LogoLogo
Get Demo
  • πŸ’«NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • Microsoft Page View Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Integrating Microsoft Defender with Keepnet Phishing Reporter
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • πŸ“šRESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • βš–οΈLegal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright Β© Keepnet Labs LTD. All rights reserved.

On this page
  • On-premise Requirement Checker
  • Download the OPRC
  • OPRC Setup
  • Configurations
  • Database Configuration
  • Current UI and New UI Tabs
  • Output
  • FAQ
  • Q: What should I do when all requirements are completed?

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Miscellaneous

On-Premise Requirement Checker

On-premise Requirement Checker

This section provides a detailed explanation of the On-premise Requirement Checker (OPRC) to ensure that the installation and configuration process of the platform will be easy.

Download the OPRC

This tool allows you to easily verify that your system meets the platform requirements before installation to speed up the process. You can download and install the OPRC tool to the server using this link.

OPRC Setup

Once the OPRC has been downloaded to the servers where the platform will be installed, only a few steps are necessary to assess and configure the required settings.

  • Run the setup file as administrator.

  • Click the Next button.

  • Leave the Installation Folder as the default option. Select Everyone and click the Next button.

  • Click the Next button to complete the installation.

Once the installation is complete, you will find a shortcut on the desktop to run the application.

Configurations

When the application is launched, you can evaluate and adjust the following elements under the Configurations heading.

LDAP Configuration

The platform needs to provide a connection to the Active Directory server located in the client's internal network in order to integrate the active directory over LDAP to fetch and synchronize users to the platform.

The following components are used to ensure the connection has been established:

Server IP or Hostname

Active Directory server IP or hostname information. If a different port is preferred for the connection, use IP:PORT format.

Username

Domain username used to login to the active directory server. It should be specified as Domain\Username.

Password

Password of the user to login to the active directory server.

Test Configuration

Confirm the configuration.

If the configuration test results in an error, go to the Output tab for details of the problem.

Proxy Configuration

A proxy server may be required to successfully use the platform if the customer wish the on-premise server to go through the internet over their proxy server. The following components are used to establish the proxy server connection to the internet.

Server IP or Hostname

Proxy Server’s IP or Hostname

Server Port

Port used to connect to the proxy server

Authentication

If authentication is required for connections to the proxy server, this option should be enabled.

Username

If authentication is required for connection to the proxy server, provide the name of the authorized user.

Password

If authentication is required for connection to the proxy server, provide the password of the authorized user.

Test Configuration

Confirm the configuration.

If the test results in an error, go to the Output tab for details of the problem.

Database Configuration

The platform database must have a connection to the server. The necessary components for two popular server types are provided below.

Microsoft SQL Server

This step is not necessary if the Next Generation Product has been installed.

Server IP or Hostname

IP or hostname of the Microsoft SQL server. If a different port is preferred for the connection, use IP:PORT format.

Database Name

Name of the database where the product is going to be installed

Username

If a SQL authentication method is required for connection to

Microsoft SQL server, provide the name of the authorized user.

Password

If a SQL authentication method is required for connection to Microsoft SQL server, provide the password of the authorized user.

Windows Authentication

If the Windows authentication method is used for connection to Microsoft SQL server, this option should be enabled. This should be the user who activates the OPRC tool.

Test Configuration

Confirm the configuration

If the test results in an error, go to the Output tab for details of the problem.

PostgreSQL Server

This step is not necessary if the Current UI (legacy interface) has been installed.

Server IP or Hostname

IP or Hostname of the PostgreSQL server

Port

Port used to connect to the PostgreSQL server

Database Name

Name of the database where the product is installed

Username

If a SQL authentication method is required for connection to the PostgreSQL server, provide the name of the authorized user.

Password

If a SQL authentication method is required for connection to the PostgreSQL server, provide the password of the authorized user.

Test Configuration

Confirm the configuration

If the test results in an error, go to the Output tab for details of the problem.

Current UI and New UI Tabs

The OPRC will check the hardware and software settings to ensure that the requirements are met for the successful use of the platform.

  • A β€œβœ“β€ icon indicates that the platform can be installed and implemented.

  • An β€œβœ˜β€ icon indicates that an element must be revised.

Output

The Output tab provides an explanation of how to revise any settings required to ensure successful use of the platform.

FAQ

Q: What should I do when all requirements are completed?

A: You can contact with the support team for further installation process by sharing that all requirements are completed and checked with the tool.

PreviousMulti-Factor Authentication (MFA) SettingsNextPlatform Requirements

Last updated 1 year ago

Was this helpful?

In order to use the product, the ability to send anonymous emails must be enabled.

πŸ’«
Phishing Simulator