS going to be to
More informationAnsible Tower Quick Setup Guide
Ansible Tower Quick Setup Guide Release Ansible Tower 2.4.5 Red Hat, Inc. Jun 06, 2017 CONTENTS 1 Quick Start 2 2 Login as a Superuser 3 3 Import a License 4 4 Examine the Tower Dashboard 6 5 The Setup
More informationElectronic Committees (ecommittees) Frequently Asked Questions v1.0
3 Electronic Committees (ecommittees) Frequently Asked Questions v1.0 SABS 2012-12-06 Table of Contents 1 Contents 1 Login and access... 3 1.1 How to access the ecommittee workspace... 3 1.1.1 Via the
More informationSophos Mobile as a Service
startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6
More informationPardot Setup Implementation Guide
Pardot Setup Implementation Guide Salesforce, Summer 18 @salesforcedocs Last updated: May 31, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
More informationEnd User Manual. December 2014 V1.0
End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationFolder Poll General User s Guide
Document version 11 Product Release version 3.0 Folder Poll General User s Guide MyAssays Ltd. 2016 www.myassays.com Contents Trademarks... 4 Copyright... 4 Additional Software Licensing Notices... 5 Online
More informationThe Electronic Voting System - EVS
The Electronic Voting System - EVS The electronic voting system is based on the MSU surveys application. Its primary purpose is to allow the MSU community to vote on a variety of issues, membership or
More informationinvenio-formatter Documentation
invenio-formatter Documentation Release 1.0.0 CERN Mar 25, 2018 Contents 1 User s Guide 3 1.1 Installation................................................ 3 1.2 Configuration...............................................
More informationNetwork Rail Brand Hub USER GUIDE
Network Rail Brand Hub USER GUIDE The Brand Hub Using keywords, visual thumbnails and a more upto-date online interface, the new Brand Hub will make searching, browsing and downloading images, templates
More informationBMC FootPrints 12 Integration with Remote Support
BMC FootPrints 12 Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are
More informationMail & Deploy Reference Manual. Version 2.0.5
Mail & Deploy Reference Manual Version 2.0.5 Introduction TABLE OF CONTENTS Introduction... 4 General Introduction... 5 Architecture... 6 Server... 6 Repository... 6 Client... 6 Contact Us... 7 Server...
More informationMetalogix Essentials for Office Creating a Backup
Metalogix Essentials for Office 365 2.1 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationNotifySCM Workspace Administration Guide
NotifySCM Workspace Administration Guide TABLE OF CONTENTS 1 Overview... 3 2 Login... 4 2.1 Main View... 5 3 Manage... 6 3.1 PIM... 6 3.2 Document...12 3.3 Server...13 4 Workspace Configuration... 14 4.1
More informationQuickBooks Payments For WooCommerce : Introduction: Installation: Requirements:
QuickBooks Payments For WooCommerce : Introduction: QuickBooks Payments For WooCommerce provides an easier, cost effective and simple alternative for a small business for accepting credit cards. Customers
More informationACTIVE Net Insights user guide. (v5.4)
ACTIVE Net Insights user guide (v5.4) Version Date 5.4 January 23, 2018 5.3 November 28, 2017 5.2 October 24, 2017 5.1 September 26, 2017 ACTIVE Network, LLC 2017 Active Network, LLC, and/or its affiliates
More informationSetting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1
Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date
More informationWelcome to the Investor Experience
Welcome to the Investor Experience Welcome to the Black Diamond Investor Experience, a platform that allows advisors to customize how they present information to their clients. This document provides important
More informationSync User Guide. Powered by Axient Anchor
Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7
More informationPulse LMS: User Management Guide Version: 1.86
Pulse LMS: User Management Guide Version: 1.86 This Guide focuses on the tools that support User Managers. Please consult our separate guides for processes for end users, learning management and administration
More informationEnterprise Payment Solutions. Scanner Installation April EPS Scanner Installation: Quick Start for Remote Deposit Complete TM
Enterprise Payment Solutions Complete TM Portions of this software: Copyright 2004-2013 Apache Software Foundation Copyright 2005 Paul Querna Copyright 2008 Marc Gravell Copyright 2000-2007 Niels Provos
More informationNDIS Implementation Guide
NDIS Implementation Guide Last Update: February 2016 Interactive Reporting Pty Ltd ABN 68 128 589 266 8/248 Miller Street NORTH SYDNEY NSW 2060 Ph: (61 2) 8011 1511 Email: info@bi4cloud.com Website: www.bi4cloud.com
More informationIBM Atlas Policy Distribution Administrators Guide: IER Connector. for IBM Atlas Suite v6
IBM Atlas Policy Distribution Administrators Guide: IER Connector for IBM Atlas Suite v6 IBM Atlas Policy Distribution: IER Connector This edition applies to version 6.0 of IBM Atlas Suite (product numbers
More informationInstallation & Configuration Guide Enterprise/Unlimited Edition
Installation & Configuration Guide Enterprise/Unlimited Edition Version 2.3 Updated January 2014 Table of Contents Getting Started... 3 Introduction... 3 Requirements... 3 Support... 4 Recommended Browsers...
