Old UI
  • Documentation Platform
    • Technical Guide
      • Whitelisting
        • Whitelisting the Pictures on Microsoft Outlook Apps
      • Minimum Requirements
      • On-Premise Requirements
        • Restricting the Access to Portal According IP
          • How to Import SSL Certificates in IIS
        • Why does the disk on the server fill up fast?
      • Getting Started
      • Phishing Simulator
      • Awareness Educator
      • Incident Responder
        • How does investigation mechanism work?
          • Benefits of Phishing Incident Responder
          • Reverse Engineering Support
          • Privacy and Security
          • Audit
          • Integrations
        • API Settings
          • Configuration steps for Office 365: Microsoft Graph App Configuration
          • Exchange Mail Configuration
          • GSuite API Configuration Guide
          • Gsuite Mail Configration
        • Analysing Suspicious Emails
          • Starting an Automatic Incident Investigation
          • Starting a Manual Incident Investigation
          • Playbook
        • FAQ (Incident Responder&Phishing Reporter)
      • Phishing Reporter Add-In
        • Installation
        • Microsoft Defender Email Reporter Add-In
      • Email Threat Simulator (ETS)
        • Creating a Trusted Account for E-mail Security Tests
          • Restriction of the Authority of the Test Account
          • Restrict Email Address
          • Enable Mailbox Audit Logging for Test Account
        • Dashboard
        • Quick Scan
        • Advanced Scan
        • Interpretation of ETS Report
        • FAQ ( ETS)
      • Threat Intelligence
        • FAQ (Threat Intelligence)
      • Report Manager
        • Phishing Campaign Report List
          • Phishing Campaign Summary
          • Statistics
          • Opened Email
          • Clicked Link in The Phishing Campaign Email
          • Submitted Form
          • Opened Attachment
          • Phishing Reporter
          • Campaign No response
          • Email Delivery Report
          • Phishing User Compare
          • Departments
        • Training Campaign Reports
          • Training Summary
          • Training Statistics
          • Opened Training Email
          • Clicked Training Link
          • View Duration
          • No Response
          • Sending Report
          • Training User Compare
          • Exam
        • Users KPI
          • User-based Grade
          • Department-based Grade
          • Target Group based grade
          • Company-based grade
        • Advanced Reporting
      • Company
        • User Role Management
      • Advanced Settings
        • Allow Email Domains
        • White Labelling
        • LDAP Settings
        • SCIM Integrations
        • Notification Templates
          • Short Codes
          • Using Notification Templates
        • Data Anonymisation
      • Available for Option
      • API Guide
        • REST API for Incident Responder (IR) Operation
        • REST API for SSO Authentication
      • Diagnostic Tool
        • FAQ
    • Maintenance Tool
    • FAQ (All Modules)
      • Video Tutorials
        • Quick Start
        • Google Workspace API Configuration Guide
        • On Premise Requirement Checker Video
        • Phishing Reporter Installation & Deployment
Powered by GitBook
On this page
  • System Requirements,
  • Portal
  • Phishing Reporter
  • Diagnostic Tool
  1. Documentation Platform
  2. Technical Guide

Minimum Requirements

System Requirements,

You must meet the minimum requirements below to use the platform's solutions.

Portal

  • Browser, Chrome 17.0+, Firefox 2+, IE 11+

  • Internet connectivity at least 512 kbps

  • An updated operating system (Windows 7 or above, Mac Os X, Ubuntu)

  • IOS 11+ and Android 4.4.4 +

  • Processor, Pentium 4 processor (2.0 GHz, or better)

  • Ram, 256 MB

  • Video Card: Minimum requirement: 128MB of video memory

  • Sound Card: Minimum requirement: 16-bit

  • Screen resolution: 1024 x 768 or higher

  • Pop-up blockers: It is recommended that pop-up blockers be disabled to avoid issues with viewing some content when launched via the LMS.

  • JavaScript: Enabled

  • Cookies: Enabled

Phishing Reporter

  • Microsoft Office 2010 +

  • An updated operating system (Windows 7 or above, Mac Os X, Ubuntu)

  • Ram: 256 MB

  • Processor: Pentium 4 processor (2.0 GHz, or better)

  • Minimum NET Framework 4.0 +

  • Network access to dashboard.keepnetlabs.com or on-premise server (80, 443)

  • Hard drive space: 3 MB

Diagnostic Tool

  • Access to dashboard.keepnetlabs.com or on-premise server

  • Network access to dashboard.keepnetlabs.com or on-premise server (80, 443)

  • An updated operating system (Windows 7 or above, Mac Os X, Ubuntu)

  • Ram: 256 MB

  • Processor: Pentium 4 processor (2.0 GHz, or better)

  • Hard drive space: 5 MB

PreviousWhitelisting the Pictures on Microsoft Outlook AppsNextOn-Premise Requirements

Last updated 1 year ago

See the list of supported versions:

Visual Studio 2010 Tools for Office Runtime
https://doc.keepnetlabs.com/technical-guide/phishing-reporter-add-in#compatability