Utilization
This section covers the general operation and use of Sandfly.
Getting Started Quickly Sandfly Dashboard Sandfly is easy to setup. Once you have installed the Server and Node, perform the following steps outli...
Tue, 4 Oct, 2022 at 4:09 PM
How to Interpret Any Alarms Sandfly is written very carefully to not have false alarms. Many of the threats Sandfly detects are so specific to a comprom...
Tue, 9 Aug, 2022 at 6:01 PM
Custom sandflies can be cloned to enhance the system sandflies or create entirely new methods of security analysis that may be unique to your operational en...
Wed, 22 Feb, 2023 at 1:55 PM
The Sandfly server provides a REST API to further expand its functionality. The full list of calls for the Sandfly API are available at: https://api.s...
Thu, 26 Jan, 2023 at 4:34 PM
Sandfly typically uses credentials stored in its own database to log in to target hosts with SSH. These credentials are encrypted using a public key, and on...
Fri, 27 Jan, 2023 at 2:09 PM