More informationEventCenter Training SEPTEMBER CrowdCompass 2505 SE 11 th Ave, Suite #300 Portland, OR
EventCenter Training SEPTEMBER 2014 CrowdCompass 2505 SE 11 th Ave, Suite #300 Portland, OR www.crowdcompass.com Toll-free: +1.888.889.3069 Fax: +1.877.615.6699 Contents Familiarize Yourself... 3 Introduction...
More informationJoomla 3.X Global Settings Part III Server Settings
Joomla 3.X Global Settings Part III Server Settings Diagram 1 Path to Temp Folder: This is a text box adjacent to this prompt which holds the path to Joomla s temp folder on the web server. This is the
More informationConnecture Platform Manager
Connecture Platform Manager 1 P a g e Table of Contents Connecture Platform Manager... 1 Introduction to the Connecture Platform Manager... 3 Getting Started... 3 Login... 3 Dashboard... 3 Connecture Application
More informationHotDocs Document Services. Administrator s Guide
HotDocs Document Services Administrator s Guide Copyright 2014 HotDocs Limited. All rights reserved. No part of this product may be reproduced, transmitted, transcribed, stored in a retrieval system, or
More informationMicrosoft Windows SharePoint Services
Microsoft Windows SharePoint Services SITE ADMIN USER TRAINING 1 Introduction What is Microsoft Windows SharePoint Services? Windows SharePoint Services (referred to generically as SharePoint) is a tool
More informationHow to Use Google. Sign in to your Chromebook. Let s get started: The sign-in screen. https://www.youtube.com/watch?v=ncnswv70qgg
How to Use Google Sign in to your Chromebook https://www.youtube.com/watch?v=ncnswv70qgg Use a Google Account to sign in to your Chromebook. A Google Account lets you access all of Google s web services
More informationutidylib Documentation Release 0.4
utidylib Documentation Release 0.4 Michal Čihař Nov 01, 2018 Contents 1 Installing 3 2 Contributing 5 3 Running testsuite 7 4 Building documentation 9 5 License 11 6 Changes 13 6.1 0.5....................................................
More informationAdministrator Quick Guide
1 Administrator Quick Guide Login Screen The first page employees will see when visiting their training site is the login screen. This is where employees must enter their username and password to access
More informationPHP-FCM Documentation
PHP-FCM Documentation Release 0.0.1 Edwin Hoksberg Apr 09, 2018 Contents 1 Overview 3 1.1 Requirements............................................... 3 1.2 Running the tests.............................................
More informationCloudiway Google Groups migration. Migrate from Google Groups to Office 365 groups
Cloudiway Google Groups migration Migrate from Google Groups to Office 365 groups Copyright 2017 CLOUDIWAY. All right reserved. Use of any CLOUDIWAY solution is governed by the license agreement included
More informationWelcome To Account Manager 2.0
Account Manager 2.0 Manage Unlimited FileMaker Servers, Databases, Privileges, and Users Effortlessly! The ultimate tool for FileMaker Database Administrators. Welcome To Account Manager 2.0 What Is Account
More informationCUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING &
Table of Contents CUSTOMER CONTROL PANEL... 2 LOGGING IN... 2 RESET YOUR PASSWORD... 2 DASHBOARD... 3 HOSTING & EMAIL... 4 WEB FORWARDING... 4 WEBSITE... 5 Usage... 5 Subdomains... 5 SSH Access... 6 File
More informationTenable.io User Guide. Last Revised: November 03, 2017
Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link
More informationGRS Enterprise Synchronization Tool
GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table
More informationAnchor User Guide. Presented by: Last Revised: August 07, 2017
Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...
More informationPolycom RealAccess, Cloud Edition
ADMINISTRATOR GUIDE January 2018 3725-47131-001E Polycom RealAccess, Cloud Edition Copyright 2017, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another
More informationAGENT123. Full Q&A and Tutorials Table of Contents. Website IDX Agent Gallery Step-by-Step Tutorials
AGENT123 Full Q&A and Tutorials Table of Contents Website IDX Agent Gallery Step-by-Step Tutorials WEBSITE General 1. How do I log into my website? 2. How do I change the Meta Tags on my website? 3. How
More informationGetting Started with the Aloha Community Template for Salesforce Identity
Getting Started with the Aloha Community Template for Salesforce Identity Salesforce, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved.
More information271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA
Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.
More information